Date
June 20, 2025, 12:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.938135] ================================================================== [ 35.938920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 35.939213] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.939446] [ 35.939929] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.940784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.941437] Hardware name: linux,dummy-virt (DT) [ 35.941659] Call trace: [ 35.941759] show_stack+0x20/0x38 (C) [ 35.941911] dump_stack_lvl+0x8c/0xd0 [ 35.942002] print_report+0x118/0x608 [ 35.942087] kasan_report+0xdc/0x128 [ 35.942170] kasan_check_range+0x100/0x1a8 [ 35.942272] __kasan_check_write+0x20/0x30 [ 35.942383] kasan_atomics_helper+0xff0/0x4858 [ 35.943623] kasan_atomics+0x198/0x2e0 [ 35.943976] kunit_try_run_case+0x170/0x3f0 [ 35.944623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.944799] kthread+0x328/0x630 [ 35.944922] ret_from_fork+0x10/0x20 [ 35.945161] [ 35.945242] Allocated by task 276: [ 35.945418] kasan_save_stack+0x3c/0x68 [ 35.945856] kasan_save_track+0x20/0x40 [ 35.945943] kasan_save_alloc_info+0x40/0x58 [ 35.946087] __kasan_kmalloc+0xd4/0xd8 [ 35.946181] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.946279] kasan_atomics+0xb8/0x2e0 [ 35.946462] kunit_try_run_case+0x170/0x3f0 [ 35.946924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.947277] kthread+0x328/0x630 [ 35.947447] ret_from_fork+0x10/0x20 [ 35.947554] [ 35.947795] The buggy address belongs to the object at fff00000c768c580 [ 35.947795] which belongs to the cache kmalloc-64 of size 64 [ 35.948651] The buggy address is located 0 bytes to the right of [ 35.948651] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.948892] [ 35.948945] The buggy address belongs to the physical page: [ 35.949013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.949113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.949220] page_type: f5(slab) [ 35.949320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.949454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.949571] page dumped because: kasan: bad access detected [ 35.950197] [ 35.950392] Memory state around the buggy address: [ 35.950883] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.951233] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.951535] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.952157] ^ [ 35.952696] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.952849] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.952967] ================================================================== [ 35.860988] ================================================================== [ 35.861346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.861575] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.861739] [ 35.861838] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.862071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.862509] Hardware name: linux,dummy-virt (DT) [ 35.862944] Call trace: [ 35.863016] show_stack+0x20/0x38 (C) [ 35.863935] dump_stack_lvl+0x8c/0xd0 [ 35.864182] print_report+0x118/0x608 [ 35.864716] kasan_report+0xdc/0x128 [ 35.864869] __asan_report_load8_noabort+0x20/0x30 [ 35.864970] kasan_atomics_helper+0x3f58/0x4858 [ 35.865075] kasan_atomics+0x198/0x2e0 [ 35.865193] kunit_try_run_case+0x170/0x3f0 [ 35.865302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.865432] kthread+0x328/0x630 [ 35.865705] ret_from_fork+0x10/0x20 [ 35.866128] [ 35.866331] Allocated by task 276: [ 35.866598] kasan_save_stack+0x3c/0x68 [ 35.867169] kasan_save_track+0x20/0x40 [ 35.867308] kasan_save_alloc_info+0x40/0x58 [ 35.867432] __kasan_kmalloc+0xd4/0xd8 [ 35.867941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.868074] kasan_atomics+0xb8/0x2e0 [ 35.868181] kunit_try_run_case+0x170/0x3f0 [ 35.868289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.868402] kthread+0x328/0x630 [ 35.869042] ret_from_fork+0x10/0x20 [ 35.869154] [ 35.869201] The buggy address belongs to the object at fff00000c768c580 [ 35.869201] which belongs to the cache kmalloc-64 of size 64 [ 35.869847] The buggy address is located 0 bytes to the right of [ 35.869847] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.870047] [ 35.870444] The buggy address belongs to the physical page: [ 35.870858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.871030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.871174] page_type: f5(slab) [ 35.871286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.872014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.872545] page dumped because: kasan: bad access detected [ 35.873007] [ 35.873067] Memory state around the buggy address: [ 35.873153] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.873258] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.873375] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.873482] ^ [ 35.874415] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.874568] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.874695] ================================================================== [ 36.007389] ================================================================== [ 36.007716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.008191] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.008798] [ 36.008977] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.009170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.009224] Hardware name: linux,dummy-virt (DT) [ 36.009735] Call trace: [ 36.009844] show_stack+0x20/0x38 (C) [ 36.010324] dump_stack_lvl+0x8c/0xd0 [ 36.010920] print_report+0x118/0x608 [ 36.011279] kasan_report+0xdc/0x128 [ 36.011403] kasan_check_range+0x100/0x1a8 [ 36.011879] __kasan_check_write+0x20/0x30 [ 36.012035] kasan_atomics_helper+0x1190/0x4858 [ 36.012528] kasan_atomics+0x198/0x2e0 [ 36.012900] kunit_try_run_case+0x170/0x3f0 [ 36.013283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.013788] kthread+0x328/0x630 [ 36.013904] ret_from_fork+0x10/0x20 [ 36.014001] [ 36.014043] Allocated by task 276: [ 36.014560] kasan_save_stack+0x3c/0x68 [ 36.014780] kasan_save_track+0x20/0x40 [ 36.015195] kasan_save_alloc_info+0x40/0x58 [ 36.015412] __kasan_kmalloc+0xd4/0xd8 [ 36.015593] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.015793] kasan_atomics+0xb8/0x2e0 [ 36.015885] kunit_try_run_case+0x170/0x3f0 [ 36.016443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.016576] kthread+0x328/0x630 [ 36.016939] ret_from_fork+0x10/0x20 [ 36.017222] [ 36.017272] The buggy address belongs to the object at fff00000c768c580 [ 36.017272] which belongs to the cache kmalloc-64 of size 64 [ 36.017428] The buggy address is located 0 bytes to the right of [ 36.017428] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.017592] [ 36.017688] The buggy address belongs to the physical page: [ 36.017868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.018036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.018175] page_type: f5(slab) [ 36.018811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.018959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.019281] page dumped because: kasan: bad access detected [ 36.019953] [ 36.020010] Memory state around the buggy address: [ 36.020106] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.020884] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.021082] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.021486] ^ [ 36.021570] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.021872] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.022117] ================================================================== [ 35.878699] ================================================================== [ 35.878856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.879003] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.879142] [ 35.879237] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.880654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.880966] Hardware name: linux,dummy-virt (DT) [ 35.881333] Call trace: [ 35.881438] show_stack+0x20/0x38 (C) [ 35.881997] dump_stack_lvl+0x8c/0xd0 [ 35.882714] print_report+0x118/0x608 [ 35.883174] kasan_report+0xdc/0x128 [ 35.883313] kasan_check_range+0x100/0x1a8 [ 35.883723] __kasan_check_write+0x20/0x30 [ 35.884057] kasan_atomics_helper+0xe44/0x4858 [ 35.884307] kasan_atomics+0x198/0x2e0 [ 35.885874] kunit_try_run_case+0x170/0x3f0 [ 35.886033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.886109] kthread+0x328/0x630 [ 35.886163] ret_from_fork+0x10/0x20 [ 35.886226] [ 35.886255] Allocated by task 276: [ 35.886296] kasan_save_stack+0x3c/0x68 [ 35.886355] kasan_save_track+0x20/0x40 [ 35.886401] kasan_save_alloc_info+0x40/0x58 [ 35.886450] __kasan_kmalloc+0xd4/0xd8 [ 35.886495] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.886543] kasan_atomics+0xb8/0x2e0 [ 35.886586] kunit_try_run_case+0x170/0x3f0 [ 35.886707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.886831] kthread+0x328/0x630 [ 35.886924] ret_from_fork+0x10/0x20 [ 35.887252] [ 35.887330] The buggy address belongs to the object at fff00000c768c580 [ 35.887330] which belongs to the cache kmalloc-64 of size 64 [ 35.887664] The buggy address is located 0 bytes to the right of [ 35.887664] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.887857] [ 35.888527] The buggy address belongs to the physical page: [ 35.888740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.889063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.889213] page_type: f5(slab) [ 35.889326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.889814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.890004] page dumped because: kasan: bad access detected [ 35.890100] [ 35.890240] Memory state around the buggy address: [ 35.890390] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.890515] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.890643] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.890747] ^ [ 35.890854] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.891028] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.891139] ================================================================== [ 35.893368] ================================================================== [ 35.893848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.893992] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.894096] [ 35.894186] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.894354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.894419] Hardware name: linux,dummy-virt (DT) [ 35.894486] Call trace: [ 35.894535] show_stack+0x20/0x38 (C) [ 35.894667] dump_stack_lvl+0x8c/0xd0 [ 35.894772] print_report+0x118/0x608 [ 35.894880] kasan_report+0xdc/0x128 [ 35.894995] __asan_report_store8_noabort+0x20/0x30 [ 35.896980] kasan_atomics_helper+0x3e5c/0x4858 [ 35.897216] kasan_atomics+0x198/0x2e0 [ 35.897331] kunit_try_run_case+0x170/0x3f0 [ 35.897438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.898573] kthread+0x328/0x630 [ 35.899172] ret_from_fork+0x10/0x20 [ 35.899435] [ 35.899699] Allocated by task 276: [ 35.899790] kasan_save_stack+0x3c/0x68 [ 35.900347] kasan_save_track+0x20/0x40 [ 35.900507] kasan_save_alloc_info+0x40/0x58 [ 35.901069] __kasan_kmalloc+0xd4/0xd8 [ 35.901548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.901880] kasan_atomics+0xb8/0x2e0 [ 35.901981] kunit_try_run_case+0x170/0x3f0 [ 35.902359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.902861] kthread+0x328/0x630 [ 35.903317] ret_from_fork+0x10/0x20 [ 35.903689] [ 35.903754] The buggy address belongs to the object at fff00000c768c580 [ 35.903754] which belongs to the cache kmalloc-64 of size 64 [ 35.904274] The buggy address is located 0 bytes to the right of [ 35.904274] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.904455] [ 35.904539] The buggy address belongs to the physical page: [ 35.904639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.904797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.904910] page_type: f5(slab) [ 35.904993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.905336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.905455] page dumped because: kasan: bad access detected [ 35.905735] [ 35.905799] Memory state around the buggy address: [ 35.905928] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.906086] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.906199] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.906361] ^ [ 35.906745] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.906941] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.907083] ================================================================== [ 36.153527] ================================================================== [ 36.153694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 36.153849] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.153987] [ 36.154079] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.154309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.154381] Hardware name: linux,dummy-virt (DT) [ 36.154918] Call trace: [ 36.155060] show_stack+0x20/0x38 (C) [ 36.155323] dump_stack_lvl+0x8c/0xd0 [ 36.155521] print_report+0x118/0x608 [ 36.155971] kasan_report+0xdc/0x128 [ 36.156163] __asan_report_load8_noabort+0x20/0x30 [ 36.156364] kasan_atomics_helper+0x3e10/0x4858 [ 36.156573] kasan_atomics+0x198/0x2e0 [ 36.156767] kunit_try_run_case+0x170/0x3f0 [ 36.157198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.157309] kthread+0x328/0x630 [ 36.157406] ret_from_fork+0x10/0x20 [ 36.157529] [ 36.157645] Allocated by task 276: [ 36.157754] kasan_save_stack+0x3c/0x68 [ 36.158005] kasan_save_track+0x20/0x40 [ 36.158479] kasan_save_alloc_info+0x40/0x58 [ 36.158594] __kasan_kmalloc+0xd4/0xd8 [ 36.159177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.159598] kasan_atomics+0xb8/0x2e0 [ 36.159975] kunit_try_run_case+0x170/0x3f0 [ 36.160129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.160650] kthread+0x328/0x630 [ 36.160895] ret_from_fork+0x10/0x20 [ 36.161011] [ 36.161071] The buggy address belongs to the object at fff00000c768c580 [ 36.161071] which belongs to the cache kmalloc-64 of size 64 [ 36.161232] The buggy address is located 0 bytes to the right of [ 36.161232] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.161363] [ 36.161404] The buggy address belongs to the physical page: [ 36.161825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.162238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.162638] page_type: f5(slab) [ 36.162762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.163026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.163288] page dumped because: kasan: bad access detected [ 36.163381] [ 36.163438] Memory state around the buggy address: [ 36.163529] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.163669] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.163796] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.163905] ^ [ 36.164540] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.164737] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.165073] ================================================================== [ 36.122503] ================================================================== [ 36.122656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.122778] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.122897] [ 36.122990] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.123257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.123365] Hardware name: linux,dummy-virt (DT) [ 36.123475] Call trace: [ 36.123586] show_stack+0x20/0x38 (C) [ 36.123771] dump_stack_lvl+0x8c/0xd0 [ 36.123939] print_report+0x118/0x608 [ 36.124101] kasan_report+0xdc/0x128 [ 36.124227] kasan_check_range+0x100/0x1a8 [ 36.124391] __kasan_check_write+0x20/0x30 [ 36.124499] kasan_atomics_helper+0x1644/0x4858 [ 36.124711] kasan_atomics+0x198/0x2e0 [ 36.124849] kunit_try_run_case+0x170/0x3f0 [ 36.124965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.125117] kthread+0x328/0x630 [ 36.125261] ret_from_fork+0x10/0x20 [ 36.125371] [ 36.125419] Allocated by task 276: [ 36.125492] kasan_save_stack+0x3c/0x68 [ 36.125629] kasan_save_track+0x20/0x40 [ 36.125710] kasan_save_alloc_info+0x40/0x58 [ 36.125825] __kasan_kmalloc+0xd4/0xd8 [ 36.125922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.126014] kasan_atomics+0xb8/0x2e0 [ 36.126082] kunit_try_run_case+0x170/0x3f0 [ 36.126164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.126261] kthread+0x328/0x630 [ 36.126335] ret_from_fork+0x10/0x20 [ 36.126415] [ 36.126469] The buggy address belongs to the object at fff00000c768c580 [ 36.126469] which belongs to the cache kmalloc-64 of size 64 [ 36.126638] The buggy address is located 0 bytes to the right of [ 36.126638] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.126848] [ 36.126913] The buggy address belongs to the physical page: [ 36.127003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.127150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.127283] page_type: f5(slab) [ 36.127427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.127561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.127674] page dumped because: kasan: bad access detected [ 36.127756] [ 36.127803] Memory state around the buggy address: [ 36.127893] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.128013] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.128127] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.128233] ^ [ 36.128410] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.128520] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.128635] ================================================================== [ 35.919841] ================================================================== [ 35.919933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 35.920014] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.920076] [ 35.920127] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.920231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.920267] Hardware name: linux,dummy-virt (DT) [ 35.921182] Call trace: [ 35.921270] show_stack+0x20/0x38 (C) [ 35.921403] dump_stack_lvl+0x8c/0xd0 [ 35.921528] print_report+0x118/0x608 [ 35.921668] kasan_report+0xdc/0x128 [ 35.921781] kasan_check_range+0x100/0x1a8 [ 35.921902] __kasan_check_write+0x20/0x30 [ 35.923710] kasan_atomics_helper+0xf20/0x4858 [ 35.923793] kasan_atomics+0x198/0x2e0 [ 35.923851] kunit_try_run_case+0x170/0x3f0 [ 35.923940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.924006] kthread+0x328/0x630 [ 35.924056] ret_from_fork+0x10/0x20 [ 35.924117] [ 35.924144] Allocated by task 276: [ 35.924184] kasan_save_stack+0x3c/0x68 [ 35.924239] kasan_save_track+0x20/0x40 [ 35.924286] kasan_save_alloc_info+0x40/0x58 [ 35.924356] __kasan_kmalloc+0xd4/0xd8 [ 35.924404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.924452] kasan_atomics+0xb8/0x2e0 [ 35.924496] kunit_try_run_case+0x170/0x3f0 [ 35.924541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.924593] kthread+0x328/0x630 [ 35.924707] ret_from_fork+0x10/0x20 [ 35.924795] [ 35.924852] The buggy address belongs to the object at fff00000c768c580 [ 35.924852] which belongs to the cache kmalloc-64 of size 64 [ 35.924986] The buggy address is located 0 bytes to the right of [ 35.924986] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.925067] [ 35.925096] The buggy address belongs to the physical page: [ 35.925137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.925201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.925272] page_type: f5(slab) [ 35.925325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.925386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.925437] page dumped because: kasan: bad access detected [ 35.925477] [ 35.925500] Memory state around the buggy address: [ 35.925544] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.925596] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.925724] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.925842] ^ [ 35.925916] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.926001] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.926077] ================================================================== [ 36.086038] ================================================================== [ 36.086106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.086182] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.086243] [ 36.086292] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.086397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.086429] Hardware name: linux,dummy-virt (DT) [ 36.086473] Call trace: [ 36.086504] show_stack+0x20/0x38 (C) [ 36.086566] dump_stack_lvl+0x8c/0xd0 [ 36.088393] print_report+0x118/0x608 [ 36.088548] kasan_report+0xdc/0x128 [ 36.088684] kasan_check_range+0x100/0x1a8 [ 36.088818] __kasan_check_write+0x20/0x30 [ 36.088936] kasan_atomics_helper+0x147c/0x4858 [ 36.089009] kasan_atomics+0x198/0x2e0 [ 36.089065] kunit_try_run_case+0x170/0x3f0 [ 36.089128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.089193] kthread+0x328/0x630 [ 36.089244] ret_from_fork+0x10/0x20 [ 36.089305] [ 36.089331] Allocated by task 276: [ 36.089372] kasan_save_stack+0x3c/0x68 [ 36.089428] kasan_save_track+0x20/0x40 [ 36.089473] kasan_save_alloc_info+0x40/0x58 [ 36.089524] __kasan_kmalloc+0xd4/0xd8 [ 36.089567] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.089639] kasan_atomics+0xb8/0x2e0 [ 36.089688] kunit_try_run_case+0x170/0x3f0 [ 36.089734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.089787] kthread+0x328/0x630 [ 36.089827] ret_from_fork+0x10/0x20 [ 36.089870] [ 36.089898] The buggy address belongs to the object at fff00000c768c580 [ 36.089898] which belongs to the cache kmalloc-64 of size 64 [ 36.089969] The buggy address is located 0 bytes to the right of [ 36.089969] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.090045] [ 36.090073] The buggy address belongs to the physical page: [ 36.090116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.090183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.090248] page_type: f5(slab) [ 36.090300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.090360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.090412] page dumped because: kasan: bad access detected [ 36.090450] [ 36.090473] Memory state around the buggy address: [ 36.090516] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.090569] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.090733] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.090942] ^ [ 36.091111] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.091351] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.091489] ================================================================== [ 36.115000] ================================================================== [ 36.115180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.115370] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.115576] [ 36.115685] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.115911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.115977] Hardware name: linux,dummy-virt (DT) [ 36.116062] Call trace: [ 36.116126] show_stack+0x20/0x38 (C) [ 36.116259] dump_stack_lvl+0x8c/0xd0 [ 36.116415] print_report+0x118/0x608 [ 36.116534] kasan_report+0xdc/0x128 [ 36.116692] __asan_report_load8_noabort+0x20/0x30 [ 36.116801] kasan_atomics_helper+0x3db0/0x4858 [ 36.116920] kasan_atomics+0x198/0x2e0 [ 36.117047] kunit_try_run_case+0x170/0x3f0 [ 36.117232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.117368] kthread+0x328/0x630 [ 36.117505] ret_from_fork+0x10/0x20 [ 36.117640] [ 36.117709] Allocated by task 276: [ 36.117810] kasan_save_stack+0x3c/0x68 [ 36.117918] kasan_save_track+0x20/0x40 [ 36.118020] kasan_save_alloc_info+0x40/0x58 [ 36.118125] __kasan_kmalloc+0xd4/0xd8 [ 36.118221] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.118325] kasan_atomics+0xb8/0x2e0 [ 36.118415] kunit_try_run_case+0x170/0x3f0 [ 36.118516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.118640] kthread+0x328/0x630 [ 36.118752] ret_from_fork+0x10/0x20 [ 36.118836] [ 36.118885] The buggy address belongs to the object at fff00000c768c580 [ 36.118885] which belongs to the cache kmalloc-64 of size 64 [ 36.119022] The buggy address is located 0 bytes to the right of [ 36.119022] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.119159] [ 36.119213] The buggy address belongs to the physical page: [ 36.119321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.119476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.119636] page_type: f5(slab) [ 36.119736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.119845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.119967] page dumped because: kasan: bad access detected [ 36.120051] [ 36.120094] Memory state around the buggy address: [ 36.120184] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.120327] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.120448] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.120559] ^ [ 36.120666] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.120789] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.120897] ================================================================== [ 35.718712] ================================================================== [ 35.718905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.719044] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.719174] [ 35.719282] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.719747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.719823] Hardware name: linux,dummy-virt (DT) [ 35.719908] Call trace: [ 35.719969] show_stack+0x20/0x38 (C) [ 35.720096] dump_stack_lvl+0x8c/0xd0 [ 35.720155] print_report+0x118/0x608 [ 35.720214] kasan_report+0xdc/0x128 [ 35.720268] kasan_check_range+0x100/0x1a8 [ 35.721075] __kasan_check_write+0x20/0x30 [ 35.721221] kasan_atomics_helper+0xa04/0x4858 [ 35.721331] kasan_atomics+0x198/0x2e0 [ 35.721389] kunit_try_run_case+0x170/0x3f0 [ 35.721453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.721516] kthread+0x328/0x630 [ 35.721570] ret_from_fork+0x10/0x20 [ 35.721658] [ 35.721686] Allocated by task 276: [ 35.721726] kasan_save_stack+0x3c/0x68 [ 35.721782] kasan_save_track+0x20/0x40 [ 35.721827] kasan_save_alloc_info+0x40/0x58 [ 35.721875] __kasan_kmalloc+0xd4/0xd8 [ 35.721918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.721967] kasan_atomics+0xb8/0x2e0 [ 35.722010] kunit_try_run_case+0x170/0x3f0 [ 35.722053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.722105] kthread+0x328/0x630 [ 35.722143] ret_from_fork+0x10/0x20 [ 35.722186] [ 35.722213] The buggy address belongs to the object at fff00000c768c580 [ 35.722213] which belongs to the cache kmalloc-64 of size 64 [ 35.722286] The buggy address is located 0 bytes to the right of [ 35.722286] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.722360] [ 35.722389] The buggy address belongs to the physical page: [ 35.722431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.722496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.722562] page_type: f5(slab) [ 35.722654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.722805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.722995] page dumped because: kasan: bad access detected [ 35.723217] [ 35.723343] Memory state around the buggy address: [ 35.723504] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.723636] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.723767] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.724728] ^ [ 35.725085] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.725585] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.725976] ================================================================== [ 36.100133] ================================================================== [ 36.100277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.100420] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.100541] [ 36.100676] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.100898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.100971] Hardware name: linux,dummy-virt (DT) [ 36.101061] Call trace: [ 36.101133] show_stack+0x20/0x38 (C) [ 36.101251] dump_stack_lvl+0x8c/0xd0 [ 36.101407] print_report+0x118/0x608 [ 36.101551] kasan_report+0xdc/0x128 [ 36.101934] kasan_check_range+0x100/0x1a8 [ 36.102215] __kasan_check_write+0x20/0x30 [ 36.102478] kasan_atomics_helper+0x154c/0x4858 [ 36.102591] kasan_atomics+0x198/0x2e0 [ 36.102693] kunit_try_run_case+0x170/0x3f0 [ 36.102817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.102945] kthread+0x328/0x630 [ 36.103076] ret_from_fork+0x10/0x20 [ 36.103196] [ 36.103244] Allocated by task 276: [ 36.103324] kasan_save_stack+0x3c/0x68 [ 36.103449] kasan_save_track+0x20/0x40 [ 36.103549] kasan_save_alloc_info+0x40/0x58 [ 36.103674] __kasan_kmalloc+0xd4/0xd8 [ 36.103773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.103883] kasan_atomics+0xb8/0x2e0 [ 36.104019] kunit_try_run_case+0x170/0x3f0 [ 36.104166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.104286] kthread+0x328/0x630 [ 36.104399] ret_from_fork+0x10/0x20 [ 36.104492] [ 36.104554] The buggy address belongs to the object at fff00000c768c580 [ 36.104554] which belongs to the cache kmalloc-64 of size 64 [ 36.104702] The buggy address is located 0 bytes to the right of [ 36.104702] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.104889] [ 36.104943] The buggy address belongs to the physical page: [ 36.105042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.105186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.105329] page_type: f5(slab) [ 36.105429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.105577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.105713] page dumped because: kasan: bad access detected [ 36.105800] [ 36.105855] Memory state around the buggy address: [ 36.105946] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.106083] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.106195] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.106288] ^ [ 36.106382] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.106523] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.106692] ================================================================== [ 36.061475] ================================================================== [ 36.061646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.061793] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.062150] [ 36.062262] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.062474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.062543] Hardware name: linux,dummy-virt (DT) [ 36.062641] Call trace: [ 36.062741] show_stack+0x20/0x38 (C) [ 36.062984] dump_stack_lvl+0x8c/0xd0 [ 36.063160] print_report+0x118/0x608 [ 36.063330] kasan_report+0xdc/0x128 [ 36.063522] kasan_check_range+0x100/0x1a8 [ 36.063835] __kasan_check_write+0x20/0x30 [ 36.064007] kasan_atomics_helper+0x1384/0x4858 [ 36.064134] kasan_atomics+0x198/0x2e0 [ 36.064258] kunit_try_run_case+0x170/0x3f0 [ 36.064449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.064605] kthread+0x328/0x630 [ 36.064740] ret_from_fork+0x10/0x20 [ 36.064921] [ 36.065001] Allocated by task 276: [ 36.065116] kasan_save_stack+0x3c/0x68 [ 36.065269] kasan_save_track+0x20/0x40 [ 36.065353] kasan_save_alloc_info+0x40/0x58 [ 36.065434] __kasan_kmalloc+0xd4/0xd8 [ 36.065725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.065861] kasan_atomics+0xb8/0x2e0 [ 36.065967] kunit_try_run_case+0x170/0x3f0 [ 36.066077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.066199] kthread+0x328/0x630 [ 36.066335] ret_from_fork+0x10/0x20 [ 36.066476] [ 36.066567] The buggy address belongs to the object at fff00000c768c580 [ 36.066567] which belongs to the cache kmalloc-64 of size 64 [ 36.066797] The buggy address is located 0 bytes to the right of [ 36.066797] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.066989] [ 36.067081] The buggy address belongs to the physical page: [ 36.067181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.067330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.067481] page_type: f5(slab) [ 36.067589] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.067720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.067939] page dumped because: kasan: bad access detected [ 36.068100] [ 36.068150] Memory state around the buggy address: [ 36.068239] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.068369] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.068499] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.068625] ^ [ 36.068716] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.068814] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.068892] ================================================================== [ 36.107477] ================================================================== [ 36.107574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.107683] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.107747] [ 36.107799] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.107905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.107937] Hardware name: linux,dummy-virt (DT) [ 36.107980] Call trace: [ 36.108011] show_stack+0x20/0x38 (C) [ 36.108073] dump_stack_lvl+0x8c/0xd0 [ 36.108126] print_report+0x118/0x608 [ 36.108183] kasan_report+0xdc/0x128 [ 36.108236] kasan_check_range+0x100/0x1a8 [ 36.108291] __kasan_check_write+0x20/0x30 [ 36.108344] kasan_atomics_helper+0x15b4/0x4858 [ 36.108401] kasan_atomics+0x198/0x2e0 [ 36.108455] kunit_try_run_case+0x170/0x3f0 [ 36.108512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.108575] kthread+0x328/0x630 [ 36.108717] ret_from_fork+0x10/0x20 [ 36.108895] [ 36.108957] Allocated by task 276: [ 36.109051] kasan_save_stack+0x3c/0x68 [ 36.109146] kasan_save_track+0x20/0x40 [ 36.109217] kasan_save_alloc_info+0x40/0x58 [ 36.109293] __kasan_kmalloc+0xd4/0xd8 [ 36.109368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.109463] kasan_atomics+0xb8/0x2e0 [ 36.109558] kunit_try_run_case+0x170/0x3f0 [ 36.109673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.109778] kthread+0x328/0x630 [ 36.109871] ret_from_fork+0x10/0x20 [ 36.109969] [ 36.110028] The buggy address belongs to the object at fff00000c768c580 [ 36.110028] which belongs to the cache kmalloc-64 of size 64 [ 36.110188] The buggy address is located 0 bytes to the right of [ 36.110188] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.110362] [ 36.110420] The buggy address belongs to the physical page: [ 36.111570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.111737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.111882] page_type: f5(slab) [ 36.111995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.112127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.112236] page dumped because: kasan: bad access detected [ 36.112361] [ 36.112412] Memory state around the buggy address: [ 36.112544] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.112863] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.113000] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.113438] ^ [ 36.113590] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.113800] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.114016] ================================================================== [ 35.911630] ================================================================== [ 35.911783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.911925] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.912055] [ 35.912152] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.912380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.912457] Hardware name: linux,dummy-virt (DT) [ 35.912540] Call trace: [ 35.912603] show_stack+0x20/0x38 (C) [ 35.912783] dump_stack_lvl+0x8c/0xd0 [ 35.912913] print_report+0x118/0x608 [ 35.913032] kasan_report+0xdc/0x128 [ 35.913158] kasan_check_range+0x100/0x1a8 [ 35.913287] __kasan_check_write+0x20/0x30 [ 35.913407] kasan_atomics_helper+0xeb8/0x4858 [ 35.913533] kasan_atomics+0x198/0x2e0 [ 35.913673] kunit_try_run_case+0x170/0x3f0 [ 35.913787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.914053] kthread+0x328/0x630 [ 35.914177] ret_from_fork+0x10/0x20 [ 35.914288] [ 35.914346] Allocated by task 276: [ 35.914517] kasan_save_stack+0x3c/0x68 [ 35.914928] kasan_save_track+0x20/0x40 [ 35.916532] kasan_save_alloc_info+0x40/0x58 [ 35.916594] __kasan_kmalloc+0xd4/0xd8 [ 35.916672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.916745] kasan_atomics+0xb8/0x2e0 [ 35.916790] kunit_try_run_case+0x170/0x3f0 [ 35.916839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.916893] kthread+0x328/0x630 [ 35.916933] ret_from_fork+0x10/0x20 [ 35.916986] [ 35.917015] The buggy address belongs to the object at fff00000c768c580 [ 35.917015] which belongs to the cache kmalloc-64 of size 64 [ 35.917090] The buggy address is located 0 bytes to the right of [ 35.917090] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.917165] [ 35.917193] The buggy address belongs to the physical page: [ 35.917236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.917303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.917369] page_type: f5(slab) [ 35.917423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.917484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.917536] page dumped because: kasan: bad access detected [ 35.917576] [ 35.917599] Memory state around the buggy address: [ 35.917717] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.917822] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.917940] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.918053] ^ [ 35.918121] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.918177] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.918226] ================================================================== [ 36.137606] ================================================================== [ 36.137749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 36.137878] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.138011] [ 36.138105] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.138335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.138405] Hardware name: linux,dummy-virt (DT) [ 36.138494] Call trace: [ 36.139125] show_stack+0x20/0x38 (C) [ 36.139471] dump_stack_lvl+0x8c/0xd0 [ 36.139798] print_report+0x118/0x608 [ 36.140117] kasan_report+0xdc/0x128 [ 36.140495] kasan_check_range+0x100/0x1a8 [ 36.140637] __kasan_check_write+0x20/0x30 [ 36.141168] kasan_atomics_helper+0x16d0/0x4858 [ 36.141307] kasan_atomics+0x198/0x2e0 [ 36.141780] kunit_try_run_case+0x170/0x3f0 [ 36.141911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.142119] kthread+0x328/0x630 [ 36.142244] ret_from_fork+0x10/0x20 [ 36.142508] [ 36.142605] Allocated by task 276: [ 36.142812] kasan_save_stack+0x3c/0x68 [ 36.143195] kasan_save_track+0x20/0x40 [ 36.143354] kasan_save_alloc_info+0x40/0x58 [ 36.143681] __kasan_kmalloc+0xd4/0xd8 [ 36.143798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.143983] kasan_atomics+0xb8/0x2e0 [ 36.144187] kunit_try_run_case+0x170/0x3f0 [ 36.144513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.144843] kthread+0x328/0x630 [ 36.144953] ret_from_fork+0x10/0x20 [ 36.145158] [ 36.145229] The buggy address belongs to the object at fff00000c768c580 [ 36.145229] which belongs to the cache kmalloc-64 of size 64 [ 36.145355] The buggy address is located 0 bytes to the right of [ 36.145355] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.145740] [ 36.145806] The buggy address belongs to the physical page: [ 36.145951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.146175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.146452] page_type: f5(slab) [ 36.146564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.146714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.146830] page dumped because: kasan: bad access detected [ 36.146918] [ 36.147282] Memory state around the buggy address: [ 36.147381] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.147606] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.147867] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.148439] ^ [ 36.148556] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.148696] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.148809] ================================================================== [ 36.052006] ================================================================== [ 36.052091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.052174] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.052236] [ 36.052290] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.052540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.052633] Hardware name: linux,dummy-virt (DT) [ 36.052729] Call trace: [ 36.052790] show_stack+0x20/0x38 (C) [ 36.052859] dump_stack_lvl+0x8c/0xd0 [ 36.052919] print_report+0x118/0x608 [ 36.052975] kasan_report+0xdc/0x128 [ 36.053031] kasan_check_range+0x100/0x1a8 [ 36.053088] __kasan_check_write+0x20/0x30 [ 36.053140] kasan_atomics_helper+0x12d8/0x4858 [ 36.053197] kasan_atomics+0x198/0x2e0 [ 36.053251] kunit_try_run_case+0x170/0x3f0 [ 36.053309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.053371] kthread+0x328/0x630 [ 36.053422] ret_from_fork+0x10/0x20 [ 36.053482] [ 36.053508] Allocated by task 276: [ 36.053547] kasan_save_stack+0x3c/0x68 [ 36.053601] kasan_save_track+0x20/0x40 [ 36.053865] kasan_save_alloc_info+0x40/0x58 [ 36.054171] __kasan_kmalloc+0xd4/0xd8 [ 36.054507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.054733] kasan_atomics+0xb8/0x2e0 [ 36.054817] kunit_try_run_case+0x170/0x3f0 [ 36.054895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.054995] kthread+0x328/0x630 [ 36.055081] ret_from_fork+0x10/0x20 [ 36.055180] [ 36.055236] The buggy address belongs to the object at fff00000c768c580 [ 36.055236] which belongs to the cache kmalloc-64 of size 64 [ 36.055699] The buggy address is located 0 bytes to the right of [ 36.055699] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.055908] [ 36.056600] The buggy address belongs to the physical page: [ 36.056731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.056971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.057672] page_type: f5(slab) [ 36.057802] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.058025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.058267] page dumped because: kasan: bad access detected [ 36.058392] [ 36.058450] Memory state around the buggy address: [ 36.058877] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.059017] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.059140] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.059249] ^ [ 36.059346] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.059483] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.059594] ================================================================== [ 36.077360] ================================================================== [ 36.077451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.077545] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.077627] [ 36.077720] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.077944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.078071] Hardware name: linux,dummy-virt (DT) [ 36.078162] Call trace: [ 36.078231] show_stack+0x20/0x38 (C) [ 36.078355] dump_stack_lvl+0x8c/0xd0 [ 36.078474] print_report+0x118/0x608 [ 36.078591] kasan_report+0xdc/0x128 [ 36.078730] kasan_check_range+0x100/0x1a8 [ 36.078831] __kasan_check_write+0x20/0x30 [ 36.078916] kasan_atomics_helper+0x1414/0x4858 [ 36.079018] kasan_atomics+0x198/0x2e0 [ 36.079132] kunit_try_run_case+0x170/0x3f0 [ 