Date
June 23, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 36.904212] ================================================================== [ 36.904311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.904429] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.904558] [ 36.904759] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.904957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.905045] Hardware name: linux,dummy-virt (DT) [ 36.905122] Call trace: [ 36.905180] show_stack+0x20/0x38 (C) [ 36.905307] dump_stack_lvl+0x8c/0xd0 [ 36.905648] print_report+0x118/0x608 [ 36.906018] kasan_report+0xdc/0x128 [ 36.906168] __asan_report_load8_noabort+0x20/0x30 [ 36.906460] kasan_atomics_helper+0x3f04/0x4858 [ 36.906616] kasan_atomics+0x198/0x2e0 [ 36.906842] kunit_try_run_case+0x170/0x3f0 [ 36.907023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.907303] kthread+0x328/0x630 [ 36.907514] ret_from_fork+0x10/0x20 [ 36.907842] [ 36.907914] Allocated by task 277: [ 36.907992] kasan_save_stack+0x3c/0x68 [ 36.908202] kasan_save_track+0x20/0x40 [ 36.908350] kasan_save_alloc_info+0x40/0x58 [ 36.908460] __kasan_kmalloc+0xd4/0xd8 [ 36.908611] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.908679] kasan_atomics+0xb8/0x2e0 [ 36.908728] kunit_try_run_case+0x170/0x3f0 [ 36.908777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.908834] kthread+0x328/0x630 [ 36.908876] ret_from_fork+0x10/0x20 [ 36.908922] [ 36.908947] The buggy address belongs to the object at fff00000c7805380 [ 36.908947] which belongs to the cache kmalloc-64 of size 64 [ 36.909020] The buggy address is located 0 bytes to the right of [ 36.909020] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.909127] [ 36.909153] The buggy address belongs to the physical page: [ 36.909193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.909256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.909314] page_type: f5(slab) [ 36.909361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.909424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.909475] page dumped because: kasan: bad access detected [ 36.909514] [ 36.909537] Memory state around the buggy address: [ 36.909576] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.909630] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.909683] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.909729] ^ [ 36.909772] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.909827] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.909876] ================================================================== [ 37.013113] ================================================================== [ 37.013221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 37.013356] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.013493] [ 37.013574] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.014399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.014477] Hardware name: linux,dummy-virt (DT) [ 37.014556] Call trace: [ 37.014628] show_stack+0x20/0x38 (C) [ 37.014750] dump_stack_lvl+0x8c/0xd0 [ 37.014925] print_report+0x118/0x608 [ 37.015060] kasan_report+0xdc/0x128 [ 37.015199] __asan_report_load8_noabort+0x20/0x30 [ 37.015348] kasan_atomics_helper+0x3df4/0x4858 [ 37.015494] kasan_atomics+0x198/0x2e0 [ 37.015603] kunit_try_run_case+0x170/0x3f0 [ 37.015736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.015885] kthread+0x328/0x630 [ 37.016048] ret_from_fork+0x10/0x20 [ 37.016177] [ 37.016299] Allocated by task 277: [ 37.016504] kasan_save_stack+0x3c/0x68 [ 37.016644] kasan_save_track+0x20/0x40 [ 37.016817] kasan_save_alloc_info+0x40/0x58 [ 37.016921] __kasan_kmalloc+0xd4/0xd8 [ 37.017020] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.017165] kasan_atomics+0xb8/0x2e0 [ 37.017282] kunit_try_run_case+0x170/0x3f0 [ 37.017396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.017503] kthread+0x328/0x630 [ 37.017609] ret_from_fork+0x10/0x20 [ 37.017727] [ 37.017792] The buggy address belongs to the object at fff00000c7805380 [ 37.017792] which belongs to the cache kmalloc-64 of size 64 [ 37.017944] The buggy address is located 0 bytes to the right of [ 37.017944] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.018135] [ 37.018184] The buggy address belongs to the physical page: [ 37.018258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.018514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.018625] page_type: f5(slab) [ 37.018738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.019126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.019234] page dumped because: kasan: bad access detected [ 37.019368] [ 37.019420] Memory state around the buggy address: [ 37.019497] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.019615] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.019722] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.019813] ^ [ 37.019978] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.020433] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.020543] ================================================================== [ 36.503305] ================================================================== [ 36.503570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 36.503745] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.504006] [ 36.504154] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.504368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.504527] Hardware name: linux,dummy-virt (DT) [ 36.504645] Call trace: [ 36.504798] show_stack+0x20/0x38 (C) [ 36.505112] dump_stack_lvl+0x8c/0xd0 [ 36.505262] print_report+0x118/0x608 [ 36.505384] kasan_report+0xdc/0x128 [ 36.506196] kasan_check_range+0x100/0x1a8 [ 36.508923] __kasan_check_write+0x20/0x30 [ 36.509135] kasan_atomics_helper+0x99c/0x4858 [ 36.509654] kasan_atomics+0x198/0x2e0 [ 36.509867] kunit_try_run_case+0x170/0x3f0 [ 36.510101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.510254] kthread+0x328/0x630 [ 36.510367] ret_from_fork+0x10/0x20 [ 36.510492] [ 36.510543] Allocated by task 277: [ 36.510624] kasan_save_stack+0x3c/0x68 [ 36.510725] kasan_save_track+0x20/0x40 [ 36.510857] kasan_save_alloc_info+0x40/0x58 [ 36.510978] __kasan_kmalloc+0xd4/0xd8 [ 36.511190] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.511386] kasan_atomics+0xb8/0x2e0 [ 36.511662] kunit_try_run_case+0x170/0x3f0 [ 36.511842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.511965] kthread+0x328/0x630 [ 36.512085] ret_from_fork+0x10/0x20 [ 36.512242] [ 36.512334] The buggy address belongs to the object at fff00000c7805380 [ 36.512334] which belongs to the cache kmalloc-64 of size 64 [ 36.512475] The buggy address is located 0 bytes to the right of [ 36.512475] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.512698] [ 36.512836] The buggy address belongs to the physical page: [ 36.512925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.513114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.513442] page_type: f5(slab) [ 36.513584] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.514272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.514377] page dumped because: kasan: bad access detected [ 36.514476] [ 36.514547] Memory state around the buggy address: [ 36.514657] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.514782] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.514895] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.515054] ^ [ 36.515163] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.515284] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.515390] ================================================================== [ 36.843660] ================================================================== [ 36.843771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.844138] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.844574] [ 36.844672] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.845463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.845544] Hardware name: linux,dummy-virt (DT) [ 36.845796] Call trace: [ 36.845893] show_stack+0x20/0x38 (C) [ 36.846081] dump_stack_lvl+0x8c/0xd0 [ 36.846375] print_report+0x118/0x608 [ 36.846521] kasan_report+0xdc/0x128 [ 36.846940] kasan_check_range+0x100/0x1a8 [ 36.847159] __kasan_check_write+0x20/0x30 [ 36.847486] kasan_atomics_helper+0x11f8/0x4858 [ 36.847685] kasan_atomics+0x198/0x2e0 [ 36.848143] kunit_try_run_case+0x170/0x3f0 [ 36.849194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.849498] kthread+0x328/0x630 [ 36.849778] ret_from_fork+0x10/0x20 [ 36.850048] [ 36.850120] Allocated by task 277: [ 36.850482] kasan_save_stack+0x3c/0x68 [ 36.850796] kasan_save_track+0x20/0x40 [ 36.851178] kasan_save_alloc_info+0x40/0x58 [ 36.851632] __kasan_kmalloc+0xd4/0xd8 [ 36.851781] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.852180] kasan_atomics+0xb8/0x2e0 [ 36.852333] kunit_try_run_case+0x170/0x3f0 [ 36.852438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.852729] kthread+0x328/0x630 [ 36.852900] ret_from_fork+0x10/0x20 [ 36.853377] [ 36.853436] The buggy address belongs to the object at fff00000c7805380 [ 36.853436] which belongs to the cache kmalloc-64 of size 64 [ 36.853648] The buggy address is located 0 bytes to the right of [ 36.853648] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.854386] [ 36.854462] The buggy address belongs to the physical page: [ 36.854601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.854963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.855295] page_type: f5(slab) [ 36.855415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.855813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.855949] page dumped because: kasan: bad access detected [ 36.856127] [ 36.856358] Memory state around the buggy address: [ 36.856469] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.856611] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.856992] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.857106] ^ [ 36.857626] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.857938] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.858229] ================================================================== [ 36.632630] ================================================================== [ 36.632737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 36.632860] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.632980] [ 36.634514] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.635763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.635846] Hardware name: linux,dummy-virt (DT) [ 36.636058] Call trace: [ 36.636122] show_stack+0x20/0x38 (C) [ 36.636916] dump_stack_lvl+0x8c/0xd0 [ 36.637496] print_report+0x118/0x608 [ 36.638198] kasan_report+0xdc/0x128 [ 36.638359] __asan_report_load4_noabort+0x20/0x30 [ 36.639087] kasan_atomics_helper+0x3dd8/0x4858 [ 36.639232] kasan_atomics+0x198/0x2e0 [ 36.639370] kunit_try_run_case+0x170/0x3f0 [ 36.639522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.640154] kthread+0x328/0x630 [ 36.640343] ret_from_fork+0x10/0x20 [ 36.640710] [ 36.640820] Allocated by task 277: [ 36.640903] kasan_save_stack+0x3c/0x68 [ 36.641010] kasan_save_track+0x20/0x40 [ 36.641596] kasan_save_alloc_info+0x40/0x58 [ 36.641790] __kasan_kmalloc+0xd4/0xd8 [ 36.641994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.642125] kasan_atomics+0xb8/0x2e0 [ 36.642233] kunit_try_run_case+0x170/0x3f0 [ 36.642603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.643411] kthread+0x328/0x630 [ 36.643604] ret_from_fork+0x10/0x20 [ 36.643856] [ 36.643973] The buggy address belongs to the object at fff00000c7805380 [ 36.643973] which belongs to the cache kmalloc-64 of size 64 [ 36.644144] The buggy address is located 0 bytes to the right of [ 36.644144] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.644514] [ 36.644590] The buggy address belongs to the physical page: [ 36.644891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.645227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.645508] page_type: f5(slab) [ 36.645736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.646003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.646134] page dumped because: kasan: bad access detected [ 36.646287] [ 36.646335] Memory state around the buggy address: [ 36.646414] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.646572] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.647202] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.647324] ^ [ 36.647509] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.647648] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.647844] ================================================================== [ 36.756664] ================================================================== [ 36.756773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 36.757102] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.757444] [ 36.757555] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.757766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.757954] Hardware name: linux,dummy-virt (DT) [ 36.758616] Call trace: [ 36.758736] show_stack+0x20/0x38 (C) [ 36.758922] dump_stack_lvl+0x8c/0xd0 [ 36.759064] print_report+0x118/0x608 [ 36.759220] kasan_report+0xdc/0x128 [ 36.759579] kasan_check_range+0x100/0x1a8 [ 36.759826] __kasan_check_write+0x20/0x30 [ 36.759992] kasan_atomics_helper+0xf20/0x4858 [ 36.760213] kasan_atomics+0x198/0x2e0 [ 36.760561] kunit_try_run_case+0x170/0x3f0 [ 36.760686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.760818] kthread+0x328/0x630 [ 36.760926] ret_from_fork+0x10/0x20 [ 36.761068] [ 36.761116] Allocated by task 277: [ 36.761199] kasan_save_stack+0x3c/0x68 [ 36.761357] kasan_save_track+0x20/0x40 [ 36.761473] kasan_save_alloc_info+0x40/0x58 [ 36.762242] __kasan_kmalloc+0xd4/0xd8 [ 36.762523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.762855] kasan_atomics+0xb8/0x2e0 [ 36.763114] kunit_try_run_case+0x170/0x3f0 [ 36.764169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.764460] kthread+0x328/0x630 [ 36.764754] ret_from_fork+0x10/0x20 [ 36.764847] [ 36.764960] The buggy address belongs to the object at fff00000c7805380 [ 36.764960] which belongs to the cache kmalloc-64 of size 64 [ 36.765208] The buggy address is located 0 bytes to the right of [ 36.765208] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.765508] [ 36.765563] The buggy address belongs to the physical page: [ 36.765673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.766016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.766515] page_type: f5(slab) [ 36.767821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.767954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.768086] page dumped because: kasan: bad access detected [ 36.768399] [ 36.770393] Memory state around the buggy address: [ 36.770503] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.770642] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.770762] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.770813] ^ [ 36.770860] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.770915] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.770960] ================================================================== [ 36.516863] ================================================================== [ 36.516966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 36.517105] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.518853] kasan_atomics_helper+0xa04/0x4858 [ 36.521392] kthread+0x328/0x630 [ 36.522280] [ 36.522376] The buggy address belongs to the physical page: [ 36.522507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.522680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.522832] page_type: f5(slab) [ 36.522939] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.523267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.523410] page dumped because: kasan: bad access detected [ 36.523492] [ 36.523549] Memory state around the buggy address: [ 36.523673] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.523803] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.523976] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.524121] ^ [ 36.524221] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.524415] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.524704] ================================================================== [ 36.832338] ================================================================== [ 36.832441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.832570] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.832804] [ 36.832876] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.833317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.833515] Hardware name: linux,dummy-virt (DT) [ 36.833665] Call trace: [ 36.833734] show_stack+0x20/0x38 (C) [ 36.834008] dump_stack_lvl+0x8c/0xd0 [ 36.834147] print_report+0x118/0x608 [ 36.834401] kasan_report+0xdc/0x128 [ 36.834530] kasan_check_range+0x100/0x1a8 [ 36.834727] __kasan_check_write+0x20/0x30 [ 36.834912] kasan_atomics_helper+0x1190/0x4858 [ 36.835134] kasan_atomics+0x198/0x2e0 [ 36.835251] kunit_try_run_case+0x170/0x3f0 [ 36.835397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.835776] kthread+0x328/0x630 [ 36.835904] ret_from_fork+0x10/0x20 [ 36.836041] [ 36.836107] Allocated by task 277: [ 36.836194] kasan_save_stack+0x3c/0x68 [ 36.836411] kasan_save_track+0x20/0x40 [ 36.836521] kasan_save_alloc_info+0x40/0x58 [ 36.836618] __kasan_kmalloc+0xd4/0xd8 [ 36.836713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.836887] kasan_atomics+0xb8/0x2e0 [ 36.837073] kunit_try_run_case+0x170/0x3f0 [ 36.837302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.837419] kthread+0x328/0x630 [ 36.837508] ret_from_fork+0x10/0x20 [ 36.837604] [ 36.837663] The buggy address belongs to the object at fff00000c7805380 [ 36.837663] which belongs to the cache kmalloc-64 of size 64 [ 36.837919] The buggy address is located 0 bytes to the right of [ 36.837919] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.838120] [ 36.838174] The buggy address belongs to the physical page: [ 36.838304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.838648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.838779] page_type: f5(slab) [ 36.838928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.839154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.839299] page dumped because: kasan: bad access detected [ 36.839409] [ 36.839460] Memory state around the buggy address: [ 36.839555] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.839705] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.839996] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.840150] ^ [ 36.840247] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.840361] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.840457] ================================================================== [ 36.995972] ================================================================== [ 36.996102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.996219] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.996336] [ 36.996407] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.996619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.996745] Hardware name: linux,dummy-virt (DT) [ 36.997551] Call trace: [ 36.997756] show_stack+0x20/0x38 (C) [ 36.997891] dump_stack_lvl+0x8c/0xd0 [ 36.998007] print_report+0x118/0x608 [ 37.000181] kasan_report+0xdc/0x128 [ 37.000338] kasan_check_range+0x100/0x1a8 [ 37.000460] __kasan_check_write+0x20/0x30 [ 37.001532] kasan_atomics_helper+0x1644/0x4858 [ 37.002114] kasan_atomics+0x198/0x2e0 [ 37.003001] kunit_try_run_case+0x170/0x3f0 [ 37.003686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.004093] kthread+0x328/0x630 [ 37.004216] ret_from_fork+0x10/0x20 [ 37.004335] [ 37.004388] Allocated by task 277: [ 37.005261] kasan_save_stack+0x3c/0x68 [ 37.005389] kasan_save_track+0x20/0x40 [ 37.006073] kasan_save_alloc_info+0x40/0x58 [ 37.006389] __kasan_kmalloc+0xd4/0xd8 [ 37.006567] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.006856] kasan_atomics+0xb8/0x2e0 [ 37.007020] kunit_try_run_case+0x170/0x3f0 [ 37.007500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.007642] kthread+0x328/0x630 [ 37.007772] ret_from_fork+0x10/0x20 [ 37.007866] [ 37.007915] The buggy address belongs to the object at fff00000c7805380 [ 37.007915] which belongs to the cache kmalloc-64 of size 64 [ 37.008481] The buggy address is located 0 bytes to the right of [ 37.008481] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.008834] [ 37.008892] The buggy address belongs to the physical page: [ 37.009008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.009170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.009530] page_type: f5(slab) [ 37.010781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.010922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.011054] page dumped because: kasan: bad access detected [ 37.011145] [ 37.011205] Memory state around the buggy address: [ 37.011295] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.011419] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.011522] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.011682] ^ [ 37.011833] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.011949] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.012066] ================================================================== [ 36.679044] ================================================================== [ 36.679146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 36.681521] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.681646] [ 36.681719] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.681913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.681979] Hardware name: linux,dummy-virt (DT) [ 36.682088] Call trace: [ 36.682156] show_stack+0x20/0x38 (C) [ 36.682685] dump_stack_lvl+0x8c/0xd0 [ 36.682836] print_report+0x118/0x608 [ 36.682966] kasan_report+0xdc/0x128 [ 36.683169] __asan_report_load4_noabort+0x20/0x30 [ 36.683660] kasan_atomics_helper+0x3e04/0x4858 [ 36.683828] kasan_atomics+0x198/0x2e0 [ 36.684000] kunit_try_run_case+0x170/0x3f0 [ 36.684309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.684458] kthread+0x328/0x630 [ 36.684632] ret_from_fork+0x10/0x20 [ 36.684933] [ 36.684984] Allocated by task 277: [ 36.685086] kasan_save_stack+0x3c/0x68 [ 36.685205] kasan_save_track+0x20/0x40 [ 36.685325] kasan_save_alloc_info+0x40/0x58 [ 36.686136] __kasan_kmalloc+0xd4/0xd8 [ 36.686254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.686376] kasan_atomics+0xb8/0x2e0 [ 36.686616] kunit_try_run_case+0x170/0x3f0 [ 36.686723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.686854] kthread+0x328/0x630 [ 36.686969] ret_from_fork+0x10/0x20 [ 36.687102] [ 36.687396] The buggy address belongs to the object at fff00000c7805380 [ 36.687396] which belongs to the cache kmalloc-64 of size 64 [ 36.687639] The buggy address is located 0 bytes to the right of [ 36.687639] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.687874] [ 36.687991] The buggy address belongs to the physical page: [ 36.688091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.688355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.688574] page_type: f5(slab) [ 36.688684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.688846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.689174] page dumped because: kasan: bad access detected [ 36.689431] [ 36.689553] Memory state around the buggy address: [ 36.689639] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.689770] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.689907] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.690014] ^ [ 36.690132] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.690525] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.690788] ================================================================== [ 36.796598] ================================================================== [ 36.796720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 36.796843] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.796968] [ 36.797057] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.797258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.797327] Hardware name: linux,dummy-virt (DT) [ 36.799164] Call trace: [ 36.799252] show_stack+0x20/0x38 (C) [ 36.799775] dump_stack_lvl+0x8c/0xd0 [ 36.799937] print_report+0x118/0x608 [ 36.800163] kasan_report+0xdc/0x128 [ 36.800322] kasan_check_range+0x100/0x1a8 [ 36.800446] __kasan_check_write+0x20/0x30 [ 36.800558] kasan_atomics_helper+0x1058/0x4858 [ 36.800680] kasan_atomics+0x198/0x2e0 [ 36.800805] kunit_try_run_case+0x170/0x3f0 [ 36.801151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.802135] kthread+0x328/0x630 [ 36.802313] ret_from_fork+0x10/0x20 [ 36.802781] [ 36.802840] Allocated by task 277: [ 36.802913] kasan_save_stack+0x3c/0x68 [ 36.803016] kasan_save_track+0x20/0x40 [ 36.803773] kasan_save_alloc_info+0x40/0x58 [ 36.804196] __kasan_kmalloc+0xd4/0xd8 [ 36.804746] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.805013] kasan_atomics+0xb8/0x2e0 [ 36.805526] kunit_try_run_case+0x170/0x3f0 [ 36.805829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.806353] kthread+0x328/0x630 [ 36.806695] ret_from_fork+0x10/0x20 [ 36.807165] [ 36.807221] The buggy address belongs to the object at fff00000c7805380 [ 36.807221] which belongs to the cache kmalloc-64 of size 64 [ 36.807360] The buggy address is located 0 bytes to the right of [ 36.807360] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.808295] [ 36.808731] The buggy address belongs to the physical page: [ 36.808918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.809103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.809655] page_type: f5(slab) [ 36.809831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.810499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.811086] page dumped because: kasan: bad access detected [ 36.811804] [ 36.812357] Memory state around the buggy address: [ 36.812657] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.813149] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.813303] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.813401] ^ [ 36.813737] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.813863] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.814263] ================================================================== [ 36.525961] ================================================================== [ 36.526090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 36.526305] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.526620] [ 36.526770] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.527055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.527131] Hardware name: linux,dummy-virt (DT) [ 36.527354] Call trace: [ 36.527447] show_stack+0x20/0x38 (C) [ 36.527689] dump_stack_lvl+0x8c/0xd0 [ 36.527813] print_report+0x118/0x608 [ 36.527929] kasan_report+0xdc/0x128 [ 36.528118] kasan_check_range+0x100/0x1a8 [ 36.528313] __kasan_check_write+0x20/0x30 [ 36.528462] kasan_atomics_helper+0xa6c/0x4858 [ 36.528595] kasan_atomics+0x198/0x2e0 [ 36.528759] kunit_try_run_case+0x170/0x3f0 [ 36.529749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.530406] kthread+0x328/0x630 [ 36.530832] ret_from_fork+0x10/0x20 [ 36.531167] [ 36.531255] Allocated by task 277: [ 36.531529] kasan_save_stack+0x3c/0x68 [ 36.531697] kasan_save_track+0x20/0x40 [ 36.533686] ret_from_fork+0x10/0x20 [ 36.535716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.535923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.536108] page_type: f5(slab) [ 36.536296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.536419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.536520] page dumped because: kasan: bad access detected [ 36.536632] [ 36.536810] Memory state around the buggy address: [ 36.536904] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.537110] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.537233] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.539134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 36.540706] show_stack+0x20/0x38 (C) [ 36.543792] kasan_save_track+0x20/0x40 [ 36.546827] The buggy address is located 0 bytes to the right of [ 36.546827] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.547763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.547882] page_type: f5(slab) [ 36.547989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.548134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.548236] page dumped because: kasan: bad access detected [ 36.548316] [ 36.549636] Memory state around the buggy address: [ 36.549759] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.549934] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.550064] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.550171] ^ [ 