36.079537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.079763] kthread+0x328/0x630 [ 36.080154] ret_from_fork+0x10/0x20 [ 36.080289] [ 36.080341] Allocated by task 276: [ 36.080421] kasan_save_stack+0x3c/0x68 [ 36.080531] kasan_save_track+0x20/0x40 [ 36.080640] kasan_save_alloc_info+0x40/0x58 [ 36.080752] __kasan_kmalloc+0xd4/0xd8 [ 36.080845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.080948] kasan_atomics+0xb8/0x2e0 [ 36.081047] kunit_try_run_case+0x170/0x3f0 [ 36.081150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.081268] kthread+0x328/0x630 [ 36.081356] ret_from_fork+0x10/0x20 [ 36.081450] [ 36.081508] The buggy address belongs to the object at fff00000c768c580 [ 36.081508] which belongs to the cache kmalloc-64 of size 64 [ 36.082634] The buggy address is located 0 bytes to the right of [ 36.082634] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.082850] [ 36.083743] The buggy address belongs to the physical page: [ 36.083862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.084511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.084924] page_type: f5(slab) [ 36.085030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.085109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.085165] page dumped because: kasan: bad access detected [ 36.085212] [ 36.085253] Memory state around the buggy address: [ 36.085308] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.085363] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.085415] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.085462] ^ [ 36.085506] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.085558] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.085605] ================================================================== [ 36.130226] ================================================================== [ 36.130406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 36.130531] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.130663] [ 36.130792] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.131038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.131113] Hardware name: linux,dummy-virt (DT) [ 36.131188] Call trace: [ 36.131243] show_stack+0x20/0x38 (C) [ 36.131374] dump_stack_lvl+0x8c/0xd0 [ 36.131510] print_report+0x118/0x608 [ 36.131679] kasan_report+0xdc/0x128 [ 36.131838] __asan_report_load8_noabort+0x20/0x30 [ 36.131996] kasan_atomics_helper+0x3df4/0x4858 [ 36.132153] kasan_atomics+0x198/0x2e0 [ 36.132285] kunit_try_run_case+0x170/0x3f0 [ 36.132467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.132596] kthread+0x328/0x630 [ 36.132716] ret_from_fork+0x10/0x20 [ 36.132901] [ 36.132972] Allocated by task 276: [ 36.133056] kasan_save_stack+0x3c/0x68 [ 36.133196] kasan_save_track+0x20/0x40 [ 36.133302] kasan_save_alloc_info+0x40/0x58 [ 36.133415] __kasan_kmalloc+0xd4/0xd8 [ 36.133549] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.133676] kasan_atomics+0xb8/0x2e0 [ 36.133769] kunit_try_run_case+0x170/0x3f0 [ 36.133879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.133990] kthread+0x328/0x630 [ 36.134072] ret_from_fork+0x10/0x20 [ 36.134152] [ 36.134198] The buggy address belongs to the object at fff00000c768c580 [ 36.134198] which belongs to the cache kmalloc-64 of size 64 [ 36.134355] The buggy address is located 0 bytes to the right of [ 36.134355] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.134529] [ 36.134581] The buggy address belongs to the physical page: [ 36.134687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.134873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.135028] page_type: f5(slab) [ 36.135183] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.135323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.135450] page dumped because: kasan: bad access detected [ 36.135540] [ 36.135598] Memory state around the buggy address: [ 36.135736] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.135867] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.135995] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.136144] ^ [ 36.136274] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.136423] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.136529] ================================================================== [ 35.689979] ================================================================== [ 35.690060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.690136] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.690199] [ 35.690247] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.690353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.690389] Hardware name: linux,dummy-virt (DT) [ 35.690430] Call trace: [ 35.690462] show_stack+0x20/0x38 (C) [ 35.690525] dump_stack_lvl+0x8c/0xd0 [ 35.690581] print_report+0x118/0x608 [ 35.690890] kasan_report+0xdc/0x128 [ 35.691252] __asan_report_load4_noabort+0x20/0x30 [ 35.691365] kasan_atomics_helper+0x42d8/0x4858 [ 35.691528] kasan_atomics+0x198/0x2e0 [ 35.692267] kunit_try_run_case+0x170/0x3f0 [ 35.692693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.693021] kthread+0x328/0x630 [ 35.693234] ret_from_fork+0x10/0x20 [ 35.693539] [ 35.693633] Allocated by task 276: [ 35.693714] kasan_save_stack+0x3c/0x68 [ 35.693808] kasan_save_track+0x20/0x40 [ 35.693907] kasan_save_alloc_info+0x40/0x58 [ 35.694010] __kasan_kmalloc+0xd4/0xd8 [ 35.694308] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.694425] kasan_atomics+0xb8/0x2e0 [ 35.694549] kunit_try_run_case+0x170/0x3f0 [ 35.694834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.694966] kthread+0x328/0x630 [ 35.695060] ret_from_fork+0x10/0x20 [ 35.695158] [ 35.695213] The buggy address belongs to the object at fff00000c768c580 [ 35.695213] which belongs to the cache kmalloc-64 of size 64 [ 35.695402] The buggy address is located 0 bytes to the right of [ 35.695402] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.695600] [ 35.695671] The buggy address belongs to the physical page: [ 35.695760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.695961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.696105] page_type: f5(slab) [ 35.696208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.696336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.696664] page dumped because: kasan: bad access detected [ 35.696846] [ 35.696906] Memory state around the buggy address: [ 35.697380] ^ [ 35.700717] print_report+0x118/0x608 [ 35.703559] __kasan_kmalloc+0xd4/0xd8 [ 35.703657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.703743] kasan_atomics+0xb8/0x2e0 [ 35.703823] kunit_try_run_case+0x170/0x3f0 [ 35.703917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.704033] kthread+0x328/0x630 [ 35.704124] ret_from_fork+0x10/0x20 [ 35.704222] [ 35.704276] The buggy address belongs to the object at fff00000c768c580 [ 35.704276] which belongs to the cache kmalloc-64 of size 64 [ 35.705037] The buggy address is located 0 bytes to the right of [ 35.705037] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.705448] [ 35.705737] The buggy address belongs to the physical page: [ 35.705862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.706110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.706312] page_type: f5(slab) [ 35.706460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.706604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.707107] page dumped because: kasan: bad access detected [ 35.708004] [ 35.708150] Memory state around the buggy address: [ 35.708256] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.708376] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.708503] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.709216] ^ [ 35.709640] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709852] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709968] ================================================================== [ 36.041591] ================================================================== [ 36.041752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.041888] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.041995] [ 36.042089] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.042467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.042803] Hardware name: linux,dummy-virt (DT) [ 36.042899] Call trace: [ 36.042971] show_stack+0x20/0x38 (C) [ 36.043109] dump_stack_lvl+0x8c/0xd0 [ 36.043230] print_report+0x118/0x608 [ 36.043348] kasan_report+0xdc/0x128 [ 36.043483] kasan_check_range+0x100/0x1a8 [ 36.043618] __kasan_check_write+0x20/0x30 [ 36.043722] kasan_atomics_helper+0x126c/0x4858 [ 36.043837] kasan_atomics+0x198/0x2e0 [ 36.043956] kunit_try_run_case+0x170/0x3f0 [ 36.044069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.044202] kthread+0x328/0x630 [ 36.044380] ret_from_fork+0x10/0x20 [ 36.044497] [ 36.044556] Allocated by task 276: [ 36.044670] kasan_save_stack+0x3c/0x68 [ 36.044786] kasan_save_track+0x20/0x40 [ 36.044871] kasan_save_alloc_info+0x40/0x58 [ 36.045253] __kasan_kmalloc+0xd4/0xd8 [ 36.045377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.045928] kasan_atomics+0xb8/0x2e0 [ 36.046071] kunit_try_run_case+0x170/0x3f0 [ 36.046168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.046255] kthread+0x328/0x630 [ 36.046317] ret_from_fork+0x10/0x20 [ 36.046422] [ 36.046475] The buggy address belongs to the object at fff00000c768c580 [ 36.046475] which belongs to the cache kmalloc-64 of size 64 [ 36.046633] The buggy address is located 0 bytes to the right of [ 36.046633] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.046788] [ 36.046847] The buggy address belongs to the physical page: [ 36.046925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.047064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.047219] page_type: f5(slab) [ 36.047676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.048017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.048356] page dumped because: kasan: bad access detected [ 36.048452] [ 36.048507] Memory state around the buggy address: [ 36.048595] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.048712] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.048783] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.048831] ^ [ 36.048876] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.048929] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.048976] ================================================================== [ 35.829134] ================================================================== [ 35.829269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.829959] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.830126] [ 35.830227] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.830462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.830537] Hardware name: linux,dummy-virt (DT) [ 35.830637] Call trace: [ 35.831637] show_stack+0x20/0x38 (C) [ 35.831824] dump_stack_lvl+0x8c/0xd0 [ 35.832332] print_report+0x118/0x608 [ 35.832507] kasan_report+0xdc/0x128 [ 35.832634] __asan_report_load4_noabort+0x20/0x30 [ 35.832739] kasan_atomics_helper+0x3e04/0x4858 [ 35.832860] kasan_atomics+0x198/0x2e0 [ 35.832976] kunit_try_run_case+0x170/0x3f0 [ 35.833117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.834308] kthread+0x328/0x630 [ 35.834820] ret_from_fork+0x10/0x20 [ 35.834977] [ 35.835202] Allocated by task 276: [ 35.835601] kasan_save_stack+0x3c/0x68 [ 35.836108] kasan_save_track+0x20/0x40 [ 35.836276] kasan_save_alloc_info+0x40/0x58 [ 35.836386] __kasan_kmalloc+0xd4/0xd8 [ 35.836465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.836545] kasan_atomics+0xb8/0x2e0 [ 35.836641] kunit_try_run_case+0x170/0x3f0 [ 35.836749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.836872] kthread+0x328/0x630 [ 35.836962] ret_from_fork+0x10/0x20 [ 35.838004] [ 35.838288] The buggy address belongs to the object at fff00000c768c580 [ 35.838288] which belongs to the cache kmalloc-64 of size 64 [ 35.838654] The buggy address is located 0 bytes to the right of [ 35.838654] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.838846] [ 35.838907] The buggy address belongs to the physical page: [ 35.839370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.839627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.839826] page_type: f5(slab) [ 35.839937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.840086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.840208] page dumped because: kasan: bad access detected [ 35.840297] [ 35.840719] Memory state around the buggy address: [ 35.840838] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.841104] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.841890] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.842111] ^ [ 35.842563] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.842718] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.842833] ================================================================== [ 36.069504] ================================================================== [ 36.069643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.069780] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.069918] [ 36.070009] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.070232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.070310] Hardware name: linux,dummy-virt (DT) [ 36.070403] Call trace: [ 36.070466] show_stack+0x20/0x38 (C) [ 36.070598] dump_stack_lvl+0x8c/0xd0 [ 36.070734] print_report+0x118/0x608 [ 36.070893] kasan_report+0xdc/0x128 [ 36.071009] __asan_report_load8_noabort+0x20/0x30 [ 36.071136] kasan_atomics_helper+0x3f04/0x4858 [ 36.071406] kasan_atomics+0x198/0x2e0 [ 36.071914] kunit_try_run_case+0x170/0x3f0 [ 36.072078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.072214] kthread+0x328/0x630 [ 36.072375] ret_from_fork+0x10/0x20 [ 36.072603] [ 36.072725] Allocated by task 276: [ 36.072840] kasan_save_stack+0x3c/0x68 [ 36.072956] kasan_save_track+0x20/0x40 [ 36.073059] kasan_save_alloc_info+0x40/0x58 [ 36.073167] __kasan_kmalloc+0xd4/0xd8 [ 36.073264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.073350] kasan_atomics+0xb8/0x2e0 [ 36.073417] kunit_try_run_case+0x170/0x3f0 [ 36.073524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.073654] kthread+0x328/0x630 [ 36.073737] ret_from_fork+0x10/0x20 [ 36.073830] [ 36.073973] The buggy address belongs to the object at fff00000c768c580 [ 36.073973] which belongs to the cache kmalloc-64 of size 64 [ 36.074170] The buggy address is located 0 bytes to the right of [ 36.074170] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.074333] [ 36.074399] The buggy address belongs to the physical page: [ 36.074482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.074749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.074933] page_type: f5(slab) [ 36.075069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.075213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.075344] page dumped because: kasan: bad access detected [ 36.075442] [ 36.075606] Memory state around the buggy address: [ 36.075733] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.075855] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.076027] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.076183] ^ [ 36.076349] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.076472] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.076575] ================================================================== [ 35.750655] ================================================================== [ 35.750786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.750946] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.751279] [ 35.751384] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.751647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.751727] Hardware name: linux,dummy-virt (DT) [ 35.751816] Call trace: [ 35.751873] show_stack+0x20/0x38 (C) [ 35.751974] dump_stack_lvl+0x8c/0xd0 [ 35.752066] print_report+0x118/0x608 [ 35.752169] kasan_report+0xdc/0x128 [ 35.752275] __asan_report_load4_noabort+0x20/0x30 [ 35.752399] kasan_atomics_helper+0x3dcc/0x4858 [ 35.752520] kasan_atomics+0x198/0x2e0 [ 35.752661] kunit_try_run_case+0x170/0x3f0 [ 35.752788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.752922] kthread+0x328/0x630 [ 35.753037] ret_from_fork+0x10/0x20 [ 35.753167] [ 35.753221] Allocated by task 276: [ 35.753315] kasan_save_stack+0x3c/0x68 [ 35.753447] kasan_save_track+0x20/0x40 [ 35.753550] kasan_save_alloc_info+0x40/0x58 [ 35.753653] __kasan_kmalloc+0xd4/0xd8 [ 35.753734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.753816] kasan_atomics+0xb8/0x2e0 [ 35.753894] kunit_try_run_case+0x170/0x3f0 [ 35.753986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.754110] kthread+0x328/0x630 [ 35.754344] ret_from_fork+0x10/0x20 [ 35.754430] [ 35.754478] The buggy address belongs to the object at fff00000c768c580 [ 35.754478] which belongs to the cache kmalloc-64 of size 64 [ 35.754638] The buggy address is located 0 bytes to the right of [ 35.754638] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.754793] [ 35.754846] The buggy address belongs to the physical page: [ 35.754913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.755346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.755525] page_type: f5(slab) [ 35.755633] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.755774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.756221] page dumped because: kasan: bad access detected [ 35.756545] [ 35.756599] Memory state around the buggy address: [ 35.756700] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.756927] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.757073] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.757185] ^ [ 35.757377] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.757511] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.757605] ================================================================== [ 35.967035] ================================================================== [ 35.967445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 35.967593] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.968178] [ 35.968688] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.969163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.969357] Hardware name: linux,dummy-virt (DT) [ 35.969559] Call trace: [ 35.969627] show_stack+0x20/0x38 (C) [ 35.969975] dump_stack_lvl+0x8c/0xd0 [ 35.970105] print_report+0x118/0x608 [ 35.970471] kasan_report+0xdc/0x128 [ 35.970664] kasan_check_range+0x100/0x1a8 [ 35.971246] __kasan_check_write+0x20/0x30 [ 35.971762] kasan_atomics_helper+0x10c0/0x4858 [ 35.972208] kasan_atomics+0x198/0x2e0 [ 35.972346] kunit_try_run_case+0x170/0x3f0 [ 35.972762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.973645] kthread+0x328/0x630 [ 35.973813] ret_from_fork+0x10/0x20 [ 35.974260] [ 35.974365] Allocated by task 276: [ 35.974786] kasan_save_stack+0x3c/0x68 [ 35.975014] kasan_save_track+0x20/0x40 [ 35.975117] kasan_save_alloc_info+0x40/0x58 [ 35.975867] __kasan_kmalloc+0xd4/0xd8 [ 35.976185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.976295] kasan_atomics+0xb8/0x2e0 [ 35.976390] kunit_try_run_case+0x170/0x3f0 [ 35.976797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.977470] kthread+0x328/0x630 [ 35.977587] ret_from_fork+0x10/0x20 [ 35.977700] [ 35.977885] The buggy address belongs to the object at fff00000c768c580 [ 35.977885] which belongs to the cache kmalloc-64 of size 64 [ 35.978551] The buggy address is located 0 bytes to the right of [ 35.978551] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.979220] [ 35.979312] The buggy address belongs to the physical page: [ 35.979669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.979843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.979978] page_type: f5(slab) [ 35.980102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.980247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.981336] page dumped because: kasan: bad access detected [ 35.981795] [ 35.982008] Memory state around the buggy address: [ 35.982132] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.982269] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.982588] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.983295] ^ [ 35.983452] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.983675] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.984359] ================================================================== [ 35.926582] ================================================================== [ 35.926719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 35.926841] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.926973] [ 35.927064] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.927289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.927362] Hardware name: linux,dummy-virt (DT) [ 35.927464] Call trace: [ 35.927529] show_stack+0x20/0x38 (C) [ 35.927654] dump_stack_lvl+0x8c/0xd0 [ 35.927748] print_report+0x118/0x608 [ 35.927859] kasan_report+0xdc/0x128 [ 35.927975] kasan_check_range+0x100/0x1a8 [ 35.928131] __kasan_check_write+0x20/0x30 [ 35.928244] kasan_atomics_helper+0xf88/0x4858 [ 35.928371] kasan_atomics+0x198/0x2e0 [ 35.928482] kunit_try_run_case+0x170/0x3f0 [ 35.928624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.928795] kthread+0x328/0x630 [ 35.928907] ret_from_fork+0x10/0x20 [ 35.929069] [ 35.929124] Allocated by task 276: [ 35.929253] kasan_save_stack+0x3c/0x68 [ 35.929365] kasan_save_track+0x20/0x40 [ 35.929710] kasan_save_alloc_info+0x40/0x58 [ 35.929838] __kasan_kmalloc+0xd4/0xd8 [ 35.929960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.930120] kasan_atomics+0xb8/0x2e0 [ 35.930369] kunit_try_run_case+0x170/0x3f0 [ 35.930667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.930789] kthread+0x328/0x630 [ 35.930886] ret_from_fork+0x10/0x20 [ 35.930978] [ 35.931167] The buggy address belongs to the object at fff00000c768c580 [ 35.931167] which belongs to the cache kmalloc-64 of size 64 [ 35.931557] The buggy address is located 0 bytes to the right of [ 35.931557] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.932007] [ 35.932269] The buggy address belongs to the physical page: [ 35.932385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.932753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.933157] page_type: f5(slab) [ 35.933356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.933795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.933992] page dumped because: kasan: bad access detected [ 35.934325] [ 35.934387] Memory state around the buggy address: [ 35.934507] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.934642] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.934764] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.935155] ^ [ 35.935656] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.935960] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.936141] ================================================================== [ 35.743879] ================================================================== [ 35.744433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.744575] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.744691] [ 35.744782] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.745022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.745099] Hardware name: linux,dummy-virt (DT) [ 35.745189] Call trace: [ 35.745256] show_stack+0x20/0x38 (C) [ 35.747664] dump_stack_lvl+0x8c/0xd0 [ 35.747789] print_report+0x118/0x608 [ 35.747853] kasan_report+0xdc/0x128 [ 35.747947] kasan_check_range+0x100/0x1a8 [ 35.748021] __kasan_check_write+0x20/0x30 [ 35.748077] kasan_atomics_helper+0xad4/0x4858 [ 35.748136] kasan_atomics+0x198/0x2e0 [ 35.748190] kunit_try_run_case+0x170/0x3f0 [ 35.748250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.748366] kthread+0x328/0x630 [ 35.748478] ret_from_fork+0x10/0x20 [ 35.748601] [ 35.748668] Allocated by task 276: [ 35.748716] kasan_save_stack+0x3c/0x68 [ 35.748776] kasan_save_track+0x20/0x40 [ 35.748821] kasan_save_alloc_info+0x40/0x58 [ 35.748868] __kasan_kmalloc+0xd4/0xd8 [ 35.748914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.748961] kasan_atomics+0xb8/0x2e0 [ 35.749005] kunit_try_run_case+0x170/0x3f0 [ 35.749050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.749102] kthread+0x328/0x630 [ 35.749143] ret_from_fork+0x10/0x20 [ 35.749187] [ 35.749213] The buggy address belongs to the object at fff00000c768c580 [ 35.749213] which belongs to the cache kmalloc-64 of size 64 [ 35.749284] The buggy address is located 0 bytes to the right of [ 35.749284] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.749360] [ 35.749389] The buggy address belongs to the physical page: [ 35.749431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.749497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.749564] page_type: f5(slab) [ 35.749638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.749704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.749754] page dumped because: kasan: bad access detected [ 35.749796] [ 35.749819] Memory state around the buggy address: [ 35.749863] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.749916] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.749968] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.750015] ^ [ 35.750058] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.750107] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.750154] ================================================================== [ 36.166143] ================================================================== [ 36.166464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 36.166992] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.167230] [ 36.167430] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.167751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.168087] Hardware name: linux,dummy-virt (DT) [ 36.168409] Call trace: [ 36.168537] show_stack+0x20/0x38 (C) [ 36.168850] dump_stack_lvl+0x8c/0xd0 [ 36.168980] print_report+0x118/0x608 [ 36.169149] kasan_report+0xdc/0x128 [ 36.169517] kasan_check_range+0x100/0x1a8 [ 36.170238] __kasan_check_write+0x20/0x30 [ 36.170406] kasan_atomics_helper+0x175c/0x4858 [ 36.170542] kasan_atomics+0x198/0x2e0 [ 36.170682] kunit_try_run_case+0x170/0x3f0 [ 36.170997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.171322] kthread+0x328/0x630 [ 36.171446] ret_from_fork+0x10/0x20 [ 36.172095] [ 36.172357] Allocated by task 276: [ 36.172440] kasan_save_stack+0x3c/0x68 [ 36.172786] kasan_save_track+0x20/0x40 [ 36.173103] kasan_save_alloc_info+0x40/0x58 [ 36.173294] __kasan_kmalloc+0xd4/0xd8 [ 36.173371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.173494] kasan_atomics+0xb8/0x2e0 [ 36.173587] kunit_try_run_case+0x170/0x3f0 [ 36.173699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.173979] kthread+0x328/0x630 [ 36.174517] ret_from_fork+0x10/0x20 [ 36.174822] [ 36.174973] The buggy address belongs to the object at fff00000c768c580 [ 36.174973] which belongs to the cache kmalloc-64 of size 64 [ 36.175163] The buggy address is located 0 bytes to the right of [ 36.175163] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.176288] [ 36.176367] The buggy address belongs to the physical page: [ 36.176454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.176565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.176661] page_type: f5(slab) [ 36.176720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.176782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.176831] page dumped because: kasan: bad access detected [ 36.176873] [ 36.176897] Memory state around the buggy address: [ 36.176940] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.176994] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.177047] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.177094] ^ [ 36.177137] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.177188] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.177236] ================================================================== [ 35.710861] ================================================================== [ 35.710941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.711026] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.711085] [ 35.711137] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.711244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.711277] Hardware name: linux,dummy-virt (DT) [ 35.711319] Call trace: [ 35.711351] show_stack+0x20/0x38 (C) [ 35.711413] dump_stack_lvl+0x8c/0xd0 [ 35.711494] print_report+0x118/0x608 [ 35.711553] kasan_report+0xdc/0x128 [ 35.711624] kasan_check_range+0x100/0x1a8 [ 35.711725] __kasan_check_write+0x20/0x30 [ 35.711836] kasan_atomics_helper+0x99c/0x4858 [ 35.711923] kasan_atomics+0x198/0x2e0 [ 35.711981] kunit_try_run_case+0x170/0x3f0 [ 35.712054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.712145] kthread+0x328/0x630 [ 35.712198] ret_from_fork+0x10/0x20 [ 35.712258] [ 35.712286] Allocated by task 276: [ 35.714719] kasan_save_stack+0x3c/0x68 [ 35.714856] kasan_save_track+0x20/0x40 [ 35.714958] kasan_save_alloc_info+0x40/0x58 [ 35.715076] __kasan_kmalloc+0xd4/0xd8 [ 35.715171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.715262] kasan_atomics+0xb8/0x2e0 [ 35.715308] kunit_try_run_case+0x170/0x3f0 [ 35.715358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.715445] kthread+0x328/0x630 [ 35.715518] ret_from_fork+0x10/0x20 [ 35.715562] [ 35.715591] The buggy address belongs to the object at fff00000c768c580 [ 35.715591] which belongs to the cache kmalloc-64 of size 64 [ 35.715746] The buggy address is located 0 bytes to the right of [ 35.715746] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.715925] [ 35.715982] The buggy address belongs to the physical page: [ 35.716074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.716204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.716345] page_type: f5(slab) [ 35.716436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.716606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.716811] page dumped because: kasan: bad access detected [ 35.716958] [ 35.717098] Memory state around the buggy address: [ 35.717190] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.717309] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.717437] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.717530] ^ [ 35.717633] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.717737] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.717834] ================================================================== [ 35.987305] ================================================================== [ 35.987486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 35.987997] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.988265] [ 35.988839] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.989352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.989618] Hardware name: linux,dummy-virt (DT) [ 35.989783] Call trace: [ 35.990046] show_stack+0x20/0x38 (C) [ 35.990436] dump_stack_lvl+0x8c/0xd0 [ 35.990657] print_report+0x118/0x608 [ 35.991555] kasan_report+0xdc/0x128 [ 35.992258] kasan_check_range+0x100/0x1a8 [ 35.992627] __kasan_check_write+0x20/0x30 [ 35.992739] kasan_atomics_helper+0x1128/0x4858 [ 35.992831] kasan_atomics+0x198/0x2e0 [ 35.993349] kunit_try_run_case+0x170/0x3f0 [ 35.994191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.994452] kthread+0x328/0x630 [ 35.995107] ret_from_fork+0x10/0x20 [ 35.995574] [ 35.996108] Allocated by task 276: [ 35.996261] kasan_save_stack+0x3c/0x68 [ 35.997065] kasan_save_track+0x20/0x40 [ 35.997466] kasan_save_alloc_info+0x40/0x58 [ 35.997683] __kasan_kmalloc+0xd4/0xd8 [ 35.997994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.998202] kasan_atomics+0xb8/0x2e0 [ 35.998302] kunit_try_run_case+0x170/0x3f0 [ 35.998409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.998534] kthread+0x328/0x630 [ 35.999748] ret_from_fork+0x10/0x20 [ 36.000166] [ 36.000758] The buggy address belongs to the object at fff00000c768c580 [ 36.000758] which belongs to the cache kmalloc-64 of size 64 [ 36.000914] The buggy address is located 0 bytes to the right of [ 36.000914] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.001083] [ 36.001700] The buggy address belongs to the physical page: [ 36.002151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.002807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.003233] page_type: f5(slab) [ 36.003579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.004351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.004689] page dumped because: kasan: bad access detected [ 36.004981] [ 36.005045] Memory state around the buggy address: [ 36.005151] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.005278] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.005805] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.006046] ^ [ 36.006125] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.006216] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.006294] ================================================================== [ 35.807990] ================================================================== [ 35.808120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.808250] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.808386] [ 35.808480] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.808725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.808806] Hardware name: linux,dummy-virt (DT) [ 35.808896] Call trace: [ 35.808959] show_stack+0x20/0x38 (C) [ 35.809090] dump_stack_lvl+0x8c/0xd0 [ 35.809218] print_report+0x118/0x608 [ 35.809338] kasan_report+0xdc/0x128 [ 35.809480] __asan_report_load4_noabort+0x20/0x30 [ 35.809624] kasan_atomics_helper+0x3dd8/0x4858 [ 35.809745] kasan_atomics+0x198/0x2e0 [ 35.809899] kunit_try_run_case+0x170/0x3f0 [ 35.810233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.810398] kthread+0x328/0x630 [ 35.810518] ret_from_fork+0x10/0x20 [ 35.810661] [ 35.811269] Allocated by task 276: [ 35.811406] kasan_save_stack+0x3c/0x68 [ 35.811528] kasan_save_track+0x20/0x40 [ 35.811816] kasan_save_alloc_info+0x40/0x58 [ 35.811921] __kasan_kmalloc+0xd4/0xd8 [ 35.812027] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.812135] kasan_atomics+0xb8/0x2e0 [ 35.812232] kunit_try_run_case+0x170/0x3f0 [ 35.812367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.812504] kthread+0x328/0x630 [ 35.812643] ret_from_fork+0x10/0x20 [ 35.812777] [ 35.812855] The buggy address belongs to the object at fff00000c768c580 [ 35.812855] which belongs to the cache kmalloc-64 of size 64 [ 35.813076] The buggy address is located 0 bytes to the right of [ 35.813076] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.813324] [ 35.813391] The buggy address belongs to the physical page: [ 35.813482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.813640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.813783] page_type: f5(slab) [ 35.813909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.814100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.814262] page dumped because: kasan: bad access detected [ 35.814369] [ 35.814416] Memory state around the buggy address: [ 35.814665] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.814946] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.815072] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.815676] ^ [ 35.816051] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.816276] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.816380] ================================================================== [ 36.179957] ================================================================== [ 36.180156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 36.180307] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.180445] [ 36.180543] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.180767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.180845] Hardware name: linux,dummy-virt (DT) [ 36.180935] Call trace: [ 36.181003] show_stack+0x20/0x38 (C) [ 36.181145] dump_stack_lvl+0x8c/0xd0 [ 36.181290] print_report+0x118/0x608 [ 36.181417] kasan_report+0xdc/0x128 [ 36.181539] __asan_report_load8_noabort+0x20/0x30 [ 36.182195] kasan_atomics_helper+0x3e20/0x4858 [ 36.182498] kasan_atomics+0x198/0x2e0 [ 36.182623] kunit_try_run_case+0x170/0x3f0 [ 36.182722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.182825] kthread+0x328/0x630 [ 36.183413] ret_from_fork+0x10/0x20 [ 36.183642] [ 36.183769] Allocated by task 276: [ 36.183859] kasan_save_stack+0x3c/0x68 [ 36.183987] kasan_save_track+0x20/0x40 [ 36.184087] kasan_save_alloc_info+0x40/0x58 [ 36.184379] __kasan_kmalloc+0xd4/0xd8 [ 36.184514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.184635] kasan_atomics+0xb8/0x2e0 [ 36.184758] kunit_try_run_case+0x170/0x3f0 [ 36.184912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.185042] kthread+0x328/0x630 [ 36.185156] ret_from_fork+0x10/0x20 [ 36.185259] [ 36.185313] The buggy address belongs to the object at fff00000c768c580 [ 36.185313] which belongs to the cache kmalloc-64 of size 64 [ 36.185481] The buggy address is located 0 bytes to the right of [ 36.185481] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.185664] [ 36.185719] The buggy address belongs to the physical page: [ 36.185814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.185958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.186564] page_type: f5(slab) [ 36.186738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.186884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.187001] page dumped because: kasan: bad access detected [ 36.187080] [ 36.187311] Memory state around the buggy address: [ 36.187486] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.187654] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.187781] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.187891] ^ [ 36.188103] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.188194] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.188270] ================================================================== [ 35.844971] ================================================================== [ 35.845103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.845250] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.845388] [ 35.845483] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.845739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.845822] Hardware name: linux,dummy-virt (DT) [ 35.845913] Call trace: [ 35.845982] show_stack+0x20/0x38 (C) [ 35.847361] dump_stack_lvl+0x8c/0xd0 [ 35.847778] print_report+0x118/0x608 [ 35.848353] kasan_report+0xdc/0x128 [ 35.848492] kasan_check_range+0x100/0x1a8 [ 35.849125] __kasan_check_read+0x20/0x30 [ 35.849400] kasan_atomics_helper+0xdd4/0x4858 [ 35.850064] kasan_atomics+0x198/0x2e0 [ 35.850217] kunit_try_run_case+0x170/0x3f0 [ 35.850355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.850946] kthread+0x328/0x630 [ 35.851084] ret_from_fork+0x10/0x20 [ 35.851624] [ 35.851695] Allocated by task 276: [ 35.852110] kasan_save_stack+0x3c/0x68 [ 35.852239] kasan_save_track+0x20/0x40 [ 35.852884] kasan_save_alloc_info+0x40/0x58 [ 35.853270] __kasan_kmalloc+0xd4/0xd8 [ 35.853541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.853652] kasan_atomics+0xb8/0x2e0 [ 35.853726] kunit_try_run_case+0x170/0x3f0 [ 35.853805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.853903] kthread+0x328/0x630 [ 35.853988] ret_from_fork+0x10/0x20 [ 35.854955] [ 35.855043] The buggy address belongs to the object at fff00000c768c580 [ 35.855043] which belongs to the cache kmalloc-64 of size 64 [ 35.855228] The buggy address is located 0 bytes to the right of [ 35.855228] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.855409] [ 35.855481] The buggy address belongs to the physical page: [ 35.855573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.855732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.855867] page_type: f5(slab) [ 35.855977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.856190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.857146] page dumped because: kasan: bad access detected [ 35.857486] [ 35.857539] Memory state around the buggy address: [ 35.857787] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.858032] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.858511] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.858653] ^ [ 35.859159] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.859291] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.859862] ================================================================== [ 35.728447] ================================================================== [ 35.728886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.729036] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.729783] [ 35.730180] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.730587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.731135] Hardware name: linux,dummy-virt (DT) [ 35.731680] Call trace: [ 35.731763] show_stack+0x20/0x38 (C) [ 35.731913] dump_stack_lvl+0x8c/0xd0 [ 35.732040] print_report+0x118/0x608 [ 35.734860] kasan_report+0xdc/0x128 [ 35.734985] kasan_check_range+0x100/0x1a8 [ 35.735120] __kasan_check_write+0x20/0x30 [ 35.735242] kasan_atomics_helper+0xa6c/0x4858 [ 35.735345] kasan_atomics+0x198/0x2e0 [ 35.735403] kunit_try_run_case+0x170/0x3f0 [ 35.735520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.735584] kthread+0x328/0x630 [ 35.735664] ret_from_fork+0x10/0x20 [ 35.735729] [ 35.735756] Allocated by task 276: [ 35.735796] kasan_save_stack+0x3c/0x68 [ 35.735853] kasan_save_track+0x20/0x40 [ 35.735898] kasan_save_alloc_info+0x40/0x58 [ 35.735947] __kasan_kmalloc+0xd4/0xd8 [ 35.735990] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.736039] kasan_atomics+0xb8/0x2e0 [ 35.736080] kunit_try_run_case+0x170/0x3f0 [ 35.736128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.736180] kthread+0x328/0x630 [ 35.736218] ret_from_fork+0x10/0x20 [ 35.736261] [ 35.736287] The buggy address belongs to the object at fff00000c768c580 [ 35.736287] which belongs to the cache kmalloc-64 of size 64 [ 35.736385] The buggy address is located 0 bytes to the right of [ 35.736385] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.736459] [ 35.736491] The buggy address belongs to the physical page: [ 35.736530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.736595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.736819] page_type: f5(slab) [ 35.737193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.737458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.737584] page dumped because: kasan: bad access detected [ 35.737707] [ 35.738024] Memory state around the buggy address: [ 35.738343] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.738890] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.739681] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.739922] ^ [ 35.740270] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.740829] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.741065] ================================================================== [ 35.954092] ================================================================== [ 35.954232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 35.954796] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.955027] [ 35.955405] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.955905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.956060] Hardware name: linux,dummy-virt (DT) [ 35.956302] Call trace: [ 35.956574] show_stack+0x20/0x38 (C) [ 35.956878] dump_stack_lvl+0x8c/0xd0 [ 35.957130] print_report+0x118/0x608 [ 35.957284] kasan_report+0xdc/0x128 [ 35.957377] kasan_check_range+0x100/0x1a8 [ 35.957735] __kasan_check_write+0x20/0x30 [ 35.957948] kasan_atomics_helper+0x1058/0x4858 [ 35.958072] kasan_atomics+0x198/0x2e0 [ 35.958267] kunit_try_run_case+0x170/0x3f0 [ 35.958552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.959005] kthread+0x328/0x630 [ 35.959189] ret_from_fork+0x10/0x20 [ 35.959641] [ 35.959803] Allocated by task 276: [ 35.960089] kasan_save_stack+0x3c/0x68 [ 35.960310] kasan_save_track+0x20/0x40 [ 35.960414] kasan_save_alloc_info+0x40/0x58 [ 35.960527] __kasan_kmalloc+0xd4/0xd8 [ 35.960634] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.960844] kasan_atomics+0xb8/0x2e0 [ 35.961213] kunit_try_run_case+0x170/0x3f0 [ 35.961423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.961528] kthread+0x328/0x630 [ 35.961629] ret_from_fork+0x10/0x20 [ 35.961769] [ 35.961871] The buggy address belongs to the object at fff00000c768c580 [ 35.961871] which belongs to the cache kmalloc-64 of size 64 [ 35.962160] The buggy address is located 0 bytes to the right of [ 35.962160] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.962814] [ 35.962939] The buggy address belongs to the physical page: [ 35.963170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.963499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.963921] page_type: f5(slab) [ 35.964266] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.964481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.964686] page dumped because: kasan: bad access detected [ 35.964794] [ 35.964850] Memory state around the buggy address: [ 35.964951] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.965068] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.965160] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.965236] ^ [ 35.965307] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965408] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965511] ================================================================== [ 36.026284] ================================================================== [ 36.026447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.026602] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.027100] [ 36.027425] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.027942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.028240] Hardware name: linux,dummy-virt (DT) [ 36.028717] Call trace: [ 36.028872] show_stack+0x20/0x38 (C) [ 36.029314] dump_stack_lvl+0x8c/0xd0 [ 36.029850] print_report+0x118/0x608 [ 36.030047] kasan_report+0xdc/0x128 [ 36.030431] kasan_check_range+0x100/0x1a8 [ 36.030569] __kasan_check_write+0x20/0x30 [ 36.030836] kasan_atomics_helper+0x11f8/0x4858 [ 36.030978] kasan_atomics+0x198/0x2e0 [ 36.031094] kunit_try_run_case+0x170/0x3f0 [ 36.031232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.031381] kthread+0x328/0x630 [ 36.031513] ret_from_fork+0x10/0x20 [ 36.031658] [ 36.031715] Allocated by task 276: [ 36.031799] kasan_save_stack+0x3c/0x68 [ 36.031930] kasan_save_track+0x20/0x40 [ 36.032039] kasan_save_alloc_info+0x40/0x58 [ 36.032149] __kasan_kmalloc+0xd4/0xd8 [ 36.032249] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.032953] kasan_atomics+0xb8/0x2e0 [ 36.033067] kunit_try_run_case+0x170/0x3f0 [ 36.033220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.033931] kthread+0x328/0x630 [ 36.034102] ret_from_fork+0x10/0x20 [ 36.034591] [ 36.034687] The buggy address belongs to the object at fff00000c768c580 [ 36.034687] which belongs to the cache kmalloc-64 of size 64 [ 36.034854] The buggy address is located 0 bytes to the right of [ 36.034854] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.035038] [ 36.035106] The buggy address belongs to the physical page: [ 36.035521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.035902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.036195] page_type: f5(slab) [ 36.036329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.036715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.036850] page dumped because: kasan: bad access detected [ 36.037065] [ 36.037318] Memory state around the buggy address: [ 36.037603] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.037829] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.038234] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.038399] ^ [ 36.039380] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.039502] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.039584] ================================================================== [ 36.189033] ================================================================== [ 36.189209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 36.189338] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.189497] [ 36.189643] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.189965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.190063] Hardware name: linux,dummy-virt (DT) [ 36.190190] Call trace: [ 36.190276] show_stack+0x20/0x38 (C) [ 36.190455] dump_stack_lvl+0x8c/0xd0 [ 36.190568] print_report+0x118/0x608 [ 36.190725] kasan_report+0xdc/0x128 [ 36.190849] kasan_check_range+0x100/0x1a8 [ 36.190980] __kasan_check_write+0x20/0x30 [ 36.191098] kasan_atomics_helper+0x17ec/0x4858 [ 36.191231] kasan_atomics+0x198/0x2e0 [ 36.191349] kunit_try_run_case+0x170/0x3f0 [ 36.191491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.191643] kthread+0x328/0x630 [ 36.191745] ret_from_fork+0x10/0x20 [ 36.191870] [ 36.191920] Allocated by task 276: [ 36.192199] kasan_save_stack+0x3c/0x68 [ 36.192331] kasan_save_track+0x20/0x40 [ 36.192433] kasan_save_alloc_info+0x40/0x58 [ 36.193114] __kasan_kmalloc+0xd4/0xd8 [ 36.193250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.193362] kasan_atomics+0xb8/0x2e0 [ 36.193458] kunit_try_run_case+0x170/0x3f0 [ 36.193577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.193744] kthread+0x328/0x630 [ 36.193872] ret_from_fork+0x10/0x20 [ 36.193996] [ 36.194055] The buggy address belongs to the object at fff00000c768c580 [ 36.194055] which belongs to the cache kmalloc-64 of size 64 [ 36.194224] The buggy address is located 0 bytes to the right of [ 36.194224] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.194401] [ 36.194457] The buggy address belongs to the physical page: [ 36.194547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.194710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.194866] page_type: f5(slab) [ 36.194975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.195108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.195215] page dumped because: kasan: bad access detected [ 36.195326] [ 36.195411] Memory state around the buggy address: [ 36.195564] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.195843] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.196243] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.196503] ^ [ 36.196597] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.196714] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.196798] ================================================================== [ 36.092624] ================================================================== [ 36.092762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.093945] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.094101] [ 36.094189] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.094370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.094438] Hardware name: linux,dummy-virt (DT) [ 36.094524] Call trace: [ 36.094591] show_stack+0x20/0x38 (C) [ 36.096551] dump_stack_lvl+0x8c/0xd0 [ 36.096639] print_report+0x118/0x608 [ 36.096732] kasan_report+0xdc/0x128 [ 36.096787] kasan_check_range+0x100/0x1a8 [ 36.096843] __kasan_check_write+0x20/0x30 [ 36.096898] kasan_atomics_helper+0x14e4/0x4858 [ 36.096956] kasan_atomics+0x198/0x2e0 [ 36.097010] kunit_try_run_case+0x170/0x3f0 [ 36.097071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.097135] kthread+0x328/0x630 [ 36.097186] ret_from_fork+0x10/0x20 [ 36.097246] [ 36.097273] Allocated by task 276: [ 36.097312] kasan_save_stack+0x3c/0x68 [ 36.097368] kasan_save_track+0x20/0x40 [ 36.097414] kasan_save_alloc_info+0x40/0x58 [ 36.097464] __kasan_kmalloc+0xd4/0xd8 [ 36.097507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.097556] kasan_atomics+0xb8/0x2e0 [ 36.097600] kunit_try_run_case+0x170/0x3f0 [ 36.097671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.097724] kthread+0x328/0x630 [ 36.097764] ret_from_fork+0x10/0x20 [ 36.097807] [ 36.097836] The buggy address belongs to the object at fff00000c768c580 [ 36.097836] which belongs to the cache kmalloc-64 of size 64 [ 36.097908] The buggy address is located 0 bytes to the right of [ 36.097908] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.097985] [ 36.098013] The buggy address belongs to the physical page: [ 36.098056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.098121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.098187] page_type: f5(slab) [ 36.098240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.098299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.098352] page dumped because: kasan: bad access detected [ 36.098390] [ 36.098413] Memory state around the buggy address: [ 36.098456] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.098510] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.098562] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.098644] ^ [ 36.098785] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.098979] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.099124] ================================================================== [ 35.817458] ================================================================== [ 35.817596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.817739] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.817880] [ 35.817975] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.818212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.818286] Hardware name: linux,dummy-virt (DT) [ 35.818375] Call trace: [ 35.818437] show_stack+0x20/0x38 (C) [ 35.818565] dump_stack_lvl+0x8c/0xd0 [ 35.818707] print_report+0x118/0x608 [ 35.818834] kasan_report+0xdc/0x128 [ 35.818955] kasan_check_range+0x100/0x1a8 [ 35.819082] __kasan_check_write+0x20/0x30 [ 35.819200] kasan_atomics_helper+0xd3c/0x4858 [ 35.819331] kasan_atomics+0x198/0x2e0 [ 35.819477] kunit_try_run_case+0x170/0x3f0 [ 35.819879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.820410] kthread+0x328/0x630 [ 35.820593] ret_from_fork+0x10/0x20 [ 35.820789] [ 35.820868] Allocated by task 276: [ 35.820948] kasan_save_stack+0x3c/0x68 [ 35.821061] kasan_save_track+0x20/0x40 [ 35.821203] kasan_save_alloc_info+0x40/0x58 [ 35.821349] __kasan_kmalloc+0xd4/0xd8 [ 35.821482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.822197] kasan_atomics+0xb8/0x2e0 [ 35.823128] kunit_try_run_case+0x170/0x3f0 [ 35.823283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.823455] kthread+0x328/0x630 [ 35.823531] ret_from_fork+0x10/0x20 [ 35.823606] [ 35.823662] The buggy address belongs to the object at fff00000c768c580 [ 35.823662] which belongs to the cache kmalloc-64 of size 64 [ 35.824436] The buggy address is located 0 bytes to the right of [ 35.824436] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.824752] [ 35.824839] The buggy address belongs to the physical page: [ 35.824946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.825143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.825327] page_type: f5(slab) [ 35.825476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.825668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.825780] page dumped because: kasan: bad access detected [ 35.826092] [ 35.826232] Memory state around the buggy address: [ 35.826335] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.826453] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.826572] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.826849] ^ [ 35.826949] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.827067] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.827168] ==================================================================
[ 30.010927] ================================================================== [ 30.011434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 30.012026] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.012530] [ 30.012973] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.013046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.013063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.013091] Call Trace: [ 30.013118] <TASK> [ 30.013149] dump_stack_lvl+0x73/0xb0 [ 30.013210] print_report+0xd1/0x650 [ 30.013255] ? __virt_addr_valid+0x1db/0x2d0 [ 30.013304] ? kasan_atomics_helper+0x1c18/0x5450 [ 30.013349] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.013578] ? kasan_atomics_helper+0x1c18/0x5450 [ 30.013685] kasan_report+0x141/0x180 [ 30.013772] ? kasan_atomics_helper+0x1c18/0x5450 [ 30.013851] kasan_check_range+0x10c/0x1c0 [ 30.013909] __kasan_check_write+0x18/0x20 [ 30.013954] kasan_atomics_helper+0x1c18/0x5450 [ 30.014002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.014062] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.014114] ? kasan_atomics+0x152/0x310 [ 30.014188] kasan_atomics+0x1dc/0x310 [ 30.014236] ? __pfx_kasan_atomics+0x10/0x10 [ 30.014283] ? __pfx_read_tsc+0x10/0x10 [ 30.014325] ? ktime_get_ts64+0x86/0x230 [ 30.014387] kunit_try_run_case+0x1a5/0x480 [ 30.014460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.014516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.014564] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.014603] ? __kthread_parkme+0x82/0x180 [ 30.014630] ? preempt_count_sub+0x50/0x80 [ 30.014669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.014697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.014724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.014751] kthread+0x337/0x6f0 [ 30.014773] ? trace_preempt_on+0x20/0xc0 [ 30.014801] ? __pfx_kthread+0x10/0x10 [ 30.014825] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.014850] ? calculate_sigpending+0x7b/0xa0 [ 30.014878] ? __pfx_kthread+0x10/0x10 [ 30.014903] ret_from_fork+0x116/0x1d0 [ 30.014925] ? __pfx_kthread+0x10/0x10 [ 30.014947] ret_from_fork_asm+0x1a/0x30 [ 30.014982] </TASK> [ 30.014997] [ 30.023974] Allocated by task 294: [ 30.024362] kasan_save_stack+0x45/0x70 [ 30.024767] kasan_save_track+0x18/0x40 [ 30.025090] kasan_save_alloc_info+0x3b/0x50 [ 30.025471] __kasan_kmalloc+0xb7/0xc0 [ 30.025774] __kmalloc_cache_noprof+0x189/0x420 [ 30.026106] kasan_atomics+0x95/0x310 [ 30.026363] kunit_try_run_case+0x1a5/0x480 [ 30.026714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.027013] kthread+0x337/0x6f0 [ 30.027231] ret_from_fork+0x116/0x1d0 [ 30.027418] ret_from_fork_asm+0x1a/0x30 [ 30.027611] [ 30.027765] The buggy address belongs to the object at ffff888102338080 [ 30.027765] which belongs to the cache kmalloc-64 of size 64 [ 30.028674] The buggy address is located 0 bytes to the right of [ 30.028674] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.029271] [ 30.029392] The buggy address belongs to the physical page: [ 30.029620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.029916] flags: 0x200000000000000(node=0|zone=2) [ 30.030162] page_type: f5(slab) [ 30.030341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.030863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.031465] page dumped because: kasan: bad access detected [ 30.031904] [ 30.032042] Memory state around the buggy address: [ 30.032449] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.032992] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.033566] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.034104] ^ [ 30.034513] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034943] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.035243] ================================================================== [ 30.036926] ================================================================== [ 30.038516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 30.039128] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.039760] [ 30.039971] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.040087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.040119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.040198] Call Trace: [ 30.040246] <TASK> [ 30.040293] dump_stack_lvl+0x73/0xb0 [ 30.040368] print_report+0xd1/0x650 [ 30.040425] ? __virt_addr_valid+0x1db/0x2d0 [ 30.040496] ? kasan_atomics_helper+0x4f30/0x5450 [ 30.040549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.040610] ? kasan_atomics_helper+0x4f30/0x5450 [ 30.040664] kasan_report+0x141/0x180 [ 30.040717] ? kasan_atomics_helper+0x4f30/0x5450 [ 30.040782] __asan_report_load8_noabort+0x18/0x20 [ 30.040841] kasan_atomics_helper+0x4f30/0x5450 [ 30.040895] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.040949] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.041005] ? kasan_atomics+0x152/0x310 [ 30.041068] kasan_atomics+0x1dc/0x310 [ 30.041123] ? __pfx_kasan_atomics+0x10/0x10 [ 30.041207] ? __pfx_read_tsc+0x10/0x10 [ 30.041248] ? ktime_get_ts64+0x86/0x230 [ 30.041304] kunit_try_run_case+0x1a5/0x480 [ 30.041351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.041391] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.041437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.041500] ? __kthread_parkme+0x82/0x180 [ 30.041547] ? preempt_count_sub+0x50/0x80 [ 30.041601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.041654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.041709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.041764] kthread+0x337/0x6f0 [ 30.041806] ? trace_preempt_on+0x20/0xc0 [ 30.041858] ? __pfx_kthread+0x10/0x10 [ 30.041908] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.041957] ? calculate_sigpending+0x7b/0xa0 [ 30.042008] ? __pfx_kthread+0x10/0x10 [ 30.042063] ret_from_fork+0x116/0x1d0 [ 30.042101] ? __pfx_kthread+0x10/0x10 [ 30.042174] ret_from_fork_asm+0x1a/0x30 [ 30.042251] </TASK> [ 30.042286] [ 30.054126] Allocated by task 294: [ 30.054499] kasan_save_stack+0x45/0x70 [ 30.054746] kasan_save_track+0x18/0x40 [ 30.055107] kasan_save_alloc_info+0x3b/0x50 [ 30.055333] __kasan_kmalloc+0xb7/0xc0 [ 30.055705] __kmalloc_cache_noprof+0x189/0x420 [ 30.055925] kasan_atomics+0x95/0x310 [ 30.056313] kunit_try_run_case+0x1a5/0x480 [ 30.056616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.057034] kthread+0x337/0x6f0 [ 30.057413] ret_from_fork+0x116/0x1d0 [ 30.057827] ret_from_fork_asm+0x1a/0x30 [ 30.058267] [ 30.058516] The buggy address belongs to the object at ffff888102338080 [ 30.058516] which belongs to the cache kmalloc-64 of size 64 [ 30.059419] The buggy address is located 0 bytes to the right of [ 30.059419] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.060259] [ 30.060738] The buggy address belongs to the physical page: [ 30.060975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.061876] flags: 0x200000000000000(node=0|zone=2) [ 30.062375] page_type: f5(slab) [ 30.062687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.063103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.063580] page dumped because: kasan: bad access detected [ 30.064074] [ 30.064183] Memory state around the buggy address: [ 30.064397] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065108] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.065490] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.065977] ^ [ 30.066362] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.066838] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.067281] ================================================================== [ 30.307958] ================================================================== [ 30.308682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 30.308952] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.309486] [ 30.309710] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.309826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.309858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.309911] Call Trace: [ 30.309960] <TASK> [ 30.310005] dump_stack_lvl+0x73/0xb0 [ 30.310083] print_report+0xd1/0x650 [ 30.310132] ? __virt_addr_valid+0x1db/0x2d0 [ 30.310222] ? kasan_atomics_helper+0x20c8/0x5450 [ 30.310274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.310334] ? kasan_atomics_helper+0x20c8/0x5450 [ 30.310388] kasan_report+0x141/0x180 [ 30.310448] ? kasan_atomics_helper+0x20c8/0x5450 [ 30.310512] kasan_check_range+0x10c/0x1c0 [ 30.310568] __kasan_check_write+0x18/0x20 [ 30.310624] kasan_atomics_helper+0x20c8/0x5450 [ 30.310676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.310712] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.310741] ? kasan_atomics+0x152/0x310 [ 30.310772] kasan_atomics+0x1dc/0x310 [ 30.310797] ? __pfx_kasan_atomics+0x10/0x10 [ 30.310824] ? __pfx_read_tsc+0x10/0x10 [ 30.310848] ? ktime_get_ts64+0x86/0x230 [ 30.310879] kunit_try_run_case+0x1a5/0x480 [ 30.310908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.310933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.310959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.310984] ? __kthread_parkme+0x82/0x180 [ 30.311008] ? preempt_count_sub+0x50/0x80 [ 30.311034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.311060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.311087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.311113] kthread+0x337/0x6f0 [ 30.311134] ? trace_preempt_on+0x20/0xc0 [ 30.311193] ? __pfx_kthread+0x10/0x10 [ 30.311221] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.311245] ? calculate_sigpending+0x7b/0xa0 [ 30.311273] ? __pfx_kthread+0x10/0x10 [ 30.311297] ret_from_fork+0x116/0x1d0 [ 30.311319] ? __pfx_kthread+0x10/0x10 [ 30.311343] ret_from_fork_asm+0x1a/0x30 [ 30.311377] </TASK> [ 30.311392] [ 30.323306] Allocated by task 294: [ 30.323682] kasan_save_stack+0x45/0x70 [ 30.324078] kasan_save_track+0x18/0x40 [ 30.324460] kasan_save_alloc_info+0x3b/0x50 [ 30.324858] __kasan_kmalloc+0xb7/0xc0 [ 30.325209] __kmalloc_cache_noprof+0x189/0x420 [ 30.325615] kasan_atomics+0x95/0x310 [ 30.325955] kunit_try_run_case+0x1a5/0x480 [ 30.326364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.326681] kthread+0x337/0x6f0 [ 30.326857] ret_from_fork+0x116/0x1d0 [ 30.327189] ret_from_fork_asm+0x1a/0x30 [ 30.327521] [ 30.327660] The buggy address belongs to the object at ffff888102338080 [ 30.327660] which belongs to the cache kmalloc-64 of size 64 [ 30.328207] The buggy address is located 0 bytes to the right of [ 30.328207] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.328942] [ 30.329059] The buggy address belongs to the physical page: [ 30.329475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.329878] flags: 0x200000000000000(node=0|zone=2) [ 30.330312] page_type: f5(slab) [ 30.330617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.330991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.331324] page dumped because: kasan: bad access detected [ 30.331738] [ 30.331896] Memory state around the buggy address: [ 30.332199] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.332687] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.333027] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.333488] ^ [ 30.333699] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.334212] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.334709] ================================================================== [ 28.889912] ================================================================== [ 28.890683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 28.891204] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.891545] [ 28.891724] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.891840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.891872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.891919] Call Trace: [ 28.891965] <TASK> [ 28.892006] dump_stack_lvl+0x73/0xb0 [ 28.892063] print_report+0xd1/0x650 [ 28.892104] ? __virt_addr_valid+0x1db/0x2d0 [ 28.892151] ? kasan_atomics_helper+0x7c7/0x5450 [ 28.892199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.892260] ? kasan_atomics_helper+0x7c7/0x5450 [ 28.892306] kasan_report+0x141/0x180 [ 28.892347] ? kasan_atomics_helper+0x7c7/0x5450 [ 28.892388] kasan_check_range+0x10c/0x1c0 [ 28.892423] __kasan_check_write+0x18/0x20 [ 28.892474] kasan_atomics_helper+0x7c7/0x5450 [ 28.892511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.892548] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.892590] ? kasan_atomics+0x152/0x310 [ 28.892629] kasan_atomics+0x1dc/0x310 [ 28.892663] ? __pfx_kasan_atomics+0x10/0x10 [ 28.892702] ? __pfx_read_tsc+0x10/0x10 [ 28.892736] ? ktime_get_ts64+0x86/0x230 [ 28.892782] kunit_try_run_case+0x1a5/0x480 [ 28.892821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.892856] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.892894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.892932] ? __kthread_parkme+0x82/0x180 [ 28.892971] ? preempt_count_sub+0x50/0x80 [ 28.893011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.893054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.893104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.893152] kthread+0x337/0x6f0 [ 28.893197] ? trace_preempt_on+0x20/0xc0 [ 28.893251] ? __pfx_kthread+0x10/0x10 [ 28.893301] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.893352] ? calculate_sigpending+0x7b/0xa0 [ 28.893407] ? __pfx_kthread+0x10/0x10 [ 28.893466] ret_from_fork+0x116/0x1d0 [ 28.893505] ? __pfx_kthread+0x10/0x10 [ 28.893544] ret_from_fork_asm+0x1a/0x30 [ 28.893605] </TASK> [ 28.893634] [ 28.902601] Allocated by task 294: [ 28.902952] kasan_save_stack+0x45/0x70 [ 28.903331] kasan_save_track+0x18/0x40 [ 28.903755] kasan_save_alloc_info+0x3b/0x50 [ 28.904097] __kasan_kmalloc+0xb7/0xc0 [ 28.904449] __kmalloc_cache_noprof+0x189/0x420 [ 28.904747] kasan_atomics+0x95/0x310 [ 28.904928] kunit_try_run_case+0x1a5/0x480 [ 28.905120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.905535] kthread+0x337/0x6f0 [ 28.905818] ret_from_fork+0x116/0x1d0 [ 28.906133] ret_from_fork_asm+0x1a/0x30 [ 28.906431] [ 28.906549] The buggy address belongs to the object at ffff888102338080 [ 28.906549] which belongs to the cache kmalloc-64 of size 64 [ 28.907263] The buggy address is located 0 bytes to the right of [ 28.907263] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.907878] [ 28.908061] The buggy address belongs to the physical page: [ 28.908552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.908838] flags: 0x200000000000000(node=0|zone=2) [ 28.909051] page_type: f5(slab) [ 28.909301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.909876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.910581] page dumped because: kasan: bad access detected [ 28.910915] [ 28.911018] Memory state around the buggy address: [ 28.911476] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.911826] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.912217] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.912577] ^ [ 28.912831] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.913316] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.913680] ================================================================== [ 29.920345] ================================================================== [ 29.920978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 29.921317] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.923288] [ 29.924219] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.924356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.924384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.924427] Call Trace: [ 29.924479] <TASK> [ 29.924519] dump_stack_lvl+0x73/0xb0 [ 29.924610] print_report+0xd1/0x650 [ 29.924649] ? __virt_addr_valid+0x1db/0x2d0 [ 29.924682] ? kasan_atomics_helper+0x19e3/0x5450 [ 29.924708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.924738] ? kasan_atomics_helper+0x19e3/0x5450 [ 29.924763] kasan_report+0x141/0x180 [ 29.924787] ? kasan_atomics_helper+0x19e3/0x5450 [ 29.924816] kasan_check_range+0x10c/0x1c0 [ 29.924843] __kasan_check_write+0x18/0x20 [ 29.924868] kasan_atomics_helper+0x19e3/0x5450 [ 29.924894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.924919] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.924947] ? kasan_atomics+0x152/0x310 [ 29.924976] kasan_atomics+0x1dc/0x310 [ 29.925002] ? __pfx_kasan_atomics+0x10/0x10 [ 29.925029] ? __pfx_read_tsc+0x10/0x10 [ 29.925053] ? ktime_get_ts64+0x86/0x230 [ 29.925084] kunit_try_run_case+0x1a5/0x480 [ 29.925113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.925138] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.925164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.925191] ? __kthread_parkme+0x82/0x180 [ 29.925215] ? preempt_count_sub+0x50/0x80 [ 29.925243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.925269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.925296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.925322] kthread+0x337/0x6f0 [ 29.925345] ? trace_preempt_on+0x20/0xc0 [ 29.925372] ? __pfx_kthread+0x10/0x10 [ 29.925396] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.925420] ? calculate_sigpending+0x7b/0xa0 [ 29.925468] ? __pfx_kthread+0x10/0x10 [ 29.925495] ret_from_fork+0x116/0x1d0 [ 29.925518] ? __pfx_kthread+0x10/0x10 [ 29.925543] ret_from_fork_asm+0x1a/0x30 [ 29.925577] </TASK> [ 29.925593] [ 29.935865] Allocated by task 294: [ 29.936182] kasan_save_stack+0x45/0x70 [ 29.936476] kasan_save_track+0x18/0x40 [ 29.936674] kasan_save_alloc_info+0x3b/0x50 [ 29.936933] __kasan_kmalloc+0xb7/0xc0 [ 29.937281] __kmalloc_cache_noprof+0x189/0x420 [ 29.937682] kasan_atomics+0x95/0x310 [ 29.938000] kunit_try_run_case+0x1a5/0x480 [ 29.938385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.938841] kthread+0x337/0x6f0 [ 29.939143] ret_from_fork+0x116/0x1d0 [ 29.939467] ret_from_fork_asm+0x1a/0x30 [ 29.939637] [ 29.939846] The buggy address belongs to the object at ffff888102338080 [ 29.939846] which belongs to the cache kmalloc-64 of size 64 [ 29.940614] The buggy address is located 0 bytes to the right of [ 29.940614] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.941452] [ 29.941651] The buggy address belongs to the physical page: [ 29.941972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.942559] flags: 0x200000000000000(node=0|zone=2) [ 29.942803] page_type: f5(slab) [ 29.942989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.943353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.943920] page dumped because: kasan: bad access detected [ 29.944385] [ 29.944545] Memory state around the buggy address: [ 29.944942] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.945525] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.946062] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.946640] ^ [ 29.946994] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.947423] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.947862] ================================================================== [ 28.621991] ================================================================== [ 28.622652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 28.624301] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.624663] [ 28.624818] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.624923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.624948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.624989] Call Trace: [ 28.625031] <TASK> [ 28.625071] dump_stack_lvl+0x73/0xb0 [ 28.625594] print_report+0xd1/0x650 [ 28.625674] ? __virt_addr_valid+0x1db/0x2d0 [ 28.625707] ? kasan_atomics_helper+0x4b6e/0x5450 [ 28.625731] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.625760] ? kasan_atomics_helper+0x4b6e/0x5450 [ 28.625784] kasan_report+0x141/0x180 [ 28.625808] ? kasan_atomics_helper+0x4b6e/0x5450 [ 28.625835] __asan_report_store4_noabort+0x1b/0x30 [ 28.625862] kasan_atomics_helper+0x4b6e/0x5450 [ 28.625886] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.625910] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.625937] ? kasan_atomics+0x152/0x310 [ 28.625964] kasan_atomics+0x1dc/0x310 [ 28.625989] ? __pfx_kasan_atomics+0x10/0x10 [ 28.626014] ? __pfx_read_tsc+0x10/0x10 [ 28.626050] ? ktime_get_ts64+0x86/0x230 [ 28.626081] kunit_try_run_case+0x1a5/0x480 [ 28.626110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.626135] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.626190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.626219] ? __kthread_parkme+0x82/0x180 [ 28.626244] ? preempt_count_sub+0x50/0x80 [ 28.626269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.626296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.626321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.626347] kthread+0x337/0x6f0 [ 28.626369] ? trace_preempt_on+0x20/0xc0 [ 28.626395] ? __pfx_kthread+0x10/0x10 [ 28.626419] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.626461] ? calculate_sigpending+0x7b/0xa0 [ 28.626490] ? __pfx_kthread+0x10/0x10 [ 28.626515] ret_from_fork+0x116/0x1d0 [ 28.626535] ? __pfx_kthread+0x10/0x10 [ 28.626558] ret_from_fork_asm+0x1a/0x30 [ 28.626591] </TASK> [ 28.626604] [ 28.638420] Allocated by task 294: [ 28.639902] kasan_save_stack+0x45/0x70 [ 28.640565] kasan_save_track+0x18/0x40 [ 28.641037] kasan_save_alloc_info+0x3b/0x50 [ 28.641518] __kasan_kmalloc+0xb7/0xc0 [ 28.641723] __kmalloc_cache_noprof+0x189/0x420 [ 28.642099] kasan_atomics+0x95/0x310 [ 28.642319] kunit_try_run_case+0x1a5/0x480 [ 28.642553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.642981] kthread+0x337/0x6f0 [ 28.643316] ret_from_fork+0x116/0x1d0 [ 28.644029] ret_from_fork_asm+0x1a/0x30 [ 28.644318] [ 28.644563] The buggy address belongs to the object at ffff888102338080 [ 28.644563] which belongs to the cache kmalloc-64 of size 64 [ 28.645248] The buggy address is located 0 bytes to the right of [ 28.645248] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.646270] [ 28.646504] The buggy address belongs to the physical page: [ 28.646827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.647471] flags: 0x200000000000000(node=0|zone=2) [ 28.647814] page_type: f5(slab) [ 28.648125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.648565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.649177] page dumped because: kasan: bad access detected [ 28.649593] [ 28.649696] Memory state around the buggy address: [ 28.650093] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.650394] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.650874] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.651163] ^ [ 28.651629] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.652404] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.652655] ================================================================== [ 29.005275] ================================================================== [ 29.006095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 29.007382] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.007947] [ 29.008191] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.008308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.008342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.008418] Call Trace: [ 29.008478] <TASK> [ 29.008526] dump_stack_lvl+0x73/0xb0 [ 29.008584] print_report+0xd1/0x650 [ 29.008614] ? __virt_addr_valid+0x1db/0x2d0 [ 29.008642] ? kasan_atomics_helper+0xa2b/0x5450 [ 29.008666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.008704] ? kasan_atomics_helper+0xa2b/0x5450 [ 29.008744] kasan_report+0x141/0x180 [ 29.008789] ? kasan_atomics_helper+0xa2b/0x5450 [ 29.008845] kasan_check_range+0x10c/0x1c0 [ 29.008932] __kasan_check_write+0x18/0x20 [ 29.009003] kasan_atomics_helper+0xa2b/0x5450 [ 29.009053] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.009103] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.009156] ? kasan_atomics+0x152/0x310 [ 29.009205] kasan_atomics+0x1dc/0x310 [ 29.009260] ? __pfx_kasan_atomics+0x10/0x10 [ 29.009313] ? __pfx_read_tsc+0x10/0x10 [ 29.009380] ? ktime_get_ts64+0x86/0x230 [ 29.009426] kunit_try_run_case+0x1a5/0x480 [ 29.009481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.009509] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.009537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.009564] ? __kthread_parkme+0x82/0x180 [ 29.009591] ? preempt_count_sub+0x50/0x80 [ 29.009619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.009646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.009673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.009700] kthread+0x337/0x6f0 [ 29.009724] ? trace_preempt_on+0x20/0xc0 [ 29.009752] ? __pfx_kthread+0x10/0x10 [ 29.009776] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.009801] ? calculate_sigpending+0x7b/0xa0 [ 29.009830] ? __pfx_kthread+0x10/0x10 [ 29.009856] ret_from_fork+0x116/0x1d0 [ 29.009877] ? __pfx_kthread+0x10/0x10 [ 29.009901] ret_from_fork_asm+0x1a/0x30 [ 29.009937] </TASK> [ 29.009954] [ 29.021737] Allocated by task 294: [ 29.022136] kasan_save_stack+0x45/0x70 [ 29.022390] kasan_save_track+0x18/0x40 [ 29.022790] kasan_save_alloc_info+0x3b/0x50 [ 29.023115] __kasan_kmalloc+0xb7/0xc0 [ 29.023332] __kmalloc_cache_noprof+0x189/0x420 [ 29.023551] kasan_atomics+0x95/0x310 [ 29.023737] kunit_try_run_case+0x1a5/0x480 [ 29.023932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.024438] kthread+0x337/0x6f0 [ 29.024927] ret_from_fork+0x116/0x1d0 [ 29.025366] ret_from_fork_asm+0x1a/0x30 [ 29.025696] [ 29.025932] The buggy address belongs to the object at ffff888102338080 [ 29.025932] which belongs to the cache kmalloc-64 of size 64 [ 29.026923] The buggy address is located 0 bytes to the right of [ 29.026923] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.027929] [ 29.028062] The buggy address belongs to the physical page: [ 29.028322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.028914] flags: 0x200000000000000(node=0|zone=2) [ 29.029528] page_type: f5(slab) [ 29.029879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.030567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.031069] page dumped because: kasan: bad access detected [ 29.031325] [ 29.031431] Memory state around the buggy address: [ 29.031972] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.032895] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.033600] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.034095] ^ [ 29.034586] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.035020] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.035638] ================================================================== [ 29.274374] ================================================================== [ 29.275079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 29.275595] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.276111] [ 29.276326] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.276430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.276477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.276517] Call Trace: [ 29.276570] <TASK> [ 29.276607] dump_stack_lvl+0x73/0xb0 [ 29.276676] print_report+0xd1/0x650 [ 29.276736] ? __virt_addr_valid+0x1db/0x2d0 [ 29.276805] ? kasan_atomics_helper+0xfa9/0x5450 [ 29.276861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.276928] ? kasan_atomics_helper+0xfa9/0x5450 [ 29.276977] kasan_report+0x141/0x180 [ 29.277032] ? kasan_atomics_helper+0xfa9/0x5450 [ 29.277096] kasan_check_range+0x10c/0x1c0 [ 29.277186] __kasan_check_write+0x18/0x20 [ 29.277236] kasan_atomics_helper+0xfa9/0x5450 [ 29.277285] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.277334] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.277398] ? kasan_atomics+0x152/0x310 [ 29.277482] kasan_atomics+0x1dc/0x310 [ 29.277536] ? __pfx_kasan_atomics+0x10/0x10 [ 29.277582] ? __pfx_read_tsc+0x10/0x10 [ 29.277627] ? ktime_get_ts64+0x86/0x230 [ 29.277688] kunit_try_run_case+0x1a5/0x480 [ 29.277753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.277823] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.277873] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.277926] ? __kthread_parkme+0x82/0x180 [ 29.277981] ? preempt_count_sub+0x50/0x80 [ 29.278060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.278116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.278199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.278234] kthread+0x337/0x6f0 [ 29.278258] ? trace_preempt_on+0x20/0xc0 [ 29.278287] ? __pfx_kthread+0x10/0x10 [ 29.278311] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.278336] ? calculate_sigpending+0x7b/0xa0 [ 29.278365] ? __pfx_kthread+0x10/0x10 [ 29.278389] ret_from_fork+0x116/0x1d0 [ 29.278412] ? __pfx_kthread+0x10/0x10 [ 29.278437] ret_from_fork_asm+0x1a/0x30 [ 29.278495] </TASK> [ 29.278512] [ 29.288286] Allocated by task 294: [ 29.288536] kasan_save_stack+0x45/0x70 [ 29.288917] kasan_save_track+0x18/0x40 [ 29.289298] kasan_save_alloc_info+0x3b/0x50 [ 29.289700] __kasan_kmalloc+0xb7/0xc0 [ 29.290037] __kmalloc_cache_noprof+0x189/0x420 [ 29.290470] kasan_atomics+0x95/0x310 [ 29.290817] kunit_try_run_case+0x1a5/0x480 [ 29.291206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.291495] kthread+0x337/0x6f0 [ 29.291669] ret_from_fork+0x116/0x1d0 [ 29.291985] ret_from_fork_asm+0x1a/0x30 [ 29.292377] [ 29.292565] The buggy address belongs to the object at ffff888102338080 [ 29.292565] which belongs to the cache kmalloc-64 of size 64 [ 29.293315] The buggy address is located 0 bytes to the right of [ 29.293315] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.293776] [ 29.293979] The buggy address belongs to the physical page: [ 29.294423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.294919] flags: 0x200000000000000(node=0|zone=2) [ 29.295270] page_type: f5(slab) [ 29.295609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.296056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.296518] page dumped because: kasan: bad access detected [ 29.296791] [ 29.296897] Memory state around the buggy address: [ 29.297103] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.297400] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.297930] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.298530] ^ [ 29.298922] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.299454] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.299725] ================================================================== [ 29.357938] ================================================================== [ 29.358764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 29.359186] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.359851] [ 29.360063] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.360178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.360209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.360261] Call Trace: [ 29.360309] <TASK> [ 29.360357] dump_stack_lvl+0x73/0xb0 [ 29.360428] print_report+0xd1/0x650 [ 29.360499] ? __virt_addr_valid+0x1db/0x2d0 [ 29.360561] ? kasan_atomics_helper+0x4a1c/0x5450 [ 29.360613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.360675] ? kasan_atomics_helper+0x4a1c/0x5450 [ 29.360729] kasan_report+0x141/0x180 [ 29.360781] ? kasan_atomics_helper+0x4a1c/0x5450 [ 29.360845] __asan_report_load4_noabort+0x18/0x20 [ 29.360904] kasan_atomics_helper+0x4a1c/0x5450 [ 29.360956] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.361011] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.361072] ? kasan_atomics+0x152/0x310 [ 29.361136] kasan_atomics+0x1dc/0x310 [ 29.361178] ? __pfx_kasan_atomics+0x10/0x10 [ 29.361228] ? __pfx_read_tsc+0x10/0x10 [ 29.361268] ? ktime_get_ts64+0x86/0x230 [ 29.361316] kunit_try_run_case+0x1a5/0x480 [ 