36.550431] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.550665] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.550792] ================================================================== [ 36.713958] ================================================================== [ 36.714227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 36.714504] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.714818] [ 36.714891] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.715195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.715267] Hardware name: linux,dummy-virt (DT) [ 36.715374] Call trace: [ 36.715435] show_stack+0x20/0x38 (C) [ 36.715588] dump_stack_lvl+0x8c/0xd0 [ 36.715723] print_report+0x118/0x608 [ 36.715849] kasan_report+0xdc/0x128 [ 36.715966] kasan_check_range+0x100/0x1a8 [ 36.716108] __kasan_check_write+0x20/0x30 [ 36.716284] kasan_atomics_helper+0xe44/0x4858 [ 36.716614] kasan_atomics+0x198/0x2e0 [ 36.716737] kunit_try_run_case+0x170/0x3f0 [ 36.716894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.717136] kthread+0x328/0x630 [ 36.717306] ret_from_fork+0x10/0x20 [ 36.717448] [ 36.717511] Allocated by task 277: [ 36.718319] kasan_save_stack+0x3c/0x68 [ 36.718586] kasan_save_track+0x20/0x40 [ 36.719059] kasan_save_alloc_info+0x40/0x58 [ 36.719194] __kasan_kmalloc+0xd4/0xd8 [ 36.719298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.719415] kasan_atomics+0xb8/0x2e0 [ 36.721090] kunit_try_run_case+0x170/0x3f0 [ 36.721583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.722196] kthread+0x328/0x630 [ 36.722296] ret_from_fork+0x10/0x20 [ 36.722395] [ 36.723294] The buggy address belongs to the object at fff00000c7805380 [ 36.723294] which belongs to the cache kmalloc-64 of size 64 [ 36.724128] The buggy address is located 0 bytes to the right of [ 36.724128] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.724731] [ 36.725173] The buggy address belongs to the physical page: [ 36.725293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.725418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.725700] page_type: f5(slab) [ 36.726606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.727460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.727565] page dumped because: kasan: bad access detected [ 36.727610] [ 36.727635] Memory state around the buggy address: [ 36.727699] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.727807] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.727922] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.728126] ^ [ 36.728386] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.728544] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.728906] ================================================================== [ 36.729753] ================================================================== [ 36.729810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 36.729899] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.730000] [ 36.730076] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.730302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.730378] Hardware name: linux,dummy-virt (DT) [ 36.730453] Call trace: [ 36.730517] show_stack+0x20/0x38 (C) [ 36.731170] dump_stack_lvl+0x8c/0xd0 [ 36.731284] print_report+0x118/0x608 [ 36.731355] kasan_report+0xdc/0x128 [ 36.731447] __asan_report_store8_noabort+0x20/0x30 [ 36.731690] kasan_atomics_helper+0x3e5c/0x4858 [ 36.731826] kasan_atomics+0x198/0x2e0 [ 36.732182] kunit_try_run_case+0x170/0x3f0 [ 36.732321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.732584] kthread+0x328/0x630 [ 36.732740] ret_from_fork+0x10/0x20 [ 36.732860] [ 36.732908] Allocated by task 277: [ 36.733079] kasan_save_stack+0x3c/0x68 [ 36.733487] kasan_save_track+0x20/0x40 [ 36.733629] kasan_save_alloc_info+0x40/0x58 [ 36.733730] __kasan_kmalloc+0xd4/0xd8 [ 36.733850] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.733977] kasan_atomics+0xb8/0x2e0 [ 36.734526] kunit_try_run_case+0x170/0x3f0 [ 36.734782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.734915] kthread+0x328/0x630 [ 36.735013] ret_from_fork+0x10/0x20 [ 36.735142] [ 36.735190] The buggy address belongs to the object at fff00000c7805380 [ 36.735190] which belongs to the cache kmalloc-64 of size 64 [ 36.735595] The buggy address is located 0 bytes to the right of [ 36.735595] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.735816] [ 36.735886] The buggy address belongs to the physical page: [ 36.735964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.736134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.736266] page_type: f5(slab) [ 36.736737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.736897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.737151] page dumped because: kasan: bad access detected [ 36.737235] [ 36.737320] Memory state around the buggy address: [ 36.737409] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.737528] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.737632] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.737727] ^ [ 36.737824] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.737963] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.738083] ================================================================== [ 36.910197] ================================================================== [ 36.910293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.910477] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.910654] [ 36.910822] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.911453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.911616] Hardware name: linux,dummy-virt (DT) [ 36.911715] Call trace: [ 36.911883] show_stack+0x20/0x38 (C) [ 36.912067] dump_stack_lvl+0x8c/0xd0 [ 36.912461] print_report+0x118/0x608 [ 36.912599] kasan_report+0xdc/0x128 [ 36.912730] kasan_check_range+0x100/0x1a8 [ 36.912852] __kasan_check_write+0x20/0x30 [ 36.913153] kasan_atomics_helper+0x1414/0x4858 [ 36.913293] kasan_atomics+0x198/0x2e0 [ 36.913441] kunit_try_run_case+0x170/0x3f0 [ 36.913571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.913715] kthread+0x328/0x630 [ 36.913825] ret_from_fork+0x10/0x20 [ 36.913941] [ 36.913994] Allocated by task 277: [ 36.914509] kasan_save_stack+0x3c/0x68 [ 36.914641] kasan_save_track+0x20/0x40 [ 36.915477] kasan_save_alloc_info+0x40/0x58 [ 36.915864] __kasan_kmalloc+0xd4/0xd8 [ 36.916193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.916411] kasan_atomics+0xb8/0x2e0 [ 36.916634] kunit_try_run_case+0x170/0x3f0 [ 36.916746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.917333] kthread+0x328/0x630 [ 36.917507] ret_from_fork+0x10/0x20 [ 36.918004] [ 36.918160] The buggy address belongs to the object at fff00000c7805380 [ 36.918160] which belongs to the cache kmalloc-64 of size 64 [ 36.918821] The buggy address is located 0 bytes to the right of [ 36.918821] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.918986] [ 36.919314] The buggy address belongs to the physical page: [ 36.919451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.919577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.919951] page_type: f5(slab) [ 36.920287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.920649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.920758] page dumped because: kasan: bad access detected [ 36.920936] [ 36.921007] Memory state around the buggy address: [ 36.921397] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.921516] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.922214] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.922328] ^ [ 36.922418] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.922764] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.923149] ================================================================== [ 36.480591] ================================================================== [ 36.480922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 36.481467] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.481659] [ 36.481735] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.481931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.481999] Hardware name: linux,dummy-virt (DT) [ 36.482095] Call trace: [ 36.482150] show_stack+0x20/0x38 (C) [ 36.482271] dump_stack_lvl+0x8c/0xd0 [ 36.482390] print_report+0x118/0x608 [ 36.482529] kasan_report+0xdc/0x128 [ 36.489268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.491413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.496129] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.498187] kunit_try_run_case+0x170/0x3f0 [ 36.499138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.499249] kasan_atomics+0xb8/0x2e0 [ 36.499348] kunit_try_run_case+0x170/0x3f0 [ 36.499445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.499615] kthread+0x328/0x630 [ 36.499750] ret_from_fork+0x10/0x20 [ 36.499934] [ 36.499995] The buggy address belongs to the object at fff00000c7805380 [ 36.499995] which belongs to the cache kmalloc-64 of size 64 [ 36.500345] The buggy address is located 0 bytes to the right of [ 36.500345] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.500500] [ 36.500551] The buggy address belongs to the physical page: [ 36.500629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.500794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.500914] page_type: f5(slab) [ 36.501063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.501246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.501365] page dumped because: kasan: bad access detected [ 36.501505] [ 36.501594] Memory state around the buggy address: [ 36.501688] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.501812] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.501951] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.502219] ^ [ 36.502320] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.502435] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.502529] ================================================================== [ 36.815119] ================================================================== [ 36.815217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 36.815326] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.815444] [ 36.815524] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.816069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.816264] Hardware name: linux,dummy-virt (DT) [ 36.816477] Call trace: [ 36.816640] show_stack+0x20/0x38 (C) [ 36.816834] dump_stack_lvl+0x8c/0xd0 [ 36.816962] print_report+0x118/0x608 [ 36.817102] kasan_report+0xdc/0x128 [ 36.817231] kasan_check_range+0x100/0x1a8 [ 36.817462] __kasan_check_write+0x20/0x30 [ 36.817619] kasan_atomics_helper+0x10c0/0x4858 [ 36.817753] kasan_atomics+0x198/0x2e0 [ 36.817928] kunit_try_run_case+0x170/0x3f0 [ 36.818131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.818425] kthread+0x328/0x630 [ 36.818658] ret_from_fork+0x10/0x20 [ 36.818882] [ 36.818937] Allocated by task 277: [ 36.819043] kasan_save_stack+0x3c/0x68 [ 36.819237] kasan_save_track+0x20/0x40 [ 36.819339] kasan_save_alloc_info+0x40/0x58 [ 36.819550] __kasan_kmalloc+0xd4/0xd8 [ 36.819666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.819808] kasan_atomics+0xb8/0x2e0 [ 36.819969] kunit_try_run_case+0x170/0x3f0 [ 36.820049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.820347] kthread+0x328/0x630 [ 36.820450] ret_from_fork+0x10/0x20 [ 36.820711] [ 36.820829] The buggy address belongs to the object at fff00000c7805380 [ 36.820829] which belongs to the cache kmalloc-64 of size 64 [ 36.820990] The buggy address is located 0 bytes to the right of [ 36.820990] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.821435] [ 36.821516] The buggy address belongs to the physical page: [ 36.821660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.821784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.821897] page_type: f5(slab) [ 36.822092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.822227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.822420] page dumped because: kasan: bad access detected [ 36.822514] [ 36.822561] Memory state around the buggy address: [ 36.822672] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.822852] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.822998] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.823109] ^ [ 36.823204] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.823349] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.823443] ================================================================== [ 36.985326] ================================================================== [ 36.985451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.985622] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.985855] [ 36.985965] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.986179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.986249] Hardware name: linux,dummy-virt (DT) [ 36.986321] Call trace: [ 36.986377] show_stack+0x20/0x38 (C) [ 36.986493] dump_stack_lvl+0x8c/0xd0 [ 36.986629] print_report+0x118/0x608 [ 36.986763] kasan_report+0xdc/0x128 [ 36.986903] __asan_report_load8_noabort+0x20/0x30 [ 36.987066] kasan_atomics_helper+0x3db0/0x4858 [ 36.987203] kasan_atomics+0x198/0x2e0 [ 36.987355] kunit_try_run_case+0x170/0x3f0 [ 36.987501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.987652] kthread+0x328/0x630 [ 36.988088] ret_from_fork+0x10/0x20 [ 36.988280] [ 36.988339] Allocated by task 277: [ 36.989212] kasan_save_stack+0x3c/0x68 [ 36.989347] kasan_save_track+0x20/0x40 [ 36.991017] kasan_save_alloc_info+0x40/0x58 [ 36.991173] __kasan_kmalloc+0xd4/0xd8 [ 36.991583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.991703] kasan_atomics+0xb8/0x2e0 [ 36.991859] kunit_try_run_case+0x170/0x3f0 [ 36.992058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.992193] kthread+0x328/0x630 [ 36.992285] ret_from_fork+0x10/0x20 [ 36.992382] [ 36.992431] The buggy address belongs to the object at fff00000c7805380 [ 36.992431] which belongs to the cache kmalloc-64 of size 64 [ 36.992740] The buggy address is located 0 bytes to the right of [ 36.992740] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.992953] [ 36.993122] The buggy address belongs to the physical page: [ 36.993241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.993428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.993569] page_type: f5(slab) [ 36.993711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.994047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.994151] page dumped because: kasan: bad access detected [ 36.994231] [ 36.994288] Memory state around the buggy address: [ 36.994444] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.994643] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.994761] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.994868] ^ [ 36.994986] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.995336] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.995502] ================================================================== [ 36.954893] ================================================================== [ 36.955005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.955165] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.955297] [ 36.955369] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.955574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.955646] Hardware name: linux,dummy-virt (DT) [ 36.955723] Call trace: [ 36.955780] show_stack+0x20/0x38 (C) [ 36.955898] dump_stack_lvl+0x8c/0xd0 [ 36.956015] print_report+0x118/0x608 [ 36.956157] kasan_report+0xdc/0x128 [ 36.956269] kasan_check_range+0x100/0x1a8 [ 36.956386] __kasan_check_write+0x20/0x30 [ 36.956993] kasan_atomics_helper+0x154c/0x4858 [ 36.957148] kasan_atomics+0x198/0x2e0 [ 36.957291] kunit_try_run_case+0x170/0x3f0 [ 36.957442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.958066] kthread+0x328/0x630 [ 36.958282] ret_from_fork+0x10/0x20 [ 36.958540] [ 36.958650] Allocated by task 277: [ 36.958755] kasan_save_stack+0x3c/0x68 [ 36.959253] kasan_save_track+0x20/0x40 [ 36.959359] kasan_save_alloc_info+0x40/0x58 [ 36.959455] __kasan_kmalloc+0xd4/0xd8 [ 36.959554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.959669] kasan_atomics+0xb8/0x2e0 [ 36.959834] kunit_try_run_case+0x170/0x3f0 [ 36.960051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.960191] kthread+0x328/0x630 [ 36.960283] ret_from_fork+0x10/0x20 [ 36.960518] [ 36.960656] The buggy address belongs to the object at fff00000c7805380 [ 36.960656] which belongs to the cache kmalloc-64 of size 64 [ 36.960979] The buggy address is located 0 bytes to the right of [ 36.960979] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.961152] [ 36.961203] The buggy address belongs to the physical page: [ 36.961279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.961399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.961512] page_type: f5(slab) [ 36.961705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.962011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.962128] page dumped because: kasan: bad access detected [ 36.962214] [ 36.962272] Memory state around the buggy address: [ 36.962642] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.962816] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.962936] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.963049] ^ [ 36.963353] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.963476] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.963577] ================================================================== [ 36.771707] ================================================================== [ 36.772001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 36.772260] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.772392] [ 36.772566] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.772917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.773008] Hardware name: linux,dummy-virt (DT) [ 36.773465] Call trace: [ 36.773537] show_stack+0x20/0x38 (C) [ 36.773677] dump_stack_lvl+0x8c/0xd0 [ 36.774057] print_report+0x118/0x608 [ 36.774540] kasan_report+0xdc/0x128 [ 36.774756] kasan_check_range+0x100/0x1a8 [ 36.774888] __kasan_check_write+0x20/0x30 [ 36.775024] kasan_atomics_helper+0xf88/0x4858 [ 36.775714] kasan_atomics+0x198/0x2e0 [ 36.776222] kunit_try_run_case+0x170/0x3f0 [ 36.776575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.776915] kthread+0x328/0x630 [ 36.777307] ret_from_fork+0x10/0x20 [ 36.777769] [ 36.777846] Allocated by task 277: [ 36.778109] kasan_save_stack+0x3c/0x68 [ 36.778222] kasan_save_track+0x20/0x40 [ 36.778321] kasan_save_alloc_info+0x40/0x58 [ 36.778479] __kasan_kmalloc+0xd4/0xd8 [ 36.778735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.779148] kasan_atomics+0xb8/0x2e0 [ 36.779870] kunit_try_run_case+0x170/0x3f0 [ 36.780191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.780339] kthread+0x328/0x630 [ 36.780494] ret_from_fork+0x10/0x20 [ 36.780599] [ 36.780660] The buggy address belongs to the object at fff00000c7805380 [ 36.780660] which belongs to the cache kmalloc-64 of size 64 [ 36.780800] The buggy address is located 0 bytes to the right of [ 36.780800] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.781011] [ 36.781084] The buggy address belongs to the physical page: [ 36.781215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.781567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.781728] page_type: f5(slab) [ 36.781821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.781957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.782336] page dumped because: kasan: bad access detected [ 36.782432] [ 36.782550] Memory state around the buggy address: [ 36.782974] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.783109] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.783233] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.783612] ^ [ 36.783889] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.784230] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.784347] ================================================================== [ 36.964080] ================================================================== [ 36.964261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.964393] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.964508] [ 36.964606] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.964944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.965014] Hardware name: linux,dummy-virt (DT) [ 36.965115] Call trace: [ 36.965278] show_stack+0x20/0x38 (C) [ 36.965580] dump_stack_lvl+0x8c/0xd0 [ 36.965701] print_report+0x118/0x608 [ 36.965999] kasan_report+0xdc/0x128 [ 36.966148] kasan_check_range+0x100/0x1a8 [ 36.966369] __kasan_check_write+0x20/0x30 [ 36.966651] kasan_atomics_helper+0x15b4/0x4858 [ 36.966813] kasan_atomics+0x198/0x2e0 [ 36.967530] kunit_try_run_case+0x170/0x3f0 [ 36.967714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.968659] kthread+0x328/0x630 [ 36.968788] ret_from_fork+0x10/0x20 [ 36.969896] [ 36.970063] Allocated by task 277: [ 36.970353] kasan_save_stack+0x3c/0x68 [ 36.970466] kasan_save_track+0x20/0x40 [ 36.971422] kasan_save_alloc_info+0x40/0x58 [ 36.972193] __kasan_kmalloc+0xd4/0xd8 [ 36.972359] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.972578] kasan_atomics+0xb8/0x2e0 [ 36.972846] kunit_try_run_case+0x170/0x3f0 [ 36.973703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.973861] kthread+0x328/0x630 [ 36.974663] ret_from_fork+0x10/0x20 [ 36.975391] [ 36.975456] The buggy address belongs to the object at fff00000c7805380 [ 36.975456] which belongs to the cache kmalloc-64 of size 64 [ 36.975599] The buggy address is located 0 bytes to the right of [ 36.975599] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.976306] [ 36.976811] The buggy address belongs to the physical page: [ 36.977058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.977465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.977674] page_type: f5(slab) [ 36.977764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.977886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.979544] page dumped because: kasan: bad access detected [ 36.979910] [ 36.979963] Memory state around the buggy address: [ 36.980061] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.981607] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.982519] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.982896] ^ [ 36.983294] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.983713] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.984135] ================================================================== [ 36.691694] ================================================================== [ 36.691795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 36.692057] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.692284] [ 36.692360] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.692560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.692630] Hardware name: linux,dummy-virt (DT) [ 36.692704] Call trace: [ 36.692759] show_stack+0x20/0x38 (C) [ 36.692876] dump_stack_lvl+0x8c/0xd0 [ 36.692987] print_report+0x118/0x608 [ 36.693129] kasan_report+0xdc/0x128 [ 36.693249] kasan_check_range+0x100/0x1a8 [ 36.693371] __kasan_check_read+0x20/0x30 [ 36.693481] kasan_atomics_helper+0xdd4/0x4858 [ 36.693602] kasan_atomics+0x198/0x2e0 [ 36.693717] kunit_try_run_case+0x170/0x3f0 [ 36.693834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.693963] kthread+0x328/0x630 [ 36.694102] ret_from_fork+0x10/0x20 [ 36.694250] [ 36.694310] Allocated by task 277: [ 36.694397] kasan_save_stack+0x3c/0x68 [ 36.694516] kasan_save_track+0x20/0x40 [ 36.695168] kasan_save_alloc_info+0x40/0x58 [ 36.695503] __kasan_kmalloc+0xd4/0xd8 [ 36.695622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.695743] kasan_atomics+0xb8/0x2e0 [ 36.695844] kunit_try_run_case+0x170/0x3f0 [ 36.696703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.696919] kthread+0x328/0x630 [ 36.697112] ret_from_fork+0x10/0x20 [ 36.697280] [ 36.697346] The buggy address belongs to the object at fff00000c7805380 [ 36.697346] which belongs to the cache kmalloc-64 of size 64 [ 36.698015] The buggy address is located 0 bytes to the right of [ 36.698015] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.698225] [ 36.698339] The buggy address belongs to the physical page: [ 36.698416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.698539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.698736] page_type: f5(slab) [ 36.699375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.699546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.699716] page dumped because: kasan: bad access detected [ 36.699803] [ 36.699855] Memory state around the buggy address: [ 36.699934] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.700054] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.700163] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.700288] ^ [ 36.700532] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.700715] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.700810] ================================================================== [ 36.551976] ================================================================== [ 36.552098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 36.552217] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.552341] [ 36.552466] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.552687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.552982] show_stack+0x20/0x38 (C) [ 36.555108] kunit_try_run_case+0x170/0x3f0 [ 36.556672] __kasan_kmalloc+0xd4/0xd8 [ 36.557734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.558109] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.560429] ================================================================== [ 36.701198] ================================================================== [ 36.701309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.701445] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.701570] [ 36.701647] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.702521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.703149] Hardware name: linux,dummy-virt (DT) [ 36.703435] Call trace: [ 36.703506] show_stack+0x20/0x38 (C) [ 36.703820] dump_stack_lvl+0x8c/0xd0 [ 36.703949] print_report+0x118/0x608 [ 36.704136] kasan_report+0xdc/0x128 [ 36.704500] __asan_report_load8_noabort+0x20/0x30 [ 36.704667] kasan_atomics_helper+0x3f58/0x4858 [ 36.705047] kasan_atomics+0x198/0x2e0 [ 36.705356] kunit_try_run_case+0x170/0x3f0 [ 36.705477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.705613] kthread+0x328/0x630 [ 36.705778] ret_from_fork+0x10/0x20 [ 36.705965] [ 36.706076] Allocated by task 277: [ 36.706160] kasan_save_stack+0x3c/0x68 [ 36.706315] kasan_save_track+0x20/0x40 [ 36.707175] kasan_save_alloc_info+0x40/0x58 [ 36.707291] __kasan_kmalloc+0xd4/0xd8 [ 36.707414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.707617] kasan_atomics+0xb8/0x2e0 [ 36.707928] kunit_try_run_case+0x170/0x3f0 [ 36.708062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.708337] kthread+0x328/0x630 [ 36.708563] ret_from_fork+0x10/0x20 [ 36.708829] [ 36.708894] The buggy address belongs to the object at fff00000c7805380 [ 36.708894] which belongs to the cache kmalloc-64 of size 64 [ 36.709189] The buggy address is located 0 bytes to the right of [ 36.709189] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.709346] [ 36.709404] The buggy address belongs to the physical page: [ 36.709607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.709734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.710011] page_type: f5(slab) [ 36.710259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.710382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.710479] page dumped because: kasan: bad access detected [ 36.710616] [ 36.710673] Memory state around the buggy address: [ 36.710806] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.710966] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.711739] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.712094] ^ [ 36.712532] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.712644] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.712994] ================================================================== [ 36.939363] ================================================================== [ 36.939497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.939610] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.939729] [ 36.939799] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.939995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.940172] Hardware name: linux,dummy-virt (DT) [ 36.940382] Call trace: [ 36.940554] show_stack+0x20/0x38 (C) [ 36.940875] dump_stack_lvl+0x8c/0xd0 [ 36.941162] print_report+0x118/0x608 [ 36.941415] kasan_report+0xdc/0x128 [ 36.941608] kasan_check_range+0x100/0x1a8 [ 36.941974] __kasan_check_write+0x20/0x30 [ 36.942211] kasan_atomics_helper+0x14e4/0x4858 [ 36.942336] kasan_atomics+0x198/0x2e0 [ 36.942453] kunit_try_run_case+0x170/0x3f0 [ 36.942621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.942786] kthread+0x328/0x630 [ 36.943210] ret_from_fork+0x10/0x20 [ 36.943356] [ 36.943415] Allocated by task 277: [ 36.943499] kasan_save_stack+0x3c/0x68 [ 36.943607] kasan_save_track+0x20/0x40 [ 36.943711] kasan_save_alloc_info+0x40/0x58 [ 36.943919] __kasan_kmalloc+0xd4/0xd8 [ 36.944048] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.944305] kasan_atomics+0xb8/0x2e0 [ 36.944526] kunit_try_run_case+0x170/0x3f0 [ 36.944636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.944745] kthread+0x328/0x630 [ 36.944878] ret_from_fork+0x10/0x20 [ 36.945061] [ 36.945119] The buggy address belongs to the object at fff00000c7805380 [ 36.945119] which belongs to the cache kmalloc-64 of size 64 [ 36.945291] The buggy address is located 0 bytes to the right of [ 36.945291] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.945551] [ 36.945660] The buggy address belongs to the physical page: [ 36.945760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.946477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.947242] page_type: f5(slab) [ 36.947873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.948179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.949500] page dumped because: kasan: bad access detected [ 36.949597] [ 36.949648] Memory state around the buggy address: [ 36.950391] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.950860] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.950973] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.951478] ^ [ 36.951610] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.951734] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.952418] ================================================================== [ 37.039236] ================================================================== [ 37.039348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.039606] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.039732] [ 37.039809] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.040400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.040471] Hardware name: linux,dummy-virt (DT) [ 37.040547] Call trace: [ 37.040601] show_stack+0x20/0x38 (C) [ 37.040719] dump_stack_lvl+0x8c/0xd0 [ 37.040829] print_report+0x118/0x608 [ 37.040955] kasan_report+0xdc/0x128 [ 37.041102] kasan_check_range+0x100/0x1a8 [ 37.041219] __kasan_check_write+0x20/0x30 [ 37.041397] kasan_atomics_helper+0x175c/0x4858 [ 37.041577] kasan_atomics+0x198/0x2e0 [ 37.041721] kunit_try_run_case+0x170/0x3f0 [ 37.041855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.041980] kthread+0x328/0x630 [ 37.042147] ret_from_fork+0x10/0x20 [ 37.042290] [ 37.042580] Allocated by task 277: [ 37.042673] kasan_save_stack+0x3c/0x68 [ 37.042783] kasan_save_track+0x20/0x40 [ 37.042875] kasan_save_alloc_info+0x40/0x58 [ 37.042960] __kasan_kmalloc+0xd4/0xd8 [ 37.043011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.043127] kasan_atomics+0xb8/0x2e0 [ 37.043212] kunit_try_run_case+0x170/0x3f0 [ 37.043378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.043755] kthread+0x328/0x630 [ 37.044411] ret_from_fork+0x10/0x20 [ 37.044682] [ 37.044745] The buggy address belongs to the object at fff00000c7805380 [ 37.044745] which belongs to the cache kmalloc-64 of size 64 [ 37.045345] The buggy address is located 0 bytes to the right of [ 37.045345] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.045545] [ 37.046051] The buggy address belongs to the physical page: [ 37.046480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.046780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.047338] page_type: f5(slab) [ 37.047481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.047715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.047837] page dumped because: kasan: bad access detected [ 37.047921] [ 37.048016] Memory state around the buggy address: [ 37.048197] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.048307] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.048489] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.048757] ^ [ 37.048957] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.049084] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.049181] ================================================================== [ 37.049520] ================================================================== [ 37.049628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 37.050716] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.050844] [ 37.050886] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.051069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.051132] Hardware name: linux,dummy-virt (DT) [ 37.051196] Call trace: [ 37.051225] show_stack+0x20/0x38 (C) [ 37.051290] dump_stack_lvl+0x8c/0xd0 [ 37.051349] print_report+0x118/0x608 [ 37.051413] kasan_report+0xdc/0x128 [ 37.051471] __asan_report_load8_noabort+0x20/0x30 [ 37.051532] kasan_atomics_helper+0x3e20/0x4858 [ 37.051591] kasan_atomics+0x198/0x2e0 [ 37.051646] kunit_try_run_case+0x170/0x3f0 [ 37.051704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.051770] kthread+0x328/0x630 [ 37.051823] ret_from_fork+0x10/0x20 [ 37.051883] [ 37.051909] Allocated by task 277: [ 37.051945] kasan_save_stack+0x3c/0x68 [ 37.052001] kasan_save_track+0x20/0x40 [ 37.052237] kasan_save_alloc_info+0x40/0x58 [ 37.052770] __kasan_kmalloc+0xd4/0xd8 [ 37.052870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.052975] kasan_atomics+0xb8/0x2e0 [ 37.053087] kunit_try_run_case+0x170/0x3f0 [ 37.053196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.053320] kthread+0x328/0x630 [ 37.053416] ret_from_fork+0x10/0x20 [ 37.053505] [ 37.053556] The buggy address belongs to the object at fff00000c7805380 [ 37.053556] which belongs to the cache kmalloc-64 of size 64 [ 37.053692] The buggy address is located 0 bytes to the right of [ 37.053692] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.055002] [ 37.055108] The buggy address belongs to the physical page: [ 37.055195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.055337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.056509] page_type: f5(slab) [ 37.056902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.057042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.058357] page dumped because: kasan: bad access detected [ 37.058486] [ 37.058604] Memory state around the buggy address: [ 37.058689] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.058798] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.058996] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.059112] ^ [ 37.059892] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.060464] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.060607] ================================================================== [ 36.924069] ================================================================== [ 36.924170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.924280] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.924395] [ 36.924461] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.924658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.924726] Hardware name: linux,dummy-virt (DT) [ 36.924795] Call trace: [ 36.924852] show_stack+0x20/0x38 (C) [ 36.924967] dump_stack_lvl+0x8c/0xd0 [ 36.925107] print_report+0x118/0x608 [ 36.925228] kasan_report+0xdc/0x128 [ 36.925340] kasan_check_range+0x100/0x1a8 [ 36.925457] __kasan_check_write+0x20/0x30 [ 36.925573] kasan_atomics_helper+0x147c/0x4858 [ 36.925697] kasan_atomics+0x198/0x2e0 [ 36.925813] kunit_try_run_case+0x170/0x3f0 [ 36.931271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.931428] kthread+0x328/0x630 [ 36.932555] ret_from_fork+0x10/0x20 [ 36.932712] [ 36.932773] Allocated by task 277: [ 36.932999] kasan_save_stack+0x3c/0x68 [ 36.933809] kasan_save_track+0x20/0x40 [ 36.933976] kasan_save_alloc_info+0x40/0x58 [ 36.934605] __kasan_kmalloc+0xd4/0xd8 [ 36.934729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.934868] kasan_atomics+0xb8/0x2e0 [ 36.934980] kunit_try_run_case+0x170/0x3f0 [ 36.935130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.935353] kthread+0x328/0x630 [ 36.935506] ret_from_fork+0x10/0x20 [ 36.935644] [ 36.935697] The buggy address belongs to the object at fff00000c7805380 [ 36.935697] which belongs to the cache kmalloc-64 of size 64 [ 36.935928] The buggy address is located 0 bytes to the right of [ 36.935928] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.936145] [ 36.936227] The buggy address belongs to the physical page: [ 36.936437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.936714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.936832] page_type: f5(slab) [ 36.936947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.937101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.937213] page dumped because: kasan: bad access detected [ 36.937307] [ 36.937366] Memory state around the buggy address: [ 36.937618] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.937781] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.938238] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.938433] ^ [ 36.938530] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.938776] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.938914] ================================================================== [ 37.021059] ================================================================== [ 37.021157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 37.021286] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.021583] [ 37.021784] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.022349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.022444] Hardware name: linux,dummy-virt (DT) [ 37.022516] Call trace: [ 37.022637] show_stack+0x20/0x38 (C) [ 37.022760] dump_stack_lvl+0x8c/0xd0 [ 37.022940] print_report+0x118/0x608 [ 37.023165] kasan_report+0xdc/0x128 [ 37.023287] kasan_check_range+0x100/0x1a8 [ 37.023418] __kasan_check_write+0x20/0x30 [ 37.023568] kasan_atomics_helper+0x16d0/0x4858 [ 37.023845] kasan_atomics+0x198/0x2e0 [ 37.024083] kunit_try_run_case+0x170/0x3f0 [ 37.024215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.024348] kthread+0x328/0x630 [ 37.024456] ret_from_fork+0x10/0x20 [ 37.024571] [ 37.024623] Allocated by task 277: [ 37.024726] kasan_save_stack+0x3c/0x68 [ 37.024979] kasan_save_track+0x20/0x40 [ 37.025113] kasan_save_alloc_info+0x40/0x58 [ 37.025265] __kasan_kmalloc+0xd4/0xd8 [ 37.025369] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.025484] kasan_atomics+0xb8/0x2e0 [ 37.025640] kunit_try_run_case+0x170/0x3f0 [ 37.025838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.025971] kthread+0x328/0x630 [ 37.026081] ret_from_fork+0x10/0x20 [ 37.026175] [ 37.026228] The buggy address belongs to the object at fff00000c7805380 [ 37.026228] which belongs to the cache kmalloc-64 of size 64 [ 37.026363] The buggy address is located 0 bytes to the right of [ 37.026363] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.026772] [ 37.026829] The buggy address belongs to the physical page: [ 37.026906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.027024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.027158] page_type: f5(slab) [ 37.027301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.027520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.027815] page dumped because: kasan: bad access detected [ 37.028064] [ 37.028199] Memory state around the buggy address: [ 37.028279] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.028428] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.028537] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.028770] ^ [ 37.028900] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.029385] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.029984] ================================================================== [ 36.739783] ================================================================== [ 36.741079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 36.741218] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.741334] [ 36.741405] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.741607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.741762] Hardware name: linux,dummy-virt (DT) [ 36.741849] Call trace: [ 36.742380] show_stack+0x20/0x38 (C) [ 36.742520] dump_stack_lvl+0x8c/0xd0 [ 36.743869] print_report+0x118/0x608 [ 36.743983] kasan_report+0xdc/0x128 [ 36.744487] kasan_check_range+0x100/0x1a8 [ 36.744679] __kasan_check_write+0x20/0x30 [ 36.744805] kasan_atomics_helper+0xeb8/0x4858 [ 36.744934] kasan_atomics+0x198/0x2e0 [ 36.745325] kunit_try_run_case+0x170/0x3f0 [ 36.745673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.746365] kthread+0x328/0x630 [ 36.746758] ret_from_fork+0x10/0x20 [ 36.747603] [ 36.747643] Allocated by task 277: [ 36.747705] kasan_save_stack+0x3c/0x68 [ 36.747815] kasan_save_track+0x20/0x40 [ 36.747878] kasan_save_alloc_info+0x40/0x58 [ 36.747929] __kasan_kmalloc+0xd4/0xd8 [ 36.747977] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.748055] kasan_atomics+0xb8/0x2e0 [ 36.748479] kunit_try_run_case+0x170/0x3f0 [ 36.748612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.748734] kthread+0x328/0x630 [ 36.749093] ret_from_fork+0x10/0x20 [ 36.749808] [ 36.750210] The buggy address belongs to the object at fff00000c7805380 [ 36.750210] which belongs to the cache kmalloc-64 of size 64 [ 36.750935] The buggy address is located 0 bytes to the right of [ 36.750935] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.751181] [ 36.751236] The buggy address belongs to the physical page: [ 36.751660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.752177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.752318] page_type: f5(slab) [ 36.752411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.752537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.752880] page dumped because: kasan: bad access detected [ 36.753159] [ 36.753257] Memory state around the buggy address: [ 36.753444] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.753985] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.754212] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.754873] ^ [ 36.755013] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.755332] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.755437] ================================================================== [ 37.030468] ================================================================== [ 37.030621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.030730] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.030959] [ 37.031040] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.031431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.031535] Hardware name: linux,dummy-virt (DT) [ 37.031615] Call trace: [ 37.031710] show_stack+0x20/0x38 (C) [ 37.031830] dump_stack_lvl+0x8c/0xd0 [ 37.032142] print_report+0x118/0x608 [ 37.032335] kasan_report+0xdc/0x128 [ 37.032497] __asan_report_load8_noabort+0x20/0x30 [ 37.032630] kasan_atomics_helper+0x3e10/0x4858 [ 37.033003] kasan_atomics+0x198/0x2e0 [ 37.033141] kunit_try_run_case+0x170/0x3f0 [ 37.033266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.033469] kthread+0x328/0x630 [ 37.033673] ret_from_fork+0x10/0x20 [ 37.033788] [ 37.033866] Allocated by task 277: [ 37.033983] kasan_save_stack+0x3c/0x68 [ 37.034159] kasan_save_track+0x20/0x40 [ 37.034436] kasan_save_alloc_info+0x40/0x58 [ 37.034630] __kasan_kmalloc+0xd4/0xd8 [ 37.034726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.034909] kasan_atomics+0xb8/0x2e0 [ 37.035069] kunit_try_run_case+0x170/0x3f0 [ 37.035172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.035276] kthread+0x328/0x630 [ 37.035380] ret_from_fork+0x10/0x20 [ 37.035516] [ 37.035563] The buggy address belongs to the object at fff00000c7805380 [ 37.035563] which belongs to the cache kmalloc-64 of size 64 [ 37.035945] The buggy address is located 0 bytes to the right of [ 37.035945] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.036194] [ 37.036309] The buggy address belongs to the physical page: [ 37.036453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.036750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.036871] page_type: f5(slab) [ 37.037016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.037156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.037250] page dumped because: kasan: bad access detected [ 37.037344] [ 37.037402] Memory state around the buggy address: [ 37.037487] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.037667] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.037821] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.037927] ^ [ 37.038007] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.038149] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.038477] ================================================================== [ 36.891690] ================================================================== [ 36.891886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.892019] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.892731] [ 36.892822] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.893042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.893126] Hardware name: linux,dummy-virt (DT) [ 36.893385] Call trace: [ 36.893488] show_stack+0x20/0x38 (C) [ 36.893629] dump_stack_lvl+0x8c/0xd0 [ 36.893999] print_report+0x118/0x608 [ 36.894157] kasan_report+0xdc/0x128 [ 36.894350] kasan_check_range+0x100/0x1a8 [ 36.894495] __kasan_check_write+0x20/0x30 [ 36.894643] kasan_atomics_helper+0x1384/0x4858 [ 36.895132] kasan_atomics+0x198/0x2e0 [ 36.895457] kunit_try_run_case+0x170/0x3f0 [ 36.895599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.896052] kthread+0x328/0x630 [ 36.896484] ret_from_fork+0x10/0x20 [ 36.896854] [ 36.897141] Allocated by task 277: [ 36.897221] kasan_save_stack+0x3c/0x68 [ 36.897417] kasan_save_track+0x20/0x40 [ 36.897718] kasan_save_alloc_info+0x40/0x58 [ 36.898114] __kasan_kmalloc+0xd4/0xd8 [ 36.898407] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.898661] kasan_atomics+0xb8/0x2e0 [ 36.898885] kunit_try_run_case+0x170/0x3f0 [ 36.899008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.899463] kthread+0x328/0x630 [ 36.899570] ret_from_fork+0x10/0x20 [ 36.899683] [ 36.899800] The buggy address belongs to the object at fff00000c7805380 [ 36.899800] which belongs to the cache kmalloc-64 of size 64 [ 36.899942] The buggy address is located 0 bytes to the right of [ 36.899942] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.900133] [ 36.900207] The buggy address belongs to the physical page: [ 36.900286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.900409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.900521] page_type: f5(slab) [ 36.900610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.900731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.900827] page dumped because: kasan: bad access detected [ 36.900905] [ 36.900952] Memory state around the buggy address: [ 36.901410] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.901750] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.901896] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.902118] ^ [ 36.902351] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.903323] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.903426] ================================================================== [ 36.785234] ================================================================== [ 36.785336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 36.785454] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.785575] [ 36.785896] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.786734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.786853] Hardware name: linux,dummy-virt (DT) [ 36.786932] Call trace: [ 36.787371] show_stack+0x20/0x38 (C) [ 36.787690] dump_stack_lvl+0x8c/0xd0 [ 36.788101] print_report+0x118/0x608 [ 36.788628] kasan_report+0xdc/0x128 [ 36.789100] kasan_check_range+0x100/0x1a8 [ 36.789372] __kasan_check_write+0x20/0x30 [ 36.789628] kasan_atomics_helper+0xff0/0x4858 [ 36.789772] kasan_atomics+0x198/0x2e0 [ 36.789889] kunit_try_run_case+0x170/0x3f0 [ 36.790461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.790762] kthread+0x328/0x630 [ 36.791019] ret_from_fork+0x10/0x20 [ 36.791202] [ 36.791310] Allocated by task 277: [ 36.791382] kasan_save_stack+0x3c/0x68 [ 36.791486] kasan_save_track+0x20/0x40 [ 36.791581] kasan_save_alloc_info+0x40/0x58 [ 36.791689] __kasan_kmalloc+0xd4/0xd8 [ 36.791831] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.792107] kasan_atomics+0xb8/0x2e0 [ 36.792257] kunit_try_run_case+0x170/0x3f0 [ 36.792370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.792636] kthread+0x328/0x630 [ 36.792801] ret_from_fork+0x10/0x20 [ 36.792900] [ 36.792954] The buggy address belongs to the object at fff00000c7805380 [ 36.792954] which belongs to the cache kmalloc-64 of size 64 [ 36.793104] The buggy address is located 0 bytes to the right of [ 36.793104] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.793278] [ 36.793341] The buggy address belongs to the physical page: [ 36.793424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.794295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.794494] page_type: f5(slab) [ 36.794694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.794795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.794849] page dumped because: kasan: bad access detected [ 36.794909] [ 36.794963] Memory state around the buggy address: [ 36.795016] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.795828] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.795969] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.796022] ^ [ 36.796098] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.796208] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.796260] ================================================================== [ 36.648826] ================================================================== [ 36.648929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 36.649066] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.649218] [ 36.649352] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.649765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.649926] Hardware name: linux,dummy-virt (DT) [ 36.650005] Call trace: [ 36.650089] show_stack+0x20/0x38 (C) [ 36.650215] dump_stack_lvl+0x8c/0xd0 [ 36.650470] print_report+0x118/0x608 [ 36.651088] kasan_report+0xdc/0x128 [ 36.652131] kasan_check_range+0x100/0x1a8 [ 36.652559] __kasan_check_write+0x20/0x30 [ 36.653389] kasan_atomics_helper+0xd3c/0x4858 [ 36.653523] kasan_atomics+0x198/0x2e0 [ 36.654137] kunit_try_run_case+0x170/0x3f0 [ 36.655235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.655717] kthread+0x328/0x630 [ 36.656349] ret_from_fork+0x10/0x20 [ 36.656479] [ 36.657413] Allocated by task 277: [ 36.657727] kasan_save_stack+0x3c/0x68 [ 36.658275] kasan_save_track+0x20/0x40 [ 36.658447] kasan_save_alloc_info+0x40/0x58 [ 36.659244] __kasan_kmalloc+0xd4/0xd8 [ 36.659788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.659905] kasan_atomics+0xb8/0x2e0 [ 36.660007] kunit_try_run_case+0x170/0x3f0 [ 36.661062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.661766] kthread+0x328/0x630 [ 36.662068] ret_from_fork+0x10/0x20 [ 36.662852] [ 36.662944] The buggy address belongs to the object at fff00000c7805380 [ 36.662944] which belongs to the cache kmalloc-64 of size 64 [ 36.663256] The buggy address is located 0 bytes to the right of [ 36.663256] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.664203] [ 36.664509] The buggy address belongs to the physical page: [ 36.664591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.664714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.664824] page_type: f5(slab) [ 36.667452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.667987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.668283] page dumped because: kasan: bad access detected [ 36.668671] [ 36.669265] Memory state around the buggy address: [ 36.669736] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.670499] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.670854] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.671769] ^ [ 36.671945] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.672074] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.673402] ================================================================== [ 37.063446] ================================================================== [ 37.063549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 37.063912] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.064063] [ 37.064257] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.064841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.064913] Hardware name: linux,dummy-virt (DT) [ 37.066414] Call trace: [ 37.066506] show_stack+0x20/0x38 (C) [ 37.066678] dump_stack_lvl+0x8c/0xd0 [ 37.067271] print_report+0x118/0x608 [ 37.067497] kasan_report+0xdc/0x128 [ 37.067832] kasan_check_range+0x100/0x1a8 [ 37.067987] __kasan_check_write+0x20/0x30 [ 37.068173] kasan_atomics_helper+0x17ec/0x4858 [ 37.068356] kasan_atomics+0x198/0x2e0 [ 37.068478] kunit_try_run_case+0x170/0x3f0 [ 37.068612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.069001] kthread+0x328/0x630 [ 37.069155] ret_from_fork+0x10/0x20 [ 37.069282] [ 37.069330] Allocated by task 277: [ 37.069401] kasan_save_stack+0x3c/0x68 [ 37.069611] kasan_save_track+0x20/0x40 [ 37.069857] kasan_save_alloc_info+0x40/0x58 [ 37.069972] __kasan_kmalloc+0xd4/0xd8 [ 37.070729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.070872] kasan_atomics+0xb8/0x2e0 [ 37.070987] kunit_try_run_case+0x170/0x3f0 [ 37.071124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.071327] kthread+0x328/0x630 [ 37.071440] ret_from_fork+0x10/0x20 [ 37.071542] [ 37.071603] The buggy address belongs to the object at fff00000c7805380 [ 37.071603] which belongs to the cache kmalloc-64 of size 64 [ 37.071745] The buggy address is located 0 bytes to the right of [ 37.071745] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.071897] [ 37.071953] The buggy address belongs to the physical page: [ 37.072047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.072635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.073193] page_type: f5(slab) [ 37.073365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.073569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.073675] page dumped because: kasan: bad access detected [ 37.074145] [ 37.074198] Memory state around the buggy address: [ 37.074432] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.074926] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.075211] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.075547] ^ [ 37.075668] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.075775] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.075870] ================================================================== [ 36.877669] ================================================================== [ 36.877976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.878312] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.878498] [ 36.878656] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.878868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.878943] Hardware name: linux,dummy-virt (DT) [ 36.879162] Call trace: [ 36.879223] show_stack+0x20/0x38 (C) [ 36.879520] dump_stack_lvl+0x8c/0xd0 [ 36.879647] print_report+0x118/0x608 [ 36.880062] kasan_report+0xdc/0x128 [ 36.880301] kasan_check_range+0x100/0x1a8 [ 36.880469] __kasan_check_write+0x20/0x30 [ 36.880595] kasan_atomics_helper+0x12d8/0x4858 [ 36.880725] kasan_atomics+0x198/0x2e0 [ 36.880845] kunit_try_run_case+0x170/0x3f0 [ 36.880986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.881164] kthread+0x328/0x630 [ 36.881738] ret_from_fork+0x10/0x20 [ 36.882110] [ 36.882178] Allocated by task 277: [ 36.882272] kasan_save_stack+0x3c/0x68 [ 36.882448] kasan_save_track+0x20/0x40 [ 36.883188] kasan_save_alloc_info+0x40/0x58 [ 36.883635] __kasan_kmalloc+0xd4/0xd8 [ 36.884022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.884191] kasan_atomics+0xb8/0x2e0 [ 36.884298] kunit_try_run_case+0x170/0x3f0 [ 36.884402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.884514] kthread+0x328/0x630 [ 36.884599] ret_from_fork+0x10/0x20 [ 36.884786] [ 36.885153] The buggy address belongs to the object at fff00000c7805380 [ 36.885153] which belongs to the cache kmalloc-64 of size 64 [ 36.885359] The buggy address is located 0 bytes to the right of [ 36.885359] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.886207] [ 36.886639] The buggy address belongs to the physical page: [ 36.886825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.887155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.887754] page_type: f5(slab) [ 36.887953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.888299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.888411] page dumped because: kasan: bad access detected [ 36.888492] [ 36.889064] Memory state around the buggy address: [ 36.889801] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.890056] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.890172] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.890267] ^ [ 36.890414] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.890524] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.890624] ================================================================== [ 36.823905] ================================================================== [ 36.824081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 36.824267] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.824546] [ 36.824682] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.824932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.825079] Hardware name: linux,dummy-virt (DT) [ 36.825157] Call trace: [ 36.825353] show_stack+0x20/0x38 (C) [ 36.825550] dump_stack_lvl+0x8c/0xd0 [ 36.825731] print_report+0x118/0x608 [ 36.825928] kasan_report+0xdc/0x128 [ 36.826067] kasan_check_range+0x100/0x1a8 [ 36.826193] __kasan_check_write+0x20/0x30 [ 36.826308] kasan_atomics_helper+0x1128/0x4858 [ 36.826427] kasan_atomics+0x198/0x2e0 [ 36.826600] kunit_try_run_case+0x170/0x3f0 [ 36.826727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.826898] kthread+0x328/0x630 [ 36.827141] ret_from_fork+0x10/0x20 [ 36.827280] [ 36.827335] Allocated by task 277: [ 36.827407] kasan_save_stack+0x3c/0x68 [ 36.827606] kasan_save_track+0x20/0x40 [ 36.827746] kasan_save_alloc_info+0x40/0x58 [ 36.827895] __kasan_kmalloc+0xd4/0xd8 [ 36.828095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.828206] kasan_atomics+0xb8/0x2e0 [ 36.828398] kunit_try_run_case+0x170/0x3f0 [ 36.828539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.828664] kthread+0x328/0x630 [ 36.828756] ret_from_fork+0x10/0x20 [ 36.828920] [ 36.829010] The buggy address belongs to the object at fff00000c7805380 [ 36.829010] which belongs to the cache kmalloc-64 of size 64 [ 36.829177] The buggy address is located 0 bytes to the right of [ 36.829177] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.829365] [ 36.829420] The buggy address belongs to the physical page: [ 36.829493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.829637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.829917] page_type: f5(slab) [ 36.830013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.830153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.830272] page dumped because: kasan: bad access detected [ 36.830368] [ 36.830479] Memory state around the buggy address: [ 36.830675] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.830810] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.830915] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.831011] ^ [ 36.831160] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.831282] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.831440] ================================================================== [ 36.859612] ================================================================== [ 36.859710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.859825] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.859941] [ 36.860817] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.861406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.861475] Hardware name: linux,dummy-virt (DT) [ 36.862044] Call trace: [ 36.862440] show_stack+0x20/0x38 (C) [ 36.862739] dump_stack_lvl+0x8c/0xd0 [ 36.862869] print_report+0x118/0x608 [ 36.862988] kasan_report+0xdc/0x128 [ 36.864291] kasan_check_range+0x100/0x1a8 [ 36.865209] __kasan_check_write+0x20/0x30 [ 36.865674] kasan_atomics_helper+0x126c/0x4858 [ 36.865951] kasan_atomics+0x198/0x2e0 [ 36.866090] kunit_try_run_case+0x170/0x3f0 [ 36.866217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.866656] kthread+0x328/0x630 [ 36.866983] ret_from_fork+0x10/0x20 [ 36.867225] [ 36.867441] Allocated by task 277: [ 36.868047] kasan_save_stack+0x3c/0x68 [ 36.868382] kasan_save_track+0x20/0x40 [ 36.868734] kasan_save_alloc_info+0x40/0x58 [ 36.868890] __kasan_kmalloc+0xd4/0xd8 [ 36.869494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.869625] kasan_atomics+0xb8/0x2e0 [ 36.869721] kunit_try_run_case+0x170/0x3f0 [ 36.869817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.869928] kthread+0x328/0x630 [ 36.870018] ret_from_fork+0x10/0x20 [ 36.870822] [ 36.871114] The buggy address belongs to the object at fff00000c7805380 [ 36.871114] which belongs to the cache kmalloc-64 of size 64 [ 36.871688] The buggy address is located 0 bytes to the right of [ 36.871688] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.871915] [ 36.872198] The buggy address belongs to the physical page: [ 36.872360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.872637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.873472] page_type: f5(slab) [ 36.873651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.873820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.874540] page dumped because: kasan: bad access detected [ 36.874771] [ 36.874949] Memory state around the buggy address: [ 36.875049] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.875878] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.875992] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.876337] ^ [ 36.876748] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.876875] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.876972] ==================================================================
[ 24.500418] ================================================================== [ 24.500727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 24.501751] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.502413] [ 24.502539] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.502617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.502636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.502667] Call Trace: [ 24.502689] <TASK> [ 24.502712] dump_stack_lvl+0x73/0xb0 [ 24.502761] print_report+0xd1/0x650 [ 24.502794] ? __virt_addr_valid+0x1db/0x2d0 [ 24.502837] ? kasan_atomics_helper+0x4b88/0x5450 [ 24.502873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.502913] ? kasan_atomics_helper+0x4b88/0x5450 [ 24.502949] kasan_report+0x141/0x180 [ 24.502981] ? kasan_atomics_helper+0x4b88/0x5450 [ 24.503016] __asan_report_load4_noabort+0x18/0x20 [ 24.503036] kasan_atomics_helper+0x4b88/0x5450 [ 24.503055] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.503073] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.503094] ? trace_hardirqs_on+0x37/0xe0 [ 24.503116] ? kasan_atomics+0x152/0x310 [ 24.503139] kasan_atomics+0x1dc/0x310 [ 24.503160] ? __pfx_kasan_atomics+0x10/0x10 [ 24.503180] ? __pfx_kasan_atomics+0x10/0x10 [ 24.503202] kunit_try_run_case+0x1a5/0x480 [ 24.503223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.503243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.503262] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.503282] ? __kthread_parkme+0x82/0x180 [ 24.503300] ? preempt_count_sub+0x50/0x80 [ 24.503320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.503341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.503361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.503399] kthread+0x337/0x6f0 [ 24.503419] ? trace_preempt_on+0x20/0xc0 [ 24.503439] ? __pfx_kthread+0x10/0x10 [ 24.503457] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.503475] ? calculate_sigpending+0x7b/0xa0 [ 24.503496] ? __pfx_kthread+0x10/0x10 [ 24.503515] ret_from_fork+0x116/0x1d0 [ 24.503532] ? __pfx_kthread+0x10/0x10 [ 24.503551] ret_from_fork_asm+0x1a/0x30 [ 24.503579] </TASK> [ 24.503591] [ 24.511155] Allocated by task 294: [ 24.511355] kasan_save_stack+0x45/0x70 [ 24.511647] kasan_save_track+0x18/0x40 [ 24.511933] kasan_save_alloc_info+0x3b/0x50 [ 24.512227] __kasan_kmalloc+0xb7/0xc0 [ 24.512507] __kmalloc_cache_noprof+0x189/0x420 [ 24.512815] kasan_atomics+0x95/0x310 [ 24.513005] kunit_try_run_case+0x1a5/0x480 [ 24.513168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.513475] kthread+0x337/0x6f0 [ 24.513696] ret_from_fork+0x116/0x1d0 [ 24.513993] ret_from_fork_asm+0x1a/0x30 [ 24.514248] [ 24.514331] The buggy address belongs to the object at ffff888102c1c600 [ 24.514331] which belongs to the cache kmalloc-64 of size 64 [ 24.515025] The buggy address is located 0 bytes to the right of [ 24.515025] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.515501] [ 24.515599] The buggy address belongs to the physical page: [ 24.515862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.516344] flags: 0x200000000000000(node=0|zone=2) [ 24.516572] page_type: f5(slab) [ 24.516714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.517337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.517642] page dumped because: kasan: bad access detected [ 24.517839] [ 24.517985] Memory state around the buggy address: [ 24.518247] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.518540] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.518777] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.518999] ^ [ 24.519163] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.519388] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.519842] ================================================================== [ 25.763042] ================================================================== [ 25.763446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 25.763697] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.763920] [ 25.764024] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.764097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.764118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.764153] Call Trace: [ 25.764179] <TASK> [ 25.764205] dump_stack_lvl+0x73/0xb0 [ 25.764254] print_report+0xd1/0x650 [ 25.764296] ? __virt_addr_valid+0x1db/0x2d0 [ 25.764339] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.764393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.764471] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.764508] kasan_report+0x141/0x180 [ 25.764545] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.764586] kasan_check_range+0x10c/0x1c0 [ 25.764620] __kasan_check_write+0x18/0x20 [ 25.764657] kasan_atomics_helper+0x1e12/0x5450 [ 25.764697] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.764737] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.764781] ? trace_hardirqs_on+0x37/0xe0 [ 25.764820] ? kasan_atomics+0x152/0x310 [ 25.764862] kasan_atomics+0x1dc/0x310 [ 25.764899] ? __pfx_kasan_atomics+0x10/0x10 [ 25.764941] ? __pfx_kasan_atomics+0x10/0x10 [ 25.764990] kunit_try_run_case+0x1a5/0x480 [ 25.765036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.765078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.765120] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.765165] ? __kthread_parkme+0x82/0x180 [ 25.765204] ? preempt_count_sub+0x50/0x80 [ 25.765250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.765316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.765361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.765416] kthread+0x337/0x6f0 [ 25.765455] ? trace_preempt_on+0x20/0xc0 [ 25.765499] ? __pfx_kthread+0x10/0x10 [ 25.765537] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.765590] ? calculate_sigpending+0x7b/0xa0 [ 25.765634] ? __pfx_kthread+0x10/0x10 [ 25.765674] ret_from_fork+0x116/0x1d0 [ 25.765708] ? __pfx_kthread+0x10/0x10 [ 25.765743] ret_from_fork_asm+0x1a/0x30 [ 25.765796] </TASK> [ 25.765834] [ 25.775705] Allocated by task 294: [ 25.776439] kasan_save_stack+0x45/0x70 [ 25.776646] kasan_save_track+0x18/0x40 [ 25.776823] kasan_save_alloc_info+0x3b/0x50 [ 25.777457] __kasan_kmalloc+0xb7/0xc0 [ 25.777635] __kmalloc_cache_noprof+0x189/0x420 [ 25.778151] kasan_atomics+0x95/0x310 [ 25.778485] kunit_try_run_case+0x1a5/0x480 [ 25.778653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.779083] kthread+0x337/0x6f0 [ 25.779327] ret_from_fork+0x116/0x1d0 [ 25.779574] ret_from_fork_asm+0x1a/0x30 [ 25.779796] [ 25.779944] The buggy address belongs to the object at ffff888102c1c600 [ 25.779944] which belongs to the cache kmalloc-64 of size 64 [ 25.780292] The buggy address is located 0 bytes to the right of [ 25.780292] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.780998] [ 25.781101] The buggy address belongs to the physical page: [ 25.781473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.781873] flags: 0x200000000000000(node=0|zone=2) [ 25.782132] page_type: f5(slab) [ 25.782359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.782659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.782978] page dumped because: kasan: bad access detected [ 25.783465] [ 25.783611] Memory state around the buggy address: [ 25.783785] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.784422] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.784663] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.784872] ^ [ 25.785219] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.785698] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.786229] ================================================================== [ 24.865304] ================================================================== [ 24.865857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 24.866434] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.866939] [ 24.867070] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.867157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.867184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.867222] Call Trace: [ 24.867251] <TASK> [ 24.867277] dump_stack_lvl+0x73/0xb0 [ 24.867331] print_report+0xd1/0x650 [ 24.867369] ? __virt_addr_valid+0x1db/0x2d0 [ 24.867424] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.867461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.867508] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.867550] kasan_report+0x141/0x180 [ 24.867589] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.867640] kasan_check_range+0x10c/0x1c0 [ 24.867679] __kasan_check_write+0x18/0x20 [ 24.867720] kasan_atomics_helper+0xa2b/0x5450 [ 24.867757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.867821] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.867897] ? trace_hardirqs_on+0x37/0xe0 [ 24.867939] ? kasan_atomics+0x152/0x310 [ 24.867989] kasan_atomics+0x1dc/0x310 [ 24.868034] ? __pfx_kasan_atomics+0x10/0x10 [ 24.868078] ? __pfx_kasan_atomics+0x10/0x10 [ 24.868129] kunit_try_run_case+0x1a5/0x480 [ 24.868175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.868218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.868261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.868302] ? __kthread_parkme+0x82/0x180 [ 24.868338] ? preempt_count_sub+0x50/0x80 [ 24.868373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.868424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.868465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.868503] kthread+0x337/0x6f0 [ 24.868538] ? trace_preempt_on+0x20/0xc0 [ 24.868578] ? __pfx_kthread+0x10/0x10 [ 24.868617] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.868657] ? calculate_sigpending+0x7b/0xa0 [ 24.868702] ? __pfx_kthread+0x10/0x10 [ 24.868742] ret_from_fork+0x116/0x1d0 [ 24.868779] ? __pfx_kthread+0x10/0x10 [ 24.868818] ret_from_fork_asm+0x1a/0x30 [ 24.868906] </TASK> [ 24.868951] [ 24.878420] Allocated by task 294: [ 24.878713] kasan_save_stack+0x45/0x70 [ 24.879076] kasan_save_track+0x18/0x40 [ 24.879338] kasan_save_alloc_info+0x3b/0x50 [ 24.879536] __kasan_kmalloc+0xb7/0xc0 [ 24.879686] __kmalloc_cache_noprof+0x189/0x420 [ 24.879885] kasan_atomics+0x95/0x310 [ 24.880035] kunit_try_run_case+0x1a5/0x480 [ 24.880227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.880453] kthread+0x337/0x6f0 [ 24.880712] ret_from_fork+0x116/0x1d0 [ 24.881050] ret_from_fork_asm+0x1a/0x30 [ 24.881362] [ 24.881526] The buggy address belongs to the object at ffff888102c1c600 [ 24.881526] which belongs to the cache kmalloc-64 of size 64 [ 24.882356] The buggy address is located 0 bytes to the right of [ 24.882356] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.883232] [ 24.883392] The buggy address belongs to the physical page: [ 24.883746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.884030] flags: 0x200000000000000(node=0|zone=2) [ 24.884399] page_type: f5(slab) [ 24.884643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.884942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.885171] page dumped because: kasan: bad access detected [ 24.885346] [ 24.885443] Memory state around the buggy address: [ 24.885607] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.885848] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.886359] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.886935] ^ [ 24.887272] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.887722] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.888210] ================================================================== [ 25.455049] ================================================================== [ 25.455616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 25.456009] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.456396] [ 25.456565] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.456648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.456673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.456710] Call Trace: [ 25.456737] <TASK> [ 25.456767] dump_stack_lvl+0x73/0xb0 [ 25.456819] print_report+0xd1/0x650 [ 25.456854] ? __virt_addr_valid+0x1db/0x2d0 [ 25.456879] ? kasan_atomics_helper+0x164f/0x5450 [ 25.456897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.456920] ? kasan_atomics_helper+0x164f/0x5450 [ 25.456938] kasan_report+0x141/0x180 [ 25.456958] ? kasan_atomics_helper+0x164f/0x5450 [ 25.456996] kasan_check_range+0x10c/0x1c0 [ 25.457016] __kasan_check_write+0x18/0x20 [ 25.457036] kasan_atomics_helper+0x164f/0x5450 [ 25.457056] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.457075] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.457096] ? trace_hardirqs_on+0x37/0xe0 [ 25.457114] ? kasan_atomics+0x152/0x310 [ 25.457137] kasan_atomics+0x1dc/0x310 [ 25.457157] ? __pfx_kasan_atomics+0x10/0x10 [ 25.457177] ? __pfx_kasan_atomics+0x10/0x10 [ 25.457200] kunit_try_run_case+0x1a5/0x480 [ 25.457221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.457240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.457260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.457280] ? __kthread_parkme+0x82/0x180 [ 25.457298] ? preempt_count_sub+0x50/0x80 [ 25.457318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.457339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.457360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.457399] kthread+0x337/0x6f0 [ 25.457452] ? trace_preempt_on+0x20/0xc0 [ 25.457487] ? __pfx_kthread+0x10/0x10 [ 25.457521] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.457559] ? calculate_sigpending+0x7b/0xa0 [ 25.457603] ? __pfx_kthread+0x10/0x10 [ 25.457645] ret_from_fork+0x116/0x1d0 [ 25.457683] ? __pfx_kthread+0x10/0x10 [ 25.457721] ret_from_fork_asm+0x1a/0x30 [ 25.457782] </TASK> [ 25.457807] [ 25.465650] Allocated by task 294: [ 25.465913] kasan_save_stack+0x45/0x70 [ 25.466223] kasan_save_track+0x18/0x40 [ 25.466544] kasan_save_alloc_info+0x3b/0x50 [ 25.466975] __kasan_kmalloc+0xb7/0xc0 [ 25.467188] __kmalloc_cache_noprof+0x189/0x420 [ 25.467462] kasan_atomics+0x95/0x310 [ 25.467614] kunit_try_run_case+0x1a5/0x480 [ 25.467772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.467952] kthread+0x337/0x6f0 [ 25.468090] ret_from_fork+0x116/0x1d0 [ 25.468236] ret_from_fork_asm+0x1a/0x30 [ 25.468590] [ 25.468727] The buggy address belongs to the object at ffff888102c1c600 [ 25.468727] which belongs to the cache kmalloc-64 of size 64 [ 25.469520] The buggy address is located 0 bytes to the right of [ 25.469520] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.470304] [ 25.470484] The buggy address belongs to the physical page: [ 25.470841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.471198] flags: 0x200000000000000(node=0|zone=2) [ 25.471437] page_type: f5(slab) [ 25.471615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.471850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.472341] page dumped because: kasan: bad access detected [ 25.472723] [ 25.472837] Memory state around the buggy address: [ 25.473039] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.473259] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.473485] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.473697] ^ [ 25.473878] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.474336] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.474802] ================================================================== [ 25.786901] ================================================================== [ 25.787445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 25.788043] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.788406] [ 25.788525] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.788607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.788632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.788672] Call Trace: [ 25.788700] <TASK> [ 25.788728] dump_stack_lvl+0x73/0xb0 [ 25.788782] print_report+0xd1/0x650 [ 25.788823] ? __virt_addr_valid+0x1db/0x2d0 [ 25.788863] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.788901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.788938] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.788975] kasan_report+0x141/0x180 [ 25.789011] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.789054] kasan_check_range+0x10c/0x1c0 [ 25.789095] __kasan_check_write+0x18/0x20 [ 25.789132] kasan_atomics_helper+0x1eaa/0x5450 [ 25.789165] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.789195] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.789226] ? trace_hardirqs_on+0x37/0xe0 [ 25.789255] ? kasan_atomics+0x152/0x310 [ 25.789290] kasan_atomics+0x1dc/0x310 [ 25.789319] ? __pfx_kasan_atomics+0x10/0x10 [ 25.789351] ? __pfx_kasan_atomics+0x10/0x10 [ 25.789405] kunit_try_run_case+0x1a5/0x480 [ 25.789442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.789474] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.789531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.789567] ? __kthread_parkme+0x82/0x180 [ 25.789599] ? preempt_count_sub+0x50/0x80 [ 25.789632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.789668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.789708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.789746] kthread+0x337/0x6f0 [ 25.789775] ? trace_preempt_on+0x20/0xc0 [ 25.789807] ? __pfx_kthread+0x10/0x10 [ 25.789837] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.789896] ? calculate_sigpending+0x7b/0xa0 [ 25.789937] ? __pfx_kthread+0x10/0x10 [ 25.789970] ret_from_fork+0x116/0x1d0 [ 25.790002] ? __pfx_kthread+0x10/0x10 [ 25.790052] ret_from_fork_asm+0x1a/0x30 [ 25.790105] </TASK> [ 25.790129] [ 25.798107] Allocated by task 294: [ 25.798267] kasan_save_stack+0x45/0x70 [ 25.798531] kasan_save_track+0x18/0x40 [ 25.798837] kasan_save_alloc_info+0x3b/0x50 [ 25.799188] __kasan_kmalloc+0xb7/0xc0 [ 25.799465] __kmalloc_cache_noprof+0x189/0x420 [ 25.799791] kasan_atomics+0x95/0x310 [ 25.800066] kunit_try_run_case+0x1a5/0x480 [ 25.800408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.800900] kthread+0x337/0x6f0 [ 25.801159] ret_from_fork+0x116/0x1d0 [ 25.801434] ret_from_fork_asm+0x1a/0x30 [ 25.801656] [ 25.801750] The buggy address belongs to the object at ffff888102c1c600 [ 25.801750] which belongs to the cache kmalloc-64 of size 64 [ 25.802100] The buggy address is located 0 bytes to the right of [ 25.802100] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.802807] [ 25.803011] The buggy address belongs to the physical page: [ 25.803354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.804218] flags: 0x200000000000000(node=0|zone=2) [ 25.804822] page_type: f5(slab) [ 25.805849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.806186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.806437] page dumped because: kasan: bad access detected [ 25.807530] [ 25.808057] Memory state around the buggy address: [ 25.808250] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.808646] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.809016] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.809311] ^ [ 25.809635] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.810207] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.810549] ================================================================== [ 25.287253] ================================================================== [ 25.287591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 25.287878] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.288171] [ 25.288321] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.288400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.288421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.288454] Call Trace: [ 25.288479] <TASK> [ 25.288503] dump_stack_lvl+0x73/0xb0 [ 25.288547] print_report+0xd1/0x650 [ 25.288584] ? __virt_addr_valid+0x1db/0x2d0 [ 25.288624] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.288658] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.288702] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.288741] kasan_report+0x141/0x180 [ 25.288779] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.288824] __asan_report_load4_noabort+0x18/0x20 [ 25.288901] kasan_atomics_helper+0x49ce/0x5450 [ 25.288947] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.288986] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.289020] ? trace_hardirqs_on+0x37/0xe0 [ 25.289053] ? kasan_atomics+0x152/0x310 [ 25.289094] kasan_atomics+0x1dc/0x310 [ 25.289131] ? __pfx_kasan_atomics+0x10/0x10 [ 25.289173] ? __pfx_kasan_atomics+0x10/0x10 [ 25.289224] kunit_try_run_case+0x1a5/0x480 [ 25.289272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.289314] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.289358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.289416] ? __kthread_parkme+0x82/0x180 [ 25.289456] ? preempt_count_sub+0x50/0x80 [ 25.289501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.289547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.289590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.289631] kthread+0x337/0x6f0 [ 25.289659] ? trace_preempt_on+0x20/0xc0 [ 25.289692] ? __pfx_kthread+0x10/0x10 [ 25.289725] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.289762] ? calculate_sigpending+0x7b/0xa0 [ 25.289798] ? __pfx_kthread+0x10/0x10 [ 25.289864] ret_from_fork+0x116/0x1d0 [ 25.289902] ? __pfx_kthread+0x10/0x10 [ 25.289938] ret_from_fork_asm+0x1a/0x30 [ 25.289995] </TASK> [ 25.290025] [ 25.300114] Allocated by task 294: [ 25.300289] kasan_save_stack+0x45/0x70 [ 25.300463] kasan_save_track+0x18/0x40 [ 25.300647] kasan_save_alloc_info+0x3b/0x50 [ 25.301289] __kasan_kmalloc+0xb7/0xc0 [ 25.301566] __kmalloc_cache_noprof+0x189/0x420 [ 25.301765] kasan_atomics+0x95/0x310 [ 25.302217] kunit_try_run_case+0x1a5/0x480 [ 25.302625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.302914] kthread+0x337/0x6f0 [ 25.303418] ret_from_fork+0x116/0x1d0 [ 25.303707] ret_from_fork_asm+0x1a/0x30 [ 25.304012] [ 25.304109] The buggy address belongs to the object at ffff888102c1c600 [ 25.304109] which belongs to the cache kmalloc-64 of size 64 [ 25.304604] The buggy address is located 0 bytes to the right of [ 25.304604] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.305199] [ 25.305814] The buggy address belongs to the physical page: [ 25.306028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.306671] flags: 0x200000000000000(node=0|zone=2) [ 25.306967] page_type: f5(slab) [ 25.307154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.307525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.307935] page dumped because: kasan: bad access detected [ 25.308206] [ 25.308364] Memory state around the buggy address: [ 25.308616] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.309083] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.309448] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.309764] ^ [ 25.310039] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.310420] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.310681] ================================================================== [ 24.787345] ================================================================== [ 24.787745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 24.788041] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.788532] [ 24.788691] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.788770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.788793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.788830] Call