29.361365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.361411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.361503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.361571] ? __kthread_parkme+0x82/0x180 [ 29.361635] ? preempt_count_sub+0x50/0x80 [ 29.361692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.361760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.361827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.361891] kthread+0x337/0x6f0 [ 29.361950] ? trace_preempt_on+0x20/0xc0 [ 29.362006] ? __pfx_kthread+0x10/0x10 [ 29.362077] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.362140] ? calculate_sigpending+0x7b/0xa0 [ 29.362187] ? __pfx_kthread+0x10/0x10 [ 29.362230] ret_from_fork+0x116/0x1d0 [ 29.362272] ? __pfx_kthread+0x10/0x10 [ 29.362314] ret_from_fork_asm+0x1a/0x30 [ 29.362387] </TASK> [ 29.362417] [ 29.377130] Allocated by task 294: [ 29.378564] kasan_save_stack+0x45/0x70 [ 29.378963] kasan_save_track+0x18/0x40 [ 29.379484] kasan_save_alloc_info+0x3b/0x50 [ 29.379698] __kasan_kmalloc+0xb7/0xc0 [ 29.380066] __kmalloc_cache_noprof+0x189/0x420 [ 29.380597] kasan_atomics+0x95/0x310 [ 29.380777] kunit_try_run_case+0x1a5/0x480 [ 29.381288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.381563] kthread+0x337/0x6f0 [ 29.382135] ret_from_fork+0x116/0x1d0 [ 29.382329] ret_from_fork_asm+0x1a/0x30 [ 29.382760] [ 29.382866] The buggy address belongs to the object at ffff888102338080 [ 29.382866] which belongs to the cache kmalloc-64 of size 64 [ 29.384047] The buggy address is located 0 bytes to the right of [ 29.384047] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.384926] [ 29.385042] The buggy address belongs to the physical page: [ 29.385245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.385772] flags: 0x200000000000000(node=0|zone=2) [ 29.385963] page_type: f5(slab) [ 29.386077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.386899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.387530] page dumped because: kasan: bad access detected [ 29.387971] [ 29.388138] Memory state around the buggy address: [ 29.388554] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.389044] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.389691] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.390069] ^ [ 29.390550] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.390916] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.391422] ================================================================== [ 30.336097] ================================================================== [ 30.336789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 30.337281] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.337701] [ 30.337891] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.337998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.338038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.338087] Call Trace: [ 30.338131] <TASK> [ 30.338213] dump_stack_lvl+0x73/0xb0 [ 30.338285] print_report+0xd1/0x650 [ 30.338333] ? __virt_addr_valid+0x1db/0x2d0 [ 30.338381] ? kasan_atomics_helper+0x4fb2/0x5450 [ 30.338423] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.338491] ? kasan_atomics_helper+0x4fb2/0x5450 [ 30.338543] kasan_report+0x141/0x180 [ 30.338589] ? kasan_atomics_helper+0x4fb2/0x5450 [ 30.338647] __asan_report_load8_noabort+0x18/0x20 [ 30.338696] kasan_atomics_helper+0x4fb2/0x5450 [ 30.338743] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.338790] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.338844] ? kasan_atomics+0x152/0x310 [ 30.338898] kasan_atomics+0x1dc/0x310 [ 30.338943] ? __pfx_kasan_atomics+0x10/0x10 [ 30.338997] ? __pfx_read_tsc+0x10/0x10 [ 30.339047] ? ktime_get_ts64+0x86/0x230 [ 30.339107] kunit_try_run_case+0x1a5/0x480 [ 30.339199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.339250] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.339304] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.339349] ? __kthread_parkme+0x82/0x180 [ 30.339399] ? preempt_count_sub+0x50/0x80 [ 30.339466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.339522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.339582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.339637] kthread+0x337/0x6f0 [ 30.339678] ? trace_preempt_on+0x20/0xc0 [ 30.339727] ? __pfx_kthread+0x10/0x10 [ 30.339774] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.339817] ? calculate_sigpending+0x7b/0xa0 [ 30.339861] ? __pfx_kthread+0x10/0x10 [ 30.339909] ret_from_fork+0x116/0x1d0 [ 30.339952] ? __pfx_kthread+0x10/0x10 [ 30.339996] ret_from_fork_asm+0x1a/0x30 [ 30.340058] </TASK> [ 30.340083] [ 30.349186] Allocated by task 294: [ 30.349540] kasan_save_stack+0x45/0x70 [ 30.349918] kasan_save_track+0x18/0x40 [ 30.350235] kasan_save_alloc_info+0x3b/0x50 [ 30.350516] __kasan_kmalloc+0xb7/0xc0 [ 30.350683] __kmalloc_cache_noprof+0x189/0x420 [ 30.350861] kasan_atomics+0x95/0x310 [ 30.351009] kunit_try_run_case+0x1a5/0x480 [ 30.352049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.352348] kthread+0x337/0x6f0 [ 30.352542] ret_from_fork+0x116/0x1d0 [ 30.354176] ret_from_fork_asm+0x1a/0x30 [ 30.354463] [ 30.354581] The buggy address belongs to the object at ffff888102338080 [ 30.354581] which belongs to the cache kmalloc-64 of size 64 [ 30.355004] The buggy address is located 0 bytes to the right of [ 30.355004] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.355833] [ 30.356054] The buggy address belongs to the physical page: [ 30.356543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.356932] flags: 0x200000000000000(node=0|zone=2) [ 30.357365] page_type: f5(slab) [ 30.357643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.358197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.358723] page dumped because: kasan: bad access detected [ 30.359011] [ 30.359173] Memory state around the buggy address: [ 30.359589] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.359919] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.360361] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.360936] ^ [ 30.361127] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.361392] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.361912] ================================================================== [ 29.538233] ================================================================== [ 29.538887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 29.539402] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.539828] [ 29.540038] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.540190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.540223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.540275] Call Trace: [ 29.540322] <TASK> [ 29.540370] dump_stack_lvl+0x73/0xb0 [ 29.540452] print_report+0xd1/0x650 [ 29.540508] ? __virt_addr_valid+0x1db/0x2d0 [ 29.540586] ? kasan_atomics_helper+0x49ce/0x5450 [ 29.540633] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.540684] ? kasan_atomics_helper+0x49ce/0x5450 [ 29.540733] kasan_report+0x141/0x180 [ 29.540789] ? kasan_atomics_helper+0x49ce/0x5450 [ 29.540850] __asan_report_load4_noabort+0x18/0x20 [ 29.540909] kasan_atomics_helper+0x49ce/0x5450 [ 29.540965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.541020] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.541078] ? kasan_atomics+0x152/0x310 [ 29.541176] kasan_atomics+0x1dc/0x310 [ 29.541235] ? __pfx_kasan_atomics+0x10/0x10 [ 29.541295] ? __pfx_read_tsc+0x10/0x10 [ 29.541339] ? ktime_get_ts64+0x86/0x230 [ 29.541390] kunit_try_run_case+0x1a5/0x480 [ 29.541438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.541496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.541545] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.541595] ? __kthread_parkme+0x82/0x180 [ 29.541647] ? preempt_count_sub+0x50/0x80 [ 29.541703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.541757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.541813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.541866] kthread+0x337/0x6f0 [ 29.541912] ? trace_preempt_on+0x20/0xc0 [ 29.541968] ? __pfx_kthread+0x10/0x10 [ 29.542019] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.542075] ? calculate_sigpending+0x7b/0xa0 [ 29.542179] ? __pfx_kthread+0x10/0x10 [ 29.542230] ret_from_fork+0x116/0x1d0 [ 29.542271] ? __pfx_kthread+0x10/0x10 [ 29.542311] ret_from_fork_asm+0x1a/0x30 [ 29.542384] </TASK> [ 29.542415] [ 29.551854] Allocated by task 294: [ 29.552256] kasan_save_stack+0x45/0x70 [ 29.552652] kasan_save_track+0x18/0x40 [ 29.552988] kasan_save_alloc_info+0x3b/0x50 [ 29.553385] __kasan_kmalloc+0xb7/0xc0 [ 29.553678] __kmalloc_cache_noprof+0x189/0x420 [ 29.553889] kasan_atomics+0x95/0x310 [ 29.554077] kunit_try_run_case+0x1a5/0x480 [ 29.554462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.554907] kthread+0x337/0x6f0 [ 29.555230] ret_from_fork+0x116/0x1d0 [ 29.555554] ret_from_fork_asm+0x1a/0x30 [ 29.555896] [ 29.556009] The buggy address belongs to the object at ffff888102338080 [ 29.556009] which belongs to the cache kmalloc-64 of size 64 [ 29.556479] The buggy address is located 0 bytes to the right of [ 29.556479] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.557426] [ 29.557586] The buggy address belongs to the physical page: [ 29.557933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.558334] flags: 0x200000000000000(node=0|zone=2) [ 29.558570] page_type: f5(slab) [ 29.558747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.559273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.559865] page dumped because: kasan: bad access detected [ 29.560318] [ 29.560506] Memory state around the buggy address: [ 29.560828] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.561095] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.561380] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.561918] ^ [ 29.562361] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.562909] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563417] ================================================================== [ 29.179789] ================================================================== [ 29.180227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 29.181489] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.182063] [ 29.182222] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.182321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.182340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.182368] Call Trace: [ 29.182395] <TASK> [ 29.182426] dump_stack_lvl+0x73/0xb0 [ 29.182506] print_report+0xd1/0x650 [ 29.182547] ? __virt_addr_valid+0x1db/0x2d0 [ 29.182594] ? kasan_atomics_helper+0xde0/0x5450 [ 29.182641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.182698] ? kasan_atomics_helper+0xde0/0x5450 [ 29.182751] kasan_report+0x141/0x180 [ 29.182806] ? kasan_atomics_helper+0xde0/0x5450 [ 29.182870] kasan_check_range+0x10c/0x1c0 [ 29.182928] __kasan_check_write+0x18/0x20 [ 29.182984] kasan_atomics_helper+0xde0/0x5450 [ 29.183041] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.183097] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.183154] ? kasan_atomics+0x152/0x310 [ 29.183213] kasan_atomics+0x1dc/0x310 [ 29.183269] ? __pfx_kasan_atomics+0x10/0x10 [ 29.183326] ? __pfx_read_tsc+0x10/0x10 [ 29.183372] ? ktime_get_ts64+0x86/0x230 [ 29.183406] kunit_try_run_case+0x1a5/0x480 [ 29.183437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.183538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.183594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.183651] ? __kthread_parkme+0x82/0x180 [ 29.183701] ? preempt_count_sub+0x50/0x80 [ 29.183760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.183819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.183864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.183911] kthread+0x337/0x6f0 [ 29.183958] ? trace_preempt_on+0x20/0xc0 [ 29.184010] ? __pfx_kthread+0x10/0x10 [ 29.184060] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.184114] ? calculate_sigpending+0x7b/0xa0 [ 29.185112] ? __pfx_kthread+0x10/0x10 [ 29.185222] ret_from_fork+0x116/0x1d0 [ 29.185276] ? __pfx_kthread+0x10/0x10 [ 29.185331] ret_from_fork_asm+0x1a/0x30 [ 29.185409] </TASK> [ 29.185456] [ 29.197846] Allocated by task 294: [ 29.198266] kasan_save_stack+0x45/0x70 [ 29.198509] kasan_save_track+0x18/0x40 [ 29.198953] kasan_save_alloc_info+0x3b/0x50 [ 29.199468] __kasan_kmalloc+0xb7/0xc0 [ 29.199786] __kmalloc_cache_noprof+0x189/0x420 [ 29.199970] kasan_atomics+0x95/0x310 [ 29.200411] kunit_try_run_case+0x1a5/0x480 [ 29.200844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.201277] kthread+0x337/0x6f0 [ 29.201547] ret_from_fork+0x116/0x1d0 [ 29.201924] ret_from_fork_asm+0x1a/0x30 [ 29.202268] [ 29.202480] The buggy address belongs to the object at ffff888102338080 [ 29.202480] which belongs to the cache kmalloc-64 of size 64 [ 29.203302] The buggy address is located 0 bytes to the right of [ 29.203302] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.203970] [ 29.204225] The buggy address belongs to the physical page: [ 29.204592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.205092] flags: 0x200000000000000(node=0|zone=2) [ 29.205562] page_type: f5(slab) [ 29.205799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.206327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.206862] page dumped because: kasan: bad access detected [ 29.207350] [ 29.207523] Memory state around the buggy address: [ 29.207934] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.208345] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.208890] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.209367] ^ [ 29.209649] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.210094] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.210409] ================================================================== [ 29.620245] ================================================================== [ 29.620947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 29.621640] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.622288] [ 29.622552] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.622668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.622738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.622793] Call Trace: [ 29.622839] <TASK> [ 29.622885] dump_stack_lvl+0x73/0xb0 [ 29.622996] print_report+0xd1/0x650 [ 29.623052] ? __virt_addr_valid+0x1db/0x2d0 [ 29.623107] ? kasan_atomics_helper+0x1467/0x5450 [ 29.623220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.623285] ? kasan_atomics_helper+0x1467/0x5450 [ 29.623337] kasan_report+0x141/0x180 [ 29.623381] ? kasan_atomics_helper+0x1467/0x5450 [ 29.623413] kasan_check_range+0x10c/0x1c0 [ 29.623462] __kasan_check_write+0x18/0x20 [ 29.623496] kasan_atomics_helper+0x1467/0x5450 [ 29.623538] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.623580] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.623634] ? kasan_atomics+0x152/0x310 [ 29.623730] kasan_atomics+0x1dc/0x310 [ 29.623782] ? __pfx_kasan_atomics+0x10/0x10 [ 29.623837] ? __pfx_read_tsc+0x10/0x10 [ 29.623888] ? ktime_get_ts64+0x86/0x230 [ 29.623982] kunit_try_run_case+0x1a5/0x480 [ 29.624043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.624091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.624136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.624199] ? __kthread_parkme+0x82/0x180 [ 29.624227] ? preempt_count_sub+0x50/0x80 [ 29.624255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.624284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.624312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.624340] kthread+0x337/0x6f0 [ 29.624362] ? trace_preempt_on+0x20/0xc0 [ 29.624390] ? __pfx_kthread+0x10/0x10 [ 29.624415] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.624449] ? calculate_sigpending+0x7b/0xa0 [ 29.624481] ? __pfx_kthread+0x10/0x10 [ 29.624508] ret_from_fork+0x116/0x1d0 [ 29.624530] ? __pfx_kthread+0x10/0x10 [ 29.624554] ret_from_fork_asm+0x1a/0x30 [ 29.624589] </TASK> [ 29.624604] [ 29.636867] Allocated by task 294: [ 29.637377] kasan_save_stack+0x45/0x70 [ 29.637824] kasan_save_track+0x18/0x40 [ 29.638269] kasan_save_alloc_info+0x3b/0x50 [ 29.638536] __kasan_kmalloc+0xb7/0xc0 [ 29.638841] __kmalloc_cache_noprof+0x189/0x420 [ 29.639207] kasan_atomics+0x95/0x310 [ 29.639528] kunit_try_run_case+0x1a5/0x480 [ 29.639794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.640029] kthread+0x337/0x6f0 [ 29.640351] ret_from_fork+0x116/0x1d0 [ 29.640797] ret_from_fork_asm+0x1a/0x30 [ 29.641202] [ 29.641390] The buggy address belongs to the object at ffff888102338080 [ 29.641390] which belongs to the cache kmalloc-64 of size 64 [ 29.642065] The buggy address is located 0 bytes to the right of [ 29.642065] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.642953] [ 29.643270] The buggy address belongs to the physical page: [ 29.643621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.643942] flags: 0x200000000000000(node=0|zone=2) [ 29.644415] page_type: f5(slab) [ 29.644809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.645363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.645831] page dumped because: kasan: bad access detected [ 29.646242] [ 29.646452] Memory state around the buggy address: [ 29.646792] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.647282] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.647607] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.648274] ^ [ 29.648720] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.649057] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.649489] ================================================================== [ 29.245351] ================================================================== [ 29.245791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 29.246359] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.246747] [ 29.247002] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.247198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.247234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.247285] Call Trace: [ 29.247329] <TASK> [ 29.247372] dump_stack_lvl+0x73/0xb0 [ 29.247491] print_report+0xd1/0x650 [ 29.247583] ? __virt_addr_valid+0x1db/0x2d0 [ 29.247653] ? kasan_atomics_helper+0xf10/0x5450 [ 29.247707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.247766] ? kasan_atomics_helper+0xf10/0x5450 [ 29.247807] kasan_report+0x141/0x180 [ 29.247834] ? kasan_atomics_helper+0xf10/0x5450 [ 29.247863] kasan_check_range+0x10c/0x1c0 [ 29.247891] __kasan_check_write+0x18/0x20 [ 29.247918] kasan_atomics_helper+0xf10/0x5450 [ 29.247960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.248002] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.248032] ? kasan_atomics+0x152/0x310 [ 29.248062] kasan_atomics+0x1dc/0x310 [ 29.248087] ? __pfx_kasan_atomics+0x10/0x10 [ 29.248114] ? __pfx_read_tsc+0x10/0x10 [ 29.248152] ? ktime_get_ts64+0x86/0x230 [ 29.248203] kunit_try_run_case+0x1a5/0x480 [ 29.248235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.248261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.248289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.248315] ? __kthread_parkme+0x82/0x180 [ 29.248341] ? preempt_count_sub+0x50/0x80 [ 29.248369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.248396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.248423] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.248468] kthread+0x337/0x6f0 [ 29.248495] ? trace_preempt_on+0x20/0xc0 [ 29.248521] ? __pfx_kthread+0x10/0x10 [ 29.248546] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.248570] ? calculate_sigpending+0x7b/0xa0 [ 29.248599] ? __pfx_kthread+0x10/0x10 [ 29.248623] ret_from_fork+0x116/0x1d0 [ 29.248644] ? __pfx_kthread+0x10/0x10 [ 29.248668] ret_from_fork_asm+0x1a/0x30 [ 29.248704] </TASK> [ 29.248719] [ 29.259205] Allocated by task 294: [ 29.259619] kasan_save_stack+0x45/0x70 [ 29.260847] kasan_save_track+0x18/0x40 [ 29.261489] kasan_save_alloc_info+0x3b/0x50 [ 29.261721] __kasan_kmalloc+0xb7/0xc0 [ 29.261902] __kmalloc_cache_noprof+0x189/0x420 [ 29.262124] kasan_atomics+0x95/0x310 [ 29.262300] kunit_try_run_case+0x1a5/0x480 [ 29.262508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.262736] kthread+0x337/0x6f0 [ 29.263035] ret_from_fork+0x116/0x1d0 [ 29.264210] ret_from_fork_asm+0x1a/0x30 [ 29.264637] [ 29.264752] The buggy address belongs to the object at ffff888102338080 [ 29.264752] which belongs to the cache kmalloc-64 of size 64 [ 29.265795] The buggy address is located 0 bytes to the right of [ 29.265795] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.266529] [ 29.266720] The buggy address belongs to the physical page: [ 29.267158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.267893] flags: 0x200000000000000(node=0|zone=2) [ 29.268125] page_type: f5(slab) [ 29.268388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.268908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.269577] page dumped because: kasan: bad access detected [ 29.269787] [ 29.269971] Memory state around the buggy address: [ 29.270651] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.271131] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.271432] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.271900] ^ [ 29.272259] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.272756] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.273017] ================================================================== [ 28.595944] ================================================================== [ 28.596873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 28.597213] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.597456] [ 28.597562] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.597625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.597640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.597666] Call Trace: [ 28.597683] <TASK> [ 28.597707] dump_stack_lvl+0x73/0xb0 [ 28.597741] print_report+0xd1/0x650 [ 28.597765] ? __virt_addr_valid+0x1db/0x2d0 [ 28.597792] ? kasan_atomics_helper+0x4b88/0x5450 [ 28.597815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.597844] ? kasan_atomics_helper+0x4b88/0x5450 [ 28.597867] kasan_report+0x141/0x180 [ 28.597891] ? kasan_atomics_helper+0x4b88/0x5450 [ 28.597919] __asan_report_load4_noabort+0x18/0x20 [ 28.597944] kasan_atomics_helper+0x4b88/0x5450 [ 28.597968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.597992] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.598019] ? kasan_atomics+0x152/0x310 [ 28.598061] kasan_atomics+0x1dc/0x310 [ 28.598086] ? __pfx_kasan_atomics+0x10/0x10 [ 28.598112] ? __pfx_read_tsc+0x10/0x10 [ 28.598136] ? ktime_get_ts64+0x86/0x230 [ 28.598166] kunit_try_run_case+0x1a5/0x480 [ 28.598194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.598219] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.598244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.598269] ? __kthread_parkme+0x82/0x180 [ 28.598292] ? preempt_count_sub+0x50/0x80 [ 28.598318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.598343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.598369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.598393] kthread+0x337/0x6f0 [ 28.598415] ? trace_preempt_on+0x20/0xc0 [ 28.598470] ? __pfx_kthread+0x10/0x10 [ 28.598518] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.598559] ? calculate_sigpending+0x7b/0xa0 [ 28.598611] ? __pfx_kthread+0x10/0x10 [ 28.598653] ret_from_fork+0x116/0x1d0 [ 28.598687] ? __pfx_kthread+0x10/0x10 [ 28.598724] ret_from_fork_asm+0x1a/0x30 [ 28.598786] </TASK> [ 28.598807] [ 28.609556] Allocated by task 294: [ 28.609923] kasan_save_stack+0x45/0x70 [ 28.610228] kasan_save_track+0x18/0x40 [ 28.610435] kasan_save_alloc_info+0x3b/0x50 [ 28.610646] __kasan_kmalloc+0xb7/0xc0 [ 28.610821] __kmalloc_cache_noprof+0x189/0x420 [ 28.611110] kasan_atomics+0x95/0x310 [ 28.611459] kunit_try_run_case+0x1a5/0x480 [ 28.611812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.612222] kthread+0x337/0x6f0 [ 28.612522] ret_from_fork+0x116/0x1d0 [ 28.612842] ret_from_fork_asm+0x1a/0x30 [ 28.613128] [ 28.613263] The buggy address belongs to the object at ffff888102338080 [ 28.613263] which belongs to the cache kmalloc-64 of size 64 [ 28.614066] The buggy address is located 0 bytes to the right of [ 28.614066] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.614790] [ 28.614968] The buggy address belongs to the physical page: [ 28.615306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.615733] flags: 0x200000000000000(node=0|zone=2) [ 28.616043] page_type: f5(slab) [ 28.616248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.616658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.617250] page dumped because: kasan: bad access detected [ 28.617489] [ 28.617590] Memory state around the buggy address: [ 28.617792] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.618207] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.618731] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.619264] ^ [ 28.619648] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.620115] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.620473] ================================================================== [ 30.068588] ================================================================== [ 30.069034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 30.069928] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.070389] [ 30.070617] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.070732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.070764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.070813] Call Trace: [ 30.070861] <TASK> [ 30.070907] dump_stack_lvl+0x73/0xb0 [ 30.070984] print_report+0xd1/0x650 [ 30.071041] ? __virt_addr_valid+0x1db/0x2d0 [ 30.071090] ? kasan_atomics_helper+0x1ce1/0x5450 [ 30.071128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.071176] ? kasan_atomics_helper+0x1ce1/0x5450 [ 30.071218] kasan_report+0x141/0x180 [ 30.071260] ? kasan_atomics_helper+0x1ce1/0x5450 [ 30.071316] kasan_check_range+0x10c/0x1c0 [ 30.071370] __kasan_check_write+0x18/0x20 [ 30.071426] kasan_atomics_helper+0x1ce1/0x5450 [ 30.071494] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.071549] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.071610] ? kasan_atomics+0x152/0x310 [ 30.071673] kasan_atomics+0x1dc/0x310 [ 30.071719] ? __pfx_kasan_atomics+0x10/0x10 [ 30.071774] ? __pfx_read_tsc+0x10/0x10 [ 30.071811] ? ktime_get_ts64+0x86/0x230 [ 30.071845] kunit_try_run_case+0x1a5/0x480 [ 30.071876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.071903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.071930] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.071956] ? __kthread_parkme+0x82/0x180 [ 30.071981] ? preempt_count_sub+0x50/0x80 [ 30.072008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.072034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.072061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.072087] kthread+0x337/0x6f0 [ 30.072110] ? trace_preempt_on+0x20/0xc0 [ 30.072137] ? __pfx_kthread+0x10/0x10 [ 30.072173] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.072206] ? calculate_sigpending+0x7b/0xa0 [ 30.072234] ? __pfx_kthread+0x10/0x10 [ 30.072258] ret_from_fork+0x116/0x1d0 [ 30.072281] ? __pfx_kthread+0x10/0x10 [ 30.072304] ret_from_fork_asm+0x1a/0x30 [ 30.072339] </TASK> [ 30.072355] [ 30.083478] Allocated by task 294: [ 30.083914] kasan_save_stack+0x45/0x70 [ 30.084862] kasan_save_track+0x18/0x40 [ 30.085149] kasan_save_alloc_info+0x3b/0x50 [ 30.085358] __kasan_kmalloc+0xb7/0xc0 [ 30.085556] __kmalloc_cache_noprof+0x189/0x420 [ 30.085793] kasan_atomics+0x95/0x310 [ 30.085999] kunit_try_run_case+0x1a5/0x480 [ 30.086259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.087075] kthread+0x337/0x6f0 [ 30.087536] ret_from_fork+0x116/0x1d0 [ 30.087918] ret_from_fork_asm+0x1a/0x30 [ 30.088330] [ 30.088541] The buggy address belongs to the object at ffff888102338080 [ 30.088541] which belongs to the cache kmalloc-64 of size 64 [ 30.089136] The buggy address is located 0 bytes to the right of [ 30.089136] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.089848] [ 30.089981] The buggy address belongs to the physical page: [ 30.090573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.091138] flags: 0x200000000000000(node=0|zone=2) [ 30.091423] page_type: f5(slab) [ 30.091606] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.092168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.092738] page dumped because: kasan: bad access detected [ 30.093183] [ 30.093357] Memory state around the buggy address: [ 30.093659] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.094168] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.094608] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.094985] ^ [ 30.095271] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.095670] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.095939] ================================================================== [ 29.510944] ================================================================== [ 29.511873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 29.512351] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.512786] [ 29.512953] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.513068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.513102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.513186] Call Trace: [ 29.513236] <TASK> [ 29.513282] dump_stack_lvl+0x73/0xb0 [ 29.513360] print_report+0xd1/0x650 [ 29.513415] ? __virt_addr_valid+0x1db/0x2d0 [ 29.513483] ? kasan_atomics_helper+0x12e6/0x5450 [ 29.513535] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.513598] ? kasan_atomics_helper+0x12e6/0x5450 [ 29.513649] kasan_report+0x141/0x180 [ 29.513702] ? kasan_atomics_helper+0x12e6/0x5450 [ 29.513767] kasan_check_range+0x10c/0x1c0 [ 29.513821] __kasan_check_write+0x18/0x20 [ 29.513874] kasan_atomics_helper+0x12e6/0x5450 [ 29.513930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.513986] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.514055] ? kasan_atomics+0x152/0x310 [ 29.514120] kasan_atomics+0x1dc/0x310 [ 29.514203] ? __pfx_kasan_atomics+0x10/0x10 [ 29.514265] ? __pfx_read_tsc+0x10/0x10 [ 29.514319] ? ktime_get_ts64+0x86/0x230 [ 29.514377] kunit_try_run_case+0x1a5/0x480 [ 29.514425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.514481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.514531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.514605] ? __kthread_parkme+0x82/0x180 [ 29.514657] ? preempt_count_sub+0x50/0x80 [ 29.514708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.514774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.514826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.514873] kthread+0x337/0x6f0 [ 29.514913] ? trace_preempt_on+0x20/0xc0 [ 29.514965] ? __pfx_kthread+0x10/0x10 [ 29.515013] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.515064] ? calculate_sigpending+0x7b/0xa0 [ 29.515117] ? __pfx_kthread+0x10/0x10 [ 29.515201] ret_from_fork+0x116/0x1d0 [ 29.515251] ? __pfx_kthread+0x10/0x10 [ 29.515300] ret_from_fork_asm+0x1a/0x30 [ 29.515396] </TASK> [ 29.515431] [ 29.525040] Allocated by task 294: [ 29.525311] kasan_save_stack+0x45/0x70 [ 29.525700] kasan_save_track+0x18/0x40 [ 29.526057] kasan_save_alloc_info+0x3b/0x50 [ 29.526467] __kasan_kmalloc+0xb7/0xc0 [ 29.526790] __kmalloc_cache_noprof+0x189/0x420 [ 29.527196] kasan_atomics+0x95/0x310 [ 29.527512] kunit_try_run_case+0x1a5/0x480 [ 29.527873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.528177] kthread+0x337/0x6f0 [ 29.528391] ret_from_fork+0x116/0x1d0 [ 29.528728] ret_from_fork_asm+0x1a/0x30 [ 29.529088] [ 29.529308] The buggy address belongs to the object at ffff888102338080 [ 29.529308] which belongs to the cache kmalloc-64 of size 64 [ 29.529732] The buggy address is located 0 bytes to the right of [ 29.529732] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.530202] [ 29.530320] The buggy address belongs to the physical page: [ 29.530655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.531306] flags: 0x200000000000000(node=0|zone=2) [ 29.531733] page_type: f5(slab) [ 29.532028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.532633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.533252] page dumped because: kasan: bad access detected [ 29.533683] [ 29.533850] Memory state around the buggy address: [ 29.534242] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.534592] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.535110] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.535516] ^ [ 29.535705] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.535974] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.536549] ================================================================== [ 30.097424] ================================================================== [ 30.098403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 30.099178] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.099848] [ 30.100145] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.100281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.100313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.100365] Call Trace: [ 30.100436] <TASK> [ 30.100499] dump_stack_lvl+0x73/0xb0 [ 30.100574] print_report+0xd1/0x650 [ 30.100608] ? __virt_addr_valid+0x1db/0x2d0 [ 30.100638] ? kasan_atomics_helper+0x1d7a/0x5450 [ 30.100663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.100693] ? kasan_atomics_helper+0x1d7a/0x5450 [ 30.100726] kasan_report+0x141/0x180 [ 30.100768] ? kasan_atomics_helper+0x1d7a/0x5450 [ 30.100804] kasan_check_range+0x10c/0x1c0 [ 30.100831] __kasan_check_write+0x18/0x20 [ 30.100859] kasan_atomics_helper+0x1d7a/0x5450 [ 30.100884] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.100908] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.100937] ? kasan_atomics+0x152/0x310 [ 30.100967] kasan_atomics+0x1dc/0x310 [ 30.100992] ? __pfx_kasan_atomics+0x10/0x10 [ 30.101019] ? __pfx_read_tsc+0x10/0x10 [ 30.101045] ? ktime_get_ts64+0x86/0x230 [ 30.101076] kunit_try_run_case+0x1a5/0x480 [ 30.101105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.101130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.101167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.101203] ? __kthread_parkme+0x82/0x180 [ 30.101228] ? preempt_count_sub+0x50/0x80 [ 30.101255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.101282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.101309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.101336] kthread+0x337/0x6f0 [ 30.101358] ? trace_preempt_on+0x20/0xc0 [ 30.101385] ? __pfx_kthread+0x10/0x10 [ 30.101409] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.101432] ? calculate_sigpending+0x7b/0xa0 [ 30.101484] ? __pfx_kthread+0x10/0x10 [ 30.101509] ret_from_fork+0x116/0x1d0 [ 30.101532] ? __pfx_kthread+0x10/0x10 [ 30.101555] ret_from_fork_asm+0x1a/0x30 [ 30.101590] </TASK> [ 30.101604] [ 30.114343] Allocated by task 294: [ 30.114889] kasan_save_stack+0x45/0x70 [ 30.115407] kasan_save_track+0x18/0x40 [ 30.115689] kasan_save_alloc_info+0x3b/0x50 [ 30.116192] __kasan_kmalloc+0xb7/0xc0 [ 30.116639] __kmalloc_cache_noprof+0x189/0x420 [ 30.116928] kasan_atomics+0x95/0x310 [ 30.117087] kunit_try_run_case+0x1a5/0x480 [ 30.117497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.118466] kthread+0x337/0x6f0 [ 30.118757] ret_from_fork+0x116/0x1d0 [ 30.118909] ret_from_fork_asm+0x1a/0x30 [ 30.119169] [ 30.119509] The buggy address belongs to the object at ffff888102338080 [ 30.119509] which belongs to the cache kmalloc-64 of size 64 [ 30.120530] The buggy address is located 0 bytes to the right of [ 30.120530] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.121334] [ 30.121906] The buggy address belongs to the physical page: [ 30.122206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.122756] flags: 0x200000000000000(node=0|zone=2) [ 30.123323] page_type: f5(slab) [ 30.123665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.124072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.124794] page dumped because: kasan: bad access detected [ 30.125223] [ 30.125359] Memory state around the buggy address: [ 30.125758] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.126651] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.127337] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.127686] ^ [ 30.128123] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.128875] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.129184] ================================================================== [ 28.832885] ================================================================== [ 28.834341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 28.835213] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.835712] [ 28.835912] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.836025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.836054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.836102] Call Trace: [ 28.836144] <TASK> [ 28.836185] dump_stack_lvl+0x73/0xb0 [ 28.836253] print_report+0xd1/0x650 [ 28.836303] ? __virt_addr_valid+0x1db/0x2d0 [ 28.836355] ? kasan_atomics_helper+0x697/0x5450 [ 28.836402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.836466] ? kasan_atomics_helper+0x697/0x5450 [ 28.836517] kasan_report+0x141/0x180 [ 28.836562] ? kasan_atomics_helper+0x697/0x5450 [ 28.836617] kasan_check_range+0x10c/0x1c0 [ 28.836671] __kasan_check_write+0x18/0x20 [ 28.836721] kasan_atomics_helper+0x697/0x5450 [ 28.836765] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.836792] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.836822] ? kasan_atomics+0x152/0x310 [ 28.836851] kasan_atomics+0x1dc/0x310 [ 28.836882] ? __pfx_kasan_atomics+0x10/0x10 [ 28.836925] ? __pfx_read_tsc+0x10/0x10 [ 28.836967] ? ktime_get_ts64+0x86/0x230 [ 28.837026] kunit_try_run_case+0x1a5/0x480 [ 28.837078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.837127] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.837175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.837218] ? __kthread_parkme+0x82/0x180 [ 28.837262] ? preempt_count_sub+0x50/0x80 [ 28.837310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.837355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.837401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.837463] kthread+0x337/0x6f0 [ 28.837513] ? trace_preempt_on+0x20/0xc0 [ 28.837569] ? __pfx_kthread+0x10/0x10 [ 28.837611] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.837642] ? calculate_sigpending+0x7b/0xa0 [ 28.837671] ? __pfx_kthread+0x10/0x10 [ 28.837696] ret_from_fork+0x116/0x1d0 [ 28.837718] ? __pfx_kthread+0x10/0x10 [ 28.837742] ret_from_fork_asm+0x1a/0x30 [ 28.837777] </TASK> [ 28.837792] [ 28.848944] Allocated by task 294: [ 28.849346] kasan_save_stack+0x45/0x70 [ 28.849773] kasan_save_track+0x18/0x40 [ 28.850050] kasan_save_alloc_info+0x3b/0x50 [ 28.850293] __kasan_kmalloc+0xb7/0xc0 [ 28.850480] __kmalloc_cache_noprof+0x189/0x420 [ 28.850682] kasan_atomics+0x95/0x310 [ 28.851009] kunit_try_run_case+0x1a5/0x480 [ 28.851265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.851484] kthread+0x337/0x6f0 [ 28.851664] ret_from_fork+0x116/0x1d0 [ 28.851826] ret_from_fork_asm+0x1a/0x30 [ 28.852129] [ 28.852295] The buggy address belongs to the object at ffff888102338080 [ 28.852295] which belongs to the cache kmalloc-64 of size 64 [ 28.852879] The buggy address is located 0 bytes to the right of [ 28.852879] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.853590] [ 28.853756] The buggy address belongs to the physical page: [ 28.854049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.854371] flags: 0x200000000000000(node=0|zone=2) [ 28.854608] page_type: f5(slab) [ 28.854780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.855351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.855936] page dumped because: kasan: bad access detected [ 28.856412] [ 28.856542] Memory state around the buggy address: [ 28.856749] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.857129] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.857651] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.858016] ^ [ 28.858386] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.858832] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.859190] ================================================================== [ 29.829951] ================================================================== [ 29.830873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 29.831196] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.831819] [ 29.832047] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.832161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.832194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.832314] Call Trace: [ 29.832361] <TASK> [ 29.832408] dump_stack_lvl+0x73/0xb0 [ 29.832492] print_report+0xd1/0x650 [ 29.832544] ? __virt_addr_valid+0x1db/0x2d0 [ 29.832601] ? kasan_atomics_helper+0x1818/0x5450 [ 29.832648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.832709] ? kasan_atomics_helper+0x1818/0x5450 [ 29.832762] kasan_report+0x141/0x180 [ 29.832815] ? kasan_atomics_helper+0x1818/0x5450 [ 29.832876] kasan_check_range+0x10c/0x1c0 [ 29.832934] __kasan_check_write+0x18/0x20 [ 29.832989] kasan_atomics_helper+0x1818/0x5450 [ 29.833040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.833093] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.833153] ? kasan_atomics+0x152/0x310 [ 29.833206] kasan_atomics+0x1dc/0x310 [ 29.833253] ? __pfx_kasan_atomics+0x10/0x10 [ 29.833296] ? __pfx_read_tsc+0x10/0x10 [ 29.833337] ? ktime_get_ts64+0x86/0x230 [ 29.833393] kunit_try_run_case+0x1a5/0x480 [ 29.833527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.833623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.833717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.833771] ? __kthread_parkme+0x82/0x180 [ 29.833873] ? preempt_count_sub+0x50/0x80 [ 29.833971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.834050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.834108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.834160] kthread+0x337/0x6f0 [ 29.834207] ? trace_preempt_on+0x20/0xc0 [ 29.834263] ? __pfx_kthread+0x10/0x10 [ 29.834314] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.834366] ? calculate_sigpending+0x7b/0xa0 [ 29.834425] ? __pfx_kthread+0x10/0x10 [ 29.834491] ret_from_fork+0x116/0x1d0 [ 29.834540] ? __pfx_kthread+0x10/0x10 [ 29.834592] ret_from_fork_asm+0x1a/0x30 [ 29.834669] </TASK> [ 29.834701] [ 29.846089] Allocated by task 294: [ 29.846593] kasan_save_stack+0x45/0x70 [ 29.847076] kasan_save_track+0x18/0x40 [ 29.847475] kasan_save_alloc_info+0x3b/0x50 [ 29.847949] __kasan_kmalloc+0xb7/0xc0 [ 29.848497] __kmalloc_cache_noprof+0x189/0x420 [ 29.848885] kasan_atomics+0x95/0x310 [ 29.849309] kunit_try_run_case+0x1a5/0x480 [ 29.849529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.849758] kthread+0x337/0x6f0 [ 29.849933] ret_from_fork+0x116/0x1d0 [ 29.850122] ret_from_fork_asm+0x1a/0x30 [ 29.850523] [ 29.850815] The buggy address belongs to the object at ffff888102338080 [ 29.850815] which belongs to the cache kmalloc-64 of size 64 [ 29.852099] The buggy address is located 0 bytes to the right of [ 29.852099] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.852666] [ 29.852791] The buggy address belongs to the physical page: [ 29.853009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.853521] flags: 0x200000000000000(node=0|zone=2) [ 29.854249] page_type: f5(slab) [ 29.854693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.855392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.855968] page dumped because: kasan: bad access detected [ 29.856481] [ 29.856612] Memory state around the buggy address: [ 29.856840] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.857522] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.857891] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.858633] ^ [ 29.858993] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.859372] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.859970] ================================================================== [ 28.684458] ================================================================== [ 28.684748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 28.686014] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.686756] [ 28.687007] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.687144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.687193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.687241] Call Trace: [ 28.687287] <TASK> [ 28.687333] dump_stack_lvl+0x73/0xb0 [ 28.687416] print_report+0xd1/0x650 [ 28.687483] ? __virt_addr_valid+0x1db/0x2d0 [ 28.687520] ? kasan_atomics_helper+0x4b54/0x5450 [ 28.687546] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.687576] ? kasan_atomics_helper+0x4b54/0x5450 [ 28.687602] kasan_report+0x141/0x180 [ 28.687626] ? kasan_atomics_helper+0x4b54/0x5450 [ 28.687656] __asan_report_load4_noabort+0x18/0x20 [ 28.687683] kasan_atomics_helper+0x4b54/0x5450 [ 28.687708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.687734] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.687763] ? kasan_atomics+0x152/0x310 [ 28.687792] kasan_atomics+0x1dc/0x310 [ 28.687817] ? __pfx_kasan_atomics+0x10/0x10 [ 28.687845] ? __pfx_read_tsc+0x10/0x10 [ 28.687870] ? ktime_get_ts64+0x86/0x230 [ 28.687901] kunit_try_run_case+0x1a5/0x480 [ 28.687930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.687956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.687982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.688007] ? __kthread_parkme+0x82/0x180 [ 28.688032] ? preempt_count_sub+0x50/0x80 [ 28.688059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.688088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.688115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.688143] kthread+0x337/0x6f0 [ 28.688177] ? trace_preempt_on+0x20/0xc0 [ 28.688210] ? __pfx_kthread+0x10/0x10 [ 28.688235] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.688259] ? calculate_sigpending+0x7b/0xa0 [ 28.688287] ? __pfx_kthread+0x10/0x10 [ 28.688312] ret_from_fork+0x116/0x1d0 [ 28.688334] ? __pfx_kthread+0x10/0x10 [ 28.688357] ret_from_fork_asm+0x1a/0x30 [ 28.688393] </TASK> [ 28.688409] [ 28.699647] Allocated by task 294: [ 28.700063] kasan_save_stack+0x45/0x70 [ 28.700522] kasan_save_track+0x18/0x40 [ 28.700848] kasan_save_alloc_info+0x3b/0x50 [ 28.701244] __kasan_kmalloc+0xb7/0xc0 [ 28.701593] __kmalloc_cache_noprof+0x189/0x420 [ 28.701949] kasan_atomics+0x95/0x310 [ 28.702363] kunit_try_run_case+0x1a5/0x480 [ 28.702655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.703087] kthread+0x337/0x6f0 [ 28.703507] ret_from_fork+0x116/0x1d0 [ 28.703935] ret_from_fork_asm+0x1a/0x30 [ 28.704372] [ 28.704563] The buggy address belongs to the object at ffff888102338080 [ 28.704563] which belongs to the cache kmalloc-64 of size 64 [ 28.705340] The buggy address is located 0 bytes to the right of [ 28.705340] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.706351] [ 28.706564] The buggy address belongs to the physical page: [ 28.707032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.707461] flags: 0x200000000000000(node=0|zone=2) [ 28.707867] page_type: f5(slab) [ 28.708185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.708711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.709299] page dumped because: kasan: bad access detected [ 28.709706] [ 28.709813] Memory state around the buggy address: [ 28.710204] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.710631] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.711190] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.711534] ^ [ 28.711932] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.712358] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.712833] ================================================================== [ 28.861560] ================================================================== [ 28.862548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 28.862928] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.863504] [ 28.863712] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.863823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.863852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.863901] Call Trace: [ 28.863947] <TASK> [ 28.863991] dump_stack_lvl+0x73/0xb0 [ 28.864061] print_report+0xd1/0x650 [ 28.864115] ? __virt_addr_valid+0x1db/0x2d0 [ 28.864164] ? kasan_atomics_helper+0x72f/0x5450 [ 28.864205] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.864256] ? kasan_atomics_helper+0x72f/0x5450 [ 28.864301] kasan_report+0x141/0x180 [ 28.864344] ? kasan_atomics_helper+0x72f/0x5450 [ 28.864401] kasan_check_range+0x10c/0x1c0 [ 28.864465] __kasan_check_write+0x18/0x20 [ 28.864518] kasan_atomics_helper+0x72f/0x5450 [ 28.864567] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.864617] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.864677] ? kasan_atomics+0x152/0x310 [ 28.864739] kasan_atomics+0x1dc/0x310 [ 28.864785] ? __pfx_kasan_atomics+0x10/0x10 [ 28.864832] ? __pfx_read_tsc+0x10/0x10 [ 28.864877] ? ktime_get_ts64+0x86/0x230 [ 28.864932] kunit_try_run_case+0x1a5/0x480 [ 28.864990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.865044] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.865099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.865153] ? __kthread_parkme+0x82/0x180 [ 28.865204] ? preempt_count_sub+0x50/0x80 [ 28.865246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.865286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.865326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.865364] kthread+0x337/0x6f0 [ 28.865398] ? trace_preempt_on+0x20/0xc0 [ 28.865437] ? __pfx_kthread+0x10/0x10 [ 28.865490] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.865515] ? calculate_sigpending+0x7b/0xa0 [ 28.865543] ? __pfx_kthread+0x10/0x10 [ 28.865567] ret_from_fork+0x116/0x1d0 [ 28.865590] ? __pfx_kthread+0x10/0x10 [ 28.865613] ret_from_fork_asm+0x1a/0x30 [ 28.865648] </TASK> [ 28.865664] [ 28.878008] Allocated by task 294: [ 28.878247] kasan_save_stack+0x45/0x70 [ 28.878491] kasan_save_track+0x18/0x40 [ 28.878793] kasan_save_alloc_info+0x3b/0x50 [ 28.879154] __kasan_kmalloc+0xb7/0xc0 [ 28.879429] __kmalloc_cache_noprof+0x189/0x420 [ 28.879645] kasan_atomics+0x95/0x310 [ 28.879936] kunit_try_run_case+0x1a5/0x480 [ 28.880333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.880616] kthread+0x337/0x6f0 [ 28.880832] ret_from_fork+0x116/0x1d0 [ 28.881089] ret_from_fork_asm+0x1a/0x30 [ 28.881384] [ 28.881556] The buggy address belongs to the object at ffff888102338080 [ 28.881556] which belongs to the cache kmalloc-64 of size 64 [ 28.882160] The buggy address is located 0 bytes to the right of [ 28.882160] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.882700] [ 28.882827] The buggy address belongs to the physical page: [ 28.883198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.883889] flags: 0x200000000000000(node=0|zone=2) [ 28.884226] page_type: f5(slab) [ 28.884517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.884851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.885495] page dumped because: kasan: bad access detected [ 28.885715] [ 28.885819] Memory state around the buggy address: [ 28.886019] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.886288] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.886868] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.887401] ^ [ 28.887854] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.888447] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.888697] ================================================================== [ 29.769104] ================================================================== [ 29.769753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 29.770127] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.770635] [ 29.770861] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.771066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.771149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.771243] Call Trace: [ 29.771304] <TASK> [ 29.771353] dump_stack_lvl+0x73/0xb0 [ 29.771423] print_report+0xd1/0x650 [ 29.771489] ? __virt_addr_valid+0x1db/0x2d0 [ 29.771547] ? kasan_atomics_helper+0x16e7/0x5450 [ 29.771601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.771664] ? kasan_atomics_helper+0x16e7/0x5450 [ 29.771716] kasan_report+0x141/0x180 [ 29.771772] ? kasan_atomics_helper+0x16e7/0x5450 [ 29.771833] kasan_check_range+0x10c/0x1c0 [ 29.771890] __kasan_check_write+0x18/0x20 [ 29.771945] kasan_atomics_helper+0x16e7/0x5450 [ 29.772002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.772047] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.772101] ? kasan_atomics+0x152/0x310 [ 29.772156] kasan_atomics+0x1dc/0x310 [ 29.772206] ? __pfx_kasan_atomics+0x10/0x10 [ 29.772263] ? __pfx_read_tsc+0x10/0x10 [ 29.772316] ? ktime_get_ts64+0x86/0x230 [ 29.772379] kunit_try_run_case+0x1a5/0x480 [ 29.772448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.772504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.772552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.772581] ? __kthread_parkme+0x82/0x180 [ 29.772607] ? preempt_count_sub+0x50/0x80 [ 29.772634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.772661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.772688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.772715] kthread+0x337/0x6f0 [ 29.772738] ? trace_preempt_on+0x20/0xc0 [ 29.772765] ? __pfx_kthread+0x10/0x10 [ 29.772789] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.772814] ? calculate_sigpending+0x7b/0xa0 [ 29.772842] ? __pfx_kthread+0x10/0x10 [ 29.772866] ret_from_fork+0x116/0x1d0 [ 29.772890] ? __pfx_kthread+0x10/0x10 [ 29.772913] ret_from_fork_asm+0x1a/0x30 [ 29.772947] </TASK> [ 29.772963] [ 29.784264] Allocated by task 294: [ 29.784722] kasan_save_stack+0x45/0x70 [ 29.785184] kasan_save_track+0x18/0x40 [ 29.785492] kasan_save_alloc_info+0x3b/0x50 [ 29.785696] __kasan_kmalloc+0xb7/0xc0 [ 29.785875] __kmalloc_cache_noprof+0x189/0x420 [ 29.786088] kasan_atomics+0x95/0x310 [ 29.786571] kunit_try_run_case+0x1a5/0x480 [ 29.787062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.787552] kthread+0x337/0x6f0 [ 29.787902] ret_from_fork+0x116/0x1d0 [ 29.788386] ret_from_fork_asm+0x1a/0x30 [ 29.788742] [ 29.788966] The buggy address belongs to the object at ffff888102338080 [ 29.788966] which belongs to the cache kmalloc-64 of size 64 [ 29.789540] The buggy address is located 0 bytes to the right of [ 29.789540] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.789965] [ 29.790092] The buggy address belongs to the physical page: [ 29.790668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.791423] flags: 0x200000000000000(node=0|zone=2) [ 29.791955] page_type: f5(slab) [ 29.792387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.793058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.793746] page dumped because: kasan: bad access detected [ 29.794264] [ 29.794457] Memory state around the buggy address: [ 29.794982] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.795392] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.795664] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.795926] ^ [ 29.796125] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.796680] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.797196] ================================================================== [ 29.679618] ================================================================== [ 29.680049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 29.681541] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.682372] [ 29.682841] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.682935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.682953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.682982] Call Trace: [ 29.683008] <TASK> [ 29.683036] dump_stack_lvl+0x73/0xb0 [ 29.683085] print_report+0xd1/0x650 [ 29.683112] ? __virt_addr_valid+0x1db/0x2d0 [ 29.683142] ? kasan_atomics_helper+0x151d/0x5450 [ 29.683183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.683235] ? kasan_atomics_helper+0x151d/0x5450 [ 29.683284] kasan_report+0x141/0x180 [ 29.683336] ? kasan_atomics_helper+0x151d/0x5450 [ 29.683370] kasan_check_range+0x10c/0x1c0 [ 29.683398] __kasan_check_write+0x18/0x20 [ 29.683425] kasan_atomics_helper+0x151d/0x5450 [ 29.683472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.683500] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.683531] ? kasan_atomics+0x152/0x310 [ 29.683561] kasan_atomics+0x1dc/0x310 [ 29.683587] ? __pfx_kasan_atomics+0x10/0x10 [ 29.683614] ? __pfx_read_tsc+0x10/0x10 [ 29.683640] ? ktime_get_ts64+0x86/0x230 [ 29.683670] kunit_try_run_case+0x1a5/0x480 [ 29.683700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.683725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.683751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.683777] ? __kthread_parkme+0x82/0x180 [ 29.683801] ? preempt_count_sub+0x50/0x80 [ 29.683828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.683854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.683880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.683907] kthread+0x337/0x6f0 [ 29.683929] ? trace_preempt_on+0x20/0xc0 [ 29.683955] ? __pfx_kthread+0x10/0x10 [ 29.683978] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.684002] ? calculate_sigpending+0x7b/0xa0 [ 29.684029] ? __pfx_kthread+0x10/0x10 [ 29.684054] ret_from_fork+0x116/0x1d0 [ 29.684076] ? __pfx_kthread+0x10/0x10 [ 29.684099] ret_from_fork_asm+0x1a/0x30 [ 29.684135] </TASK> [ 29.684158] [ 29.696155] Allocated by task 294: [ 29.696351] kasan_save_stack+0x45/0x70 [ 29.696595] kasan_save_track+0x18/0x40 [ 29.696818] kasan_save_alloc_info+0x3b/0x50 [ 29.697046] __kasan_kmalloc+0xb7/0xc0 [ 29.698224] __kmalloc_cache_noprof+0x189/0x420 [ 29.698506] kasan_atomics+0x95/0x310 [ 29.698684] kunit_try_run_case+0x1a5/0x480 [ 29.699034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.699487] kthread+0x337/0x6f0 [ 29.700134] ret_from_fork+0x116/0x1d0 [ 29.700544] ret_from_fork_asm+0x1a/0x30 [ 29.700919] [ 29.701108] The buggy address belongs to the object at ffff888102338080 [ 29.701108] which belongs to the cache kmalloc-64 of size 64 [ 29.701919] The buggy address is located 0 bytes to the right of [ 29.701919] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.702778] [ 29.703008] The buggy address belongs to the physical page: [ 29.703640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.704171] flags: 0x200000000000000(node=0|zone=2) [ 29.704621] page_type: f5(slab) [ 29.704833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.705426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.705869] page dumped because: kasan: bad access detected [ 29.706199] [ 29.706330] Memory state around the buggy address: [ 29.706543] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.707070] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.707498] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.708061] ^ [ 29.708314] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.708774] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.709352] ================================================================== [ 30.363208] ================================================================== [ 30.364271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 30.364656] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.365183] [ 30.365399] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.365542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.365574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.365626] Call Trace: [ 30.365673] <TASK> [ 30.365720] dump_stack_lvl+0x73/0xb0 [ 30.365788] print_report+0xd1/0x650 [ 30.365862] ? __virt_addr_valid+0x1db/0x2d0 [ 30.365917] ? kasan_atomics_helper+0x218a/0x5450 [ 30.365966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.366034] ? kasan_atomics_helper+0x218a/0x5450 [ 30.366085] kasan_report+0x141/0x180 [ 30.366156] ? kasan_atomics_helper+0x218a/0x5450 [ 30.366212] kasan_check_range+0x10c/0x1c0 [ 30.366270] __kasan_check_write+0x18/0x20 [ 30.366316] kasan_atomics_helper+0x218a/0x5450 [ 30.366367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.366437] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.366504] ? kasan_atomics+0x152/0x310 [ 30.366563] kasan_atomics+0x1dc/0x310 [ 30.366610] ? __pfx_kasan_atomics+0x10/0x10 [ 30.366642] ? __pfx_read_tsc+0x10/0x10 [ 30.366676] ? ktime_get_ts64+0x86/0x230 [ 30.366726] kunit_try_run_case+0x1a5/0x480 [ 30.366779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.366847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.366901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.366950] ? __kthread_parkme+0x82/0x180 [ 30.366998] ? preempt_count_sub+0x50/0x80 [ 30.367051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.367122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.367170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.367220] kthread+0x337/0x6f0 [ 30.367261] ? trace_preempt_on+0x20/0xc0 [ 30.367306] ? __pfx_kthread+0x10/0x10 [ 30.367350] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.367392] ? calculate_sigpending+0x7b/0xa0 [ 30.367429] ? __pfx_kthread+0x10/0x10 [ 30.367475] ret_from_fork+0x116/0x1d0 [ 30.367500] ? __pfx_kthread+0x10/0x10 [ 30.367523] ret_from_fork_asm+0x1a/0x30 [ 30.367559] </TASK> [ 30.367574] [ 30.379042] Allocated by task 294: [ 30.379305] kasan_save_stack+0x45/0x70 [ 30.379546] kasan_save_track+0x18/0x40 [ 30.379866] kasan_save_alloc_info+0x3b/0x50 [ 30.380315] __kasan_kmalloc+0xb7/0xc0 [ 30.380684] __kmalloc_cache_noprof+0x189/0x420 [ 30.381075] kasan_atomics+0x95/0x310 [ 30.381523] kunit_try_run_case+0x1a5/0x480 [ 30.381906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.382461] kthread+0x337/0x6f0 [ 30.382822] ret_from_fork+0x116/0x1d0 [ 30.383244] ret_from_fork_asm+0x1a/0x30 [ 30.383549] [ 30.383702] The buggy address belongs to the object at ffff888102338080 [ 30.383702] which belongs to the cache kmalloc-64 of size 64 [ 30.384704] The buggy address is located 0 bytes to the right of [ 30.384704] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.385464] [ 30.385662] The buggy address belongs to the physical page: [ 30.385945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.386448] flags: 0x200000000000000(node=0|zone=2) [ 30.386769] page_type: f5(slab) [ 30.386928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.387534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.387887] page dumped because: kasan: bad access detected [ 30.388283] [ 30.388463] Memory state around the buggy address: [ 30.388773] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.389214] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.389611] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.390166] ^ [ 30.390461] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.390914] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.391430] ================================================================== [ 29.453131] ================================================================== [ 29.454592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 29.455062] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.455720] [ 29.455908] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.456013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.456045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.456096] Call Trace: [ 29.456143] <TASK> [ 29.456190] dump_stack_lvl+0x73/0xb0 [ 29.456266] print_report+0xd1/0x650 [ 29.456314] ? __virt_addr_valid+0x1db/0x2d0 [ 29.456366] ? kasan_atomics_helper+0x1217/0x5450 [ 29.456411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.456522] ? kasan_atomics_helper+0x1217/0x5450 [ 29.456570] kasan_report+0x141/0x180 [ 29.456619] ? kasan_atomics_helper+0x1217/0x5450 [ 29.456674] kasan_check_range+0x10c/0x1c0 [ 29.456721] __kasan_check_write+0x18/0x20 [ 29.456773] kasan_atomics_helper+0x1217/0x5450 [ 29.456866] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.456917] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.456972] ? kasan_atomics+0x152/0x310 [ 29.457032] kasan_atomics+0x1dc/0x310 [ 29.457120] ? __pfx_kasan_atomics+0x10/0x10 [ 29.457170] ? __pfx_read_tsc+0x10/0x10 [ 29.457218] ? ktime_get_ts64+0x86/0x230 [ 29.457272] kunit_try_run_case+0x1a5/0x480 [ 29.457315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.457341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.457368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.457394] ? __kthread_parkme+0x82/0x180 [ 29.457420] ? preempt_count_sub+0x50/0x80 [ 29.457470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.457500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.457529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.457557] kthread+0x337/0x6f0 [ 29.457580] ? trace_preempt_on+0x20/0xc0 [ 29.457608] ? __pfx_kthread+0x10/0x10 [ 29.457631] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.457656] ? calculate_sigpending+0x7b/0xa0 [ 29.457684] ? __pfx_kthread+0x10/0x10 [ 29.457709] ret_from_fork+0x116/0x1d0 [ 29.457730] ? __pfx_kthread+0x10/0x10 [ 29.457754] ret_from_fork_asm+0x1a/0x30 [ 29.457789] </TASK> [ 29.457806] [ 29.469784] Allocated by task 294: [ 29.470130] kasan_save_stack+0x45/0x70 [ 29.470571] kasan_save_track+0x18/0x40 [ 29.470793] kasan_save_alloc_info+0x3b/0x50 [ 29.471140] __kasan_kmalloc+0xb7/0xc0 [ 29.471494] __kmalloc_cache_noprof+0x189/0x420 [ 29.471902] kasan_atomics+0x95/0x310 [ 29.472083] kunit_try_run_case+0x1a5/0x480 [ 29.472275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.472649] kthread+0x337/0x6f0 [ 29.472992] ret_from_fork+0x116/0x1d0 [ 29.473425] ret_from_fork_asm+0x1a/0x30 [ 29.473788] [ 29.473985] The buggy address belongs to the object at ffff888102338080 [ 29.473985] which belongs to the cache kmalloc-64 of size 64 [ 29.474972] The buggy address is located 0 bytes to the right of [ 29.474972] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.475915] [ 29.476113] The buggy address belongs to the physical page: [ 29.476370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.476686] flags: 0x200000000000000(node=0|zone=2) [ 29.476908] page_type: f5(slab) [ 29.477138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.477764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.478339] page dumped because: kasan: bad access detected [ 29.478777] [ 29.478944] Memory state around the buggy address: [ 29.479285] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.480396] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.480691] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.480958] ^ [ 29.481160] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.481426] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.481788] ================================================================== [ 29.651019] ================================================================== [ 29.651613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 29.652007] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.652546] [ 29.652766] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.652920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.652971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.653024] Call Trace: [ 29.653074] <TASK> [ 29.653119] dump_stack_lvl+0x73/0xb0 [ 29.653268] print_report+0xd1/0x650 [ 29.653350] ? __virt_addr_valid+0x1db/0x2d0 [ 29.653421] ? kasan_atomics_helper+0x50d4/0x5450 [ 29.653482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.653538] ? kasan_atomics_helper+0x50d4/0x5450 [ 29.653588] kasan_report+0x141/0x180 [ 29.653690] ? kasan_atomics_helper+0x50d4/0x5450 [ 29.653757] __asan_report_store8_noabort+0x1b/0x30 [ 29.653818] kasan_atomics_helper+0x50d4/0x5450 [ 29.653871] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.653923] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.654021] ? kasan_atomics+0x152/0x310 [ 29.654097] kasan_atomics+0x1dc/0x310 [ 29.654157] ? __pfx_kasan_atomics+0x10/0x10 [ 29.654206] ? __pfx_read_tsc+0x10/0x10 [ 29.654235] ? ktime_get_ts64+0x86/0x230 [ 29.654267] kunit_try_run_case+0x1a5/0x480 [ 29.654298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.654325] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.654352] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.654378] ? __kthread_parkme+0x82/0x180 [ 29.654403] ? preempt_count_sub+0x50/0x80 [ 29.654430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.654483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.654511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.654538] kthread+0x337/0x6f0 [ 29.654560] ? trace_preempt_on+0x20/0xc0 [ 29.654588] ? __pfx_kthread+0x10/0x10 [ 29.654612] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.654636] ? calculate_sigpending+0x7b/0xa0 [ 29.654664] ? __pfx_kthread+0x10/0x10 [ 29.654688] ret_from_fork+0x116/0x1d0 [ 29.654711] ? __pfx_kthread+0x10/0x10 [ 29.654734] ret_from_fork_asm+0x1a/0x30 [ 29.654770] </TASK> [ 29.654786] [ 29.666339] Allocated by task 294: [ 29.666795] kasan_save_stack+0x45/0x70 [ 29.667180] kasan_save_track+0x18/0x40 [ 29.667521] kasan_save_alloc_info+0x3b/0x50 [ 29.667837] __kasan_kmalloc+0xb7/0xc0 [ 29.668108] __kmalloc_cache_noprof+0x189/0x420 [ 29.668527] kasan_atomics+0x95/0x310 [ 29.668734] kunit_try_run_case+0x1a5/0x480 [ 29.669138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.669405] kthread+0x337/0x6f0 [ 29.669673] ret_from_fork+0x116/0x1d0 [ 29.669935] ret_from_fork_asm+0x1a/0x30 [ 29.670375] [ 29.670582] The buggy address belongs to the object at ffff888102338080 [ 29.670582] which belongs to the cache kmalloc-64 of size 64 [ 29.671575] The buggy address is located 0 bytes to the right of [ 29.671575] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.672295] [ 29.672411] The buggy address belongs to the physical page: [ 29.672639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.672944] flags: 0x200000000000000(node=0|zone=2) [ 29.673141] page_type: f5(slab) [ 29.673426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.673918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.674406] page dumped because: kasan: bad access detected [ 29.674692] [ 29.674840] Memory state around the buggy address: [ 29.675108] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.675605] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.676012] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.676415] ^ [ 29.676777] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.677191] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.677625] ================================================================== [ 30.246846] ================================================================== [ 30.247889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 30.248660] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.249284] [ 30.249542] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.249676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.249710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.249762] Call Trace: [ 30.249811] <TASK> [ 30.249855] dump_stack_lvl+0x73/0xb0 [ 30.249929] print_report+0xd1/0x650 [ 30.249985] ? __virt_addr_valid+0x1db/0x2d0 [ 30.250053] ? kasan_atomics_helper+0x2006/0x5450 [ 30.250106] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.250163] ? kasan_atomics_helper+0x2006/0x5450 [ 30.250211] kasan_report+0x141/0x180 [ 30.250257] ? kasan_atomics_helper+0x2006/0x5450 [ 30.250315] kasan_check_range+0x10c/0x1c0 [ 30.250371] __kasan_check_write+0x18/0x20 [ 30.250426] kasan_atomics_helper+0x2006/0x5450 [ 30.250493] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.250547] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.250602] ? kasan_atomics+0x152/0x310 [ 30.250698] kasan_atomics+0x1dc/0x310 [ 30.250768] ? __pfx_kasan_atomics+0x10/0x10 [ 30.250827] ? __pfx_read_tsc+0x10/0x10 [ 30.250880] ? ktime_get_ts64+0x86/0x230 [ 30.250947] kunit_try_run_case+0x1a5/0x480 [ 30.251010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.251064] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.251121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.251169] ? __kthread_parkme+0x82/0x180 [ 30.251214] ? preempt_count_sub+0x50/0x80 [ 30.251258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.251300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.251349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.251399] kthread+0x337/0x6f0 [ 30.251488] ? trace_preempt_on+0x20/0xc0 [ 30.251564] ? __pfx_kthread+0x10/0x10 [ 30.251618] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.251672] ? calculate_sigpending+0x7b/0xa0 [ 30.251729] ? __pfx_kthread+0x10/0x10 [ 30.251785] ret_from_fork+0x116/0x1d0 [ 30.251831] ? __pfx_kthread+0x10/0x10 [ 30.251883] ret_from_fork_asm+0x1a/0x30 [ 30.251955] </TASK> [ 30.251987] [ 30.265437] Allocated by task 294: [ 30.265803] kasan_save_stack+0x45/0x70 [ 30.266106] kasan_save_track+0x18/0x40 [ 30.266331] kasan_save_alloc_info+0x3b/0x50 [ 30.266540] __kasan_kmalloc+0xb7/0xc0 [ 30.266819] __kmalloc_cache_noprof+0x189/0x420 [ 30.267261] kasan_atomics+0x95/0x310 [ 30.267623] kunit_try_run_case+0x1a5/0x480 [ 30.267994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.268349] kthread+0x337/0x6f0 [ 30.268574] ret_from_fork+0x116/0x1d0 [ 30.268922] ret_from_fork_asm+0x1a/0x30 [ 30.269279] [ 30.269469] The buggy address belongs to the object at ffff888102338080 [ 30.269469] which belongs to the cache kmalloc-64 of size 64 [ 30.270294] The buggy address is located 0 bytes to the right of [ 30.270294] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.271570] [ 30.271947] The buggy address belongs to the physical page: [ 30.272225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.272842] flags: 0x200000000000000(node=0|zone=2) [ 30.273072] page_type: f5(slab) [ 30.273288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.273742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.274372] page dumped because: kasan: bad access detected [ 30.274815] [ 30.274978] Memory state around the buggy address: [ 30.275322] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.275681] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.275952] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.276477] ^ [ 30.276871] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.277455] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.277819] ================================================================== [ 29.153107] ================================================================== [ 29.153934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 29.154359] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.154700] [ 29.154918] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.155057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.155081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.155121] Call Trace: [ 29.155160] <TASK> [ 29.155197] dump_stack_lvl+0x73/0xb0 [ 29.155248] print_report+0xd1/0x650 [ 29.155287] ? __virt_addr_valid+0x1db/0x2d0 [ 29.155332] ? kasan_atomics_helper+0xd47/0x5450 [ 29.155372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.155425] ? kasan_atomics_helper+0xd47/0x5450 [ 29.155486] kasan_report+0x141/0x180 [ 29.155561] ? kasan_atomics_helper+0xd47/0x5450 [ 29.155631] kasan_check_range+0x10c/0x1c0 [ 29.155681] __kasan_check_write+0x18/0x20 [ 29.155722] kasan_atomics_helper+0xd47/0x5450 [ 29.155770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.155818] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.155874] ? kasan_atomics+0x152/0x310 [ 29.155939] kasan_atomics+0x1dc/0x310 [ 29.155988] ? __pfx_kasan_atomics+0x10/0x10 [ 29.156044] ? __pfx_read_tsc+0x10/0x10 [ 29.156098] ? ktime_get_ts64+0x86/0x230 [ 29.156161] kunit_try_run_case+0x1a5/0x480 [ 29.156222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.156275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.156331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.156388] ? __kthread_parkme+0x82/0x180 [ 29.156451] ? preempt_count_sub+0x50/0x80 [ 29.156514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.156571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.156629] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.156686] kthread+0x337/0x6f0 [ 29.156768] ? trace_preempt_on+0x20/0xc0 [ 29.156802] ? __pfx_kthread+0x10/0x10 [ 29.156827] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.156851] ? calculate_sigpending+0x7b/0xa0 [ 29.156880] ? __pfx_kthread+0x10/0x10 [ 29.156905] ret_from_fork+0x116/0x1d0 [ 29.156927] ? __pfx_kthread+0x10/0x10 [ 29.156950] ret_from_fork_asm+0x1a/0x30 [ 29.156985] </TASK> [ 29.157001] [ 29.166787] Allocated by task 294: [ 29.167071] kasan_save_stack+0x45/0x70 [ 29.167401] kasan_save_track+0x18/0x40 [ 29.167644] kasan_save_alloc_info+0x3b/0x50 [ 29.167874] __kasan_kmalloc+0xb7/0xc0 [ 29.168083] __kmalloc_cache_noprof+0x189/0x420 [ 29.168438] kasan_atomics+0x95/0x310 [ 29.168753] kunit_try_run_case+0x1a5/0x480 [ 29.169059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.169452] kthread+0x337/0x6f0 [ 29.169849] ret_from_fork+0x116/0x1d0 [ 29.170175] ret_from_fork_asm+0x1a/0x30 [ 29.170516] [ 29.170671] The buggy address belongs to the object at ffff888102338080 [ 29.170671] which belongs to the cache kmalloc-64 of size 64 [ 29.171097] The buggy address is located 0 bytes to the right of [ 29.171097] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.172085] [ 29.172314] The buggy address belongs to the physical page: [ 29.172726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.173185] flags: 0x200000000000000(node=0|zone=2) [ 29.173489] page_type: f5(slab) [ 29.173769] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.174121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.174880] page dumped because: kasan: bad access detected [ 29.175334] [ 29.175488] Memory state around the buggy address: [ 29.175698] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.175968] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.176233] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.176535] ^ [ 29.177027] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.177625] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.178167] ================================================================== [ 28.525519] ================================================================== [ 28.526710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 28.527383] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.528147] [ 28.528335] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.528462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.528490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.528550] Call Trace: [ 28.528596] <TASK> [ 28.528639] dump_stack_lvl+0x73/0xb0 [ 28.528849] print_report+0xd1/0x650 [ 28.528916] ? __virt_addr_valid+0x1db/0x2d0 [ 28.528975] ? kasan_atomics_helper+0x4bbc/0x5450 [ 28.529017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.529067] ? kasan_atomics_helper+0x4bbc/0x5450 [ 28.529112] kasan_report+0x141/0x180 [ 28.529156] ? kasan_atomics_helper+0x4bbc/0x5450 [ 28.529215] __asan_report_load4_noabort+0x18/0x20 [ 28.529283] kasan_atomics_helper+0x4bbc/0x5450 [ 28.529336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.529382] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.529451] ? kasan_atomics+0x152/0x310 [ 28.529524] kasan_atomics+0x1dc/0x310 [ 28.529576] ? __pfx_kasan_atomics+0x10/0x10 [ 28.529725] ? __pfx_read_tsc+0x10/0x10 [ 28.529754] ? ktime_get_ts64+0x86/0x230 [ 28.529786] kunit_try_run_case+0x1a5/0x480 [ 28.529816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.529840] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.529867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.529893] ? __kthread_parkme+0x82/0x180 [ 28.529917] ? preempt_count_sub+0x50/0x80 [ 28.529944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.529969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.529994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.530021] kthread+0x337/0x6f0 [ 28.530057] ? trace_preempt_on+0x20/0xc0 [ 28.530085] ? __pfx_kthread+0x10/0x10 [ 28.530109] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.530133] ? calculate_sigpending+0x7b/0xa0 [ 28.530170] ? __pfx_kthread+0x10/0x10 [ 28.530203] ret_from_fork+0x116/0x1d0 [ 28.530225] ? __pfx_kthread+0x10/0x10 [ 28.530248] ret_from_fork_asm+0x1a/0x30 [ 28.530282] </TASK> [ 28.530297] [ 28.544710] Allocated by task 294: [ 28.545020] kasan_save_stack+0x45/0x70 [ 28.545365] kasan_save_track+0x18/0x40 [ 28.545551] kasan_save_alloc_info+0x3b/0x50 [ 28.545754] __kasan_kmalloc+0xb7/0xc0 [ 28.546057] __kmalloc_cache_noprof+0x189/0x420 [ 28.547207] kasan_atomics+0x95/0x310 [ 28.547635] kunit_try_run_case+0x1a5/0x480 [ 28.547975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.548429] kthread+0x337/0x6f0 [ 28.548743] ret_from_fork+0x116/0x1d0 [ 28.548906] ret_from_fork_asm+0x1a/0x30 [ 28.549162] [ 28.549317] The buggy address belongs to the object at ffff888102338080 [ 28.549317] which belongs to the cache kmalloc-64 of size 64 [ 28.550785] The buggy address is located 0 bytes to the right of [ 28.550785] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.551960] [ 28.552097] The buggy address belongs to the physical page: [ 28.552626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.553227] flags: 0x200000000000000(node=0|zone=2) [ 28.553861] page_type: f5(slab) [ 28.554052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.554506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.555201] page dumped because: kasan: bad access detected [ 28.555700] [ 28.555882] Memory state around the buggy address: [ 28.556142] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.556626] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.557234] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.557762] ^ [ 28.558339] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.558610] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.559149] ================================================================== [ 28.974454] ================================================================== [ 28.974958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 28.975172] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.975462] [ 28.975708] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.975851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.975884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.975931] Call Trace: [ 28.975976] <TASK> [ 28.976018] dump_stack_lvl+0x73/0xb0 [ 28.976089] print_report+0xd1/0x650 [ 28.976154] ? __virt_addr_valid+0x1db/0x2d0 [ 28.976226] ? kasan_atomics_helper+0x992/0x5450 [ 28.976280] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.976339] ? kasan_atomics_helper+0x992/0x5450 [ 28.976381] kasan_report+0x141/0x180 [ 28.976429] ? kasan_atomics_helper+0x992/0x5450 [ 28.976527] kasan_check_range+0x10c/0x1c0 [ 28.976577] __kasan_check_write+0x18/0x20 [ 28.976670] kasan_atomics_helper+0x992/0x5450 [ 28.976723] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.976793] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.976856] ? kasan_atomics+0x152/0x310 [ 28.976915] kasan_atomics+0x1dc/0x310 [ 28.976959] ? __pfx_kasan_atomics+0x10/0x10 [ 28.976992] ? __pfx_read_tsc+0x10/0x10 [ 28.977019] ? ktime_get_ts64+0x86/0x230 [ 28.977053] kunit_try_run_case+0x1a5/0x480 [ 28.977083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.977108] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.977137] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.977178] ? __kthread_parkme+0x82/0x180 [ 28.977211] ? preempt_count_sub+0x50/0x80 [ 28.977239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.977266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.977294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.977320] kthread+0x337/0x6f0 [ 28.977343] ? trace_preempt_on+0x20/0xc0 [ 28.977370] ? __pfx_kthread+0x10/0x10 [ 28.977394] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.977419] ? calculate_sigpending+0x7b/0xa0 [ 28.977469] ? __pfx_kthread+0x10/0x10 [ 28.977497] ret_from_fork+0x116/0x1d0 [ 28.977519] ? __pfx_kthread+0x10/0x10 [ 28.977543] ret_from_fork_asm+0x1a/0x30 [ 28.977579] </TASK> [ 28.977594] [ 28.991246] Allocated by task 294: [ 28.991691] kasan_save_stack+0x45/0x70 [ 28.992096] kasan_save_track+0x18/0x40 [ 28.992534] kasan_save_alloc_info+0x3b/0x50 [ 28.993147] __kasan_kmalloc+0xb7/0xc0 [ 28.993496] __kmalloc_cache_noprof+0x189/0x420 [ 28.994067] kasan_atomics+0x95/0x310 [ 28.994374] kunit_try_run_case+0x1a5/0x480 [ 28.994625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.994959] kthread+0x337/0x6f0 [ 28.995301] ret_from_fork+0x116/0x1d0 [ 28.995732] ret_from_fork_asm+0x1a/0x30 [ 28.995987] [ 28.996105] The buggy address belongs to the object at ffff888102338080 [ 28.996105] which belongs to the cache kmalloc-64 of size 64 [ 28.996755] The buggy address is located 0 bytes to the right of [ 28.996755] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.997404] [ 28.997627] The buggy address belongs to the physical page: [ 28.998249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.998887] flags: 0x200000000000000(node=0|zone=2) [ 28.999252] page_type: f5(slab) [ 28.999525] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.000103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.000769] page dumped because: kasan: bad access detected [ 29.001292] [ 29.001493] Memory state around the buggy address: [ 29.001693] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.002015] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.002462] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.002864] ^ [ 29.003091] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.003753] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.004121] ================================================================== [ 29.214565] ================================================================== [ 29.215541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 29.216246] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.216503] [ 29.216770] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.216886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.216917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.216998] Call Trace: [ 29.217059] <TASK> [ 29.217108] dump_stack_lvl+0x73/0xb0 [ 29.217231] print_report+0xd1/0x650 [ 29.217288] ? __virt_addr_valid+0x1db/0x2d0 [ 29.217344] ? kasan_atomics_helper+0xe78/0x5450 [ 29.217396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.217456] ? kasan_atomics_helper+0xe78/0x5450 [ 29.217505] kasan_report+0x141/0x180 [ 29.217584] ? kasan_atomics_helper+0xe78/0x5450 [ 29.217683] kasan_check_range+0x10c/0x1c0 [ 29.217753] __kasan_check_write+0x18/0x20 [ 29.217808] kasan_atomics_helper+0xe78/0x5450 [ 29.217862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.217917] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.217966] ? kasan_atomics+0x152/0x310 [ 29.218006] kasan_atomics+0x1dc/0x310 [ 29.218043] ? __pfx_kasan_atomics+0x10/0x10 [ 29.218074] ? __pfx_read_tsc+0x10/0x10 [ 29.218100] ? ktime_get_ts64+0x86/0x230 [ 29.218133] kunit_try_run_case+0x1a5/0x480 [ 29.218176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.218215] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.218247] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.218274] ? __kthread_parkme+0x82/0x180 [ 29.218298] ? preempt_count_sub+0x50/0x80 [ 