Trace: [ 24.789160] <TASK> [ 24.789186] dump_stack_lvl+0x73/0xb0 [ 24.789222] print_report+0xd1/0x650 [ 24.789241] ? __virt_addr_valid+0x1db/0x2d0 [ 24.789261] ? kasan_atomics_helper+0x860/0x5450 [ 24.789279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.789301] ? kasan_atomics_helper+0x860/0x5450 [ 24.789319] kasan_report+0x141/0x180 [ 24.789338] ? kasan_atomics_helper+0x860/0x5450 [ 24.789360] kasan_check_range+0x10c/0x1c0 [ 24.789397] __kasan_check_write+0x18/0x20 [ 24.789421] kasan_atomics_helper+0x860/0x5450 [ 24.789441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.789460] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.789481] ? trace_hardirqs_on+0x37/0xe0 [ 24.789499] ? kasan_atomics+0x152/0x310 [ 24.789522] kasan_atomics+0x1dc/0x310 [ 24.789541] ? __pfx_kasan_atomics+0x10/0x10 [ 24.789561] ? __pfx_kasan_atomics+0x10/0x10 [ 24.789584] kunit_try_run_case+0x1a5/0x480 [ 24.789606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.789625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.789645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.789664] ? __kthread_parkme+0x82/0x180 [ 24.789682] ? preempt_count_sub+0x50/0x80 [ 24.789702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.789723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.789743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.789763] kthread+0x337/0x6f0 [ 24.789780] ? trace_preempt_on+0x20/0xc0 [ 24.789799] ? __pfx_kthread+0x10/0x10 [ 24.789817] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.789858] ? calculate_sigpending+0x7b/0xa0 [ 24.789881] ? __pfx_kthread+0x10/0x10 [ 24.789900] ret_from_fork+0x116/0x1d0 [ 24.789917] ? __pfx_kthread+0x10/0x10 [ 24.789935] ret_from_fork_asm+0x1a/0x30 [ 24.789962] </TASK> [ 24.789974] [ 24.801630] Allocated by task 294: [ 24.801776] kasan_save_stack+0x45/0x70 [ 24.802045] kasan_save_track+0x18/0x40 [ 24.802246] kasan_save_alloc_info+0x3b/0x50 [ 24.802496] __kasan_kmalloc+0xb7/0xc0 [ 24.802688] __kmalloc_cache_noprof+0x189/0x420 [ 24.802904] kasan_atomics+0x95/0x310 [ 24.803119] kunit_try_run_case+0x1a5/0x480 [ 24.803348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.804052] kthread+0x337/0x6f0 [ 24.804192] ret_from_fork+0x116/0x1d0 [ 24.804591] ret_from_fork_asm+0x1a/0x30 [ 24.804868] [ 24.805277] The buggy address belongs to the object at ffff888102c1c600 [ 24.805277] which belongs to the cache kmalloc-64 of size 64 [ 24.805807] The buggy address is located 0 bytes to the right of [ 24.805807] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.806496] [ 24.806661] The buggy address belongs to the physical page: [ 24.807372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.807733] flags: 0x200000000000000(node=0|zone=2) [ 24.808128] page_type: f5(slab) [ 24.808256] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.808799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.809358] page dumped because: kasan: bad access detected [ 24.809796] [ 24.809916] Memory state around the buggy address: [ 24.810083] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.810559] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.811326] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.811614] ^ [ 24.811890] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.812465] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.813037] ================================================================== [ 25.005462] ================================================================== [ 25.005953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 25.006541] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.006993] [ 25.007159] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.007255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.007277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.007307] Call Trace: [ 25.007330] <TASK> [ 25.007356] dump_stack_lvl+0x73/0xb0 [ 25.007427] print_report+0xd1/0x650 [ 25.007469] ? __virt_addr_valid+0x1db/0x2d0 [ 25.007514] ? kasan_atomics_helper+0xde0/0x5450 [ 25.007552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.007599] ? kasan_atomics_helper+0xde0/0x5450 [ 25.007640] kasan_report+0x141/0x180 [ 25.007682] ? kasan_atomics_helper+0xde0/0x5450 [ 25.007733] kasan_check_range+0x10c/0x1c0 [ 25.007776] __kasan_check_write+0x18/0x20 [ 25.007819] kasan_atomics_helper+0xde0/0x5450 [ 25.007899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.007943] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.007989] ? trace_hardirqs_on+0x37/0xe0 [ 25.008030] ? kasan_atomics+0x152/0x310 [ 25.008080] kasan_atomics+0x1dc/0x310 [ 25.008124] ? __pfx_kasan_atomics+0x10/0x10 [ 25.008168] ? __pfx_kasan_atomics+0x10/0x10 [ 25.008221] kunit_try_run_case+0x1a5/0x480 [ 25.008266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.008307] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.008349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.008398] ? __kthread_parkme+0x82/0x180 [ 25.008434] ? preempt_count_sub+0x50/0x80 [ 25.008493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.008535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.008574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.008625] kthread+0x337/0x6f0 [ 25.008660] ? trace_preempt_on+0x20/0xc0 [ 25.008699] ? __pfx_kthread+0x10/0x10 [ 25.008736] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.008775] ? calculate_sigpending+0x7b/0xa0 [ 25.008819] ? __pfx_kthread+0x10/0x10 [ 25.008901] ret_from_fork+0x116/0x1d0 [ 25.008937] ? __pfx_kthread+0x10/0x10 [ 25.008974] ret_from_fork_asm+0x1a/0x30 [ 25.009028] </TASK> [ 25.009052] [ 25.017285] Allocated by task 294: [ 25.017540] kasan_save_stack+0x45/0x70 [ 25.017879] kasan_save_track+0x18/0x40 [ 25.018181] kasan_save_alloc_info+0x3b/0x50 [ 25.018535] __kasan_kmalloc+0xb7/0xc0 [ 25.018762] __kmalloc_cache_noprof+0x189/0x420 [ 25.019090] kasan_atomics+0x95/0x310 [ 25.019235] kunit_try_run_case+0x1a5/0x480 [ 25.019401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.019574] kthread+0x337/0x6f0 [ 25.019702] ret_from_fork+0x116/0x1d0 [ 25.019873] ret_from_fork_asm+0x1a/0x30 [ 25.020027] [ 25.020149] The buggy address belongs to the object at ffff888102c1c600 [ 25.020149] which belongs to the cache kmalloc-64 of size 64 [ 25.020493] The buggy address is located 0 bytes to the right of [ 25.020493] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.021070] [ 25.021230] The buggy address belongs to the physical page: [ 25.021623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.022185] flags: 0x200000000000000(node=0|zone=2) [ 25.022573] page_type: f5(slab) [ 25.022866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.023359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.023867] page dumped because: kasan: bad access detected [ 25.024237] [ 25.024394] Memory state around the buggy address: [ 25.024727] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.025213] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.025612] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.025873] ^ [ 25.026232] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.026541] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.026773] ================================================================== [ 25.543046] ================================================================== [ 25.543555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 25.544072] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.544724] [ 25.544891] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.544969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.544988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.545017] Call Trace: [ 25.545054] <TASK> [ 25.545079] dump_stack_lvl+0x73/0xb0 [ 25.545129] print_report+0xd1/0x650 [ 25.545169] ? __virt_addr_valid+0x1db/0x2d0 [ 25.545213] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.545253] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.545297] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.545339] kasan_report+0x141/0x180 [ 25.545394] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.545434] kasan_check_range+0x10c/0x1c0 [ 25.545468] __kasan_check_write+0x18/0x20 [ 25.545499] kasan_atomics_helper+0x18b1/0x5450 [ 25.545532] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.545563] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.545598] ? trace_hardirqs_on+0x37/0xe0 [ 25.545629] ? kasan_atomics+0x152/0x310 [ 25.545664] kasan_atomics+0x1dc/0x310 [ 25.545696] ? __pfx_kasan_atomics+0x10/0x10 [ 25.545732] ? __pfx_kasan_atomics+0x10/0x10 [ 25.545774] kunit_try_run_case+0x1a5/0x480 [ 25.545814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.545880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.545917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.545952] ? __kthread_parkme+0x82/0x180 [ 25.545991] ? preempt_count_sub+0x50/0x80 [ 25.546046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.546096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.546146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.546195] kthread+0x337/0x6f0 [ 25.546233] ? trace_preempt_on+0x20/0xc0 [ 25.546276] ? __pfx_kthread+0x10/0x10 [ 25.546319] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.546360] ? calculate_sigpending+0x7b/0xa0 [ 25.546422] ? __pfx_kthread+0x10/0x10 [ 25.546468] ret_from_fork+0x116/0x1d0 [ 25.546509] ? __pfx_kthread+0x10/0x10 [ 25.546553] ret_from_fork_asm+0x1a/0x30 [ 25.546616] </TASK> [ 25.546641] [ 25.557967] Allocated by task 294: [ 25.558145] kasan_save_stack+0x45/0x70 [ 25.558309] kasan_save_track+0x18/0x40 [ 25.558615] kasan_save_alloc_info+0x3b/0x50 [ 25.558893] __kasan_kmalloc+0xb7/0xc0 [ 25.559069] __kmalloc_cache_noprof+0x189/0x420 [ 25.559259] kasan_atomics+0x95/0x310 [ 25.560493] kunit_try_run_case+0x1a5/0x480 [ 25.560860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.561111] kthread+0x337/0x6f0 [ 25.561265] ret_from_fork+0x116/0x1d0 [ 25.561449] ret_from_fork_asm+0x1a/0x30 [ 25.561635] [ 25.561737] The buggy address belongs to the object at ffff888102c1c600 [ 25.561737] which belongs to the cache kmalloc-64 of size 64 [ 25.562748] The buggy address is located 0 bytes to the right of [ 25.562748] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.563100] [ 25.563158] The buggy address belongs to the physical page: [ 25.563252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.563393] flags: 0x200000000000000(node=0|zone=2) [ 25.564192] page_type: f5(slab) [ 25.564342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.564739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.565105] page dumped because: kasan: bad access detected [ 25.565341] [ 25.565450] Memory state around the buggy address: [ 25.565670] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.565895] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.566134] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.566439] ^ [ 25.566746] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.567206] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.567509] ================================================================== [ 25.637711] ================================================================== [ 25.638296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 25.638602] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.639989] [ 25.640114] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.640164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.640177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.640196] Call Trace: [ 25.640211] <TASK> [ 25.640231] dump_stack_lvl+0x73/0xb0 [ 25.640278] print_report+0xd1/0x650 [ 25.640315] ? __virt_addr_valid+0x1db/0x2d0 [ 25.640351] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.640521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.640554] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.640584] kasan_report+0x141/0x180 [ 25.640605] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.640628] kasan_check_range+0x10c/0x1c0 [ 25.640648] __kasan_check_write+0x18/0x20 [ 25.640667] kasan_atomics_helper+0x1b22/0x5450 [ 25.640687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.640707] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.640728] ? trace_hardirqs_on+0x37/0xe0 [ 25.640747] ? kasan_atomics+0x152/0x310 [ 25.640770] kasan_atomics+0x1dc/0x310 [ 25.640790] ? __pfx_kasan_atomics+0x10/0x10 [ 25.640810] ? __pfx_kasan_atomics+0x10/0x10 [ 25.640858] kunit_try_run_case+0x1a5/0x480 [ 25.640881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.640901] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.640920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.640940] ? __kthread_parkme+0x82/0x180 [ 25.640957] ? preempt_count_sub+0x50/0x80 [ 25.640978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.640998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.641019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.641039] kthread+0x337/0x6f0 [ 25.641056] ? trace_preempt_on+0x20/0xc0 [ 25.641075] ? __pfx_kthread+0x10/0x10 [ 25.641093] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.641112] ? calculate_sigpending+0x7b/0xa0 [ 25.641132] ? __pfx_kthread+0x10/0x10 [ 25.641151] ret_from_fork+0x116/0x1d0 [ 25.641168] ? __pfx_kthread+0x10/0x10 [ 25.641186] ret_from_fork_asm+0x1a/0x30 [ 25.641213] </TASK> [ 25.641224] [ 25.653124] Allocated by task 294: [ 25.653547] kasan_save_stack+0x45/0x70 [ 25.653779] kasan_save_track+0x18/0x40 [ 25.654073] kasan_save_alloc_info+0x3b/0x50 [ 25.654352] __kasan_kmalloc+0xb7/0xc0 [ 25.654608] __kmalloc_cache_noprof+0x189/0x420 [ 25.655298] kasan_atomics+0x95/0x310 [ 25.655509] kunit_try_run_case+0x1a5/0x480 [ 25.655643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.656117] kthread+0x337/0x6f0 [ 25.656321] ret_from_fork+0x116/0x1d0 [ 25.656729] ret_from_fork_asm+0x1a/0x30 [ 25.657196] [ 25.657293] The buggy address belongs to the object at ffff888102c1c600 [ 25.657293] which belongs to the cache kmalloc-64 of size 64 [ 25.657937] The buggy address is located 0 bytes to the right of [ 25.657937] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.658700] [ 25.658786] The buggy address belongs to the physical page: [ 25.659190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.660037] flags: 0x200000000000000(node=0|zone=2) [ 25.660279] page_type: f5(slab) [ 25.660416] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.660960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.661521] page dumped because: kasan: bad access detected [ 25.661805] [ 25.662094] Memory state around the buggy address: [ 25.662577] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.662904] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.663725] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.664035] ^ [ 25.664513] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.664824] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.665187] ================================================================== [ 26.002100] ================================================================== [ 26.002650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 26.003212] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 26.003872] [ 26.004066] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 26.004309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.004346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.004392] Call Trace: [ 26.004872] <TASK> [ 26.004903] dump_stack_lvl+0x73/0xb0 [ 26.004941] print_report+0xd1/0x650 [ 26.004963] ? __virt_addr_valid+0x1db/0x2d0 [ 26.004984] ? kasan_atomics_helper+0x224c/0x5450 [ 26.005003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.005025] ? kasan_atomics_helper+0x224c/0x5450 [ 26.005044] kasan_report+0x141/0x180 [ 26.005064] ? kasan_atomics_helper+0x224c/0x5450 [ 26.005086] kasan_check_range+0x10c/0x1c0 [ 26.005107] __kasan_check_write+0x18/0x20 [ 26.005127] kasan_atomics_helper+0x224c/0x5450 [ 26.005147] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.005166] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.005186] ? trace_hardirqs_on+0x37/0xe0 [ 26.005205] ? kasan_atomics+0x152/0x310 [ 26.005227] kasan_atomics+0x1dc/0x310 [ 26.005246] ? __pfx_kasan_atomics+0x10/0x10 [ 26.005266] ? __pfx_kasan_atomics+0x10/0x10 [ 26.005289] kunit_try_run_case+0x1a5/0x480 [ 26.005309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.005329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.005348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.005368] ? __kthread_parkme+0x82/0x180 [ 26.005408] ? preempt_count_sub+0x50/0x80 [ 26.005443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.005483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.005524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.005568] kthread+0x337/0x6f0 [ 26.005604] ? trace_preempt_on+0x20/0xc0 [ 26.005642] ? __pfx_kthread+0x10/0x10 [ 26.005662] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.005681] ? calculate_sigpending+0x7b/0xa0 [ 26.005702] ? __pfx_kthread+0x10/0x10 [ 26.005721] ret_from_fork+0x116/0x1d0 [ 26.005739] ? __pfx_kthread+0x10/0x10 [ 26.005757] ret_from_fork_asm+0x1a/0x30 [ 26.005784] </TASK> [ 26.005795] [ 26.015812] Allocated by task 294: [ 26.016082] kasan_save_stack+0x45/0x70 [ 26.016374] kasan_save_track+0x18/0x40 [ 26.016571] kasan_save_alloc_info+0x3b/0x50 [ 26.016730] __kasan_kmalloc+0xb7/0xc0 [ 26.017107] __kmalloc_cache_noprof+0x189/0x420 [ 26.017431] kasan_atomics+0x95/0x310 [ 26.017694] kunit_try_run_case+0x1a5/0x480 [ 26.017853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.018049] kthread+0x337/0x6f0 [ 26.018200] ret_from_fork+0x116/0x1d0 [ 26.018356] ret_from_fork_asm+0x1a/0x30 [ 26.018540] [ 26.018635] The buggy address belongs to the object at ffff888102c1c600 [ 26.018635] which belongs to the cache kmalloc-64 of size 64 [ 26.019473] The buggy address is located 0 bytes to the right of [ 26.019473] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 26.020198] [ 26.020407] The buggy address belongs to the physical page: [ 26.020723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 26.021407] flags: 0x200000000000000(node=0|zone=2) [ 26.021545] page_type: f5(slab) [ 26.021621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.021740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.022645] page dumped because: kasan: bad access detected [ 26.023313] [ 26.023645] Memory state around the buggy address: [ 26.024085] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.024414] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.024871] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.025237] ^ [ 26.025592] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.026241] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.026541] ================================================================== [ 25.881346] ================================================================== [ 25.881770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 25.882508] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.883023] [ 25.883152] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.883235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.883261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.883300] Call Trace: [ 25.883328] <TASK> [ 25.883357] dump_stack_lvl+0x73/0xb0 [ 25.883426] print_report+0xd1/0x650 [ 25.883469] ? __virt_addr_valid+0x1db/0x2d0 [ 25.883512] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.883552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.883597] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.883639] kasan_report+0x141/0x180 [ 25.883680] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.883730] __asan_report_load8_noabort+0x18/0x20 [ 25.883775] kasan_atomics_helper+0x4f98/0x5450 [ 25.883813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.883859] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.883897] ? trace_hardirqs_on+0x37/0xe0 [ 25.883933] ? kasan_atomics+0x152/0x310 [ 25.883971] kasan_atomics+0x1dc/0x310 [ 25.884004] ? __pfx_kasan_atomics+0x10/0x10 [ 25.884045] ? __pfx_kasan_atomics+0x10/0x10 [ 25.884090] kunit_try_run_case+0x1a5/0x480 [ 25.884136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.884178] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.884221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.884265] ? __kthread_parkme+0x82/0x180 [ 25.884304] ? preempt_count_sub+0x50/0x80 [ 25.884349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.884410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.884456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.884499] kthread+0x337/0x6f0 [ 25.884539] ? trace_preempt_on+0x20/0xc0 [ 25.884581] ? __pfx_kthread+0x10/0x10 [ 25.884620] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.884657] ? calculate_sigpending+0x7b/0xa0 [ 25.884701] ? __pfx_kthread+0x10/0x10 [ 25.884742] ret_from_fork+0x116/0x1d0 [ 25.884780] ? __pfx_kthread+0x10/0x10 [ 25.884819] ret_from_fork_asm+0x1a/0x30 [ 25.884872] </TASK> [ 25.884892] [ 25.893270] Allocated by task 294: [ 25.893541] kasan_save_stack+0x45/0x70 [ 25.893823] kasan_save_track+0x18/0x40 [ 25.894071] kasan_save_alloc_info+0x3b/0x50 [ 25.894243] __kasan_kmalloc+0xb7/0xc0 [ 25.894494] __kmalloc_cache_noprof+0x189/0x420 [ 25.894718] kasan_atomics+0x95/0x310 [ 25.895000] kunit_try_run_case+0x1a5/0x480 [ 25.895213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.895530] kthread+0x337/0x6f0 [ 25.895727] ret_from_fork+0x116/0x1d0 [ 25.896023] ret_from_fork_asm+0x1a/0x30 [ 25.896191] [ 25.896325] The buggy address belongs to the object at ffff888102c1c600 [ 25.896325] which belongs to the cache kmalloc-64 of size 64 [ 25.896827] The buggy address is located 0 bytes to the right of [ 25.896827] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.897301] [ 25.897413] The buggy address belongs to the physical page: [ 25.897589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.897831] flags: 0x200000000000000(node=0|zone=2) [ 25.898189] page_type: f5(slab) [ 25.898459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.898967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.899408] page dumped because: kasan: bad access detected [ 25.899587] [ 25.899673] Memory state around the buggy address: [ 25.899870] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.900288] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.900737] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.901991] ^ [ 25.902364] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.902721] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.904351] ================================================================== [ 25.218016] ================================================================== [ 25.218755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 25.219288] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.219765] [ 25.219981] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.220063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.220085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.220117] Call Trace: [ 25.220144] <TASK> [ 25.220172] dump_stack_lvl+0x73/0xb0 [ 25.220228] print_report+0xd1/0x650 [ 25.220271] ? __virt_addr_valid+0x1db/0x2d0 [ 25.220315] ? kasan_atomics_helper+0x1217/0x5450 [ 25.220353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.220414] ? kasan_atomics_helper+0x1217/0x5450 [ 25.220456] kasan_report+0x141/0x180 [ 25.220499] ? kasan_atomics_helper+0x1217/0x5450 [ 25.220550] kasan_check_range+0x10c/0x1c0 [ 25.220594] __kasan_check_write+0x18/0x20 [ 25.220638] kasan_atomics_helper+0x1217/0x5450 [ 25.220683] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.220724] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.220769] ? trace_hardirqs_on+0x37/0xe0 [ 25.220806] ? kasan_atomics+0x152/0x310 [ 25.220881] kasan_atomics+0x1dc/0x310 [ 25.220919] ? __pfx_kasan_atomics+0x10/0x10 [ 25.220983] ? __pfx_kasan_atomics+0x10/0x10 [ 25.221027] kunit_try_run_case+0x1a5/0x480 [ 25.221081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.221123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.221171] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.221216] ? __kthread_parkme+0x82/0x180 [ 25.221266] ? preempt_count_sub+0x50/0x80 [ 25.221308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.221349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.221404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.221448] kthread+0x337/0x6f0 [ 25.221486] ? trace_preempt_on+0x20/0xc0 [ 25.221526] ? __pfx_kthread+0x10/0x10 [ 25.221564] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.221604] ? calculate_sigpending+0x7b/0xa0 [ 25.221649] ? __pfx_kthread+0x10/0x10 [ 25.221693] ret_from_fork+0x116/0x1d0 [ 25.221729] ? __pfx_kthread+0x10/0x10 [ 25.221765] ret_from_fork_asm+0x1a/0x30 [ 25.221855] </TASK> [ 25.221881] [ 25.230067] Allocated by task 294: [ 25.230348] kasan_save_stack+0x45/0x70 [ 25.230696] kasan_save_track+0x18/0x40 [ 25.231014] kasan_save_alloc_info+0x3b/0x50 [ 25.231218] __kasan_kmalloc+0xb7/0xc0 [ 25.231370] __kmalloc_cache_noprof+0x189/0x420 [ 25.231712] kasan_atomics+0x95/0x310 [ 25.232016] kunit_try_run_case+0x1a5/0x480 [ 25.232230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.232553] kthread+0x337/0x6f0 [ 25.232788] ret_from_fork+0x116/0x1d0 [ 25.233014] ret_from_fork_asm+0x1a/0x30 [ 25.233292] [ 25.233431] The buggy address belongs to the object at ffff888102c1c600 [ 25.233431] which belongs to the cache kmalloc-64 of size 64 [ 25.233877] The buggy address is located 0 bytes to the right of [ 25.233877] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.234572] [ 25.234729] The buggy address belongs to the physical page: [ 25.235120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.235639] flags: 0x200000000000000(node=0|zone=2) [ 25.235819] page_type: f5(slab) [ 25.235987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.236218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.236452] page dumped because: kasan: bad access detected [ 25.236627] [ 25.236711] Memory state around the buggy address: [ 25.236896] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.237108] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.237576] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.238078] ^ [ 25.238449] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.238971] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.239417] ================================================================== [ 25.688466] ================================================================== [ 25.688849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 25.689432] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.689731] [ 25.689846] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.689929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.689953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.689990] Call Trace: [ 25.690029] <TASK> [ 25.690060] dump_stack_lvl+0x73/0xb0 [ 25.690120] print_report+0xd1/0x650 [ 25.690153] ? __virt_addr_valid+0x1db/0x2d0 [ 25.690185] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.690214] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.690255] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.690289] kasan_report+0x141/0x180 [ 25.690326] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.690394] __asan_report_load8_noabort+0x18/0x20 [ 25.690445] kasan_atomics_helper+0x4f30/0x5450 [ 25.690493] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.690538] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.690587] ? trace_hardirqs_on+0x37/0xe0 [ 25.690630] ? kasan_atomics+0x152/0x310 [ 25.690683] kasan_atomics+0x1dc/0x310 [ 25.690731] ? __pfx_kasan_atomics+0x10/0x10 [ 25.690780] ? __pfx_kasan_atomics+0x10/0x10 [ 25.690833] kunit_try_run_case+0x1a5/0x480 [ 25.690881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.690927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.690973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.691021] ? __kthread_parkme+0x82/0x180 [ 25.691060] ? preempt_count_sub+0x50/0x80 [ 25.691126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.691163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.691202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.691242] kthread+0x337/0x6f0 [ 25.691280] ? trace_preempt_on+0x20/0xc0 [ 25.691322] ? __pfx_kthread+0x10/0x10 [ 25.691363] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.691417] ? calculate_sigpending+0x7b/0xa0 [ 25.691463] ? __pfx_kthread+0x10/0x10 [ 25.691506] ret_from_fork+0x116/0x1d0 [ 25.691546] ? __pfx_kthread+0x10/0x10 [ 25.691585] ret_from_fork_asm+0x1a/0x30 [ 25.691646] </TASK> [ 25.691673] [ 25.701564] Allocated by task 294: [ 25.702320] kasan_save_stack+0x45/0x70 [ 25.702546] kasan_save_track+0x18/0x40 [ 25.702711] kasan_save_alloc_info+0x3b/0x50 [ 25.702900] __kasan_kmalloc+0xb7/0xc0 [ 25.703061] __kmalloc_cache_noprof+0x189/0x420 [ 25.703230] kasan_atomics+0x95/0x310 [ 25.703387] kunit_try_run_case+0x1a5/0x480 [ 25.703548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.703729] kthread+0x337/0x6f0 [ 25.703857] ret_from_fork+0x116/0x1d0 [ 25.703937] ret_from_fork_asm+0x1a/0x30 [ 25.704015] [ 25.704060] The buggy address belongs to the object at ffff888102c1c600 [ 25.704060] which belongs to the cache kmalloc-64 of size 64 [ 25.704238] The buggy address is located 0 bytes to the right of [ 25.704238] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.704644] [ 25.704817] The buggy address belongs to the physical page: [ 25.705299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.705928] flags: 0x200000000000000(node=0|zone=2) [ 25.706333] page_type: f5(slab) [ 25.706659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.707263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.707781] page dumped because: kasan: bad access detected [ 25.708254] [ 25.708428] Memory state around the buggy address: [ 25.708812] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.709315] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.709602] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.710416] ^ [ 25.710729] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.711174] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.711575] ================================================================== [ 25.240339] ================================================================== [ 25.240890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 25.241302] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.241589] [ 25.241739] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.241822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.241877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.241917] Call Trace: [ 25.241946] <TASK> [ 25.241974] dump_stack_lvl+0x73/0xb0 [ 25.242040] print_report+0xd1/0x650 [ 25.242089] ? __virt_addr_valid+0x1db/0x2d0 [ 25.242137] ? kasan_atomics_helper+0x49e8/0x5450 [ 25.242181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.242231] ? kasan_atomics_helper+0x49e8/0x5450 [ 25.242273] kasan_report+0x141/0x180 [ 25.242318] ? kasan_atomics_helper+0x49e8/0x5450 [ 25.242372] __asan_report_load4_noabort+0x18/0x20 [ 25.242428] kasan_atomics_helper+0x49e8/0x5450 [ 25.242494] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.242539] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.242580] ? trace_hardirqs_on+0x37/0xe0 [ 25.242618] ? kasan_atomics+0x152/0x310 [ 25.242661] kasan_atomics+0x1dc/0x310 [ 25.242698] ? __pfx_kasan_atomics+0x10/0x10 [ 25.242740] ? __pfx_kasan_atomics+0x10/0x10 [ 25.242807] kunit_try_run_case+0x1a5/0x480 [ 25.242897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.242944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.242998] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.243046] ? __kthread_parkme+0x82/0x180 [ 25.243086] ? preempt_count_sub+0x50/0x80 [ 25.243130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.243174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.243217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.243259] kthread+0x337/0x6f0 [ 25.243294] ? trace_preempt_on+0x20/0xc0 [ 25.243336] ? __pfx_kthread+0x10/0x10 [ 25.243389] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.243434] ? calculate_sigpending+0x7b/0xa0 [ 25.243479] ? __pfx_kthread+0x10/0x10 [ 25.243520] ret_from_fork+0x116/0x1d0 [ 25.243560] ? __pfx_kthread+0x10/0x10 [ 25.243600] ret_from_fork_asm+0x1a/0x30 [ 25.243659] </TASK> [ 25.243684] [ 25.251938] Allocated by task 294: [ 25.252090] kasan_save_stack+0x45/0x70 [ 25.252255] kasan_save_track+0x18/0x40 [ 25.252455] kasan_save_alloc_info+0x3b/0x50 [ 25.252762] __kasan_kmalloc+0xb7/0xc0 [ 25.253063] __kmalloc_cache_noprof+0x189/0x420 [ 25.253396] kasan_atomics+0x95/0x310 [ 25.253659] kunit_try_run_case+0x1a5/0x480 [ 25.253980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.254372] kthread+0x337/0x6f0 [ 25.254634] ret_from_fork+0x116/0x1d0 [ 25.254820] ret_from_fork_asm+0x1a/0x30 [ 25.255079] [ 25.255172] The buggy address belongs to the object at ffff888102c1c600 [ 25.255172] which belongs to the cache kmalloc-64 of size 64 [ 25.255704] The buggy address is located 0 bytes to the right of [ 25.255704] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.256404] [ 25.256502] The buggy address belongs to the physical page: [ 25.256679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.257204] flags: 0x200000000000000(node=0|zone=2) [ 25.257562] page_type: f5(slab) [ 25.257812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.258113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.258353] page dumped because: kasan: bad access detected [ 25.258757] [ 25.258946] Memory state around the buggy address: [ 25.259284] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.259753] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.259999] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.260257] ^ [ 25.260590] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.261071] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.261491] ================================================================== [ 24.760585] ================================================================== [ 24.761109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 24.762149] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.762411] [ 24.763292] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.763352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.763366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.763403] Call Trace: [ 24.763428] <TASK> [ 24.763452] dump_stack_lvl+0x73/0xb0 [ 24.763503] print_report+0xd1/0x650 [ 24.763540] ? __virt_addr_valid+0x1db/0x2d0 [ 24.763613] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.763651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.763694] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.763741] kasan_report+0x141/0x180 [ 24.763773] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.763803] kasan_check_range+0x10c/0x1c0 [ 24.763835] __kasan_check_write+0x18/0x20 [ 24.763869] kasan_atomics_helper+0x7c7/0x5450 [ 24.763890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.763910] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.763930] ? trace_hardirqs_on+0x37/0xe0 [ 24.763949] ? kasan_atomics+0x152/0x310 [ 24.763971] kasan_atomics+0x1dc/0x310 [ 24.763991] ? __pfx_kasan_atomics+0x10/0x10 [ 24.764011] ? __pfx_kasan_atomics+0x10/0x10 [ 24.764034] kunit_try_run_case+0x1a5/0x480 [ 24.764055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.764074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.764094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.764113] ? __kthread_parkme+0x82/0x180 [ 24.764131] ? preempt_count_sub+0x50/0x80 [ 24.764152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.764172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.764193] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.764213] kthread+0x337/0x6f0 [ 24.764230] ? trace_preempt_on+0x20/0xc0 [ 24.764249] ? __pfx_kthread+0x10/0x10 [ 24.764267] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.764285] ? calculate_sigpending+0x7b/0xa0 [ 24.764305] ? __pfx_kthread+0x10/0x10 [ 24.764324] ret_from_fork+0x116/0x1d0 [ 24.764341] ? __pfx_kthread+0x10/0x10 [ 24.764358] ret_from_fork_asm+0x1a/0x30 [ 24.764401] </TASK> [ 24.764415] [ 24.773185] Allocated by task 294: [ 24.773341] kasan_save_stack+0x45/0x70 [ 24.773630] kasan_save_track+0x18/0x40 [ 24.773943] kasan_save_alloc_info+0x3b/0x50 [ 24.774254] __kasan_kmalloc+0xb7/0xc0 [ 24.774445] __kmalloc_cache_noprof+0x189/0x420 [ 24.774612] kasan_atomics+0x95/0x310 [ 24.774759] kunit_try_run_case+0x1a5/0x480 [ 24.774912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.775255] kthread+0x337/0x6f0 [ 24.775525] ret_from_fork+0x116/0x1d0 [ 24.775807] ret_from_fork_asm+0x1a/0x30 [ 24.777502] [ 24.778142] The buggy address belongs to the object at ffff888102c1c600 [ 24.778142] which belongs to the cache kmalloc-64 of size 64 [ 24.779074] The buggy address is located 0 bytes to the right of [ 24.779074] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.779582] [ 24.779680] The buggy address belongs to the physical page: [ 24.780396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.780970] flags: 0x200000000000000(node=0|zone=2) [ 24.781142] page_type: f5(slab) [ 24.781298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.781778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.782105] page dumped because: kasan: bad access detected [ 24.782344] [ 24.782446] Memory state around the buggy address: [ 24.782744] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.783045] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.783853] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.784642] ^ [ 24.785038] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.785314] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.785720] ================================================================== [ 24.700618] ================================================================== [ 24.701122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 24.701764] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.702888] [ 24.703085] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.703165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.703186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.703221] Call Trace: [ 24.703246] <TASK> [ 24.703273] dump_stack_lvl+0x73/0xb0 [ 24.703329] print_report+0xd1/0x650 [ 24.703371] ? __virt_addr_valid+0x1db/0x2d0 [ 24.703435] ? kasan_atomics_helper+0x697/0x5450 [ 24.703475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.703522] ? kasan_atomics_helper+0x697/0x5450 [ 24.703556] kasan_report+0x141/0x180 [ 24.703590] ? kasan_atomics_helper+0x697/0x5450 [ 24.703633] kasan_check_range+0x10c/0x1c0 [ 24.703671] __kasan_check_write+0x18/0x20 [ 24.703705] kasan_atomics_helper+0x697/0x5450 [ 24.703742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.703780] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.703821] ? trace_hardirqs_on+0x37/0xe0 [ 24.703855] ? kasan_atomics+0x152/0x310 [ 24.703897] kasan_atomics+0x1dc/0x310 [ 24.703937] ? __pfx_kasan_atomics+0x10/0x10 [ 24.703971] ? __pfx_kasan_atomics+0x10/0x10 [ 24.704017] kunit_try_run_case+0x1a5/0x480 [ 24.704058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.704098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.704141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.704184] ? __kthread_parkme+0x82/0x180 [ 24.704224] ? preempt_count_sub+0x50/0x80 [ 24.704268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.704306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.704344] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.704396] kthread+0x337/0x6f0 [ 24.704434] ? trace_preempt_on+0x20/0xc0 [ 24.704472] ? __pfx_kthread+0x10/0x10 [ 24.704505] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.704540] ? calculate_sigpending+0x7b/0xa0 [ 24.704582] ? __pfx_kthread+0x10/0x10 [ 24.704622] ret_from_fork+0x116/0x1d0 [ 24.704660] ? __pfx_kthread+0x10/0x10 [ 24.704700] ret_from_fork_asm+0x1a/0x30 [ 24.704760] </TASK> [ 24.704784] [ 24.718724] Allocated by task 294: [ 24.718861] kasan_save_stack+0x45/0x70 [ 24.719064] kasan_save_track+0x18/0x40 [ 24.719532] kasan_save_alloc_info+0x3b/0x50 [ 24.720161] __kasan_kmalloc+0xb7/0xc0 [ 24.720364] __kmalloc_cache_noprof+0x189/0x420 [ 24.720530] kasan_atomics+0x95/0x310 [ 24.721092] kunit_try_run_case+0x1a5/0x480 [ 24.721319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.721491] kthread+0x337/0x6f0 [ 24.721749] ret_from_fork+0x116/0x1d0 [ 24.722342] ret_from_fork_asm+0x1a/0x30 [ 24.722682] [ 24.722978] The buggy address belongs to the object at ffff888102c1c600 [ 24.722978] which belongs to the cache kmalloc-64 of size 64 [ 24.723762] The buggy address is located 0 bytes to the right of [ 24.723762] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.724815] [ 24.724940] The buggy address belongs to the physical page: [ 24.725149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.725697] flags: 0x200000000000000(node=0|zone=2) [ 24.726425] page_type: f5(slab) [ 24.726770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.727352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.727579] page dumped because: kasan: bad access detected [ 24.727918] [ 24.728414] Memory state around the buggy address: [ 24.728656] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.728996] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.729264] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.729691] ^ [ 24.729954] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.730441] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.730831] ================================================================== [ 25.196682] ================================================================== [ 25.197241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 25.197763] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.198111] [ 25.198229] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.198312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.198338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.198373] Call Trace: [ 25.198415] <TASK> [ 25.198444] dump_stack_lvl+0x73/0xb0 [ 25.198497] print_report+0xd1/0x650 [ 25.198540] ? __virt_addr_valid+0x1db/0x2d0 [ 25.198583] ? kasan_atomics_helper+0x4a02/0x5450 [ 25.198624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.198670] ? kasan_atomics_helper+0x4a02/0x5450 [ 25.198711] kasan_report+0x141/0x180 [ 25.198754] ? kasan_atomics_helper+0x4a02/0x5450 [ 25.198805] __asan_report_load4_noabort+0x18/0x20 [ 25.198905] kasan_atomics_helper+0x4a02/0x5450 [ 25.198953] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.198994] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.199040] ? trace_hardirqs_on+0x37/0xe0 [ 25.199082] ? kasan_atomics+0x152/0x310 [ 25.199133] kasan_atomics+0x1dc/0x310 [ 25.199178] ? __pfx_kasan_atomics+0x10/0x10 [ 25.199223] ? __pfx_kasan_atomics+0x10/0x10 [ 25.199273] kunit_try_run_case+0x1a5/0x480 [ 25.199319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.199353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.199408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.199447] ? __kthread_parkme+0x82/0x180 [ 25.199505] ? preempt_count_sub+0x50/0x80 [ 25.199548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.199589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.199630] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.199671] kthread+0x337/0x6f0 [ 25.199705] ? trace_preempt_on+0x20/0xc0 [ 25.199766] ? __pfx_kthread+0x10/0x10 [ 25.199804] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.199871] ? calculate_sigpending+0x7b/0xa0 [ 25.199902] ? __pfx_kthread+0x10/0x10 [ 25.199922] ret_from_fork+0x116/0x1d0 [ 25.199941] ? __pfx_kthread+0x10/0x10 [ 25.199959] ret_from_fork_asm+0x1a/0x30 [ 25.199987] </TASK> [ 25.199999] [ 25.208090] Allocated by task 294: [ 25.208363] kasan_save_stack+0x45/0x70 [ 25.208669] kasan_save_track+0x18/0x40 [ 25.208973] kasan_save_alloc_info+0x3b/0x50 [ 25.209288] __kasan_kmalloc+0xb7/0xc0 [ 25.209584] __kmalloc_cache_noprof+0x189/0x420 [ 25.209933] kasan_atomics+0x95/0x310 [ 25.210180] kunit_try_run_case+0x1a5/0x480 [ 25.210495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.210692] kthread+0x337/0x6f0 [ 25.210996] ret_from_fork+0x116/0x1d0 [ 25.211287] ret_from_fork_asm+0x1a/0x30 [ 25.211507] [ 25.211596] The buggy address belongs to the object at ffff888102c1c600 [ 25.211596] which belongs to the cache kmalloc-64 of size 64 [ 25.212133] The buggy address is located 0 bytes to the right of [ 25.212133] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.212494] [ 25.212585] The buggy address belongs to the physical page: [ 25.212761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.213023] flags: 0x200000000000000(node=0|zone=2) [ 25.213310] page_type: f5(slab) [ 25.213572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.214089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.214629] page dumped because: kasan: bad access detected [ 25.215048] [ 25.215207] Memory state around the buggy address: [ 25.215473] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.215699] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.215941] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.216148] ^ [ 25.216317] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.216760] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.217238] ================================================================== [ 24.732578] ================================================================== [ 24.732827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 24.733364] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.733733] [ 24.734144] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.734288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.734302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.734321] Call Trace: [ 24.734337] <TASK> [ 24.734359] dump_stack_lvl+0x73/0xb0 [ 24.734425] print_report+0xd1/0x650 [ 24.734465] ? __virt_addr_valid+0x1db/0x2d0 [ 24.734610] ? kasan_atomics_helper+0x72f/0x5450 [ 24.734734] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.734760] ? kasan_atomics_helper+0x72f/0x5450 [ 24.734780] kasan_report+0x141/0x180 [ 24.734801] ? kasan_atomics_helper+0x72f/0x5450 [ 24.734823] kasan_check_range+0x10c/0x1c0 [ 24.734855] __kasan_check_write+0x18/0x20 [ 24.734875] kasan_atomics_helper+0x72f/0x5450 [ 24.734895] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.734917] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.734938] ? trace_hardirqs_on+0x37/0xe0 [ 24.734956] ? kasan_atomics+0x152/0x310 [ 24.734979] kasan_atomics+0x1dc/0x310 [ 24.734998] ? __pfx_kasan_atomics+0x10/0x10 [ 24.735018] ? __pfx_kasan_atomics+0x10/0x10 [ 24.735041] kunit_try_run_case+0x1a5/0x480 [ 24.735063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.735082] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.735101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.735121] ? __kthread_parkme+0x82/0x180 [ 24.735138] ? preempt_count_sub+0x50/0x80 [ 24.735159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.735179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.735200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.735220] kthread+0x337/0x6f0 [ 24.735237] ? trace_preempt_on+0x20/0xc0 [ 24.735257] ? __pfx_kthread+0x10/0x10 [ 24.735275] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.735294] ? calculate_sigpending+0x7b/0xa0 [ 24.735314] ? __pfx_kthread+0x10/0x10 [ 24.735333] ret_from_fork+0x116/0x1d0 [ 24.735350] ? __pfx_kthread+0x10/0x10 [ 24.735368] ret_from_fork_asm+0x1a/0x30 [ 24.735415] </TASK> [ 24.735427] [ 24.747446] Allocated by task 294: [ 24.747693] kasan_save_stack+0x45/0x70 [ 24.747989] kasan_save_track+0x18/0x40 [ 24.748672] kasan_save_alloc_info+0x3b/0x50 [ 24.748904] __kasan_kmalloc+0xb7/0xc0 [ 24.749037] __kmalloc_cache_noprof+0x189/0x420 [ 24.749451] kasan_atomics+0x95/0x310 [ 24.749718] kunit_try_run_case+0x1a5/0x480 [ 24.750203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.750491] kthread+0x337/0x6f0 [ 24.750631] ret_from_fork+0x116/0x1d0 [ 24.750895] ret_from_fork_asm+0x1a/0x30 [ 24.751560] [ 24.751686] The buggy address belongs to the object at ffff888102c1c600 [ 24.751686] which belongs to the cache kmalloc-64 of size 64 [ 24.752033] The buggy address is located 0 bytes to the right of [ 24.752033] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.752832] [ 24.753239] The buggy address belongs to the physical page: [ 24.753619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.754149] flags: 0x200000000000000(node=0|zone=2) [ 24.754512] page_type: f5(slab) [ 24.754651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.755355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.755785] page dumped because: kasan: bad access detected [ 24.756375] [ 24.756495] Memory state around the buggy address: [ 24.756658] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.757438] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.757761] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.758365] ^ [ 24.758619] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.759301] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.759810] ================================================================== [ 25.568231] ================================================================== [ 25.568701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 25.569201] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.569524] [ 25.569639] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.569712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.569734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.569768] Call Trace: [ 25.569795] <TASK> [ 25.569823] dump_stack_lvl+0x73/0xb0 [ 25.569909] print_report+0xd1/0x650 [ 25.569953] ? __virt_addr_valid+0x1db/0x2d0 [ 25.569987] ? kasan_atomics_helper+0x194a/0x5450 [ 25.570032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.570109] ? kasan_atomics_helper+0x194a/0x5450 [ 25.570146] kasan_report+0x141/0x180 [ 25.570185] ? kasan_atomics_helper+0x194a/0x5450 [ 25.570238] kasan_check_range+0x10c/0x1c0 [ 25.570279] __kasan_check_write+0x18/0x20 [ 25.570317] kasan_atomics_helper+0x194a/0x5450 [ 25.570357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.570414] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.570464] ? trace_hardirqs_on+0x37/0xe0 [ 25.570509] ? kasan_atomics+0x152/0x310 [ 25.570560] kasan_atomics+0x1dc/0x310 [ 25.570602] ? __pfx_kasan_atomics+0x10/0x10 [ 25.570640] ? __pfx_kasan_atomics+0x10/0x10 [ 25.570686] kunit_try_run_case+0x1a5/0x480 [ 25.570731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.570773] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.570817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.570902] ? __kthread_parkme+0x82/0x180 [ 25.570947] ? preempt_count_sub+0x50/0x80 [ 25.570994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.571039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.571083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.571127] kthread+0x337/0x6f0 [ 25.571163] ? trace_preempt_on+0x20/0xc0 [ 25.571196] ? __pfx_kthread+0x10/0x10 [ 25.571225] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.571256] ? calculate_sigpending+0x7b/0xa0 [ 25.571293] ? __pfx_kthread+0x10/0x10 [ 25.571331] ret_from_fork+0x116/0x1d0 [ 25.571368] ? __pfx_kthread+0x10/0x10 [ 25.571422] ret_from_fork_asm+0x1a/0x30 [ 25.571481] </TASK> [ 25.571504] [ 25.579414] Allocated by task 294: [ 25.579662] kasan_save_stack+0x45/0x70 [ 25.579979] kasan_save_track+0x18/0x40 [ 25.580277] kasan_save_alloc_info+0x3b/0x50 [ 25.580585] __kasan_kmalloc+0xb7/0xc0 [ 25.580858] __kmalloc_cache_noprof+0x189/0x420 [ 25.581106] kasan_atomics+0x95/0x310 [ 25.581273] kunit_try_run_case+0x1a5/0x480 [ 25.581531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.581780] kthread+0x337/0x6f0 [ 25.582007] ret_from_fork+0x116/0x1d0 [ 25.582263] ret_from_fork_asm+0x1a/0x30 [ 25.582493] [ 25.582599] The buggy address belongs to the object at ffff888102c1c600 [ 25.582599] which belongs to the cache kmalloc-64 of size 64 [ 25.583069] The buggy address is located 0 bytes to the right of [ 25.583069] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.583718] [ 25.583814] The buggy address belongs to the physical page: [ 25.584122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.584477] flags: 0x200000000000000(node=0|zone=2) [ 25.584772] page_type: f5(slab) [ 25.585023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.585296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.585652] page dumped because: kasan: bad access detected [ 25.585985] [ 25.586136] Memory state around the buggy address: [ 25.586365] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.586732] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.587003] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.587215] ^ [ 25.587389] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.587820] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.588301] ================================================================== [ 24.679741] ================================================================== [ 24.680300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 24.681115] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.681622] [ 24.681799] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.681894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.681920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.681959] Call Trace: [ 24.681988] <TASK> [ 24.682027] dump_stack_lvl+0x73/0xb0 [ 24.682091] print_report+0xd1/0x650 [ 24.682140] ? __virt_addr_valid+0x1db/0x2d0 [ 24.682190] ? kasan_atomics_helper+0x5fe/0x5450 [ 24.682231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.682279] ? kasan_atomics_helper+0x5fe/0x5450 [ 24.682317] kasan_report+0x141/0x180 [ 24.682357] ? kasan_atomics_helper+0x5fe/0x5450 [ 24.682425] kasan_check_range+0x10c/0x1c0 [ 24.682469] __kasan_check_write+0x18/0x20 [ 24.682510] kasan_atomics_helper+0x5fe/0x5450 [ 24.682555] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.682601] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.682649] ? trace_hardirqs_on+0x37/0xe0 [ 24.682693] ? kasan_atomics+0x152/0x310 [ 24.682747] kasan_atomics+0x1dc/0x310 [ 24.682789] ? __pfx_kasan_atomics+0x10/0x10 [ 24.682824] ? __pfx_kasan_atomics+0x10/0x10 [ 24.682869] kunit_try_run_case+0x1a5/0x480 [ 24.682911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.682952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.682995] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.683039] ? __kthread_parkme+0x82/0x180 [ 24.683078] ? preempt_count_sub+0x50/0x80 [ 24.683136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.683160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.683181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.683202] kthread+0x337/0x6f0 [ 24.683220] ? trace_preempt_on+0x20/0xc0 [ 24.683240] ? __pfx_kthread+0x10/0x10 [ 24.683258] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.683277] ? calculate_sigpending+0x7b/0xa0 [ 24.683298] ? __pfx_kthread+0x10/0x10 [ 24.683316] ret_from_fork+0x116/0x1d0 [ 24.683333] ? __pfx_kthread+0x10/0x10 [ 24.683351] ret_from_fork_asm+0x1a/0x30 [ 24.683395] </TASK> [ 24.683410] [ 24.690835] Allocated by task 294: [ 24.690999] kasan_save_stack+0x45/0x70 [ 24.691162] kasan_save_track+0x18/0x40 [ 24.691309] kasan_save_alloc_info+0x3b/0x50 [ 24.691691] __kasan_kmalloc+0xb7/0xc0 [ 24.691999] __kmalloc_cache_noprof+0x189/0x420 [ 24.692327] kasan_atomics+0x95/0x310 [ 24.692614] kunit_try_run_case+0x1a5/0x480 [ 24.692899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.693336] kthread+0x337/0x6f0 [ 24.693601] ret_from_fork+0x116/0x1d0 [ 24.693870] ret_from_fork_asm+0x1a/0x30 [ 24.694154] [ 24.694298] The buggy address belongs to the object at ffff888102c1c600 [ 24.694298] which belongs to the cache kmalloc-64 of size 64 [ 24.695038] The buggy address is located 0 bytes to the right of [ 24.695038] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.695549] [ 24.695651] The buggy address belongs to the physical page: [ 24.695857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.696317] flags: 0x200000000000000(node=0|zone=2) [ 24.696582] page_type: f5(slab) [ 24.696718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.697048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.697475] page dumped because: kasan: bad access detected [ 24.697715] [ 24.697862] Memory state around the buggy address: [ 24.698149] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.698492] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.699002] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.699297] ^ [ 24.699563] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.699783] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.699991] ================================================================== [ 25.589095] ================================================================== [ 25.589552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 25.589997] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.590412] [ 25.590580] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.590665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.590692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.590721] Call Trace: [ 25.590745] <TASK> [ 25.590769] dump_stack_lvl+0x73/0xb0 [ 25.590818] print_report+0xd1/0x650 [ 25.590889] ? __virt_addr_valid+0x1db/0x2d0 [ 25.590930] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.590966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.591004] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.591035] kasan_report+0x141/0x180 [ 25.591070] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.591116] kasan_check_range+0x10c/0x1c0 [ 25.591156] __kasan_check_write+0x18/0x20 [ 25.591195] kasan_atomics_helper+0x19e3/0x5450 [ 25.591235] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.591270] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.591311] ? trace_hardirqs_on+0x37/0xe0 [ 25.591345] ? kasan_atomics+0x152/0x310 [ 25.591406] kasan_atomics+0x1dc/0x310 [ 25.591447] ? __pfx_kasan_atomics+0x10/0x10 [ 25.591486] ? __pfx_kasan_atomics+0x10/0x10 [ 25.591528] kunit_try_run_case+0x1a5/0x480 [ 25.591571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.591607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.591647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.591683] ? __kthread_parkme+0x82/0x180 [ 25.591719] ? preempt_count_sub+0x50/0x80 [ 25.591759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.591797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.591869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.591912] kthread+0x337/0x6f0 [ 25.591948] ? trace_preempt_on+0x20/0xc0 [ 25.591987] ? __pfx_kthread+0x10/0x10 [ 25.592021] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.592059] ? calculate_sigpending+0x7b/0xa0 [ 25.592100] ? __pfx_kthread+0x10/0x10 [ 25.592138] ret_from_fork+0x116/0x1d0 [ 25.592174] ? __pfx_kthread+0x10/0x10 [ 25.592209] ret_from_fork_asm+0x1a/0x30 [ 25.592262] </TASK> [ 25.592285] [ 25.602997] Allocated by task 294: [ 25.603245] kasan_save_stack+0x45/0x70 [ 25.603438] kasan_save_track+0x18/0x40 [ 25.603691] kasan_save_alloc_info+0x3b/0x50 [ 25.604048] __kasan_kmalloc+0xb7/0xc0 [ 25.604206] __kmalloc_cache_noprof+0x189/0x420 [ 25.604529] kasan_atomics+0x95/0x310 [ 25.604702] kunit_try_run_case+0x1a5/0x480 [ 25.605073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.605276] kthread+0x337/0x6f0 [ 25.605519] ret_from_fork+0x116/0x1d0 [ 25.605702] ret_from_fork_asm+0x1a/0x30 [ 25.605982] [ 25.606093] The buggy address belongs to the object at ffff888102c1c600 [ 25.606093] which belongs to the cache kmalloc-64 of size 64 [ 25.606562] The buggy address is located 0 bytes to the right of [ 25.606562] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.607095] [ 25.607290] The buggy address belongs to the physical page: [ 25.607656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.607909] flags: 0x200000000000000(node=0|zone=2) [ 25.608083] page_type: f5(slab) [ 25.608221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.608462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.608686] page dumped because: kasan: bad access detected [ 25.608862] [ 25.608969] Memory state around the buggy address: [ 25.609291] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.609758] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.610437] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.611104] ^ [ 25.611277] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.611506] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.611719] ================================================================== [ 25.612473] ================================================================== [ 25.612961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 25.613556] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.614067] [ 25.614243] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.614328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.614355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.614409] Call Trace: [ 25.614437] <TASK> [ 25.614463] dump_stack_lvl+0x73/0xb0 [ 25.614519] print_report+0xd1/0x650 [ 25.614562] ? __virt_addr_valid+0x1db/0x2d0 [ 25.614608] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.614649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.614700] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.614746] kasan_report+0x141/0x180 [ 25.614790] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.614840] kasan_check_range+0x10c/0x1c0 [ 25.614888] __kasan_check_write+0x18/0x20 [ 25.614934] kasan_atomics_helper+0x1a7f/0x5450 [ 25.614977] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.615020] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.615063] ? trace_hardirqs_on+0x37/0xe0 [ 25.615105] ? kasan_atomics+0x152/0x310 [ 25.615153] kasan_atomics+0x1dc/0x310 [ 25.615192] ? __pfx_kasan_atomics+0x10/0x10 [ 25.615234] ? __pfx_kasan_atomics+0x10/0x10 [ 25.615284] kunit_try_run_case+0x1a5/0x480 [ 25.615329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.615372] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.615421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.615468] ? __kthread_parkme+0x82/0x180 [ 25.615501] ? preempt_count_sub+0x50/0x80 [ 25.615538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.615576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.615620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.615664] kthread+0x337/0x6f0 [ 25.615700] ? trace_preempt_on+0x20/0xc0 [ 25.615741] ? __pfx_kthread+0x10/0x10 [ 25.615780] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.615819] ? calculate_sigpending+0x7b/0xa0 [ 25.615861] ? __pfx_kthread+0x10/0x10 [ 25.615902] ret_from_fork+0x116/0x1d0 [ 25.615940] ? __pfx_kthread+0x10/0x10 [ 25.615979] ret_from_fork_asm+0x1a/0x30 [ 25.616040] </TASK> [ 25.616064] [ 25.624552] Allocated by task 294: [ 25.624710] kasan_save_stack+0x45/0x70 [ 25.624902] kasan_save_track+0x18/0x40 [ 25.625171] kasan_save_alloc_info+0x3b/0x50 [ 25.625617] __kasan_kmalloc+0xb7/0xc0 [ 25.625914] __kmalloc_cache_noprof+0x189/0x420 [ 25.626760] kasan_atomics+0x95/0x310 [ 25.627286] kunit_try_run_case+0x1a5/0x480 [ 25.627949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.628172] kthread+0x337/0x6f0 [ 25.628313] ret_from_fork+0x116/0x1d0 [ 25.628476] ret_from_fork_asm+0x1a/0x30 [ 25.628631] [ 25.628723] The buggy address belongs to the object at ffff888102c1c600 [ 25.628723] which belongs to the cache kmalloc-64 of size 64 [ 25.630026] The buggy address is located 0 bytes to the right of [ 25.630026] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.630977] [ 25.631132] The buggy address belongs to the physical page: [ 25.632017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.632452] flags: 0x200000000000000(node=0|zone=2) [ 25.632682] page_type: f5(slab) [ 25.633220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.633754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.633990] page dumped because: kasan: bad access detected [ 25.634180] [ 25.634264] Memory state around the buggy address: [ 25.634796] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.635094] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.635370] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.635588] ^ [ 25.635751] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.636366] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.636974] ================================================================== [ 25.811553] ================================================================== [ 25.811999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 25.813158] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.813499] [ 25.813714] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.813822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.813875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.813911] Call Trace: [ 25.813937] <TASK> [ 25.813962] dump_stack_lvl+0x73/0xb0 [ 25.814028] print_report+0xd1/0x650 [ 25.814078] ? __virt_addr_valid+0x1db/0x2d0 [ 25.814132] ? kasan_atomics_helper+0x1f43/0x5450 [ 25.814173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.814243] ? kasan_atomics_helper+0x1f43/0x5450 [ 25.814297] kasan_report+0x141/0x180 [ 25.814342] ? kasan_atomics_helper+0x1f43/0x5450 [ 25.814406] kasan_check_range+0x10c/0x1c0 [ 25.814448] __kasan_check_write+0x18/0x20 [ 25.814487] kasan_atomics_helper+0x1f43/0x5450 [ 25.814527] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.814561] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.814611] ? trace_hardirqs_on+0x37/0xe0 [ 25.814664] ? kasan_atomics+0x152/0x310 [ 25.814700] kasan_atomics+0x1dc/0x310 [ 25.814720] ? __pfx_kasan_atomics+0x10/0x10 [ 25.814742] ? __pfx_kasan_atomics+0x10/0x10 [ 25.814765] kunit_try_run_case+0x1a5/0x480 [ 25.814787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.814807] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.814857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.814881] ? __kthread_parkme+0x82/0x180 [ 25.814900] ? preempt_count_sub+0x50/0x80 [ 25.814920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.814941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.814962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.814982] kthread+0x337/0x6f0 [ 25.815000] ? trace_preempt_on+0x20/0xc0 [ 25.815019] ? __pfx_kthread+0x10/0x10 [ 25.815038] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.815057] ? calculate_sigpending+0x7b/0xa0 [ 25.815078] ? __pfx_kthread+0x10/0x10 [ 25.815097] ret_from_fork+0x116/0x1d0 [ 25.815114] ? __pfx_kthread+0x10/0x10 [ 25.815132] ret_from_fork_asm+0x1a/0x30 [ 25.815161] </TASK> [ 25.815173] [ 25.823721] Allocated by task 294: [ 25.824007] kasan_save_stack+0x45/0x70 [ 25.824176] kasan_save_track+0x18/0x40 [ 25.824323] kasan_save_alloc_info+0x3b/0x50 [ 25.824634] __kasan_kmalloc+0xb7/0xc0 [ 25.824921] __kmalloc_cache_noprof+0x189/0x420 [ 25.825285] kasan_atomics+0x95/0x310 [ 25.825545] kunit_try_run_case+0x1a5/0x480 [ 25.825817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.826119] kthread+0x337/0x6f0 [ 25.826357] ret_from_fork+0x116/0x1d0 [ 25.826576] ret_from_fork_asm+0x1a/0x30 [ 25.826771] [ 25.826921] The buggy address belongs to the object at ffff888102c1c600 [ 25.826921] which belongs to the cache kmalloc-64 of size 64 [ 25.827431] The buggy address is located 0 bytes to the right of [ 25.827431] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.828106] [ 25.828226] The buggy address belongs to the physical page: [ 25.828590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.829014] flags: 0x200000000000000(node=0|zone=2) [ 25.829224] page_type: f5(slab) [ 25.829487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.829742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.829964] page dumped because: kasan: bad access detected [ 25.830186] [ 25.830279] Memory state around the buggy address: [ 25.830554] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.831055] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.831594] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.831829] ^ [ 25.832195] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.832495] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.832832] ================================================================== [ 24.521025] ================================================================== [ 24.522103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 24.522638] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.523113] [ 24.523231] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.523315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.523342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.523395] Call Trace: [ 24.523424] <TASK> [ 24.523455] dump_stack_lvl+0x73/0xb0 [ 24.523508] print_report+0xd1/0x650 [ 24.523551] ? __virt_addr_valid+0x1db/0x2d0 [ 24.523596] ? kasan_atomics_helper+0x4b6e/0x5450 [ 24.523636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.523679] ? kasan_atomics_helper+0x4b6e/0x5450 [ 24.523718] kasan_report+0x141/0x180 [ 24.523754] ? kasan_atomics_helper+0x4b6e/0x5450 [ 24.523802] __asan_report_store4_noabort+0x1b/0x30 [ 24.523838] kasan_atomics_helper+0x4b6e/0x5450 [ 24.523872] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.523903] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.523938] ? trace_hardirqs_on+0x37/0xe0 [ 24.523973] ? kasan_atomics+0x152/0x310 [ 24.524018] kasan_atomics+0x1dc/0x310 [ 24.524059] ? __pfx_kasan_atomics+0x10/0x10 [ 24.524102] ? __pfx_kasan_atomics+0x10/0x10 [ 24.524151] kunit_try_run_case+0x1a5/0x480 [ 24.524196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.524234] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.524276] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.524320] ? __kthread_parkme+0x82/0x180 [ 24.524359] ? preempt_count_sub+0x50/0x80 [ 24.524417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.524463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.524508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.524552] kthread+0x337/0x6f0 [ 24.524590] ? trace_preempt_on+0x20/0xc0 [ 24.524626] ? __pfx_kthread+0x10/0x10 [ 24.524655] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.524689] ? calculate_sigpending+0x7b/0xa0 [ 24.524728] ? __pfx_kthread+0x10/0x10 [ 24.524767] ret_from_fork+0x116/0x1d0 [ 24.524803] ? __pfx_kthread+0x10/0x10 [ 24.524856] ret_from_fork_asm+0x1a/0x30 [ 24.524910] </TASK> [ 24.524929] [ 24.533449] Allocated by task 294: [ 24.533728] kasan_save_stack+0x45/0x70 [ 24.534090] kasan_save_track+0x18/0x40 [ 24.534398] kasan_save_alloc_info+0x3b/0x50 [ 24.534715] __kasan_kmalloc+0xb7/0xc0 [ 24.537294] __kmalloc_cache_noprof+0x189/0x420 [ 24.537706] kasan_atomics+0x95/0x310 [ 24.538065] kunit_try_run_case+0x1a5/0x480 [ 24.538396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.538764] kthread+0x337/0x6f0 [ 24.539068] ret_from_fork+0x116/0x1d0 [ 24.539350] ret_from_fork_asm+0x1a/0x30 [ 24.539623] [ 24.539712] The buggy address belongs to the object at ffff888102c1c600 [ 24.539712] which belongs to the cache kmalloc-64 of size 64 [ 24.541309] The buggy address is located 0 bytes to the right of [ 24.541309] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.542545] [ 24.542820] The buggy address belongs to the physical page: [ 24.543113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.543591] flags: 0x200000000000000(node=0|zone=2) [ 24.543842] page_type: f5(slab) [ 24.543975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.544258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.545193] page dumped because: kasan: bad access detected [ 24.545656] [ 24.545745] Memory state around the buggy address: [ 24.546193] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.546467] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.547280] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.547556] ^ [ 24.547840] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.548248] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.548617] ================================================================== [ 25.174618] ================================================================== [ 25.175125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 25.175601] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.175922] [ 25.176034] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.176117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.176141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.176174] Call Trace: [ 25.176198] <TASK> [ 25.176221] dump_stack_lvl+0x73/0xb0 [ 25.176268] print_report+0xd1/0x650 [ 25.176306] ? __virt_addr_valid+0x1db/0x2d0 [ 25.176348] ? kasan_atomics_helper+0x1148/0x5450 [ 25.176403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.176454] ? kasan_atomics_helper+0x1148/0x5450 [ 25.176488] kasan_report+0x141/0x180 [ 25.176526] ? kasan_atomics_helper+0x1148/0x5450 [ 25.176571] kasan_check_range+0x10c/0x1c0 [ 25.176610] __kasan_check_write+0x18/0x20 [ 25.176661] kasan_atomics_helper+0x1148/0x5450 [ 25.176703] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.176760] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.176806] ? trace_hardirqs_on+0x37/0xe0 [ 25.176873] ? kasan_atomics+0x152/0x310 [ 25.176924] kasan_atomics+0x1dc/0x310 [ 25.176967] ? __pfx_kasan_atomics+0x10/0x10 [ 25.177006] ? __pfx_kasan_atomics+0x10/0x10 [ 25.177052] kunit_try_run_case+0x1a5/0x480 [ 25.177096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.177137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.177179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.177219] ? __kthread_parkme+0x82/0x180 [ 25.177278] ? preempt_count_sub+0x50/0x80 [ 25.177317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.177362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.177420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.177465] kthread+0x337/0x6f0 [ 25.177505] ? trace_preempt_on+0x20/0xc0 [ 25.177548] ? __pfx_kthread+0x10/0x10 [ 25.177589] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.177631] ? calculate_sigpending+0x7b/0xa0 [ 25.177661] ? __pfx_kthread+0x10/0x10 [ 25.177681] ret_from_fork+0x116/0x1d0 [ 25.177699] ? __pfx_kthread+0x10/0x10 [ 25.177718] ret_from_fork_asm+0x1a/0x30 [ 25.177746] </TASK> [ 25.177757] [ 25.186005] Allocated by task 294: [ 25.186303] kasan_save_stack+0x45/0x70 [ 25.186647] kasan_save_track+0x18/0x40 [ 25.186866] kasan_save_alloc_info+0x3b/0x50 [ 25.187189] __kasan_kmalloc+0xb7/0xc0 [ 25.187421] __kmalloc_cache_noprof+0x189/0x420 [ 25.187686] kasan_atomics+0x95/0x310 [ 25.187907] kunit_try_run_case+0x1a5/0x480 [ 25.188173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.188399] kthread+0x337/0x6f0 [ 25.188660] ret_from_fork+0x116/0x1d0 [ 25.188876] ret_from_fork_asm+0x1a/0x30 [ 25.189096] [ 25.189210] The buggy address belongs to the object at ffff888102c1c600 [ 25.189210] which belongs to the cache kmalloc-64 of size 64 [ 25.189726] The buggy address is located 0 bytes to the right of [ 25.189726] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.190122] [ 25.190222] The buggy address belongs to the physical page: [ 25.190424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.190681] flags: 0x200000000000000(node=0|zone=2) [ 25.190913] page_type: f5(slab) [ 25.191169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.191682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.192196] page dumped because: kasan: bad access detected [ 25.192568] [ 25.192705] Memory state around the buggy address: [ 25.193051] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.193513] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.193737] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.193980] ^ [ 25.194162] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.194622] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.195112] ================================================================== [ 25.150303] ================================================================== [ 25.151008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 25.151598] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.152145] [ 25.152346] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.152446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.152474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.152527] Call Trace: [ 25.152555] <TASK> [ 25.152583] dump_stack_lvl+0x73/0xb0 [ 25.152637] print_report+0xd1/0x650 [ 25.152674] ? __virt_addr_valid+0x1db/0x2d0 [ 25.152711] ? kasan_atomics_helper+0x4a1c/0x5450 [ 25.152747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.152810] ? kasan_atomics_helper+0x4a1c/0x5450 [ 25.152881] kasan_report+0x141/0x180 [ 25.152922] ? kasan_atomics_helper+0x4a1c/0x5450 [ 25.152968] __asan_report_load4_noabort+0x18/0x20 [ 25.153010] kasan_atomics_helper+0x4a1c/0x5450 [ 25.153067] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.153109] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.153150] ? trace_hardirqs_on+0x37/0xe0 [ 25.153190] ? kasan_atomics+0x152/0x310 [ 25.153238] kasan_atomics+0x1dc/0x310 [ 25.153295] ? __pfx_kasan_atomics+0x10/0x10 [ 25.153339] ? __pfx_kasan_atomics+0x10/0x10 [ 25.153399] kunit_try_run_case+0x1a5/0x480 [ 25.153440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.153464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.153488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.153508] ? __kthread_parkme+0x82/0x180 [ 25.153527] ? preempt_count_sub+0x50/0x80 [ 25.153548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.153568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.153603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.153643] kthread+0x337/0x6f0 [ 25.153677] ? trace_preempt_on+0x20/0xc0 [ 25.153737] ? __pfx_kthread+0x10/0x10 [ 25.153775] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.153816] ? calculate_sigpending+0x7b/0xa0 [ 25.153906] ? __pfx_kthread+0x10/0x10 [ 25.153945] ret_from_fork+0x116/0x1d0 [ 25.153981] ? __pfx_kthread+0x10/0x10 [ 25.154029] ret_from_fork_asm+0x1a/0x30 [ 25.154089] </TASK> [ 25.154103] [ 25.162358] Allocated by task 294: [ 25.162650] kasan_save_stack+0x45/0x70 [ 25.162950] kasan_save_track+0x18/0x40 [ 25.163150] kasan_save_alloc_info+0x3b/0x50 [ 25.163442] __kasan_kmalloc+0xb7/0xc0 [ 25.163696] __kmalloc_cache_noprof+0x189/0x420 [ 25.163993] kasan_atomics+0x95/0x310 [ 25.164278] kunit_try_run_case+0x1a5/0x480 [ 25.164482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.164697] kthread+0x337/0x6f0 [ 25.164950] ret_from_fork+0x116/0x1d0 [ 25.165222] ret_from_fork_asm+0x1a/0x30 [ 25.165520] [ 25.165689] The buggy address belongs to the object at ffff888102c1c600 [ 25.165689] which belongs to the cache kmalloc-64 of size 64 [ 25.166254] The buggy address is located 0 bytes to the right of [ 25.166254] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.166717] [ 25.166861] The buggy address belongs to the physical page: [ 25.167081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.167353] flags: 0x200000000000000(node=0|zone=2) [ 25.167713] page_type: f5(slab) [ 25.167993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.168471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.168962] page dumped because: kasan: bad access detected [ 25.169327] [ 25.169648] Memory state around the buggy address: [ 25.170952] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.171462] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.172477] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.172901] ^ [ 25.173176] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.173489] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.173860] ================================================================== [ 25.949224] ================================================================== [ 25.949593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 25.950279] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.950819] [ 25.951046] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.951127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.951154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.951193] Call Trace: [ 25.951221] <TASK> [ 25.951251] dump_stack_lvl+0x73/0xb0 [ 25.951303] print_report+0xd1/0x650 [ 25.951345] ? __virt_addr_valid+0x1db/0x2d0 [ 25.951401] ? kasan_atomics_helper+0x218a/0x5450 [ 25.951444] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.951493] ? kasan_atomics_helper+0x218a/0x5450 [ 25.951535] kasan_report+0x141/0x180 [ 25.951579] ? kasan_atomics_helper+0x218a/0x5450 [ 25.951630] kasan_check_range+0x10c/0x1c0 [ 25.951675] __kasan_check_write+0x18/0x20 [ 25.951720] kasan_atomics_helper+0x218a/0x5450 [ 25.951764] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.951806] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.951849] ? trace_hardirqs_on+0x37/0xe0 [ 25.951890] ? kasan_atomics+0x152/0x310 [ 25.951940] kasan_atomics+0x1dc/0x310 [ 25.951982] ? __pfx_kasan_atomics+0x10/0x10 [ 25.952025] ? __pfx_kasan_atomics+0x10/0x10 [ 25.952075] kunit_try_run_case+0x1a5/0x480 [ 25.952120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.952161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.952204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.952248] ? __kthread_parkme+0x82/0x180 [ 25.952286] ? preempt_count_sub+0x50/0x80 [ 25.952331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.952387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.952425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.952459] kthread+0x337/0x6f0 [ 25.952487] ? trace_preempt_on+0x20/0xc0 [ 25.952523] ? __pfx_kthread+0x10/0x10 [ 25.952557] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.952594] ? calculate_sigpending+0x7b/0xa0 [ 25.952637] ? __pfx_kthread+0x10/0x10 [ 25.952678] ret_from_fork+0x116/0x1d0 [ 25.952715] ? __pfx_kthread+0x10/0x10 [ 25.952755] ret_from_fork_asm+0x1a/0x30 [ 25.952814] </TASK> [ 25.952844] [ 25.961914] Allocated by task 294: [ 25.962129] kasan_save_stack+0x45/0x70 [ 25.962590] kasan_save_track+0x18/0x40 [ 25.963958] kasan_save_alloc_info+0x3b/0x50 [ 25.964251] __kasan_kmalloc+0xb7/0xc0 [ 25.964414] __kmalloc_cache_noprof+0x189/0x420 [ 25.964584] kasan_atomics+0x95/0x310 [ 25.964732] kunit_try_run_case+0x1a5/0x480 [ 25.965973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.966274] kthread+0x337/0x6f0 [ 25.966480] ret_from_fork+0x116/0x1d0 [ 25.966678] ret_from_fork_asm+0x1a/0x30 [ 25.967333] [ 25.967460] The buggy address belongs to the object at ffff888102c1c600 [ 25.967460] which belongs to the cache kmalloc-64 of size 64 [ 25.967801] The buggy address is located 0 bytes to the right of [ 25.967801] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.969278] [ 25.969775] The buggy address belongs to the physical page: [ 25.970181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.970608] flags: 0x200000000000000(node=0|zone=2) [ 25.972573] page_type: f5(slab) [ 25.972744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.972950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.973560] page dumped because: kasan: bad access detected [ 25.973820] [ 25.974410] Memory state around the buggy address: [ 25.974678] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.975144] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.975440] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.975784] ^ [ 25.976429] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.976779] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.977310] ================================================================== [ 25.102590] ================================================================== [ 25.103178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 25.103671] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.103989] [ 25.104117] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.104209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.104236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.104275] Call Trace: [ 25.104304] <TASK> [ 25.104332] dump_stack_lvl+0x73/0xb0 [ 25.104397] print_report+0xd1/0x650 [ 25.104437] ? __virt_addr_valid+0x1db/0x2d0 [ 25.104475] ? kasan_atomics_helper+0x4a36/0x5450 [ 25.104514] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.104560] ? kasan_atomics_helper+0x4a36/0x5450 [ 25.104599] kasan_report+0x141/0x180 [ 25.104636] ? kasan_atomics_helper+0x4a36/0x5450 [ 25.104686] __asan_report_load4_noabort+0x18/0x20 [ 25.104729] kasan_atomics_helper+0x4a36/0x5450 [ 25.104773] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.104816] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.104874] ? trace_hardirqs_on+0x37/0xe0 [ 25.104915] ? kasan_atomics+0x152/0x310 [ 25.104966] kasan_atomics+0x1dc/0x310 [ 25.105010] ? __pfx_kasan_atomics+0x10/0x10 [ 25.105054] ? __pfx_kasan_atomics+0x10/0x10 [ 25.105106] kunit_try_run_case+0x1a5/0x480 [ 25.105153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.105196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.105239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.105281] ? __kthread_parkme+0x82/0x180 [ 25.105317] ? preempt_count_sub+0x50/0x80 [ 25.105356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.105412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.105459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.105505] kthread+0x337/0x6f0 [ 25.105544] ? trace_preempt_on+0x20/0xc0 [ 25.105587] ? __pfx_kthread+0x10/0x10 [ 25.105619] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.105640] ? calculate_sigpending+0x7b/0xa0 [ 25.105662] ? __pfx_kthread+0x10/0x10 [ 25.105680] ret_from_fork+0x116/0x1d0 [ 25.105699] ? __pfx_kthread+0x10/0x10 [ 25.105717] ret_from_fork_asm+0x1a/0x30 [ 25.105745] </TASK> [ 25.105763] [ 25.114582] Allocated by task 294: [ 25.114752] kasan_save_stack+0x45/0x70 [ 25.115102] kasan_save_track+0x18/0x40 [ 25.115400] kasan_save_alloc_info+0x3b/0x50 [ 25.115720] __kasan_kmalloc+0xb7/0xc0 [ 25.116033] __kmalloc_cache_noprof+0x189/0x420 [ 25.116367] kasan_atomics+0x95/0x310 [ 25.116590] kunit_try_run_case+0x1a5/0x480 [ 25.116922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.117211] kthread+0x337/0x6f0 [ 25.117391] ret_from_fork+0x116/0x1d0 [ 25.117545] ret_from_fork_asm+0x1a/0x30 [ 25.117750] [ 25.117931] The buggy address belongs to the object at ffff888102c1c600 [ 25.117931] which belongs to the cache kmalloc-64 of size 64 [ 25.118535] The buggy address is located 0 bytes to the right of [ 25.118535] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.119243] [ 25.119402] The buggy address belongs to the physical page: [ 25.119731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.120092] flags: 0x200000000000000(node=0|zone=2) [ 25.120338] page_type: f5(slab) [ 25.120497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.120762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.121051] page dumped because: kasan: bad access detected [ 25.121251] [ 