29.218326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.218353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.218380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.218407] kthread+0x337/0x6f0 [ 29.218430] ? trace_preempt_on+0x20/0xc0 [ 29.218479] ? __pfx_kthread+0x10/0x10 [ 29.218505] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.218530] ? calculate_sigpending+0x7b/0xa0 [ 29.218559] ? __pfx_kthread+0x10/0x10 [ 29.218584] ret_from_fork+0x116/0x1d0 [ 29.218606] ? __pfx_kthread+0x10/0x10 [ 29.218629] ret_from_fork_asm+0x1a/0x30 [ 29.218664] </TASK> [ 29.218680] [ 29.230678] Allocated by task 294: [ 29.231006] kasan_save_stack+0x45/0x70 [ 29.231331] kasan_save_track+0x18/0x40 [ 29.231640] kasan_save_alloc_info+0x3b/0x50 [ 29.232016] __kasan_kmalloc+0xb7/0xc0 [ 29.232365] __kmalloc_cache_noprof+0x189/0x420 [ 29.232588] kasan_atomics+0x95/0x310 [ 29.232964] kunit_try_run_case+0x1a5/0x480 [ 29.233393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.233655] kthread+0x337/0x6f0 [ 29.233831] ret_from_fork+0x116/0x1d0 [ 29.233989] ret_from_fork_asm+0x1a/0x30 [ 29.234187] [ 29.234305] The buggy address belongs to the object at ffff888102338080 [ 29.234305] which belongs to the cache kmalloc-64 of size 64 [ 29.235141] The buggy address is located 0 bytes to the right of [ 29.235141] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.236294] [ 29.236571] The buggy address belongs to the physical page: [ 29.236863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.237552] flags: 0x200000000000000(node=0|zone=2) [ 29.237937] page_type: f5(slab) [ 29.238343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.238694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.238958] page dumped because: kasan: bad access detected [ 29.239168] [ 29.239269] Memory state around the buggy address: [ 29.239484] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.239754] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.240075] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.241572] ^ [ 29.241871] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.242944] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.243405] ================================================================== [ 30.449253] ================================================================== [ 30.449871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 30.451554] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.452207] [ 30.452404] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.452964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.453023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.453120] Call Trace: [ 30.453164] <TASK> [ 30.453202] dump_stack_lvl+0x73/0xb0 [ 30.453253] print_report+0xd1/0x650 [ 30.453281] ? __virt_addr_valid+0x1db/0x2d0 [ 30.453310] ? kasan_atomics_helper+0x5115/0x5450 [ 30.453336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.453367] ? kasan_atomics_helper+0x5115/0x5450 [ 30.453391] kasan_report+0x141/0x180 [ 30.453417] ? kasan_atomics_helper+0x5115/0x5450 [ 30.453466] __asan_report_load8_noabort+0x18/0x20 [ 30.453499] kasan_atomics_helper+0x5115/0x5450 [ 30.453526] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.453551] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.453580] ? kasan_atomics+0x152/0x310 [ 30.453609] kasan_atomics+0x1dc/0x310 [ 30.453635] ? __pfx_kasan_atomics+0x10/0x10 [ 30.453662] ? __pfx_read_tsc+0x10/0x10 [ 30.453689] ? ktime_get_ts64+0x86/0x230 [ 30.453720] kunit_try_run_case+0x1a5/0x480 [ 30.453749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.453775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.453802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.453828] ? __kthread_parkme+0x82/0x180 [ 30.453853] ? preempt_count_sub+0x50/0x80 [ 30.453880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.453907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.453933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.453960] kthread+0x337/0x6f0 [ 30.453983] ? trace_preempt_on+0x20/0xc0 [ 30.454010] ? __pfx_kthread+0x10/0x10 [ 30.454046] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.454072] ? calculate_sigpending+0x7b/0xa0 [ 30.454101] ? __pfx_kthread+0x10/0x10 [ 30.454127] ret_from_fork+0x116/0x1d0 [ 30.454156] ? __pfx_kthread+0x10/0x10 [ 30.454190] ret_from_fork_asm+0x1a/0x30 [ 30.454224] </TASK> [ 30.454239] [ 30.465401] Allocated by task 294: [ 30.465705] kasan_save_stack+0x45/0x70 [ 30.466083] kasan_save_track+0x18/0x40 [ 30.466418] kasan_save_alloc_info+0x3b/0x50 [ 30.466842] __kasan_kmalloc+0xb7/0xc0 [ 30.467198] __kmalloc_cache_noprof+0x189/0x420 [ 30.467564] kasan_atomics+0x95/0x310 [ 30.467931] kunit_try_run_case+0x1a5/0x480 [ 30.468319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.468714] kthread+0x337/0x6f0 [ 30.469018] ret_from_fork+0x116/0x1d0 [ 30.469331] ret_from_fork_asm+0x1a/0x30 [ 30.469574] [ 30.469768] The buggy address belongs to the object at ffff888102338080 [ 30.469768] which belongs to the cache kmalloc-64 of size 64 [ 30.470619] The buggy address is located 0 bytes to the right of [ 30.470619] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.471465] [ 30.471630] The buggy address belongs to the physical page: [ 30.472023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.472594] flags: 0x200000000000000(node=0|zone=2) [ 30.472941] page_type: f5(slab) [ 30.473315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.473753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.474317] page dumped because: kasan: bad access detected [ 30.474644] [ 30.474834] Memory state around the buggy address: [ 30.475255] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475686] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.476136] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.476638] ^ [ 30.476943] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.477298] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.477751] ================================================================== [ 28.714252] ================================================================== [ 28.714798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 28.715329] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.715657] [ 28.715900] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.715991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.716014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.716053] Call Trace: [ 28.716090] <TASK> [ 28.716126] dump_stack_lvl+0x73/0xb0 [ 28.716207] print_report+0xd1/0x650 [ 28.716247] ? __virt_addr_valid+0x1db/0x2d0 [ 28.716286] ? kasan_atomics_helper+0x4a0/0x5450 [ 28.716320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.716360] ? kasan_atomics_helper+0x4a0/0x5450 [ 28.716393] kasan_report+0x141/0x180 [ 28.716431] ? kasan_atomics_helper+0x4a0/0x5450 [ 28.716490] kasan_check_range+0x10c/0x1c0 [ 28.716534] __kasan_check_write+0x18/0x20 [ 28.716610] kasan_atomics_helper+0x4a0/0x5450 [ 28.716701] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.716782] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.716855] ? kasan_atomics+0x152/0x310 [ 28.716919] kasan_atomics+0x1dc/0x310 [ 28.716985] ? __pfx_kasan_atomics+0x10/0x10 [ 28.717034] ? __pfx_read_tsc+0x10/0x10 [ 28.717080] ? ktime_get_ts64+0x86/0x230 [ 28.717201] kunit_try_run_case+0x1a5/0x480 [ 28.717281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.717339] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.717395] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.717464] ? __kthread_parkme+0x82/0x180 [ 28.717518] ? preempt_count_sub+0x50/0x80 [ 28.717574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.717626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.717710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.717776] kthread+0x337/0x6f0 [ 28.717827] ? trace_preempt_on+0x20/0xc0 [ 28.717874] ? __pfx_kthread+0x10/0x10 [ 28.717901] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.717926] ? calculate_sigpending+0x7b/0xa0 [ 28.717955] ? __pfx_kthread+0x10/0x10 [ 28.717980] ret_from_fork+0x116/0x1d0 [ 28.718003] ? __pfx_kthread+0x10/0x10 [ 28.718037] ret_from_fork_asm+0x1a/0x30 [ 28.718080] </TASK> [ 28.718096] [ 28.729792] Allocated by task 294: [ 28.730020] kasan_save_stack+0x45/0x70 [ 28.730273] kasan_save_track+0x18/0x40 [ 28.730530] kasan_save_alloc_info+0x3b/0x50 [ 28.730887] __kasan_kmalloc+0xb7/0xc0 [ 28.731235] __kmalloc_cache_noprof+0x189/0x420 [ 28.731617] kasan_atomics+0x95/0x310 [ 28.731962] kunit_try_run_case+0x1a5/0x480 [ 28.732365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.732854] kthread+0x337/0x6f0 [ 28.733195] ret_from_fork+0x116/0x1d0 [ 28.733523] ret_from_fork_asm+0x1a/0x30 [ 28.733764] [ 28.733868] The buggy address belongs to the object at ffff888102338080 [ 28.733868] which belongs to the cache kmalloc-64 of size 64 [ 28.734558] The buggy address is located 0 bytes to the right of [ 28.734558] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.735539] [ 28.735745] The buggy address belongs to the physical page: [ 28.736289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.737016] flags: 0x200000000000000(node=0|zone=2) [ 28.737633] page_type: f5(slab) [ 28.737845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.738662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.738945] page dumped because: kasan: bad access detected [ 28.739374] [ 28.739510] Memory state around the buggy address: [ 28.739816] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.740319] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.740986] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.741700] ^ [ 28.742096] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.742627] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.743036] ================================================================== [ 29.710506] ================================================================== [ 29.711116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 29.711584] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.711976] [ 29.712129] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.712276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.712308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.712357] Call Trace: [ 29.712404] <TASK> [ 29.712470] dump_stack_lvl+0x73/0xb0 [ 29.712545] print_report+0xd1/0x650 [ 29.712599] ? __virt_addr_valid+0x1db/0x2d0 [ 29.712656] ? kasan_atomics_helper+0x15b6/0x5450 [ 29.712699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.712750] ? kasan_atomics_helper+0x15b6/0x5450 [ 29.712802] kasan_report+0x141/0x180 [ 29.712853] ? kasan_atomics_helper+0x15b6/0x5450 [ 29.712908] kasan_check_range+0x10c/0x1c0 [ 29.712956] __kasan_check_write+0x18/0x20 [ 29.713006] kasan_atomics_helper+0x15b6/0x5450 [ 29.713052] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.713115] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.713220] ? kasan_atomics+0x152/0x310 [ 29.713282] kasan_atomics+0x1dc/0x310 [ 29.713342] ? __pfx_kasan_atomics+0x10/0x10 [ 29.713413] ? __pfx_read_tsc+0x10/0x10 [ 29.713477] ? ktime_get_ts64+0x86/0x230 [ 29.713526] kunit_try_run_case+0x1a5/0x480 [ 29.713559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.713585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.713613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.713645] ? __kthread_parkme+0x82/0x180 [ 29.713683] ? preempt_count_sub+0x50/0x80 [ 29.713731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.713782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.713842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.713910] kthread+0x337/0x6f0 [ 29.713959] ? trace_preempt_on+0x20/0xc0 [ 29.714008] ? __pfx_kthread+0x10/0x10 [ 29.714065] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.714117] ? calculate_sigpending+0x7b/0xa0 [ 29.714215] ? __pfx_kthread+0x10/0x10 [ 29.714260] ret_from_fork+0x116/0x1d0 [ 29.714302] ? __pfx_kthread+0x10/0x10 [ 29.714332] ret_from_fork_asm+0x1a/0x30 [ 29.714370] </TASK> [ 29.714388] [ 29.724669] Allocated by task 294: [ 29.724904] kasan_save_stack+0x45/0x70 [ 29.725089] kasan_save_track+0x18/0x40 [ 29.725240] kasan_save_alloc_info+0x3b/0x50 [ 29.725398] __kasan_kmalloc+0xb7/0xc0 [ 29.727368] __kmalloc_cache_noprof+0x189/0x420 [ 29.728401] kasan_atomics+0x95/0x310 [ 29.728709] kunit_try_run_case+0x1a5/0x480 [ 29.728966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.729797] kthread+0x337/0x6f0 [ 29.730011] ret_from_fork+0x116/0x1d0 [ 29.730242] ret_from_fork_asm+0x1a/0x30 [ 29.730815] [ 29.730930] The buggy address belongs to the object at ffff888102338080 [ 29.730930] which belongs to the cache kmalloc-64 of size 64 [ 29.731877] The buggy address is located 0 bytes to the right of [ 29.731877] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.732755] [ 29.733182] The buggy address belongs to the physical page: [ 29.733803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.734541] flags: 0x200000000000000(node=0|zone=2) [ 29.734749] page_type: f5(slab) [ 29.735014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.735686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.736171] page dumped because: kasan: bad access detected [ 29.736588] [ 29.736697] Memory state around the buggy address: [ 29.737045] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.737654] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.738098] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.738557] ^ [ 29.738800] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.739468] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.739757] ================================================================== [ 28.561129] ================================================================== [ 28.561924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 28.563187] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.563461] [ 28.563594] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.564363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.564397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.564427] Call Trace: [ 28.564457] <TASK> [ 28.564484] dump_stack_lvl+0x73/0xb0 [ 28.564529] print_report+0xd1/0x650 [ 28.564565] ? __virt_addr_valid+0x1db/0x2d0 [ 28.564605] ? kasan_atomics_helper+0x4ba2/0x5450 [ 28.564692] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.564748] ? kasan_atomics_helper+0x4ba2/0x5450 [ 28.564776] kasan_report+0x141/0x180 [ 28.564801] ? kasan_atomics_helper+0x4ba2/0x5450 [ 28.564828] __asan_report_store4_noabort+0x1b/0x30 [ 28.564855] kasan_atomics_helper+0x4ba2/0x5450 [ 28.564879] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.564902] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.564930] ? kasan_atomics+0x152/0x310 [ 28.564957] kasan_atomics+0x1dc/0x310 [ 28.564982] ? __pfx_kasan_atomics+0x10/0x10 [ 28.565007] ? __pfx_read_tsc+0x10/0x10 [ 28.565031] ? ktime_get_ts64+0x86/0x230 [ 28.565060] kunit_try_run_case+0x1a5/0x480 [ 28.565088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.565113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.565138] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.565162] ? __kthread_parkme+0x82/0x180 [ 28.565186] ? preempt_count_sub+0x50/0x80 [ 28.565212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.565237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.565292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.565318] kthread+0x337/0x6f0 [ 28.565339] ? trace_preempt_on+0x20/0xc0 [ 28.565366] ? __pfx_kthread+0x10/0x10 [ 28.565389] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.565411] ? calculate_sigpending+0x7b/0xa0 [ 28.565438] ? __pfx_kthread+0x10/0x10 [ 28.565483] ret_from_fork+0x116/0x1d0 [ 28.565505] ? __pfx_kthread+0x10/0x10 [ 28.565530] ret_from_fork_asm+0x1a/0x30 [ 28.565582] </TASK> [ 28.565603] [ 28.578265] Allocated by task 294: [ 28.578576] kasan_save_stack+0x45/0x70 [ 28.578810] kasan_save_track+0x18/0x40 [ 28.578988] kasan_save_alloc_info+0x3b/0x50 [ 28.579346] __kasan_kmalloc+0xb7/0xc0 [ 28.580538] __kmalloc_cache_noprof+0x189/0x420 [ 28.581013] kasan_atomics+0x95/0x310 [ 28.581411] kunit_try_run_case+0x1a5/0x480 [ 28.581936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.582225] kthread+0x337/0x6f0 [ 28.582554] ret_from_fork+0x116/0x1d0 [ 28.582894] ret_from_fork_asm+0x1a/0x30 [ 28.583220] [ 28.583326] The buggy address belongs to the object at ffff888102338080 [ 28.583326] which belongs to the cache kmalloc-64 of size 64 [ 28.584134] The buggy address is located 0 bytes to the right of [ 28.584134] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.585200] [ 28.585464] The buggy address belongs to the physical page: [ 28.585983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.586371] flags: 0x200000000000000(node=0|zone=2) [ 28.586597] page_type: f5(slab) [ 28.586769] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.587958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.589123] page dumped because: kasan: bad access detected [ 28.589406] [ 28.589573] Memory state around the buggy address: [ 28.589916] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.590531] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.591297] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.592236] ^ [ 28.592788] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.593294] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.594517] ================================================================== [ 30.220996] ================================================================== [ 30.221536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 30.222053] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.222457] [ 30.222691] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.222818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.222851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.222900] Call Trace: [ 30.222957] <TASK> [ 30.223015] dump_stack_lvl+0x73/0xb0 [ 30.223086] print_report+0xd1/0x650 [ 30.223131] ? __virt_addr_valid+0x1db/0x2d0 [ 30.223219] ? kasan_atomics_helper+0x4f71/0x5450 [ 30.223275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.223348] ? kasan_atomics_helper+0x4f71/0x5450 [ 30.223400] kasan_report+0x141/0x180 [ 30.223459] ? kasan_atomics_helper+0x4f71/0x5450 [ 30.223518] __asan_report_load8_noabort+0x18/0x20 [ 30.223580] kasan_atomics_helper+0x4f71/0x5450 [ 30.223640] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.223691] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.223747] ? kasan_atomics+0x152/0x310 [ 30.223783] kasan_atomics+0x1dc/0x310 [ 30.223812] ? __pfx_kasan_atomics+0x10/0x10 [ 30.223840] ? __pfx_read_tsc+0x10/0x10 [ 30.223866] ? ktime_get_ts64+0x86/0x230 [ 30.223897] kunit_try_run_case+0x1a5/0x480 [ 30.223925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.223951] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.223977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.224004] ? __kthread_parkme+0x82/0x180 [ 30.224028] ? preempt_count_sub+0x50/0x80 [ 30.224055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.224082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.224108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.224134] kthread+0x337/0x6f0 [ 30.224187] ? trace_preempt_on+0x20/0xc0 [ 30.224217] ? __pfx_kthread+0x10/0x10 [ 30.224242] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.224266] ? calculate_sigpending+0x7b/0xa0 [ 30.224294] ? __pfx_kthread+0x10/0x10 [ 30.224319] ret_from_fork+0x116/0x1d0 [ 30.224340] ? __pfx_kthread+0x10/0x10 [ 30.224364] ret_from_fork_asm+0x1a/0x30 [ 30.224398] </TASK> [ 30.224413] [ 30.233798] Allocated by task 294: [ 30.234189] kasan_save_stack+0x45/0x70 [ 30.234618] kasan_save_track+0x18/0x40 [ 30.234902] kasan_save_alloc_info+0x3b/0x50 [ 30.235234] __kasan_kmalloc+0xb7/0xc0 [ 30.235584] __kmalloc_cache_noprof+0x189/0x420 [ 30.235855] kasan_atomics+0x95/0x310 [ 30.236179] kunit_try_run_case+0x1a5/0x480 [ 30.236400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.236798] kthread+0x337/0x6f0 [ 30.237013] ret_from_fork+0x116/0x1d0 [ 30.237355] ret_from_fork_asm+0x1a/0x30 [ 30.237588] [ 30.237770] The buggy address belongs to the object at ffff888102338080 [ 30.237770] which belongs to the cache kmalloc-64 of size 64 [ 30.238403] The buggy address is located 0 bytes to the right of [ 30.238403] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.238960] [ 30.239149] The buggy address belongs to the physical page: [ 30.239582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.240422] flags: 0x200000000000000(node=0|zone=2) [ 30.240638] page_type: f5(slab) [ 30.240859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.241546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.241934] page dumped because: kasan: bad access detected [ 30.242278] [ 30.242479] Memory state around the buggy address: [ 30.242915] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.243362] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.243962] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.244361] ^ [ 30.244666] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.245127] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.245595] ================================================================== [ 29.392922] ================================================================== [ 29.393508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 29.394098] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.394808] [ 29.395076] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.395229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.395265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.395319] Call Trace: [ 29.395364] <TASK> [ 29.395411] dump_stack_lvl+0x73/0xb0 [ 29.395588] print_report+0xd1/0x650 [ 29.395642] ? __virt_addr_valid+0x1db/0x2d0 [ 29.395699] ? kasan_atomics_helper+0x1148/0x5450 [ 29.395742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.395801] ? kasan_atomics_helper+0x1148/0x5450 [ 29.395852] kasan_report+0x141/0x180 [ 29.395888] ? kasan_atomics_helper+0x1148/0x5450 [ 29.395918] kasan_check_range+0x10c/0x1c0 [ 29.395945] __kasan_check_write+0x18/0x20 [ 29.395972] kasan_atomics_helper+0x1148/0x5450 [ 29.395997] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.396023] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.396052] ? kasan_atomics+0x152/0x310 [ 29.396081] kasan_atomics+0x1dc/0x310 [ 29.396107] ? __pfx_kasan_atomics+0x10/0x10 [ 29.396134] ? __pfx_read_tsc+0x10/0x10 [ 29.396188] ? ktime_get_ts64+0x86/0x230 [ 29.396229] kunit_try_run_case+0x1a5/0x480 [ 29.396260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.396285] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.396312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.396339] ? __kthread_parkme+0x82/0x180 [ 29.396364] ? preempt_count_sub+0x50/0x80 [ 29.396391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.396419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.396464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.396494] kthread+0x337/0x6f0 [ 29.396518] ? trace_preempt_on+0x20/0xc0 [ 29.396546] ? __pfx_kthread+0x10/0x10 [ 29.396570] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.396596] ? calculate_sigpending+0x7b/0xa0 [ 29.396626] ? __pfx_kthread+0x10/0x10 [ 29.396651] ret_from_fork+0x116/0x1d0 [ 29.396673] ? __pfx_kthread+0x10/0x10 [ 29.396697] ret_from_fork_asm+0x1a/0x30 [ 29.396734] </TASK> [ 29.396750] [ 29.408234] Allocated by task 294: [ 29.408499] kasan_save_stack+0x45/0x70 [ 29.408881] kasan_save_track+0x18/0x40 [ 29.409208] kasan_save_alloc_info+0x3b/0x50 [ 29.409632] __kasan_kmalloc+0xb7/0xc0 [ 29.409975] __kmalloc_cache_noprof+0x189/0x420 [ 29.410408] kasan_atomics+0x95/0x310 [ 29.410680] kunit_try_run_case+0x1a5/0x480 [ 29.411074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.411619] kthread+0x337/0x6f0 [ 29.411989] ret_from_fork+0x116/0x1d0 [ 29.412401] ret_from_fork_asm+0x1a/0x30 [ 29.412738] [ 29.412858] The buggy address belongs to the object at ffff888102338080 [ 29.412858] which belongs to the cache kmalloc-64 of size 64 [ 29.413903] The buggy address is located 0 bytes to the right of [ 29.413903] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.414813] [ 29.414949] The buggy address belongs to the physical page: [ 29.415316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.415741] flags: 0x200000000000000(node=0|zone=2) [ 29.416224] page_type: f5(slab) [ 29.416429] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.416961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.417386] page dumped because: kasan: bad access detected [ 29.417892] [ 29.418062] Memory state around the buggy address: [ 29.418324] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.418867] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.419221] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.419772] ^ [ 29.420053] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.420493] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.420777] ================================================================== [ 29.484025] ================================================================== [ 29.484503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 29.485055] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.485721] [ 29.486302] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.486501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.486523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.486554] Call Trace: [ 29.486580] <TASK> [ 29.486608] dump_stack_lvl+0x73/0xb0 [ 29.486653] print_report+0xd1/0x650 [ 29.486680] ? __virt_addr_valid+0x1db/0x2d0 [ 29.486708] ? kasan_atomics_helper+0x49e8/0x5450 [ 29.486733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.486762] ? kasan_atomics_helper+0x49e8/0x5450 [ 29.486787] kasan_report+0x141/0x180 [ 29.486811] ? kasan_atomics_helper+0x49e8/0x5450 [ 29.486839] __asan_report_load4_noabort+0x18/0x20 [ 29.486866] kasan_atomics_helper+0x49e8/0x5450 [ 29.486891] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.486916] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.486944] ? kasan_atomics+0x152/0x310 [ 29.486973] kasan_atomics+0x1dc/0x310 [ 29.486998] ? __pfx_kasan_atomics+0x10/0x10 [ 29.487025] ? __pfx_read_tsc+0x10/0x10 [ 29.487049] ? ktime_get_ts64+0x86/0x230 [ 29.487081] kunit_try_run_case+0x1a5/0x480 [ 29.487109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.487134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.487173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.487210] ? __kthread_parkme+0x82/0x180 [ 29.487235] ? preempt_count_sub+0x50/0x80 [ 29.487262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.487290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.487316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.487343] kthread+0x337/0x6f0 [ 29.487365] ? trace_preempt_on+0x20/0xc0 [ 29.487392] ? __pfx_kthread+0x10/0x10 [ 29.487417] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.487461] ? calculate_sigpending+0x7b/0xa0 [ 29.487494] ? __pfx_kthread+0x10/0x10 [ 29.487520] ret_from_fork+0x116/0x1d0 [ 29.487544] ? __pfx_kthread+0x10/0x10 [ 29.487568] ret_from_fork_asm+0x1a/0x30 [ 29.487605] </TASK> [ 29.487620] [ 29.498638] Allocated by task 294: [ 29.499039] kasan_save_stack+0x45/0x70 [ 29.499379] kasan_save_track+0x18/0x40 [ 29.499700] kasan_save_alloc_info+0x3b/0x50 [ 29.499999] __kasan_kmalloc+0xb7/0xc0 [ 29.500326] __kmalloc_cache_noprof+0x189/0x420 [ 29.500702] kasan_atomics+0x95/0x310 [ 29.501040] kunit_try_run_case+0x1a5/0x480 [ 29.501350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.501755] kthread+0x337/0x6f0 [ 29.502117] ret_from_fork+0x116/0x1d0 [ 29.502402] ret_from_fork_asm+0x1a/0x30 [ 29.502676] [ 29.502789] The buggy address belongs to the object at ffff888102338080 [ 29.502789] which belongs to the cache kmalloc-64 of size 64 [ 29.503261] The buggy address is located 0 bytes to the right of [ 29.503261] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.503704] [ 29.503826] The buggy address belongs to the physical page: [ 29.504083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.504712] flags: 0x200000000000000(node=0|zone=2) [ 29.505123] page_type: f5(slab) [ 29.505460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.505987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.506311] page dumped because: kasan: bad access detected [ 29.506543] [ 29.506644] Memory state around the buggy address: [ 29.506852] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.507324] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.507871] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.508433] ^ [ 29.508832] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.509386] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.509855] ================================================================== [ 29.798953] ================================================================== [ 29.799785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 29.800369] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.800661] [ 29.800810] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.800924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.800958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.801009] Call Trace: [ 29.801056] <TASK> [ 29.801105] dump_stack_lvl+0x73/0xb0 [ 29.801170] print_report+0xd1/0x650 [ 29.801228] ? __virt_addr_valid+0x1db/0x2d0 [ 29.801281] ? kasan_atomics_helper+0x177f/0x5450 [ 29.801333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.801397] ? kasan_atomics_helper+0x177f/0x5450 [ 29.801459] kasan_report+0x141/0x180 [ 29.801499] ? kasan_atomics_helper+0x177f/0x5450 [ 29.801541] kasan_check_range+0x10c/0x1c0 [ 29.801579] __kasan_check_write+0x18/0x20 [ 29.801615] kasan_atomics_helper+0x177f/0x5450 [ 29.801650] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.801685] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.801724] ? kasan_atomics+0x152/0x310 [ 29.801763] kasan_atomics+0x1dc/0x310 [ 29.801798] ? __pfx_kasan_atomics+0x10/0x10 [ 29.801836] ? __pfx_read_tsc+0x10/0x10 [ 29.801870] ? ktime_get_ts64+0x86/0x230 [ 29.801913] kunit_try_run_case+0x1a5/0x480 [ 29.801954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.801990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.802041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.802085] ? __kthread_parkme+0x82/0x180 [ 29.802127] ? preempt_count_sub+0x50/0x80 [ 29.802176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.802224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.802428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.802572] kthread+0x337/0x6f0 [ 29.802616] ? trace_preempt_on+0x20/0xc0 [ 29.802658] ? __pfx_kthread+0x10/0x10 [ 29.802697] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.802739] ? calculate_sigpending+0x7b/0xa0 [ 29.802792] ? __pfx_kthread+0x10/0x10 [ 29.802838] ret_from_fork+0x116/0x1d0 [ 29.802884] ? __pfx_kthread+0x10/0x10 [ 29.802933] ret_from_fork_asm+0x1a/0x30 [ 29.802995] </TASK> [ 29.803022] [ 29.815060] Allocated by task 294: [ 29.815527] kasan_save_stack+0x45/0x70 [ 29.815988] kasan_save_track+0x18/0x40 [ 29.816496] kasan_save_alloc_info+0x3b/0x50 [ 29.816706] __kasan_kmalloc+0xb7/0xc0 [ 29.816888] __kmalloc_cache_noprof+0x189/0x420 [ 29.817096] kasan_atomics+0x95/0x310 [ 29.817468] kunit_try_run_case+0x1a5/0x480 [ 29.817902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.818414] kthread+0x337/0x6f0 [ 29.818724] ret_from_fork+0x116/0x1d0 [ 29.819011] ret_from_fork_asm+0x1a/0x30 [ 29.819574] [ 29.819760] The buggy address belongs to the object at ffff888102338080 [ 29.819760] which belongs to the cache kmalloc-64 of size 64 [ 29.820660] The buggy address is located 0 bytes to the right of [ 29.820660] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.821169] [ 29.821288] The buggy address belongs to the physical page: [ 29.821573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.822181] flags: 0x200000000000000(node=0|zone=2) [ 29.822667] page_type: f5(slab) [ 29.823058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.823815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.824485] page dumped because: kasan: bad access detected [ 29.824905] [ 29.825075] Memory state around the buggy address: [ 29.825603] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.826045] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.826573] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.826977] ^ [ 29.827380] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.828077] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.828666] ================================================================== [ 30.422156] ================================================================== [ 30.422564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 30.422989] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.423362] [ 30.423602] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.423710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.423741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.423794] Call Trace: [ 30.423842] <TASK> [ 30.423887] dump_stack_lvl+0x73/0xb0 [ 30.423961] print_report+0xd1/0x650 [ 30.424010] ? __virt_addr_valid+0x1db/0x2d0 [ 30.424053] ? kasan_atomics_helper+0x224c/0x5450 [ 30.424100] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.424193] ? kasan_atomics_helper+0x224c/0x5450 [ 30.424251] kasan_report+0x141/0x180 [ 30.424306] ? kasan_atomics_helper+0x224c/0x5450 [ 30.424370] kasan_check_range+0x10c/0x1c0 [ 30.424428] __kasan_check_write+0x18/0x20 [ 30.424496] kasan_atomics_helper+0x224c/0x5450 [ 30.424553] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.424607] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.424661] ? kasan_atomics+0x152/0x310 [ 30.424711] kasan_atomics+0x1dc/0x310 [ 30.424759] ? __pfx_kasan_atomics+0x10/0x10 [ 30.424807] ? __pfx_read_tsc+0x10/0x10 [ 30.424849] ? ktime_get_ts64+0x86/0x230 [ 30.424905] kunit_try_run_case+0x1a5/0x480 [ 30.424961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.425007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.425055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.425098] ? __kthread_parkme+0x82/0x180 [ 30.425179] ? preempt_count_sub+0x50/0x80 [ 30.425237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.425297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.425350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.425384] kthread+0x337/0x6f0 [ 30.425410] ? trace_preempt_on+0x20/0xc0 [ 30.425454] ? __pfx_kthread+0x10/0x10 [ 30.425490] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.425515] ? calculate_sigpending+0x7b/0xa0 [ 30.425545] ? __pfx_kthread+0x10/0x10 [ 30.425570] ret_from_fork+0x116/0x1d0 [ 30.425594] ? __pfx_kthread+0x10/0x10 [ 30.425618] ret_from_fork_asm+0x1a/0x30 [ 30.425653] </TASK> [ 30.425668] [ 30.434331] Allocated by task 294: [ 30.434677] kasan_save_stack+0x45/0x70 [ 30.435025] kasan_save_track+0x18/0x40 [ 30.435398] kasan_save_alloc_info+0x3b/0x50 [ 30.435758] __kasan_kmalloc+0xb7/0xc0 [ 30.436078] __kmalloc_cache_noprof+0x189/0x420 [ 30.436480] kasan_atomics+0x95/0x310 [ 30.436780] kunit_try_run_case+0x1a5/0x480 [ 30.437133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.437475] kthread+0x337/0x6f0 [ 30.437651] ret_from_fork+0x116/0x1d0 [ 30.437830] ret_from_fork_asm+0x1a/0x30 [ 30.438021] [ 30.438222] The buggy address belongs to the object at ffff888102338080 [ 30.438222] which belongs to the cache kmalloc-64 of size 64 [ 30.439098] The buggy address is located 0 bytes to the right of [ 30.439098] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.439946] [ 30.440120] The buggy address belongs to the physical page: [ 30.440437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.440950] flags: 0x200000000000000(node=0|zone=2) [ 30.441271] page_type: f5(slab) [ 30.441625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.441896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.442487] page dumped because: kasan: bad access detected [ 30.442803] [ 30.442902] Memory state around the buggy address: [ 30.443247] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.443911] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.444286] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.444825] ^ [ 30.446743] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.447212] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.447524] ================================================================== [ 28.773955] ================================================================== [ 28.774316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 28.775346] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.775706] [ 28.775835] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.775936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.775968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.776020] Call Trace: [ 28.776067] <TASK> [ 28.776114] dump_stack_lvl+0x73/0xb0 [ 28.776188] print_report+0xd1/0x650 [ 28.776247] ? __virt_addr_valid+0x1db/0x2d0 [ 28.776303] ? kasan_atomics_helper+0x565/0x5450 [ 28.776353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.776414] ? kasan_atomics_helper+0x565/0x5450 [ 28.776486] kasan_report+0x141/0x180 [ 28.776529] ? kasan_atomics_helper+0x565/0x5450 [ 28.776584] kasan_check_range+0x10c/0x1c0 [ 28.776636] __kasan_check_write+0x18/0x20 [ 28.776682] kasan_atomics_helper+0x565/0x5450 [ 28.776726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.776774] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.776834] ? kasan_atomics+0x152/0x310 [ 28.776884] kasan_atomics+0x1dc/0x310 [ 28.776931] ? __pfx_kasan_atomics+0x10/0x10 [ 28.776983] ? __pfx_read_tsc+0x10/0x10 [ 28.777030] ? ktime_get_ts64+0x86/0x230 [ 28.777087] kunit_try_run_case+0x1a5/0x480 [ 28.777137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.777184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.777235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.777288] ? __kthread_parkme+0x82/0x180 [ 28.777341] ? preempt_count_sub+0x50/0x80 [ 28.777393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.777487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.777540] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.777593] kthread+0x337/0x6f0 [ 28.777641] ? trace_preempt_on+0x20/0xc0 [ 28.777698] ? __pfx_kthread+0x10/0x10 [ 28.777740] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.777781] ? calculate_sigpending+0x7b/0xa0 [ 28.777812] ? __pfx_kthread+0x10/0x10 [ 28.777838] ret_from_fork+0x116/0x1d0 [ 28.777860] ? __pfx_kthread+0x10/0x10 [ 28.777885] ret_from_fork_asm+0x1a/0x30 [ 28.777920] </TASK> [ 28.777937] [ 28.786936] Allocated by task 294: [ 28.787148] kasan_save_stack+0x45/0x70 [ 28.787377] kasan_save_track+0x18/0x40 [ 28.787620] kasan_save_alloc_info+0x3b/0x50 [ 28.787970] __kasan_kmalloc+0xb7/0xc0 [ 28.788298] __kmalloc_cache_noprof+0x189/0x420 [ 28.788696] kasan_atomics+0x95/0x310 [ 28.789135] kunit_try_run_case+0x1a5/0x480 [ 28.789508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.789828] kthread+0x337/0x6f0 [ 28.790005] ret_from_fork+0x116/0x1d0 [ 28.790266] ret_from_fork_asm+0x1a/0x30 [ 28.790601] [ 28.790766] The buggy address belongs to the object at ffff888102338080 [ 28.790766] which belongs to the cache kmalloc-64 of size 64 [ 28.791627] The buggy address is located 0 bytes to the right of [ 28.791627] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.792268] [ 28.792393] The buggy address belongs to the physical page: [ 28.792622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.792914] flags: 0x200000000000000(node=0|zone=2) [ 28.793285] page_type: f5(slab) [ 28.793597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.794152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.794702] page dumped because: kasan: bad access detected [ 28.795080] [ 28.795260] Memory state around the buggy address: [ 28.795567] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.795904] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.796171] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.796708] ^ [ 28.797233] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.797614] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.797941] ================================================================== [ 29.422419] ================================================================== [ 29.423617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 29.424008] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.424652] [ 29.424898] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.425007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.425036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.425083] Call Trace: [ 29.425127] <TASK> [ 29.425213] dump_stack_lvl+0x73/0xb0 [ 29.425296] print_report+0xd1/0x650 [ 29.425350] ? __virt_addr_valid+0x1db/0x2d0 [ 29.425404] ? kasan_atomics_helper+0x4a02/0x5450 [ 29.425459] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.425499] ? kasan_atomics_helper+0x4a02/0x5450 [ 29.425525] kasan_report+0x141/0x180 [ 29.425550] ? kasan_atomics_helper+0x4a02/0x5450 [ 29.425579] __asan_report_load4_noabort+0x18/0x20 [ 29.425607] kasan_atomics_helper+0x4a02/0x5450 [ 29.425632] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.425657] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.425686] ? kasan_atomics+0x152/0x310 [ 29.425714] kasan_atomics+0x1dc/0x310 [ 29.425741] ? __pfx_kasan_atomics+0x10/0x10 [ 29.425767] ? __pfx_read_tsc+0x10/0x10 [ 29.425793] ? ktime_get_ts64+0x86/0x230 [ 29.425823] kunit_try_run_case+0x1a5/0x480 [ 29.425852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.425878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.425903] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.425929] ? __kthread_parkme+0x82/0x180 [ 29.425954] ? preempt_count_sub+0x50/0x80 [ 29.425980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.426006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.426049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.426078] kthread+0x337/0x6f0 [ 29.426102] ? trace_preempt_on+0x20/0xc0 [ 29.426130] ? __pfx_kthread+0x10/0x10 [ 29.426180] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.426213] ? calculate_sigpending+0x7b/0xa0 [ 29.426242] ? __pfx_kthread+0x10/0x10 [ 29.426268] ret_from_fork+0x116/0x1d0 [ 29.426290] ? __pfx_kthread+0x10/0x10 [ 29.426315] ret_from_fork_asm+0x1a/0x30 [ 29.426351] </TASK> [ 29.426367] [ 29.435479] Allocated by task 294: [ 29.435834] kasan_save_stack+0x45/0x70 [ 29.436926] kasan_save_track+0x18/0x40 [ 29.437382] kasan_save_alloc_info+0x3b/0x50 [ 29.437778] __kasan_kmalloc+0xb7/0xc0 [ 29.438052] __kmalloc_cache_noprof+0x189/0x420 [ 29.440131] kasan_atomics+0x95/0x310 [ 29.440613] kunit_try_run_case+0x1a5/0x480 [ 29.441044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.441493] kthread+0x337/0x6f0 [ 29.441813] ret_from_fork+0x116/0x1d0 [ 29.442209] ret_from_fork_asm+0x1a/0x30 [ 29.442559] [ 29.442739] The buggy address belongs to the object at ffff888102338080 [ 29.442739] which belongs to the cache kmalloc-64 of size 64 [ 29.443587] The buggy address is located 0 bytes to the right of [ 29.443587] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.444333] [ 29.444553] The buggy address belongs to the physical page: [ 29.445000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.445652] flags: 0x200000000000000(node=0|zone=2) [ 29.446112] page_type: f5(slab) [ 29.446370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.447028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.447628] page dumped because: kasan: bad access detected [ 29.447954] [ 29.448200] Memory state around the buggy address: [ 29.448657] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.449131] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.449715] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.450327] ^ [ 29.450657] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.451065] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.451647] ================================================================== [ 28.654287] ================================================================== [ 28.654878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 28.655678] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.655961] [ 28.656083] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.656189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.656215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.656264] Call Trace: [ 28.656307] <TASK> [ 28.656347] dump_stack_lvl+0x73/0xb0 [ 28.656417] print_report+0xd1/0x650 [ 28.656479] ? __virt_addr_valid+0x1db/0x2d0 [ 28.656529] ? kasan_atomics_helper+0x3df/0x5450 [ 28.656571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.656602] ? kasan_atomics_helper+0x3df/0x5450 [ 28.656626] kasan_report+0x141/0x180 [ 28.656649] ? kasan_atomics_helper+0x3df/0x5450 [ 28.656676] kasan_check_range+0x10c/0x1c0 [ 28.656701] __kasan_check_read+0x15/0x20 [ 28.656726] kasan_atomics_helper+0x3df/0x5450 [ 28.656750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.656774] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.656801] ? kasan_atomics+0x152/0x310 [ 28.656829] kasan_atomics+0x1dc/0x310 [ 28.656853] ? __pfx_kasan_atomics+0x10/0x10 [ 28.656881] ? __pfx_read_tsc+0x10/0x10 [ 28.656908] ? ktime_get_ts64+0x86/0x230 [ 28.656940] kunit_try_run_case+0x1a5/0x480 [ 28.656970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.656995] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.657022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.657048] ? __kthread_parkme+0x82/0x180 [ 28.657072] ? preempt_count_sub+0x50/0x80 [ 28.657100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.657126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.657153] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.657181] kthread+0x337/0x6f0 [ 28.657203] ? trace_preempt_on+0x20/0xc0 [ 28.657230] ? __pfx_kthread+0x10/0x10 [ 28.657255] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.657279] ? calculate_sigpending+0x7b/0xa0 [ 28.657307] ? __pfx_kthread+0x10/0x10 [ 28.657332] ret_from_fork+0x116/0x1d0 [ 28.657353] ? __pfx_kthread+0x10/0x10 [ 28.657376] ret_from_fork_asm+0x1a/0x30 [ 28.657411] </TASK> [ 28.657426] [ 28.670250] Allocated by task 294: [ 28.670648] kasan_save_stack+0x45/0x70 [ 28.671206] kasan_save_track+0x18/0x40 [ 28.671498] kasan_save_alloc_info+0x3b/0x50 [ 28.671716] __kasan_kmalloc+0xb7/0xc0 [ 28.672114] __kmalloc_cache_noprof+0x189/0x420 [ 28.672535] kasan_atomics+0x95/0x310 [ 28.672864] kunit_try_run_case+0x1a5/0x480 [ 28.673274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.673733] kthread+0x337/0x6f0 [ 28.674117] ret_from_fork+0x116/0x1d0 [ 28.674500] ret_from_fork_asm+0x1a/0x30 [ 28.674745] [ 28.674992] The buggy address belongs to the object at ffff888102338080 [ 28.674992] which belongs to the cache kmalloc-64 of size 64 [ 28.675824] The buggy address is located 0 bytes to the right of [ 28.675824] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.676740] [ 28.676921] The buggy address belongs to the physical page: [ 28.677397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.678001] flags: 0x200000000000000(node=0|zone=2) [ 28.678486] page_type: f5(slab) [ 28.678766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.679311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.679826] page dumped because: kasan: bad access detected [ 28.680244] [ 28.680365] Memory state around the buggy address: [ 28.680687] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.681091] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.681665] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.681976] ^ [ 28.682190] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.682754] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.683066] ================================================================== [ 29.741332] ================================================================== [ 29.741810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 29.742391] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.742891] [ 29.743189] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.743308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.743339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.743413] Call Trace: [ 29.743482] <TASK> [ 29.743529] dump_stack_lvl+0x73/0xb0 [ 29.743602] print_report+0xd1/0x650 [ 29.743655] ? __virt_addr_valid+0x1db/0x2d0 [ 29.743704] ? kasan_atomics_helper+0x164f/0x5450 [ 29.743751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.743805] ? kasan_atomics_helper+0x164f/0x5450 [ 29.743856] kasan_report+0x141/0x180 [ 29.743903] ? kasan_atomics_helper+0x164f/0x5450 [ 29.743964] kasan_check_range+0x10c/0x1c0 [ 29.744016] __kasan_check_write+0x18/0x20 [ 29.744058] kasan_atomics_helper+0x164f/0x5450 [ 29.744112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.744185] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.744287] ? kasan_atomics+0x152/0x310 [ 29.744369] kasan_atomics+0x1dc/0x310 [ 29.744452] ? __pfx_kasan_atomics+0x10/0x10 [ 29.744513] ? __pfx_read_tsc+0x10/0x10 [ 29.744555] ? ktime_get_ts64+0x86/0x230 [ 29.744588] kunit_try_run_case+0x1a5/0x480 [ 29.744620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.744646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.744674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.744701] ? __kthread_parkme+0x82/0x180 [ 29.744726] ? preempt_count_sub+0x50/0x80 [ 29.744754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.744782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.744809] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.744836] kthread+0x337/0x6f0 [ 29.744858] ? trace_preempt_on+0x20/0xc0 [ 29.744886] ? __pfx_kthread+0x10/0x10 [ 29.744909] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.744934] ? calculate_sigpending+0x7b/0xa0 [ 29.744963] ? __pfx_kthread+0x10/0x10 [ 29.744988] ret_from_fork+0x116/0x1d0 [ 29.745011] ? __pfx_kthread+0x10/0x10 [ 29.745035] ret_from_fork_asm+0x1a/0x30 [ 29.745071] </TASK> [ 29.745086] [ 29.754271] Allocated by task 294: [ 29.754517] kasan_save_stack+0x45/0x70 [ 29.754754] kasan_save_track+0x18/0x40 [ 29.754935] kasan_save_alloc_info+0x3b/0x50 [ 29.755136] __kasan_kmalloc+0xb7/0xc0 [ 29.756333] __kmalloc_cache_noprof+0x189/0x420 [ 29.756547] kasan_atomics+0x95/0x310 [ 29.756702] kunit_try_run_case+0x1a5/0x480 [ 29.756864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.757055] kthread+0x337/0x6f0 [ 29.757513] ret_from_fork+0x116/0x1d0 [ 29.757714] ret_from_fork_asm+0x1a/0x30 [ 29.757904] [ 29.758012] The buggy address belongs to the object at ffff888102338080 [ 29.758012] which belongs to the cache kmalloc-64 of size 64 [ 29.759392] The buggy address is located 0 bytes to the right of [ 29.759392] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.760400] [ 29.760598] The buggy address belongs to the physical page: [ 29.761041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.761912] flags: 0x200000000000000(node=0|zone=2) [ 29.762621] page_type: f5(slab) [ 29.762874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.763138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.763710] page dumped because: kasan: bad access detected [ 29.764033] [ 29.764657] Memory state around the buggy address: [ 29.764881] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.765249] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.765792] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.766629] ^ [ 29.766843] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.767426] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.767937] ================================================================== [ 29.300842] ================================================================== [ 29.301867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 29.302523] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.302846] [ 29.302999] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.303116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.303148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.303200] Call Trace: [ 29.303248] <TASK> [ 29.303294] dump_stack_lvl+0x73/0xb0 [ 29.303375] print_report+0xd1/0x650 [ 29.303449] ? __virt_addr_valid+0x1db/0x2d0 [ 29.303497] ? kasan_atomics_helper+0x4a36/0x5450 [ 29.303546] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.303605] ? kasan_atomics_helper+0x4a36/0x5450 [ 29.303659] kasan_report+0x141/0x180 [ 29.303714] ? kasan_atomics_helper+0x4a36/0x5450 [ 29.303779] __asan_report_load4_noabort+0x18/0x20 [ 29.303840] kasan_atomics_helper+0x4a36/0x5450 [ 29.303897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.303952] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.304013] ? kasan_atomics+0x152/0x310 [ 29.304078] kasan_atomics+0x1dc/0x310 [ 29.304132] ? __pfx_kasan_atomics+0x10/0x10 [ 29.304188] ? __pfx_read_tsc+0x10/0x10 [ 29.304239] ? ktime_get_ts64+0x86/0x230 [ 29.304303] kunit_try_run_case+0x1a5/0x480 [ 29.304364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.304412] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.304464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.304516] ? __kthread_parkme+0x82/0x180 [ 29.304552] ? preempt_count_sub+0x50/0x80 [ 29.304597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.304642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.304694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.304741] kthread+0x337/0x6f0 [ 29.304797] ? trace_preempt_on+0x20/0xc0 [ 29.304872] ? __pfx_kthread+0x10/0x10 [ 29.304924] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.304975] ? calculate_sigpending+0x7b/0xa0 [ 29.305033] ? __pfx_kthread+0x10/0x10 [ 29.305086] ret_from_fork+0x116/0x1d0 [ 29.305132] ? __pfx_kthread+0x10/0x10 [ 29.305177] ret_from_fork_asm+0x1a/0x30 [ 29.305252] </TASK> [ 29.305297] [ 29.315321] Allocated by task 294: [ 29.315718] kasan_save_stack+0x45/0x70 [ 29.316048] kasan_save_track+0x18/0x40 [ 29.316372] kasan_save_alloc_info+0x3b/0x50 [ 29.316734] __kasan_kmalloc+0xb7/0xc0 [ 29.316989] __kmalloc_cache_noprof+0x189/0x420 [ 29.317491] kasan_atomics+0x95/0x310 [ 29.317777] kunit_try_run_case+0x1a5/0x480 [ 29.317993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.318299] kthread+0x337/0x6f0 [ 29.318636] ret_from_fork+0x116/0x1d0 [ 29.318871] ret_from_fork_asm+0x1a/0x30 [ 29.319181] [ 29.319329] The buggy address belongs to the object at ffff888102338080 [ 29.319329] which belongs to the cache kmalloc-64 of size 64 [ 29.320031] The buggy address is located 0 bytes to the right of [ 29.320031] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.320899] [ 29.321022] The buggy address belongs to the physical page: [ 29.321238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.321709] flags: 0x200000000000000(node=0|zone=2) [ 29.322139] page_type: f5(slab) [ 29.322433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.323018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.323808] page dumped because: kasan: bad access detected [ 29.324054] [ 29.324209] Memory state around the buggy address: [ 29.324476] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.324805] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.325301] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.325769] ^ [ 29.326012] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.326687] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.327016] ================================================================== [ 29.123432] ================================================================== [ 29.124552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 29.125312] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.125905] [ 29.126108] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.126289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.126322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.126377] Call Trace: [ 29.126422] <TASK> [ 29.126475] dump_stack_lvl+0x73/0xb0 [ 29.126538] print_report+0xd1/0x650 [ 29.126566] ? __virt_addr_valid+0x1db/0x2d0 [ 29.126595] ? kasan_atomics_helper+0x4a84/0x5450 [ 29.126619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.126649] ? kasan_atomics_helper+0x4a84/0x5450 [ 29.126674] kasan_report+0x141/0x180 [ 29.126698] ? kasan_atomics_helper+0x4a84/0x5450 [ 29.126727] __asan_report_load4_noabort+0x18/0x20 [ 29.126754] kasan_atomics_helper+0x4a84/0x5450 [ 29.126780] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.126804] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.126833] ? kasan_atomics+0x152/0x310 [ 29.126861] kasan_atomics+0x1dc/0x310 [ 29.126887] ? __pfx_kasan_atomics+0x10/0x10 [ 29.126914] ? __pfx_read_tsc+0x10/0x10 [ 29.126938] ? ktime_get_ts64+0x86/0x230 [ 29.126968] kunit_try_run_case+0x1a5/0x480 [ 29.126997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.127021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.127047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.127073] ? __kthread_parkme+0x82/0x180 [ 29.127098] ? preempt_count_sub+0x50/0x80 [ 29.127124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.127174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.127214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.127240] kthread+0x337/0x6f0 [ 29.127263] ? trace_preempt_on+0x20/0xc0 [ 29.127291] ? __pfx_kthread+0x10/0x10 [ 29.127316] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.127339] ? calculate_sigpending+0x7b/0xa0 [ 29.127368] ? __pfx_kthread+0x10/0x10 [ 29.127393] ret_from_fork+0x116/0x1d0 [ 29.127414] ? __pfx_kthread+0x10/0x10 [ 29.127438] ret_from_fork_asm+0x1a/0x30 [ 29.127494] </TASK> [ 29.127510] [ 29.140307] Allocated by task 294: [ 29.141010] kasan_save_stack+0x45/0x70 [ 29.141466] kasan_save_track+0x18/0x40 [ 29.141751] kasan_save_alloc_info+0x3b/0x50 [ 29.141969] __kasan_kmalloc+0xb7/0xc0 [ 29.142358] __kmalloc_cache_noprof+0x189/0x420 [ 29.142676] kasan_atomics+0x95/0x310 [ 29.142970] kunit_try_run_case+0x1a5/0x480 [ 29.143215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.143506] kthread+0x337/0x6f0 [ 29.143695] ret_from_fork+0x116/0x1d0 [ 29.143986] ret_from_fork_asm+0x1a/0x30 [ 29.144348] [ 29.144510] The buggy address belongs to the object at ffff888102338080 [ 29.144510] which belongs to the cache kmalloc-64 of size 64 [ 29.145170] The buggy address is located 0 bytes to the right of [ 29.145170] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.145818] [ 29.145983] The buggy address belongs to the physical page: [ 29.146294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.146886] flags: 0x200000000000000(node=0|zone=2) [ 29.147186] page_type: f5(slab) [ 29.147367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.147913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.148347] page dumped because: kasan: bad access detected [ 29.148679] [ 29.148847] Memory state around the buggy address: [ 29.149078] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.149382] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.149985] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.150561] ^ [ 29.150906] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.151210] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.151761] ================================================================== [ 28.799923] ================================================================== [ 28.800706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 28.801342] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.801694] [ 28.801886] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.801980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.802007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.802061] Call Trace: [ 28.802102] <TASK> [ 28.802138] dump_stack_lvl+0x73/0xb0 [ 28.802194] print_report+0xd1/0x650 [ 28.802232] ? __virt_addr_valid+0x1db/0x2d0 [ 28.802270] ? kasan_atomics_helper+0x5fe/0x5450 [ 28.802305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.802346] ? kasan_atomics_helper+0x5fe/0x5450 [ 28.802386] kasan_report+0x141/0x180 [ 28.802428] ? kasan_atomics_helper+0x5fe/0x5450 [ 28.802496] kasan_check_range+0x10c/0x1c0 [ 28.802554] __kasan_check_write+0x18/0x20 [ 28.802609] kasan_atomics_helper+0x5fe/0x5450 [ 28.802662] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.802715] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.802776] ? kasan_atomics+0x152/0x310 [ 28.802843] kasan_atomics+0x1dc/0x310 [ 28.802896] ? __pfx_kasan_atomics+0x10/0x10 [ 28.802954] ? __pfx_read_tsc+0x10/0x10 [ 28.803004] ? ktime_get_ts64+0x86/0x230 [ 28.803066] kunit_try_run_case+0x1a5/0x480 [ 28.803125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.803179] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.803228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.803269] ? __kthread_parkme+0x82/0x180 [ 28.803312] ? preempt_count_sub+0x50/0x80 [ 28.803363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.803408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.803469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.803523] kthread+0x337/0x6f0 [ 28.803567] ? trace_preempt_on+0x20/0xc0 [ 28.803622] ? __pfx_kthread+0x10/0x10 [ 28.803670] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.803722] ? calculate_sigpending+0x7b/0xa0 [ 28.803779] ? __pfx_kthread+0x10/0x10 [ 28.803831] ret_from_fork+0x116/0x1d0 [ 28.803879] ? __pfx_kthread+0x10/0x10 [ 28.803929] ret_from_fork_asm+0x1a/0x30 [ 28.804003] </TASK> [ 28.804033] [ 28.820021] Allocated by task 294: [ 28.820611] kasan_save_stack+0x45/0x70 [ 28.820849] kasan_save_track+0x18/0x40 [ 28.821194] kasan_save_alloc_info+0x3b/0x50 [ 28.821419] __kasan_kmalloc+0xb7/0xc0 [ 28.821662] __kmalloc_cache_noprof+0x189/0x420 [ 28.822036] kasan_atomics+0x95/0x310 [ 28.822386] kunit_try_run_case+0x1a5/0x480 [ 28.822659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.822914] kthread+0x337/0x6f0 [ 28.823180] ret_from_fork+0x116/0x1d0 [ 28.823379] ret_from_fork_asm+0x1a/0x30 [ 28.823663] [ 28.823839] The buggy address belongs to the object at ffff888102338080 [ 28.823839] which belongs to the cache kmalloc-64 of size 64 [ 28.824511] The buggy address is located 0 bytes to the right of [ 28.824511] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.825169] [ 28.825289] The buggy address belongs to the physical page: [ 28.825591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.826115] flags: 0x200000000000000(node=0|zone=2) [ 28.826372] page_type: f5(slab) [ 28.826680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.826968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.827337] page dumped because: kasan: bad access detected [ 28.827752] [ 28.827958] Memory state around the buggy address: [ 28.828240] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.828519] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.829030] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.829537] ^ [ 28.829818] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.830182] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.830601] ================================================================== [ 29.093958] ================================================================== [ 29.095456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 29.096046] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.096609] [ 29.096818] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.096909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.096933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.096971] Call Trace: [ 29.097011] <TASK> [ 29.097049] dump_stack_lvl+0x73/0xb0 [ 29.097106] print_report+0xd1/0x650 [ 29.097145] ? __virt_addr_valid+0x1db/0x2d0 [ 29.097184] ? kasan_atomics_helper+0xc70/0x5450 [ 29.097222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.097277] ? kasan_atomics_helper+0xc70/0x5450 [ 29.097325] kasan_report+0x141/0x180 [ 29.097379] ? kasan_atomics_helper+0xc70/0x5450 [ 29.097627] kasan_check_range+0x10c/0x1c0 [ 29.097697] __kasan_check_write+0x18/0x20 [ 29.097749] kasan_atomics_helper+0xc70/0x5450 [ 29.098058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.098120] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.098170] ? kasan_atomics+0x152/0x310 [ 29.098230] kasan_atomics+0x1dc/0x310 [ 29.098282] ? __pfx_kasan_atomics+0x10/0x10 [ 29.098340] ? __pfx_read_tsc+0x10/0x10 [ 29.098392] ? ktime_get_ts64+0x86/0x230 [ 29.098473] kunit_try_run_case+0x1a5/0x480 [ 29.098531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.098578] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.098629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.098682] ? __kthread_parkme+0x82/0x180 [ 29.098734] ? preempt_count_sub+0x50/0x80 [ 29.098792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.098847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.098897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.098950] kthread+0x337/0x6f0 [ 29.098999] ? trace_preempt_on+0x20/0xc0 [ 29.099051] ? __pfx_kthread+0x10/0x10 [ 29.099093] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.099189] ? calculate_sigpending+0x7b/0xa0 [ 29.099250] ? __pfx_kthread+0x10/0x10 [ 29.099296] ret_from_fork+0x116/0x1d0 [ 29.099336] ? __pfx_kthread+0x10/0x10 [ 29.099389] ret_from_fork_asm+0x1a/0x30 [ 29.099476] </TASK> [ 29.099509] [ 29.108734] Allocated by task 294: [ 29.108989] kasan_save_stack+0x45/0x70 [ 29.109300] kasan_save_track+0x18/0x40 [ 29.110434] kasan_save_alloc_info+0x3b/0x50 [ 29.110751] __kasan_kmalloc+0xb7/0xc0 [ 29.110938] __kmalloc_cache_noprof+0x189/0x420 [ 29.111135] kasan_atomics+0x95/0x310 [ 29.111472] kunit_try_run_case+0x1a5/0x480 [ 29.111835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.112299] kthread+0x337/0x6f0 [ 29.112638] ret_from_fork+0x116/0x1d0 [ 29.113465] ret_from_fork_asm+0x1a/0x30 [ 29.113806] [ 29.113913] The buggy address belongs to the object at ffff888102338080 [ 29.113913] which belongs to the cache kmalloc-64 of size 64 [ 29.114943] The buggy address is located 0 bytes to the right of [ 29.114943] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.115706] [ 29.115906] The buggy address belongs to the physical page: [ 29.116395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.116802] flags: 0x200000000000000(node=0|zone=2) [ 29.117456] page_type: f5(slab) [ 29.117709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.118120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.118865] page dumped because: kasan: bad access detected [ 29.119247] [ 29.119405] Memory state around the buggy address: [ 29.119710] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.120653] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.121156] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.121567] ^ [ 29.121868] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.122287] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.122569] ================================================================== [ 29.065816] ================================================================== [ 29.066232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 29.066598] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.067241] [ 29.067404] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.067527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.067558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.067611] Call Trace: [ 29.067660] <TASK> [ 29.067707] dump_stack_lvl+0x73/0xb0 [ 29.067772] print_report+0xd1/0x650 [ 29.067821] ? __virt_addr_valid+0x1db/0x2d0 [ 29.067871] ? kasan_atomics_helper+0xb6a/0x5450 [ 29.067910] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.067961] ? kasan_atomics_helper+0xb6a/0x5450 [ 29.068007] kasan_report+0x141/0x180 [ 29.068057] ? kasan_atomics_helper+0xb6a/0x5450 [ 29.068113] kasan_check_range+0x10c/0x1c0 [ 29.068203] __kasan_check_write+0x18/0x20 [ 29.068259] kasan_atomics_helper+0xb6a/0x5450 [ 29.068312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.068367] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.068418] ? kasan_atomics+0x152/0x310 [ 29.068484] kasan_atomics+0x1dc/0x310 [ 29.068537] ? __pfx_kasan_atomics+0x10/0x10 [ 29.068593] ? __pfx_read_tsc+0x10/0x10 [ 29.068632] ? ktime_get_ts64+0x86/0x230 [ 29.068688] kunit_try_run_case+0x1a5/0x480 [ 29.068737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.068779] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.068827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.068874] ? __kthread_parkme+0x82/0x180 [ 29.068915] ? preempt_count_sub+0x50/0x80 [ 29.068962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.069012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.069066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.069112] kthread+0x337/0x6f0 [ 29.069194] ? trace_preempt_on+0x20/0xc0 [ 29.069243] ? __pfx_kthread+0x10/0x10 [ 29.069289] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.069330] ? calculate_sigpending+0x7b/0xa0 [ 29.069382] ? __pfx_kthread+0x10/0x10 [ 29.069429] ret_from_fork+0x116/0x1d0 [ 29.069486] ? __pfx_kthread+0x10/0x10 [ 29.069534] ret_from_fork_asm+0x1a/0x30 [ 29.069602] </TASK> [ 29.069633] [ 29.079630] Allocated by task 294: [ 29.079923] kasan_save_stack+0x45/0x70 [ 29.080315] kasan_save_track+0x18/0x40 [ 29.080639] kasan_save_alloc_info+0x3b/0x50 [ 29.080931] __kasan_kmalloc+0xb7/0xc0 [ 29.081202] __kmalloc_cache_noprof+0x189/0x420 [ 29.081570] kasan_atomics+0x95/0x310 [ 29.081776] kunit_try_run_case+0x1a5/0x480 [ 29.082078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.083259] kthread+0x337/0x6f0 [ 29.083635] ret_from_fork+0x116/0x1d0 [ 29.083943] ret_from_fork_asm+0x1a/0x30 [ 29.084113] [ 29.084294] The buggy address belongs to the object at ffff888102338080 [ 29.084294] which belongs to the cache kmalloc-64 of size 64 [ 29.085032] The buggy address is located 0 bytes to the right of [ 29.085032] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.085712] [ 29.085844] The buggy address belongs to the physical page: [ 29.086101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.086435] flags: 0x200000000000000(node=0|zone=2) [ 29.086858] page_type: f5(slab) [ 29.087172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.087711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.088171] page dumped because: kasan: bad access detected [ 29.088487] [ 29.088597] Memory state around the buggy address: [ 29.088907] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.089196] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.089472] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.090005] ^ [ 29.090447] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.090968] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.091320] ================================================================== [ 30.161975] ================================================================== [ 30.162371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 30.163258] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.163808] [ 30.163953] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.164065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.164096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.164148] Call Trace: [ 30.164196] <TASK> [ 30.164240] dump_stack_lvl+0x73/0xb0 [ 30.164315] print_report+0xd1/0x650 [ 30.164436] ? __virt_addr_valid+0x1db/0x2d0 [ 30.164501] ? kasan_atomics_helper+0x1eaa/0x5450 [ 30.164548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.164610] ? kasan_atomics_helper+0x1eaa/0x5450 [ 30.164663] kasan_report+0x141/0x180 [ 30.164717] ? kasan_atomics_helper+0x1eaa/0x5450 [ 30.164783] kasan_check_range+0x10c/0x1c0 [ 30.164839] __kasan_check_write+0x18/0x20 [ 30.164884] kasan_atomics_helper+0x1eaa/0x5450 [ 30.164927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.164970] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.165024] ? kasan_atomics+0x152/0x310 [ 30.165129] kasan_atomics+0x1dc/0x310 [ 30.165234] ? __pfx_kasan_atomics+0x10/0x10 [ 30.165284] ? __pfx_read_tsc+0x10/0x10 [ 30.165333] ? ktime_get_ts64+0x86/0x230 [ 30.165401] kunit_try_run_case+0x1a5/0x480 [ 30.165473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.165515] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.165543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.165569] ? __kthread_parkme+0x82/0x180 [ 30.165595] ? preempt_count_sub+0x50/0x80 [ 30.165623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.165650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.165678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.165705] kthread+0x337/0x6f0 [ 30.165728] ? trace_preempt_on+0x20/0xc0 [ 30.165755] ? __pfx_kthread+0x10/0x10 [ 30.165778] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.165803] ? calculate_sigpending+0x7b/0xa0 [ 30.165831] ? __pfx_kthread+0x10/0x10 [ 30.165856] ret_from_fork+0x116/0x1d0 [ 30.165878] ? __pfx_kthread+0x10/0x10 [ 30.165901] ret_from_fork_asm+0x1a/0x30 [ 30.165937] </TASK> [ 30.165952] [ 30.177164] Allocated by task 294: [ 30.177530] kasan_save_stack+0x45/0x70 [ 30.177980] kasan_save_track+0x18/0x40 [ 30.178389] kasan_save_alloc_info+0x3b/0x50 [ 30.178813] __kasan_kmalloc+0xb7/0xc0 [ 30.179199] __kmalloc_cache_noprof+0x189/0x420 [ 30.179631] kasan_atomics+0x95/0x310 [ 30.179824] kunit_try_run_case+0x1a5/0x480 [ 30.180019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.180629] kthread+0x337/0x6f0 [ 30.180919] ret_from_fork+0x116/0x1d0 [ 30.181241] ret_from_fork_asm+0x1a/0x30 [ 30.181481] [ 30.181589] The buggy address belongs to the object at ffff888102338080 [ 30.181589] which belongs to the cache kmalloc-64 of size 64 [ 30.182672] The buggy address is located 0 bytes to the right of [ 30.182672] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.183063] [ 30.183589] The buggy address belongs to the physical page: [ 30.184107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.184751] flags: 0x200000000000000(node=0|zone=2) [ 30.185164] page_type: f5(slab) [ 30.185356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.185683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.185962] page dumped because: kasan: bad access detected [ 30.186266] [ 30.186438] Memory state around the buggy address: [ 30.186902] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.187840] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.188723] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.189308] ^ [ 30.189695] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.190092] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.190594] ================================================================== [ 30.278989] ================================================================== [ 30.279666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 30.280290] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.280810] [ 30.280968] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.281058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.281083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.281121] Call Trace: [ 30.281182] <TASK> [ 30.281221] dump_stack_lvl+0x73/0xb0 [ 30.281278] print_report+0xd1/0x650 [ 30.281317] ? __virt_addr_valid+0x1db/0x2d0 [ 30.281358] ? kasan_atomics_helper+0x4f98/0x5450 [ 30.281393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.281433] ? kasan_atomics_helper+0x4f98/0x5450 [ 30.281483] kasan_report+0x141/0x180 [ 30.281521] ? kasan_atomics_helper+0x4f98/0x5450 [ 30.281597] __asan_report_load8_noabort+0x18/0x20 [ 30.281651] kasan_atomics_helper+0x4f98/0x5450 [ 30.281703] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.281745] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.281798] ? kasan_atomics+0x152/0x310 [ 30.281853] kasan_atomics+0x1dc/0x310 [ 30.281933] ? __pfx_kasan_atomics+0x10/0x10 [ 30.281985] ? __pfx_read_tsc+0x10/0x10 [ 30.282042] ? ktime_get_ts64+0x86/0x230 [ 30.282107] kunit_try_run_case+0x1a5/0x480 [ 30.282218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.282272] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.282325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.282381] ? __kthread_parkme+0x82/0x180 [ 30.282431] ? preempt_count_sub+0x50/0x80 [ 30.282516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.282572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.282625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.282673] kthread+0x337/0x6f0 [ 30.282714] ? trace_preempt_on+0x20/0xc0 [ 30.282768] ? __pfx_kthread+0x10/0x10 [ 30.282837] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.282887] ? calculate_sigpending+0x7b/0xa0 [ 30.282940] ? __pfx_kthread+0x10/0x10 [ 30.282991] ret_from_fork+0x116/0x1d0 [ 30.283041] ? __pfx_kthread+0x10/0x10 [ 30.283111] ret_from_fork_asm+0x1a/0x30 [ 30.283219] </TASK> [ 30.283251] [ 30.293618] Allocated by task 294: [ 30.293989] kasan_save_stack+0x45/0x70 [ 30.294344] kasan_save_track+0x18/0x40 [ 30.294604] kasan_save_alloc_info+0x3b/0x50 [ 30.294956] __kasan_kmalloc+0xb7/0xc0 [ 30.295257] __kmalloc_cache_noprof+0x189/0x420 [ 30.295524] kasan_atomics+0x95/0x310 [ 30.295724] kunit_try_run_case+0x1a5/0x480 [ 30.295911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.296131] kthread+0x337/0x6f0 [ 30.296342] ret_from_fork+0x116/0x1d0 [ 30.296528] ret_from_fork_asm+0x1a/0x30 [ 30.296721] [ 30.296830] The buggy address belongs to the object at ffff888102338080 [ 30.296830] which belongs to the cache kmalloc-64 of size 64 [ 30.297408] The buggy address is located 0 bytes to the right of [ 30.297408] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.298358] [ 30.298553] The buggy address belongs to the physical page: [ 30.298988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.299600] flags: 0x200000000000000(node=0|zone=2) [ 30.299978] page_type: f5(slab) [ 30.300174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.300473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.301013] page dumped because: kasan: bad access detected [ 30.301438] [ 30.301614] Memory state around the buggy address: [ 30.301983] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.304564] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.305017] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.305371] ^ [ 30.305612] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.306390] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.306926] ================================================================== [ 29.950543] ================================================================== [ 29.951580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 29.952084] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.952432] [ 29.952659] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.952765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.952797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.952860] Call Trace: [ 29.952921] <TASK> [ 29.952968] dump_stack_lvl+0x73/0xb0 [ 29.953065] print_report+0xd1/0x650 [ 29.953113] ? __virt_addr_valid+0x1db/0x2d0 [ 29.953195] ? kasan_atomics_helper+0x1a7f/0x5450 [ 29.953242] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.953301] ? kasan_atomics_helper+0x1a7f/0x5450 [ 29.953355] kasan_report+0x141/0x180 [ 29.953410] ? kasan_atomics_helper+0x1a7f/0x5450 [ 29.953498] kasan_check_range+0x10c/0x1c0 [ 29.953557] __kasan_check_write+0x18/0x20 [ 29.953613] kasan_atomics_helper+0x1a7f/0x5450 [ 29.953669] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.953721] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.953780] ? kasan_atomics+0x152/0x310 [ 29.953838] kasan_atomics+0x1dc/0x310 [ 29.953873] ? __pfx_kasan_atomics+0x10/0x10 [ 29.953902] ? __pfx_read_tsc+0x10/0x10 [ 29.953928] ? ktime_get_ts64+0x86/0x230 [ 29.953961] kunit_try_run_case+0x1a5/0x480 [ 29.953991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.954017] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.954063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.954090] ? __kthread_parkme+0x82/0x180 [ 29.954114] ? preempt_count_sub+0x50/0x80 [ 29.954160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.954207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.954251] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.954296] kthread+0x337/0x6f0 [ 29.954340] ? trace_preempt_on+0x20/0xc0 [ 29.954417] ? __pfx_kthread+0x10/0x10 [ 29.954468] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.954518] ? calculate_sigpending+0x7b/0xa0 [ 29.954573] ? __pfx_kthread+0x10/0x10 [ 29.954619] ret_from_fork+0x116/0x1d0 [ 29.954665] ? __pfx_kthread+0x10/0x10 [ 29.954731] ret_from_fork_asm+0x1a/0x30 [ 29.954801] </TASK> [ 29.954832] [ 29.965733] Allocated by task 294: [ 29.966129] kasan_save_stack+0x45/0x70 [ 29.966451] kasan_save_track+0x18/0x40 [ 29.966635] kasan_save_alloc_info+0x3b/0x50 [ 29.966898] __kasan_kmalloc+0xb7/0xc0 [ 29.967223] __kmalloc_cache_noprof+0x189/0x420 [ 29.967799] kasan_atomics+0x95/0x310 [ 29.968578] kunit_try_run_case+0x1a5/0x480 [ 29.969291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.969997] kthread+0x337/0x6f0 [ 29.970413] ret_from_fork+0x116/0x1d0 [ 29.970739] ret_from_fork_asm+0x1a/0x30 [ 29.970984] [ 29.971153] The buggy address belongs to the object at ffff888102338080 [ 29.971153] which belongs to the cache kmalloc-64 of size 64 [ 29.971833] The buggy address is located 0 bytes to the right of [ 29.971833] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.973101] [ 29.973264] The buggy address belongs to the physical page: [ 29.973593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.974180] flags: 0x200000000000000(node=0|zone=2) [ 29.974465] page_type: f5(slab) [ 29.974699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.975076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.976094] page dumped because: kasan: bad access detected [ 29.976504] [ 29.976674] Memory state around the buggy address: [ 29.977003] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977735] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.978398] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.978785] ^ [ 29.979308] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.979788] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.980258] ================================================================== [ 29.981564] ================================================================== [ 29.982168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 29.982732] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.983048] [ 29.983389] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.983545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.983576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.983627] Call Trace: [ 29.983673] <TASK> [ 29.983747] dump_stack_lvl+0x73/0xb0 [ 29.983841] print_report+0xd1/0x650 [ 29.983896] ? __virt_addr_valid+0x1db/0x2d0 [ 29.983955] ? kasan_atomics_helper+0x1b22/0x5450 [ 29.984009] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.984064] ? kasan_atomics_helper+0x1b22/0x5450 [ 29.984112] kasan_report+0x141/0x180 [ 29.984223] ? kasan_atomics_helper+0x1b22/0x5450 [ 29.984299] kasan_check_range+0x10c/0x1c0 [ 29.984357] __kasan_check_write+0x18/0x20 [ 29.984395] kasan_atomics_helper+0x1b22/0x5450 [ 29.984421] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.984470] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.984504] ? kasan_atomics+0x152/0x310 [ 29.984535] kasan_atomics+0x1dc/0x310 [ 29.984561] ? __pfx_kasan_atomics+0x10/0x10 [ 29.984588] ? __pfx_read_tsc+0x10/0x10 [ 29.984614] ? ktime_get_ts64+0x86/0x230 [ 29.984646] kunit_try_run_case+0x1a5/0x480 [ 29.984677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.984703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.984730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.984756] ? __kthread_parkme+0x82/0x180 [ 29.984780] ? preempt_count_sub+0x50/0x80 [ 29.984808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.984834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.984861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.984888] kthread+0x337/0x6f0 [ 29.984911] ? trace_preempt_on+0x20/0xc0 [ 29.984937] ? __pfx_kthread+0x10/0x10 [ 29.984961] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.984986] ? calculate_sigpending+0x7b/0xa0 [ 29.985013] ? __pfx_kthread+0x10/0x10 [ 29.985037] ret_from_fork+0x116/0x1d0 [ 29.985059] ? __pfx_kthread+0x10/0x10 [ 29.985083] ret_from_fork_asm+0x1a/0x30 [ 29.985118] </TASK> [ 29.985135] [ 29.995810] Allocated by task 294: [ 29.996190] kasan_save_stack+0x45/0x70 [ 29.996677] kasan_save_track+0x18/0x40 [ 29.997060] kasan_save_alloc_info+0x3b/0x50 [ 29.997467] __kasan_kmalloc+0xb7/0xc0 [ 29.997663] __kmalloc_cache_noprof+0x189/0x420 [ 29.997872] kasan_atomics+0x95/0x310 [ 29.998063] kunit_try_run_case+0x1a5/0x480 [ 29.998551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.999056] kthread+0x337/0x6f0 [ 29.999402] ret_from_fork+0x116/0x1d0 [ 29.999824] ret_from_fork_asm+0x1a/0x30 [ 30.000269] [ 30.000514] The buggy address belongs to the object at ffff888102338080 [ 30.000514] which belongs to the cache kmalloc-64 of size 64 [ 30.001614] The buggy address is located 0 bytes to the right of [ 30.001614] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.002402] [ 30.002613] The buggy address belongs to the physical page: [ 30.003168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.003569] flags: 0x200000000000000(node=0|zone=2) [ 30.003798] page_type: f5(slab) [ 30.004103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.004758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.005028] page dumped because: kasan: bad access detected [ 30.005640] [ 30.005822] Memory state around the buggy address: [ 30.006414] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.006794] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.007715] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.008088] ^ [ 30.008451] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.009105] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.009532] ================================================================== [ 29.329188] ================================================================== [ 29.330658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 29.331079] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.331696] [ 29.331880] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.332017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.332052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.332105] Call Trace: [ 29.332152] <TASK> [ 29.332195] dump_stack_lvl+0x73/0xb0 [ 29.332267] print_report+0xd1/0x650 [ 29.332313] ? __virt_addr_valid+0x1db/0x2d0 [ 29.332365] ? kasan_atomics_helper+0x1079/0x5450 [ 29.332414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.333114] ? kasan_atomics_helper+0x1079/0x5450 [ 29.333173] kasan_report+0x141/0x180 [ 29.333229] ? kasan_atomics_helper+0x1079/0x5450 [ 29.333294] kasan_check_range+0x10c/0x1c0 [ 29.333352] __kasan_check_write+0x18/0x20 [ 29.333408] kasan_atomics_helper+0x1079/0x5450 [ 29.333499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.333552] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.333606] ? kasan_atomics+0x152/0x310 [ 29.333668] kasan_atomics+0x1dc/0x310 [ 29.333724] ? __pfx_kasan_atomics+0x10/0x10 [ 29.333781] ? __pfx_read_tsc+0x10/0x10 [ 29.333833] ? ktime_get_ts64+0x86/0x230 [ 29.333898] kunit_try_run_case+0x1a5/0x480 [ 29.333959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.334014] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.334078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.334134] ? __kthread_parkme+0x82/0x180 [ 29.334181] ? preempt_count_sub+0x50/0x80 [ 29.334237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.334293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.334351] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.334403] kthread+0x337/0x6f0 [ 29.334450] ? trace_preempt_on+0x20/0xc0 [ 29.334505] ? __pfx_kthread+0x10/0x10 [ 29.334550] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.334602] ? calculate_sigpending+0x7b/0xa0 [ 29.334659] ? __pfx_kthread+0x10/0x10 [ 29.334713] ret_from_fork+0x116/0x1d0 [ 29.334759] ? __pfx_kthread+0x10/0x10 [ 29.334811] ret_from_fork_asm+0x1a/0x30 [ 29.334888] </TASK> [ 29.334918] [ 29.344422] Allocated by task 294: [ 29.344827] kasan_save_stack+0x45/0x70 [ 29.345239] kasan_save_track+0x18/0x40 [ 29.345624] kasan_save_alloc_info+0x3b/0x50 [ 29.346002] __kasan_kmalloc+0xb7/0xc0 [ 29.346337] __kmalloc_cache_noprof+0x189/0x420 [ 29.346590] kasan_atomics+0x95/0x310 [ 29.346793] kunit_try_run_case+0x1a5/0x480 [ 29.347020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.347524] kthread+0x337/0x6f0 [ 29.347827] ret_from_fork+0x116/0x1d0 [ 29.348155] ret_from_fork_asm+0x1a/0x30 [ 29.348510] [ 29.348669] The buggy address belongs to the object at ffff888102338080 [ 29.348669] which belongs to the cache kmalloc-64 of size 64 [ 29.349583] The buggy address is located 0 bytes to the right of [ 29.349583] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.350351] [ 29.350513] The buggy address belongs to the physical page: [ 29.350762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.351105] flags: 0x200000000000000(node=0|zone=2) [ 29.351554] page_type: f5(slab) [ 29.351860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.352477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.353054] page dumped because: kasan: bad access detected [ 29.353613] [ 29.353776] Memory state around the buggy address: [ 29.354039] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.354614] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.355038] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.355641] ^ [ 29.355940] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.356299] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.356833] ================================================================== [ 30.393070] ================================================================== [ 30.393617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 30.394007] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.394300] [ 30.394455] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.394543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.394565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.394604] Call Trace: [ 30.394644] <TASK> [ 30.394678] dump_stack_lvl+0x73/0xb0 [ 30.394731] print_report+0xd1/0x650 [ 30.394767] ? __virt_addr_valid+0x1db/0x2d0 [ 30.394807] ? kasan_atomics_helper+0x4fa5/0x5450 [ 30.394842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.394882] ? kasan_atomics_helper+0x4fa5/0x5450 [ 30.394918] kasan_report+0x141/0x180 [ 30.394954] ? kasan_atomics_helper+0x4fa5/0x5450 [ 30.394996] __asan_report_load8_noabort+0x18/0x20 [ 30.395036] kasan_atomics_helper+0x4fa5/0x5450 [ 30.395072] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.395108] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.395150] ? kasan_atomics+0x152/0x310 [ 30.395198] kasan_atomics+0x1dc/0x310 [ 30.395244] ? __pfx_kasan_atomics+0x10/0x10 [ 30.395292] ? __pfx_read_tsc+0x10/0x10 [ 30.395340] ? ktime_get_ts64+0x86/0x230 [ 30.395399] kunit_try_run_case+0x1a5/0x480 [ 30.395545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.395611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.395662] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.395703] ? __kthread_parkme+0x82/0x180 [ 30.395746] ? preempt_count_sub+0x50/0x80 [ 30.395791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.395833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.395874] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.395921] kthread+0x337/0x6f0 [ 30.395965] ? trace_preempt_on+0x20/0xc0 [ 30.396019] ? __pfx_kthread+0x10/0x10 [ 30.396071] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.396123] ? calculate_sigpending+0x7b/0xa0 [ 30.396223] ? __pfx_kthread+0x10/0x10 [ 30.396279] ret_from_fork+0x116/0x1d0 [ 30.396328] ? __pfx_kthread+0x10/0x10 [ 30.396380] ret_from_fork_asm+0x1a/0x30 [ 30.396463] </TASK> [ 30.396490] [ 30.406105] Allocated by task 294: [ 30.406515] kasan_save_stack+0x45/0x70 [ 30.406862] kasan_save_track+0x18/0x40 [ 30.407069] kasan_save_alloc_info+0x3b/0x50 [ 30.407326] __kasan_kmalloc+0xb7/0xc0 [ 30.407652] __kmalloc_cache_noprof+0x189/0x420 [ 30.408030] kasan_atomics+0x95/0x310 [ 30.408384] kunit_try_run_case+0x1a5/0x480 [ 30.408758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.409221] kthread+0x337/0x6f0 [ 30.409549] ret_from_fork+0x116/0x1d0 [ 30.409741] ret_from_fork_asm+0x1a/0x30 [ 30.410079] [ 30.410284] The buggy address belongs to the object at ffff888102338080 [ 30.410284] which belongs to the cache kmalloc-64 of size 64 [ 30.410890] The buggy address is located 0 bytes to the right of [ 30.410890] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.411684] [ 30.411895] The buggy address belongs to the physical page: [ 30.412306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.414844] flags: 0x200000000000000(node=0|zone=2) [ 30.415716] page_type: f5(slab) [ 30.415896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.416376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.416845] page dumped because: kasan: bad access detected [ 30.417221] [ 30.417384] Memory state around the buggy address: [ 30.417762] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.418199] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.418637] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.419564] ^ [ 30.419843] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.420416] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.420982] ================================================================== [ 30.191972] ================================================================== [ 30.192523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 30.192966] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.193839] [ 30.194131] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.194277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.194310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.194377] Call Trace: [ 30.194425] <TASK> [ 30.194485] dump_stack_lvl+0x73/0xb0 [ 30.194597] print_report+0xd1/0x650 [ 30.194668] ? __virt_addr_valid+0x1db/0x2d0 [ 30.194722] ? kasan_atomics_helper+0x1f43/0x5450 [ 30.194771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.194859] ? kasan_atomics_helper+0x1f43/0x5450 [ 30.194928] kasan_report+0x141/0x180 [ 30.194969] ? kasan_atomics_helper+0x1f43/0x5450 [ 30.194999] kasan_check_range+0x10c/0x1c0 [ 30.195026] __kasan_check_write+0x18/0x20 [ 30.195053] kasan_atomics_helper+0x1f43/0x5450 [ 30.195084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.195127] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.195173] ? kasan_atomics+0x152/0x310 [ 30.195228] kasan_atomics+0x1dc/0x310 [ 30.195308] ? __pfx_kasan_atomics+0x10/0x10 [ 30.195360] ? __pfx_read_tsc+0x10/0x10 [ 30.195427] ? ktime_get_ts64+0x86/0x230 [ 30.195501] kunit_try_run_case+0x1a5/0x480 [ 30.195587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.195653] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.195709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.195758] ? __kthread_parkme+0x82/0x180 [ 30.195786] ? preempt_count_sub+0x50/0x80 [ 30.195814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.195841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.195870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.195898] kthread+0x337/0x6f0 [ 30.195922] ? trace_preempt_on+0x20/0xc0 [ 30.195949] ? __pfx_kthread+0x10/0x10 [ 30.195973] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.195996] ? calculate_sigpending+0x7b/0xa0 [ 30.196024] ? __pfx_kthread+0x10/0x10 [ 30.196049] ret_from_fork+0x116/0x1d0 [ 30.196071] ? __pfx_kthread+0x10/0x10 [ 30.196095] ret_from_fork_asm+0x1a/0x30 [ 30.196129] </TASK> [ 30.196146] [ 30.207088] Allocated by task 294: [ 30.207288] kasan_save_stack+0x45/0x70 [ 30.207489] kasan_save_track+0x18/0x40 [ 30.207703] kasan_save_alloc_info+0x3b/0x50 [ 30.207936] __kasan_kmalloc+0xb7/0xc0 [ 30.208136] __kmalloc_cache_noprof+0x189/0x420 [ 30.208309] kasan_atomics+0x95/0x310 [ 30.208664] kunit_try_run_case+0x1a5/0x480 [ 30.209008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.209485] kthread+0x337/0x6f0 [ 30.209710] ret_from_fork+0x116/0x1d0 [ 30.209880] ret_from_fork_asm+0x1a/0x30 [ 30.210073] [ 30.210198] The buggy address belongs to the object at ffff888102338080 [ 30.210198] which belongs to the cache kmalloc-64 of size 64 [ 30.210973] The buggy address is located 0 bytes to the right of [ 30.210973] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.212049] [ 30.212247] The buggy address belongs to the physical page: [ 30.212484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.212856] flags: 0x200000000000000(node=0|zone=2) [ 30.213125] page_type: f5(slab) [ 30.213532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.214174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.214892] page dumped because: kasan: bad access detected [ 30.215489] [ 30.215677] Memory state around the buggy address: [ 30.216297] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.216779] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.217381] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.217749] ^ [ 30.218410] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.218875] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.219507] ================================================================== [ 29.592005] ================================================================== [ 29.592714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 29.593387] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.593959] [ 29.594221] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.594341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.594373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.594426] Call Trace: [ 29.594482] <TASK> [ 29.594528] dump_stack_lvl+0x73/0xb0 [ 29.594604] print_report+0xd1/0x650 [ 29.594661] ? __virt_addr_valid+0x1db/0x2d0 [ 29.594719] ? kasan_atomics_helper+0x4eae/0x5450 [ 29.594772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.594834] ? kasan_atomics_helper+0x4eae/0x5450 [ 29.594888] kasan_report+0x141/0x180 [ 29.594943] ? kasan_atomics_helper+0x4eae/0x5450 [ 29.595008] __asan_report_load8_noabort+0x18/0x20 [ 29.595067] kasan_atomics_helper+0x4eae/0x5450 [ 29.595109] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.595189] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.595241] ? kasan_atomics+0x152/0x310 [ 29.595296] kasan_atomics+0x1dc/0x310 [ 29.595343] ? __pfx_kasan_atomics+0x10/0x10 [ 29.595399] ? __pfx_read_tsc+0x10/0x10 [ 29.595457] ? ktime_get_ts64+0x86/0x230 [ 29.595546] kunit_try_run_case+0x1a5/0x480 [ 29.595600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.595647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.595691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.595738] ? __kthread_parkme+0x82/0x180 [ 29.595784] ? preempt_count_sub+0x50/0x80 [ 29.595837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.595891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.595944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.596000] kthread+0x337/0x6f0 [ 29.596048] ? trace_preempt_on+0x20/0xc0 [ 29.596096] ? __pfx_kthread+0x10/0x10 [ 29.596181] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.596234] ? calculate_sigpending+0x7b/0xa0 [ 29.596290] ? __pfx_kthread+0x10/0x10 [ 29.596356] ret_from_fork+0x116/0x1d0 [ 29.596402] ? __pfx_kthread+0x10/0x10 [ 29.596457] ret_from_fork_asm+0x1a/0x30 [ 29.596533] </TASK> [ 29.596567] [ 29.606220] Allocated by task 294: [ 29.606593] kasan_save_stack+0x45/0x70 [ 29.606992] kasan_save_track+0x18/0x40 [ 29.607333] kasan_save_alloc_info+0x3b/0x50 [ 29.608411] __kasan_kmalloc+0xb7/0xc0 [ 29.608793] __kmalloc_cache_noprof+0x189/0x420 [ 29.609008] kasan_atomics+0x95/0x310 [ 29.609181] kunit_try_run_case+0x1a5/0x480 [ 29.609350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.609571] kthread+0x337/0x6f0 [ 29.609714] ret_from_fork+0x116/0x1d0 [ 29.609865] ret_from_fork_asm+0x1a/0x30 [ 29.610035] [ 29.610127] The buggy address belongs to the object at ffff888102338080 [ 29.610127] which belongs to the cache kmalloc-64 of size 64 [ 29.610712] The buggy address is located 0 bytes to the right of [ 29.610712] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.612902] [ 29.613136] The buggy address belongs to the physical page: [ 29.613387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.614253] flags: 0x200000000000000(node=0|zone=2) [ 29.614556] page_type: f5(slab) [ 29.614740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.615025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.615344] page dumped because: kasan: bad access detected [ 29.615806] [ 29.615975] Memory state around the buggy address: [ 29.616294] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.616569] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.617101] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.617588] ^ [ 29.617816] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.618376] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.618785] ================================================================== [ 28.914955] ================================================================== [ 28.915421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 28.915774] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.916054] [ 28.916201] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.916310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.916338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.916384] Call Trace: [ 28.916425] <TASK> [ 28.916480] dump_stack_lvl+0x73/0xb0 [ 28.916548] print_report+0xd1/0x650 [ 28.916603] ? __virt_addr_valid+0x1db/0x2d0 [ 28.916662] ? kasan_atomics_helper+0x860/0x5450 [ 28.916714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.916776] ? kasan_atomics_helper+0x860/0x5450 [ 28.916830] kasan_report+0x141/0x180 [ 28.916884] ? kasan_atomics_helper+0x860/0x5450 [ 28.916947] kasan_check_range+0x10c/0x1c0 [ 28.917005] __kasan_check_write+0x18/0x20 [ 28.917063] kasan_atomics_helper+0x860/0x5450 [ 28.917119] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.917168] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.917212] ? kasan_atomics+0x152/0x310 [ 28.917255] kasan_atomics+0x1dc/0x310 [ 28.917292] ? __pfx_kasan_atomics+0x10/0x10 [ 28.917328] ? __pfx_read_tsc+0x10/0x10 [ 28.917360] ? ktime_get_ts64+0x86/0x230 [ 28.917402] kunit_try_run_case+0x1a5/0x480 [ 28.917451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.917487] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.917525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.917561] ? __kthread_parkme+0x82/0x180 [ 28.917595] ? preempt_count_sub+0x50/0x80 [ 28.917637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.917682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.917727] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.917773] kthread+0x337/0x6f0 [ 28.917815] ? trace_preempt_on+0x20/0xc0 [ 28.917865] ? __pfx_kthread+0x10/0x10 [ 28.917911] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.917956] ? calculate_sigpending+0x7b/0xa0 [ 28.918001] ? __pfx_kthread+0x10/0x10 [ 28.918060] ret_from_fork+0x116/0x1d0 [ 28.918106] ? __pfx_kthread+0x10/0x10 [ 28.918153] ret_from_fork_asm+0x1a/0x30 [ 28.918220] </TASK> [ 28.918247] [ 28.927967] Allocated by task 294: [ 28.928234] kasan_save_stack+0x45/0x70 [ 28.928619] kasan_save_track+0x18/0x40 [ 28.928940] kasan_save_alloc_info+0x3b/0x50 [ 28.929337] __kasan_kmalloc+0xb7/0xc0 [ 28.929657] __kmalloc_cache_noprof+0x189/0x420 [ 28.929959] kasan_atomics+0x95/0x310 [ 28.930214] kunit_try_run_case+0x1a5/0x480 [ 28.930416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.930788] kthread+0x337/0x6f0 [ 28.930967] ret_from_fork+0x116/0x1d0 [ 28.931145] ret_from_fork_asm+0x1a/0x30 [ 28.931483] [ 28.931660] The buggy address belongs to the object at ffff888102338080 [ 28.931660] which belongs to the cache kmalloc-64 of size 64 [ 28.932473] The buggy address is located 0 bytes to the right of [ 28.932473] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.932917] [ 28.933034] The buggy address belongs to the physical page: [ 28.933368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.934189] flags: 0x200000000000000(node=0|zone=2) [ 28.934580] page_type: f5(slab) [ 28.934877] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.935186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.935731] page dumped because: kasan: bad access detected [ 28.936018] [ 28.936179] Memory state around the buggy address: [ 28.936386] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.936670] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.936931] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.937190] ^ [ 28.937464] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.938085] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.938616] ================================================================== [ 30.130716] ================================================================== [ 30.131008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 30.131808] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 30.132076] [ 30.132288] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 30.132390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.132408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.132437] Call Trace: [ 30.132484] <TASK> [ 30.132525] dump_stack_lvl+0x73/0xb0 [ 30.132590] print_report+0xd1/0x650 [ 30.132641] ? __virt_addr_valid+0x1db/0x2d0 [ 30.132699] ? kasan_atomics_helper+0x1e12/0x5450 [ 30.132746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.132786] ? kasan_atomics_helper+0x1e12/0x5450 [ 30.132811] kasan_report+0x141/0x180 [ 30.132836] ? kasan_atomics_helper+0x1e12/0x5450 [ 30.132864] kasan_check_range+0x10c/0x1c0 [ 30.132892] __kasan_check_write+0x18/0x20 [ 30.132918] kasan_atomics_helper+0x1e12/0x5450 [ 30.132944] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.132969] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.132998] ? kasan_atomics+0x152/0x310 [ 30.133027] kasan_atomics+0x1dc/0x310 [ 30.133052] ? __pfx_kasan_atomics+0x10/0x10 [ 30.133079] ? __pfx_read_tsc+0x10/0x10 [ 30.133103] ? ktime_get_ts64+0x86/0x230 [ 30.133134] kunit_try_run_case+0x1a5/0x480 [ 30.133177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.133261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.133309] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.133355] ? __kthread_parkme+0x82/0x180 [ 30.133403] ? preempt_count_sub+0x50/0x80 [ 30.133471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.133528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.133588] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.133645] kthread+0x337/0x6f0 [ 30.133695] ? trace_preempt_on+0x20/0xc0 [ 30.133749] ? __pfx_kthread+0x10/0x10 [ 30.133801] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.133853] ? calculate_sigpending+0x7b/0xa0 [ 30.133910] ? __pfx_kthread+0x10/0x10 [ 30.133962] ret_from_fork+0x116/0x1d0 [ 30.134010] ? __pfx_kthread+0x10/0x10 [ 30.134070] ret_from_fork_asm+0x1a/0x30 [ 30.134146] </TASK> [ 30.134177] [ 30.144525] Allocated by task 294: [ 30.144909] kasan_save_stack+0x45/0x70 [ 30.145335] kasan_save_track+0x18/0x40 [ 30.145658] kasan_save_alloc_info+0x3b/0x50 [ 30.145861] __kasan_kmalloc+0xb7/0xc0 [ 30.146209] __kmalloc_cache_noprof+0x189/0x420 [ 30.146626] kasan_atomics+0x95/0x310 [ 30.146927] kunit_try_run_case+0x1a5/0x480 [ 30.147375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.147648] kthread+0x337/0x6f0 [ 30.147956] ret_from_fork+0x116/0x1d0 [ 30.148270] ret_from_fork_asm+0x1a/0x30 [ 30.148625] [ 30.148789] The buggy address belongs to the object at ffff888102338080 [ 30.148789] which belongs to the cache kmalloc-64 of size 64 [ 30.150627] The buggy address is located 0 bytes to the right of [ 30.150627] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 30.151778] [ 30.152118] The buggy address belongs to the physical page: [ 30.152948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 30.153662] flags: 0x200000000000000(node=0|zone=2) [ 30.154078] page_type: f5(slab) [ 30.154346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.154940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.155484] page dumped because: kasan: bad access detected [ 30.155961] [ 30.156063] Memory state around the buggy address: [ 30.156900] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.157313] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.157947] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.158637] ^ [ 30.158864] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.159668] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.160079] ================================================================== [ 28.939939] ================================================================== [ 28.940407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 28.940751] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.941180] [ 28.941386] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.941514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.941544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.941590] Call Trace: [ 28.941655] <TASK> [ 28.941695] dump_stack_lvl+0x73/0xb0 [ 28.941761] print_report+0xd1/0x650 [ 28.941830] ? __virt_addr_valid+0x1db/0x2d0 [ 28.941884] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.941930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.941991] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.942052] kasan_report+0x141/0x180 [ 28.942110] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.942173] kasan_check_range+0x10c/0x1c0 [ 28.942232] __kasan_check_write+0x18/0x20 [ 28.942289] kasan_atomics_helper+0x8f9/0x5450 [ 28.942345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.942399] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.942471] ? kasan_atomics+0x152/0x310 [ 28.942538] kasan_atomics+0x1dc/0x310 [ 28.942595] ? __pfx_kasan_atomics+0x10/0x10 [ 28.942654] ? __pfx_read_tsc+0x10/0x10 [ 28.942707] ? ktime_get_ts64+0x86/0x230 [ 28.942773] kunit_try_run_case+0x1a5/0x480 [ 28.942835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.942890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.942944] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.943001] ? __kthread_parkme+0x82/0x180 [ 28.943053] ? preempt_count_sub+0x50/0x80 [ 28.943109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.943169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.943226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.943278] kthread+0x337/0x6f0 [ 28.943326] ? trace_preempt_on+0x20/0xc0 [ 28.943382] ? __pfx_kthread+0x10/0x10 [ 28.943435] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.943487] ? calculate_sigpending+0x7b/0xa0 [ 28.943536] ? __pfx_kthread+0x10/0x10 [ 28.943582] ret_from_fork+0x116/0x1d0 [ 28.943623] ? __pfx_kthread+0x10/0x10 [ 28.943703] ret_from_fork_asm+0x1a/0x30 [ 28.943773] </TASK> [ 28.943805] [ 28.959256] Allocated by task 294: [ 28.959668] kasan_save_stack+0x45/0x70 [ 28.960112] kasan_save_track+0x18/0x40 [ 28.960482] kasan_save_alloc_info+0x3b/0x50 [ 28.960837] __kasan_kmalloc+0xb7/0xc0 [ 28.961123] __kmalloc_cache_noprof+0x189/0x420 [ 28.961490] kasan_atomics+0x95/0x310 [ 28.961773] kunit_try_run_case+0x1a5/0x480 [ 28.962115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.962516] kthread+0x337/0x6f0 [ 28.962725] ret_from_fork+0x116/0x1d0 [ 28.963137] ret_from_fork_asm+0x1a/0x30 [ 28.963484] [ 28.963668] The buggy address belongs to the object at ffff888102338080 [ 28.963668] which belongs to the cache kmalloc-64 of size 64 [ 28.964536] The buggy address is located 0 bytes to the right of [ 28.964536] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.965162] [ 28.965382] The buggy address belongs to the physical page: [ 28.965967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.966719] flags: 0x200000000000000(node=0|zone=2) [ 28.967035] page_type: f5(slab) [ 28.967419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.967862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.968513] page dumped because: kasan: bad access detected [ 28.968823] [ 28.968973] Memory state around the buggy address: [ 28.969456] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.969868] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.970329] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.970838] ^ [ 28.971304] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.971585] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.972125] ================================================================== [ 29.564729] ================================================================== [ 29.565367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 29.565727] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.566253] [ 29.566434] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.567934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.567972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.568020] Call Trace: [ 29.568069] <TASK> [ 29.568113] dump_stack_lvl+0x73/0xb0 [ 29.568228] print_report+0xd1/0x650 [ 29.568282] ? __virt_addr_valid+0x1db/0x2d0 [ 29.568339] ? kasan_atomics_helper+0x13b5/0x5450 [ 29.568391] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.568464] ? kasan_atomics_helper+0x13b5/0x5450 [ 29.568519] kasan_report+0x141/0x180 [ 29.568574] ? kasan_atomics_helper+0x13b5/0x5450 [ 29.568638] kasan_check_range+0x10c/0x1c0 [ 29.568694] __kasan_check_read+0x15/0x20 [ 29.568750] kasan_atomics_helper+0x13b5/0x5450 [ 29.568802] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.568854] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.568913] ? kasan_atomics+0x152/0x310 [ 29.568974] kasan_atomics+0x1dc/0x310 [ 29.569031] ? __pfx_kasan_atomics+0x10/0x10 [ 29.569088] ? __pfx_read_tsc+0x10/0x10 [ 29.569138] ? ktime_get_ts64+0x86/0x230 [ 29.569235] kunit_try_run_case+0x1a5/0x480 [ 29.569298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.569351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.569408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.569501] ? __kthread_parkme+0x82/0x180 [ 29.569555] ? preempt_count_sub+0x50/0x80 [ 29.569612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.569671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.569726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.569767] kthread+0x337/0x6f0 [ 29.569792] ? trace_preempt_on+0x20/0xc0 [ 29.569820] ? __pfx_kthread+0x10/0x10 [ 29.569844] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.569869] ? calculate_sigpending+0x7b/0xa0 [ 29.569897] ? __pfx_kthread+0x10/0x10 [ 29.569921] ret_from_fork+0x116/0x1d0 [ 29.569944] ? __pfx_kthread+0x10/0x10 [ 29.569968] ret_from_fork_asm+0x1a/0x30 [ 29.570004] </TASK> [ 29.570019] [ 29.579456] Allocated by task 294: [ 29.579698] kasan_save_stack+0x45/0x70 [ 29.580125] kasan_save_track+0x18/0x40 [ 29.580500] kasan_save_alloc_info+0x3b/0x50 [ 29.580866] __kasan_kmalloc+0xb7/0xc0 [ 29.581218] __kmalloc_cache_noprof+0x189/0x420 [ 29.581596] kasan_atomics+0x95/0x310 [ 29.581917] kunit_try_run_case+0x1a5/0x480 [ 29.582171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.582404] kthread+0x337/0x6f0 [ 29.582708] ret_from_fork+0x116/0x1d0 [ 29.583052] ret_from_fork_asm+0x1a/0x30 [ 29.583451] [ 29.583629] The buggy address belongs to the object at ffff888102338080 [ 29.583629] which belongs to the cache kmalloc-64 of size 64 [ 29.584107] The buggy address is located 0 bytes to the right of [ 29.584107] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.584572] [ 29.584688] The buggy address belongs to the physical page: [ 29.585000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.585661] flags: 0x200000000000000(node=0|zone=2) [ 29.586066] page_type: f5(slab) [ 29.586407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.587005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.587588] page dumped because: kasan: bad access detected [ 29.587882] [ 29.587988] Memory state around the buggy address: [ 29.588229] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.588559] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.589088] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.589653] ^ [ 29.590059] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.590430] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.590699] ================================================================== [ 29.891305] ================================================================== [ 29.892173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 29.893349] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.894213] [ 29.894462] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.894770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.894793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.894823] Call Trace: [ 29.894849] <TASK> [ 29.894876] dump_stack_lvl+0x73/0xb0 [ 29.894922] print_report+0xd1/0x650 [ 29.894950] ? __virt_addr_valid+0x1db/0x2d0 [ 29.894978] ? kasan_atomics_helper+0x194a/0x5450 [ 29.895002] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.895033] ? kasan_atomics_helper+0x194a/0x5450 [ 29.895057] kasan_report+0x141/0x180 [ 29.895081] ? kasan_atomics_helper+0x194a/0x5450 [ 29.895110] kasan_check_range+0x10c/0x1c0 [ 29.895136] __kasan_check_write+0x18/0x20 [ 29.895195] kasan_atomics_helper+0x194a/0x5450 [ 29.895222] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.895248] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.895276] ? kasan_atomics+0x152/0x310 [ 29.895304] kasan_atomics+0x1dc/0x310 [ 29.895330] ? __pfx_kasan_atomics+0x10/0x10 [ 29.895357] ? __pfx_read_tsc+0x10/0x10 [ 29.895381] ? ktime_get_ts64+0x86/0x230 [ 29.895412] kunit_try_run_case+0x1a5/0x480 [ 29.895460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.895489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.895517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.895544] ? __kthread_parkme+0x82/0x180 [ 29.895568] ? preempt_count_sub+0x50/0x80 [ 29.895596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.895622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.895650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.895676] kthread+0x337/0x6f0 [ 29.895699] ? trace_preempt_on+0x20/0xc0 [ 29.895726] ? __pfx_kthread+0x10/0x10 [ 29.895749] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.895774] ? calculate_sigpending+0x7b/0xa0 [ 29.895803] ? __pfx_kthread+0x10/0x10 [ 29.895828] ret_from_fork+0x116/0x1d0 [ 29.895850] ? __pfx_kthread+0x10/0x10 [ 29.895873] ret_from_fork_asm+0x1a/0x30 [ 29.895908] </TASK> [ 29.895924] [ 29.906411] Allocated by task 294: [ 29.906799] kasan_save_stack+0x45/0x70 [ 29.907331] kasan_save_track+0x18/0x40 [ 29.907717] kasan_save_alloc_info+0x3b/0x50 [ 29.908131] __kasan_kmalloc+0xb7/0xc0 [ 29.908535] __kmalloc_cache_noprof+0x189/0x420 [ 29.908888] kasan_atomics+0x95/0x310 [ 29.909243] kunit_try_run_case+0x1a5/0x480 [ 29.909499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.909952] kthread+0x337/0x6f0 [ 29.910286] ret_from_fork+0x116/0x1d0 [ 29.910626] ret_from_fork_asm+0x1a/0x30 [ 29.910944] [ 29.911127] The buggy address belongs to the object at ffff888102338080 [ 29.911127] which belongs to the cache kmalloc-64 of size 64 [ 29.911928] The buggy address is located 0 bytes to the right of [ 29.911928] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.912758] [ 29.912954] The buggy address belongs to the physical page: [ 29.913402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.913890] flags: 0x200000000000000(node=0|zone=2) [ 29.914135] page_type: f5(slab) [ 29.914348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.914881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.915488] page dumped because: kasan: bad access detected [ 29.915983] [ 29.916195] Memory state around the buggy address: [ 29.916476] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.916745] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.917006] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.917295] ^ [ 29.917506] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.918094] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.918666] ================================================================== [ 29.861199] ================================================================== [ 29.861698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 29.862327] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.862714] [ 29.863010] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.863199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.863230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.863281] Call Trace: [ 29.863322] <TASK> [ 29.863362] dump_stack_lvl+0x73/0xb0 [ 29.863434] print_report+0xd1/0x650 [ 29.863547] ? __virt_addr_valid+0x1db/0x2d0 [ 29.863654] ? kasan_atomics_helper+0x18b1/0x5450 [ 29.863781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.863854] ? kasan_atomics_helper+0x18b1/0x5450 [ 29.863943] kasan_report+0x141/0x180 [ 29.864041] ? kasan_atomics_helper+0x18b1/0x5450 [ 29.864112] kasan_check_range+0x10c/0x1c0 [ 29.864196] __kasan_check_write+0x18/0x20 [ 29.864240] kasan_atomics_helper+0x18b1/0x5450 [ 29.864292] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.864343] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.864403] ? kasan_atomics+0x152/0x310 [ 29.864475] kasan_atomics+0x1dc/0x310 [ 29.864532] ? __pfx_kasan_atomics+0x10/0x10 [ 29.864592] ? __pfx_read_tsc+0x10/0x10 [ 29.864644] ? ktime_get_ts64+0x86/0x230 [ 29.864710] kunit_try_run_case+0x1a5/0x480 [ 29.864774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.864828] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.864882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.864938] ? __kthread_parkme+0x82/0x180 [ 29.864990] ? preempt_count_sub+0x50/0x80 [ 29.865048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.865105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.865191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.865252] kthread+0x337/0x6f0 [ 29.865302] ? trace_preempt_on+0x20/0xc0 [ 29.865358] ? __pfx_kthread+0x10/0x10 [ 29.865403] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.865431] ? calculate_sigpending+0x7b/0xa0 [ 29.865485] ? __pfx_kthread+0x10/0x10 [ 29.865511] ret_from_fork+0x116/0x1d0 [ 29.865534] ? __pfx_kthread+0x10/0x10 [ 29.865558] ret_from_fork_asm+0x1a/0x30 [ 29.865593] </TASK> [ 29.865609] [ 29.877244] Allocated by task 294: [ 29.877736] kasan_save_stack+0x45/0x70 [ 29.878172] kasan_save_track+0x18/0x40 [ 29.878517] kasan_save_alloc_info+0x3b/0x50 [ 29.878957] __kasan_kmalloc+0xb7/0xc0 [ 29.879331] __kmalloc_cache_noprof+0x189/0x420 [ 29.879563] kasan_atomics+0x95/0x310 [ 29.879746] kunit_try_run_case+0x1a5/0x480 [ 29.879927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.880390] kthread+0x337/0x6f0 [ 29.880937] ret_from_fork+0x116/0x1d0 [ 29.881406] ret_from_fork_asm+0x1a/0x30 [ 29.881792] [ 29.881969] The buggy address belongs to the object at ffff888102338080 [ 29.881969] which belongs to the cache kmalloc-64 of size 64 [ 29.882956] The buggy address is located 0 bytes to the right of [ 29.882956] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.883662] [ 29.883792] The buggy address belongs to the physical page: [ 29.884014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.884342] flags: 0x200000000000000(node=0|zone=2) [ 29.884739] page_type: f5(slab) [ 29.885221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.885913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.886560] page dumped because: kasan: bad access detected [ 29.886990] [ 29.887309] Memory state around the buggy address: [ 29.887711] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.888127] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.888601] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.888862] ^ [ 29.889246] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.889789] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.890264] ================================================================== [ 29.036859] ================================================================== [ 29.037262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 29.038152] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 29.038715] [ 29.038949] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 29.039129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.039181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.039232] Call Trace: [ 29.039276] <TASK> [ 29.039322] dump_stack_lvl+0x73/0xb0 [ 29.039403] print_report+0xd1/0x650 [ 29.039472] ? __virt_addr_valid+0x1db/0x2d0 [ 29.039529] ? kasan_atomics_helper+0xac7/0x5450 [ 29.039579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.039639] ? kasan_atomics_helper+0xac7/0x5450 [ 29.039694] kasan_report+0x141/0x180 [ 29.039741] ? kasan_atomics_helper+0xac7/0x5450 [ 29.039793] kasan_check_range+0x10c/0x1c0 [ 29.039821] __kasan_check_write+0x18/0x20 [ 29.039849] kasan_atomics_helper+0xac7/0x5450 [ 29.039875] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.039900] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.039929] ? kasan_atomics+0x152/0x310 [ 29.039959] kasan_atomics+0x1dc/0x310 [ 29.039985] ? __pfx_kasan_atomics+0x10/0x10 [ 29.040013] ? __pfx_read_tsc+0x10/0x10 [ 29.040037] ? ktime_get_ts64+0x86/0x230 [ 29.040068] kunit_try_run_case+0x1a5/0x480 [ 29.040098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.040124] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.040157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.040199] ? __kthread_parkme+0x82/0x180 [ 29.040226] ? preempt_count_sub+0x50/0x80 [ 29.040255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.040282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.040309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.040336] kthread+0x337/0x6f0 [ 29.040359] ? trace_preempt_on+0x20/0xc0 [ 29.040386] ? __pfx_kthread+0x10/0x10 [ 29.040410] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.040434] ? calculate_sigpending+0x7b/0xa0 [ 29.040486] ? __pfx_kthread+0x10/0x10 [ 29.040512] ret_from_fork+0x116/0x1d0 [ 29.040535] ? __pfx_kthread+0x10/0x10 [ 29.040559] ret_from_fork_asm+0x1a/0x30 [ 29.040594] </TASK> [ 29.040610] [ 29.052602] Allocated by task 294: [ 29.052912] kasan_save_stack+0x45/0x70 [ 29.053191] kasan_save_track+0x18/0x40 [ 29.053398] kasan_save_alloc_info+0x3b/0x50 [ 29.054411] __kasan_kmalloc+0xb7/0xc0 [ 29.054619] __kmalloc_cache_noprof+0x189/0x420 [ 29.055191] kasan_atomics+0x95/0x310 [ 29.055396] kunit_try_run_case+0x1a5/0x480 [ 29.055884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.056295] kthread+0x337/0x6f0 [ 29.056606] ret_from_fork+0x116/0x1d0 [ 29.056915] ret_from_fork_asm+0x1a/0x30 [ 29.057335] [ 29.057521] The buggy address belongs to the object at ffff888102338080 [ 29.057521] which belongs to the cache kmalloc-64 of size 64 [ 29.058199] The buggy address is located 0 bytes to the right of [ 29.058199] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 29.058816] [ 29.058986] The buggy address belongs to the physical page: [ 29.059324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 29.060024] flags: 0x200000000000000(node=0|zone=2) [ 29.060295] page_type: f5(slab) [ 29.060597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.061145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.061641] page dumped because: kasan: bad access detected [ 29.061941] [ 29.062088] Memory state around the buggy address: [ 29.062467] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.062742] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.063295] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.063816] ^ [ 29.064026] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.064396] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.064676] ================================================================== [ 28.744322] ================================================================== [ 28.745803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 28.746320] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294 [ 28.746820] [ 28.747064] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.747208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.747244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.747294] Call Trace: [ 28.747378] <TASK> [ 28.747449] dump_stack_lvl+0x73/0xb0 [ 28.747530] print_report+0xd1/0x650 [ 28.747587] ? __virt_addr_valid+0x1db/0x2d0 [ 28.747843] ? kasan_atomics_helper+0x4b3a/0x5450 [ 28.747892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.747938] ? kasan_atomics_helper+0x4b3a/0x5450 [ 28.747975] kasan_report+0x141/0x180 [ 28.748013] ? kasan_atomics_helper+0x4b3a/0x5450 [ 28.748055] __asan_report_store4_noabort+0x1b/0x30 [ 28.748096] kasan_atomics_helper+0x4b3a/0x5450 [ 28.748132] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.748172] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.748213] ? kasan_atomics+0x152/0x310 [ 28.748260] kasan_atomics+0x1dc/0x310 [ 28.748296] ? __pfx_kasan_atomics+0x10/0x10 [ 28.748333] ? __pfx_read_tsc+0x10/0x10 [ 28.748367] ? ktime_get_ts64+0x86/0x230 [ 28.748414] kunit_try_run_case+0x1a5/0x480 [ 28.748469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.748512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.748556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.748599] ? __kthread_parkme+0x82/0x180 [ 28.748641] ? preempt_count_sub+0x50/0x80 [ 28.748687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.748716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.748744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.748771] kthread+0x337/0x6f0 [ 28.748794] ? trace_preempt_on+0x20/0xc0 [ 28.748821] ? __pfx_kthread+0x10/0x10 [ 28.748845] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.748869] ? calculate_sigpending+0x7b/0xa0 [ 28.748897] ? __pfx_kthread+0x10/0x10 [ 28.748921] ret_from_fork+0x116/0x1d0 [ 28.748943] ? __pfx_kthread+0x10/0x10 [ 28.748966] ret_from_fork_asm+0x1a/0x30 [ 28.749001] </TASK> [ 28.749016] [ 28.759634] Allocated by task 294: [ 28.760084] kasan_save_stack+0x45/0x70 [ 28.760515] kasan_save_track+0x18/0x40 [ 28.760809] kasan_save_alloc_info+0x3b/0x50 [ 28.761024] __kasan_kmalloc+0xb7/0xc0 [ 28.761529] __kmalloc_cache_noprof+0x189/0x420 [ 28.761973] kasan_atomics+0x95/0x310 [ 28.762348] kunit_try_run_case+0x1a5/0x480 [ 28.762660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.763125] kthread+0x337/0x6f0 [ 28.763469] ret_from_fork+0x116/0x1d0 [ 28.763665] ret_from_fork_asm+0x1a/0x30 [ 28.763998] [ 28.764292] The buggy address belongs to the object at ffff888102338080 [ 28.764292] which belongs to the cache kmalloc-64 of size 64 [ 28.765079] The buggy address is located 0 bytes to the right of [ 28.765079] allocated 48-byte region [ffff888102338080, ffff8881023380b0) [ 28.765972] [ 28.766127] The buggy address belongs to the physical page: [ 28.766640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338 [ 28.767215] flags: 0x200000000000000(node=0|zone=2) [ 28.767509] page_type: f5(slab) [ 28.767830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.768430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.768989] page dumped because: kasan: bad access detected [ 28.769463] [ 28.769634] Memory state around the buggy address: [ 28.770072] ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.770618] ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.771110] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.771739] ^ [ 28.772099] ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.772436] ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.772711] ==================================================================