25.121353] Memory state around the buggy address: [ 25.121665] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.122164] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.122676] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.123177] ^ [ 25.123514] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.124000] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.124425] ================================================================== [ 25.712159] ================================================================== [ 25.712530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 25.712822] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.713319] [ 25.713563] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.713675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.713702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.713753] Call Trace: [ 25.713782] <TASK> [ 25.713810] dump_stack_lvl+0x73/0xb0 [ 25.713896] print_report+0xd1/0x650 [ 25.713938] ? __virt_addr_valid+0x1db/0x2d0 [ 25.713978] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.714025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.714071] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.714112] kasan_report+0x141/0x180 [ 25.714152] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.714242] kasan_check_range+0x10c/0x1c0 [ 25.714324] __kasan_check_write+0x18/0x20 [ 25.714414] kasan_atomics_helper+0x1ce1/0x5450 [ 25.714481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.714539] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.714590] ? trace_hardirqs_on+0x37/0xe0 [ 25.714628] ? kasan_atomics+0x152/0x310 [ 25.714678] kasan_atomics+0x1dc/0x310 [ 25.714734] ? __pfx_kasan_atomics+0x10/0x10 [ 25.714778] ? __pfx_kasan_atomics+0x10/0x10 [ 25.714879] kunit_try_run_case+0x1a5/0x480 [ 25.714949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.714998] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.715044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.715085] ? __kthread_parkme+0x82/0x180 [ 25.715124] ? preempt_count_sub+0x50/0x80 [ 25.715192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.715233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.715292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.715326] kthread+0x337/0x6f0 [ 25.715345] ? trace_preempt_on+0x20/0xc0 [ 25.715365] ? __pfx_kthread+0x10/0x10 [ 25.715401] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.715422] ? calculate_sigpending+0x7b/0xa0 [ 25.715444] ? __pfx_kthread+0x10/0x10 [ 25.715463] ret_from_fork+0x116/0x1d0 [ 25.715481] ? __pfx_kthread+0x10/0x10 [ 25.715499] ret_from_fork_asm+0x1a/0x30 [ 25.715526] </TASK> [ 25.715538] [ 25.724543] Allocated by task 294: [ 25.724700] kasan_save_stack+0x45/0x70 [ 25.724895] kasan_save_track+0x18/0x40 [ 25.725045] kasan_save_alloc_info+0x3b/0x50 [ 25.725208] __kasan_kmalloc+0xb7/0xc0 [ 25.725485] __kmalloc_cache_noprof+0x189/0x420 [ 25.725874] kasan_atomics+0x95/0x310 [ 25.726186] kunit_try_run_case+0x1a5/0x480 [ 25.726559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.727032] kthread+0x337/0x6f0 [ 25.727338] ret_from_fork+0x116/0x1d0 [ 25.727625] ret_from_fork_asm+0x1a/0x30 [ 25.728016] [ 25.728173] The buggy address belongs to the object at ffff888102c1c600 [ 25.728173] which belongs to the cache kmalloc-64 of size 64 [ 25.728644] The buggy address is located 0 bytes to the right of [ 25.728644] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.729089] [ 25.729272] The buggy address belongs to the physical page: [ 25.729681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.730317] flags: 0x200000000000000(node=0|zone=2) [ 25.730696] page_type: f5(slab) [ 25.731000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.731439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.731674] page dumped because: kasan: bad access detected [ 25.731882] [ 25.731968] Memory state around the buggy address: [ 25.732134] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.732568] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.733079] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.733542] ^ [ 25.733934] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.734583] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.734904] ================================================================== [ 25.079691] ================================================================== [ 25.080930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 25.081340] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.081909] [ 25.082100] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.082179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.082199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.082229] Call Trace: [ 25.082253] <TASK> [ 25.082277] dump_stack_lvl+0x73/0xb0 [ 25.082325] print_report+0xd1/0x650 [ 25.082407] ? __virt_addr_valid+0x1db/0x2d0 [ 25.082447] ? kasan_atomics_helper+0xfa9/0x5450 [ 25.082501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.082548] ? kasan_atomics_helper+0xfa9/0x5450 [ 25.082587] kasan_report+0x141/0x180 [ 25.082642] ? kasan_atomics_helper+0xfa9/0x5450 [ 25.082690] kasan_check_range+0x10c/0x1c0 [ 25.082726] __kasan_check_write+0x18/0x20 [ 25.082766] kasan_atomics_helper+0xfa9/0x5450 [ 25.082806] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.082883] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.082930] ? trace_hardirqs_on+0x37/0xe0 [ 25.082970] ? kasan_atomics+0x152/0x310 [ 25.083034] kasan_atomics+0x1dc/0x310 [ 25.083070] ? __pfx_kasan_atomics+0x10/0x10 [ 25.083109] ? __pfx_kasan_atomics+0x10/0x10 [ 25.083159] kunit_try_run_case+0x1a5/0x480 [ 25.083203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.083242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.083299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.083340] ? __kthread_parkme+0x82/0x180 [ 25.083389] ? preempt_count_sub+0x50/0x80 [ 25.083436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.083478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.083538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.083580] kthread+0x337/0x6f0 [ 25.083617] ? trace_preempt_on+0x20/0xc0 [ 25.083659] ? __pfx_kthread+0x10/0x10 [ 25.083697] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.083750] ? calculate_sigpending+0x7b/0xa0 [ 25.083793] ? __pfx_kthread+0x10/0x10 [ 25.083863] ret_from_fork+0x116/0x1d0 [ 25.083894] ? __pfx_kthread+0x10/0x10 [ 25.083914] ret_from_fork_asm+0x1a/0x30 [ 25.083943] </TASK> [ 25.083956] [ 25.092072] Allocated by task 294: [ 25.092340] kasan_save_stack+0x45/0x70 [ 25.092649] kasan_save_track+0x18/0x40 [ 25.092964] kasan_save_alloc_info+0x3b/0x50 [ 25.093271] __kasan_kmalloc+0xb7/0xc0 [ 25.093472] __kmalloc_cache_noprof+0x189/0x420 [ 25.093794] kasan_atomics+0x95/0x310 [ 25.093973] kunit_try_run_case+0x1a5/0x480 [ 25.094154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.094521] kthread+0x337/0x6f0 [ 25.094803] ret_from_fork+0x116/0x1d0 [ 25.095112] ret_from_fork_asm+0x1a/0x30 [ 25.095415] [ 25.095575] The buggy address belongs to the object at ffff888102c1c600 [ 25.095575] which belongs to the cache kmalloc-64 of size 64 [ 25.096181] The buggy address is located 0 bytes to the right of [ 25.096181] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.096655] [ 25.096784] The buggy address belongs to the physical page: [ 25.097183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.097654] flags: 0x200000000000000(node=0|zone=2) [ 25.097918] page_type: f5(slab) [ 25.098089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.098612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.099002] page dumped because: kasan: bad access detected [ 25.099309] [ 25.099460] Memory state around the buggy address: [ 25.099740] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.100200] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.100599] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.100976] ^ [ 25.101243] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.101656] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.102035] ================================================================== [ 24.983301] ================================================================== [ 24.983851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 24.984416] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.984955] [ 24.985116] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.985215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.985240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.985274] Call Trace: [ 24.985299] <TASK> [ 24.985325] dump_stack_lvl+0x73/0xb0 [ 24.985393] print_report+0xd1/0x650 [ 24.985452] ? __virt_addr_valid+0x1db/0x2d0 [ 24.985492] ? kasan_atomics_helper+0xd47/0x5450 [ 24.985529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.985576] ? kasan_atomics_helper+0xd47/0x5450 [ 24.985618] kasan_report+0x141/0x180 [ 24.985663] ? kasan_atomics_helper+0xd47/0x5450 [ 24.985713] kasan_check_range+0x10c/0x1c0 [ 24.985760] __kasan_check_write+0x18/0x20 [ 24.985804] kasan_atomics_helper+0xd47/0x5450 [ 24.985877] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.985924] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.985968] ? trace_hardirqs_on+0x37/0xe0 [ 24.986020] ? kasan_atomics+0x152/0x310 [ 24.986077] kasan_atomics+0x1dc/0x310 [ 24.986126] ? __pfx_kasan_atomics+0x10/0x10 [ 24.986173] ? __pfx_kasan_atomics+0x10/0x10 [ 24.986225] kunit_try_run_case+0x1a5/0x480 [ 24.986277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.986323] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.986370] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.986425] ? __kthread_parkme+0x82/0x180 [ 24.986467] ? preempt_count_sub+0x50/0x80 [ 24.986510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.986557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.986605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.986652] kthread+0x337/0x6f0 [ 24.986713] ? trace_preempt_on+0x20/0xc0 [ 24.986757] ? __pfx_kthread+0x10/0x10 [ 24.986793] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.986866] ? calculate_sigpending+0x7b/0xa0 [ 24.986914] ? __pfx_kthread+0x10/0x10 [ 24.986959] ret_from_fork+0x116/0x1d0 [ 24.986994] ? __pfx_kthread+0x10/0x10 [ 24.987044] ret_from_fork_asm+0x1a/0x30 [ 24.987096] </TASK> [ 24.987118] [ 24.995185] Allocated by task 294: [ 24.995480] kasan_save_stack+0x45/0x70 [ 24.995783] kasan_save_track+0x18/0x40 [ 24.996094] kasan_save_alloc_info+0x3b/0x50 [ 24.996451] __kasan_kmalloc+0xb7/0xc0 [ 24.996737] __kmalloc_cache_noprof+0x189/0x420 [ 24.996933] kasan_atomics+0x95/0x310 [ 24.997085] kunit_try_run_case+0x1a5/0x480 [ 24.997244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.997437] kthread+0x337/0x6f0 [ 24.997572] ret_from_fork+0x116/0x1d0 [ 24.997714] ret_from_fork_asm+0x1a/0x30 [ 24.997978] [ 24.998149] The buggy address belongs to the object at ffff888102c1c600 [ 24.998149] which belongs to the cache kmalloc-64 of size 64 [ 24.998991] The buggy address is located 0 bytes to the right of [ 24.998991] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.999763] [ 24.999926] The buggy address belongs to the physical page: [ 25.000307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.000594] flags: 0x200000000000000(node=0|zone=2) [ 25.000776] page_type: f5(slab) [ 25.000947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.001179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.001409] page dumped because: kasan: bad access detected [ 25.001695] [ 25.001861] Memory state around the buggy address: [ 25.002215] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.002666] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.003165] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.003631] ^ [ 25.004025] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.004655] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.004984] ================================================================== [ 24.441666] ================================================================== [ 24.442421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 24.442904] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.443391] [ 24.443595] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.443679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.443703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.443739] Call Trace: [ 24.443764] <TASK> [ 24.443797] dump_stack_lvl+0x73/0xb0 [ 24.443851] print_report+0xd1/0x650 [ 24.443883] ? __virt_addr_valid+0x1db/0x2d0 [ 24.443939] ? kasan_atomics_helper+0x4bbc/0x5450 [ 24.443969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.443993] ? kasan_atomics_helper+0x4bbc/0x5450 [ 24.444025] kasan_report+0x141/0x180 [ 24.444047] ? kasan_atomics_helper+0x4bbc/0x5450 [ 24.444068] __asan_report_load4_noabort+0x18/0x20 [ 24.444098] kasan_atomics_helper+0x4bbc/0x5450 [ 24.444129] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.444156] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.444186] ? trace_hardirqs_on+0x37/0xe0 [ 24.444206] ? kasan_atomics+0x152/0x310 [ 24.444228] kasan_atomics+0x1dc/0x310 [ 24.444246] ? __pfx_kasan_atomics+0x10/0x10 [ 24.444265] ? __pfx_kasan_atomics+0x10/0x10 [ 24.444287] kunit_try_run_case+0x1a5/0x480 [ 24.444308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.444327] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.444346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.444365] ? __kthread_parkme+0x82/0x180 [ 24.444400] ? preempt_count_sub+0x50/0x80 [ 24.444422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.444442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.444462] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.444482] kthread+0x337/0x6f0 [ 24.444498] ? trace_preempt_on+0x20/0xc0 [ 24.444517] ? __pfx_kthread+0x10/0x10 [ 24.444535] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.444552] ? calculate_sigpending+0x7b/0xa0 [ 24.444573] ? __pfx_kthread+0x10/0x10 [ 24.444591] ret_from_fork+0x116/0x1d0 [ 24.444608] ? __pfx_kthread+0x10/0x10 [ 24.444625] ret_from_fork_asm+0x1a/0x30 [ 24.444653] </TASK> [ 24.444665] [ 24.457754] Allocated by task 294: [ 24.458019] kasan_save_stack+0x45/0x70 [ 24.458465] kasan_save_track+0x18/0x40 [ 24.458681] kasan_save_alloc_info+0x3b/0x50 [ 24.459420] __kasan_kmalloc+0xb7/0xc0 [ 24.459607] __kmalloc_cache_noprof+0x189/0x420 [ 24.460016] kasan_atomics+0x95/0x310 [ 24.460362] kunit_try_run_case+0x1a5/0x480 [ 24.460798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.461078] kthread+0x337/0x6f0 [ 24.461200] ret_from_fork+0x116/0x1d0 [ 24.461596] ret_from_fork_asm+0x1a/0x30 [ 24.462005] [ 24.462359] The buggy address belongs to the object at ffff888102c1c600 [ 24.462359] which belongs to the cache kmalloc-64 of size 64 [ 24.462773] The buggy address is located 0 bytes to the right of [ 24.462773] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.463795] [ 24.464344] The buggy address belongs to the physical page: [ 24.464521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.464993] flags: 0x200000000000000(node=0|zone=2) [ 24.465210] page_type: f5(slab) [ 24.465598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.466040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.466505] page dumped because: kasan: bad access detected [ 24.466838] [ 24.467140] Memory state around the buggy address: [ 24.467475] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.467744] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.468527] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.468908] ^ [ 24.469082] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.469510] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.469808] ================================================================== [ 25.055777] ================================================================== [ 25.056236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 25.056764] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.057311] [ 25.057499] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.057606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.057647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.057685] Call Trace: [ 25.057714] <TASK> [ 25.057742] dump_stack_lvl+0x73/0xb0 [ 25.057796] print_report+0xd1/0x650 [ 25.057891] ? __virt_addr_valid+0x1db/0x2d0 [ 25.057964] ? kasan_atomics_helper+0xf10/0x5450 [ 25.058004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.058075] ? kasan_atomics_helper+0xf10/0x5450 [ 25.058117] kasan_report+0x141/0x180 [ 25.058162] ? kasan_atomics_helper+0xf10/0x5450 [ 25.058212] kasan_check_range+0x10c/0x1c0 [ 25.058251] __kasan_check_write+0x18/0x20 [ 25.058291] kasan_atomics_helper+0xf10/0x5450 [ 25.058358] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.058424] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.058473] ? trace_hardirqs_on+0x37/0xe0 [ 25.058514] ? kasan_atomics+0x152/0x310 [ 25.058589] kasan_atomics+0x1dc/0x310 [ 25.058632] ? __pfx_kasan_atomics+0x10/0x10 [ 25.058694] ? __pfx_kasan_atomics+0x10/0x10 [ 25.058735] kunit_try_run_case+0x1a5/0x480 [ 25.058762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.058786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.058807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.058860] ? __kthread_parkme+0x82/0x180 [ 25.058886] ? preempt_count_sub+0x50/0x80 [ 25.058908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.058930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.058954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.058976] kthread+0x337/0x6f0 [ 25.058995] ? trace_preempt_on+0x20/0xc0 [ 25.059016] ? __pfx_kthread+0x10/0x10 [ 25.059036] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.059056] ? calculate_sigpending+0x7b/0xa0 [ 25.059076] ? __pfx_kthread+0x10/0x10 [ 25.059095] ret_from_fork+0x116/0x1d0 [ 25.059112] ? __pfx_kthread+0x10/0x10 [ 25.059130] ret_from_fork_asm+0x1a/0x30 [ 25.059157] </TASK> [ 25.059169] [ 25.068258] Allocated by task 294: [ 25.068423] kasan_save_stack+0x45/0x70 [ 25.068588] kasan_save_track+0x18/0x40 [ 25.068736] kasan_save_alloc_info+0x3b/0x50 [ 25.068894] __kasan_kmalloc+0xb7/0xc0 [ 25.069040] __kmalloc_cache_noprof+0x189/0x420 [ 25.069203] kasan_atomics+0x95/0x310 [ 25.069522] kunit_try_run_case+0x1a5/0x480 [ 25.069910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.070346] kthread+0x337/0x6f0 [ 25.070673] ret_from_fork+0x116/0x1d0 [ 25.071054] ret_from_fork_asm+0x1a/0x30 [ 25.071397] [ 25.071587] The buggy address belongs to the object at ffff888102c1c600 [ 25.071587] which belongs to the cache kmalloc-64 of size 64 [ 25.072550] The buggy address is located 0 bytes to the right of [ 25.072550] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.072919] [ 25.073010] The buggy address belongs to the physical page: [ 25.073409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.073986] flags: 0x200000000000000(node=0|zone=2) [ 25.074212] page_type: f5(slab) [ 25.074353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.074589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.074808] page dumped because: kasan: bad access detected [ 25.075155] [ 25.075299] Memory state around the buggy address: [ 25.075724] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.076284] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.076827] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.077328] ^ [ 25.077654] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.078086] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.078729] ================================================================== [ 25.521778] ================================================================== [ 25.523338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 25.523624] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.523864] [ 25.524022] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.524096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.524119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.524155] Call Trace: [ 25.524183] <TASK> [ 25.524210] dump_stack_lvl+0x73/0xb0 [ 25.524264] print_report+0xd1/0x650 [ 25.524306] ? __virt_addr_valid+0x1db/0x2d0 [ 25.524348] ? kasan_atomics_helper+0x1818/0x5450 [ 25.524403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.524452] ? kasan_atomics_helper+0x1818/0x5450 [ 25.524493] kasan_report+0x141/0x180 [ 25.524536] ? kasan_atomics_helper+0x1818/0x5450 [ 25.524585] kasan_check_range+0x10c/0x1c0 [ 25.524628] __kasan_check_write+0x18/0x20 [ 25.524672] kasan_atomics_helper+0x1818/0x5450 [ 25.524711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.524748] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.524785] ? trace_hardirqs_on+0x37/0xe0 [ 25.524822] ? kasan_atomics+0x152/0x310 [ 25.524906] kasan_atomics+0x1dc/0x310 [ 25.524949] ? __pfx_kasan_atomics+0x10/0x10 [ 25.524990] ? __pfx_kasan_atomics+0x10/0x10 [ 25.525030] kunit_try_run_case+0x1a5/0x480 [ 25.525071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.525110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.525151] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.525194] ? __kthread_parkme+0x82/0x180 [ 25.525234] ? preempt_count_sub+0x50/0x80 [ 25.525279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.525323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.525369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.525427] kthread+0x337/0x6f0 [ 25.525468] ? trace_preempt_on+0x20/0xc0 [ 25.525512] ? __pfx_kthread+0x10/0x10 [ 25.525553] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.525594] ? calculate_sigpending+0x7b/0xa0 [ 25.525638] ? __pfx_kthread+0x10/0x10 [ 25.525680] ret_from_fork+0x116/0x1d0 [ 25.525718] ? __pfx_kthread+0x10/0x10 [ 25.525759] ret_from_fork_asm+0x1a/0x30 [ 25.525819] </TASK> [ 25.525868] [ 25.533951] Allocated by task 294: [ 25.534169] kasan_save_stack+0x45/0x70 [ 25.534453] kasan_save_track+0x18/0x40 [ 25.534624] kasan_save_alloc_info+0x3b/0x50 [ 25.534786] __kasan_kmalloc+0xb7/0xc0 [ 25.534962] __kmalloc_cache_noprof+0x189/0x420 [ 25.535130] kasan_atomics+0x95/0x310 [ 25.535279] kunit_try_run_case+0x1a5/0x480 [ 25.535525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.535897] kthread+0x337/0x6f0 [ 25.536147] ret_from_fork+0x116/0x1d0 [ 25.536434] ret_from_fork_asm+0x1a/0x30 [ 25.536724] [ 25.536888] The buggy address belongs to the object at ffff888102c1c600 [ 25.536888] which belongs to the cache kmalloc-64 of size 64 [ 25.537611] The buggy address is located 0 bytes to the right of [ 25.537611] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.538135] [ 25.538234] The buggy address belongs to the physical page: [ 25.538449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.538943] flags: 0x200000000000000(node=0|zone=2) [ 25.539247] page_type: f5(slab) [ 25.539497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.539732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.539986] page dumped because: kasan: bad access detected [ 25.540193] [ 25.540278] Memory state around the buggy address: [ 25.540453] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.540669] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.540905] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.541117] ^ [ 25.541281] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.541671] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.542164] ================================================================== [ 24.471031] ================================================================== [ 24.472299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 24.472741] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.472957] [ 24.473068] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.473141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.473160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.473188] Call Trace: [ 24.473208] <TASK> [ 24.473228] dump_stack_lvl+0x73/0xb0 [ 24.473270] print_report+0xd1/0x650 [ 24.473299] ? __virt_addr_valid+0x1db/0x2d0 [ 24.473330] ? kasan_atomics_helper+0x4ba2/0x5450 [ 24.473357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.473413] ? kasan_atomics_helper+0x4ba2/0x5450 [ 24.473443] kasan_report+0x141/0x180 [ 24.473474] ? kasan_atomics_helper+0x4ba2/0x5450 [ 24.473509] __asan_report_store4_noabort+0x1b/0x30 [ 24.474071] kasan_atomics_helper+0x4ba2/0x5450 [ 24.474272] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.474295] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.474318] ? trace_hardirqs_on+0x37/0xe0 [ 24.474338] ? kasan_atomics+0x152/0x310 [ 24.474362] kasan_atomics+0x1dc/0x310 [ 24.474401] ? __pfx_kasan_atomics+0x10/0x10 [ 24.474425] ? __pfx_kasan_atomics+0x10/0x10 [ 24.474449] kunit_try_run_case+0x1a5/0x480 [ 24.474472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.474492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.474512] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.474533] ? __kthread_parkme+0x82/0x180 [ 24.474552] ? preempt_count_sub+0x50/0x80 [ 24.474573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.474594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.474615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.474637] kthread+0x337/0x6f0 [ 24.474654] ? trace_preempt_on+0x20/0xc0 [ 24.474674] ? __pfx_kthread+0x10/0x10 [ 24.474693] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.474712] ? calculate_sigpending+0x7b/0xa0 [ 24.474733] ? __pfx_kthread+0x10/0x10 [ 24.474752] ret_from_fork+0x116/0x1d0 [ 24.474771] ? __pfx_kthread+0x10/0x10 [ 24.474789] ret_from_fork_asm+0x1a/0x30 [ 24.474818] </TASK> [ 24.474831] [ 24.484640] Allocated by task 294: [ 24.485005] kasan_save_stack+0x45/0x70 [ 24.485307] kasan_save_track+0x18/0x40 [ 24.485593] kasan_save_alloc_info+0x3b/0x50 [ 24.486057] __kasan_kmalloc+0xb7/0xc0 [ 24.486791] __kmalloc_cache_noprof+0x189/0x420 [ 24.487375] kasan_atomics+0x95/0x310 [ 24.487682] kunit_try_run_case+0x1a5/0x480 [ 24.488033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.488474] kthread+0x337/0x6f0 [ 24.488628] ret_from_fork+0x116/0x1d0 [ 24.488814] ret_from_fork_asm+0x1a/0x30 [ 24.489284] [ 24.489445] The buggy address belongs to the object at ffff888102c1c600 [ 24.489445] which belongs to the cache kmalloc-64 of size 64 [ 24.490640] The buggy address is located 0 bytes to the right of [ 24.490640] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.491546] [ 24.491683] The buggy address belongs to the physical page: [ 24.492001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.492593] flags: 0x200000000000000(node=0|zone=2) [ 24.492884] page_type: f5(slab) [ 24.493243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.493686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.494107] page dumped because: kasan: bad access detected [ 24.494373] [ 24.495027] Memory state around the buggy address: [ 24.495449] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.495943] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.496446] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.496914] ^ [ 24.497361] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.497821] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.498372] ================================================================== [ 24.889095] ================================================================== [ 24.889411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 24.889947] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.890267] [ 24.890398] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.890482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.890509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.890546] Call Trace: [ 24.890575] <TASK> [ 24.890603] dump_stack_lvl+0x73/0xb0 [ 24.890657] print_report+0xd1/0x650 [ 24.890701] ? __virt_addr_valid+0x1db/0x2d0 [ 24.890742] ? kasan_atomics_helper+0xac7/0x5450 [ 24.890780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.890858] ? kasan_atomics_helper+0xac7/0x5450 [ 24.890904] kasan_report+0x141/0x180 [ 24.890948] ? kasan_atomics_helper+0xac7/0x5450 [ 24.890999] kasan_check_range+0x10c/0x1c0 [ 24.891045] __kasan_check_write+0x18/0x20 [ 24.891088] kasan_atomics_helper+0xac7/0x5450 [ 24.891131] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.891173] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.891217] ? trace_hardirqs_on+0x37/0xe0 [ 24.891257] ? kasan_atomics+0x152/0x310 [ 24.891307] kasan_atomics+0x1dc/0x310 [ 24.891351] ? __pfx_kasan_atomics+0x10/0x10 [ 24.891403] ? __pfx_kasan_atomics+0x10/0x10 [ 24.891468] kunit_try_run_case+0x1a5/0x480 [ 24.891510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.891560] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.891598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.891640] ? __kthread_parkme+0x82/0x180 [ 24.891689] ? preempt_count_sub+0x50/0x80 [ 24.891740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.891778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.891816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.891884] kthread+0x337/0x6f0 [ 24.891918] ? trace_preempt_on+0x20/0xc0 [ 24.891957] ? __pfx_kthread+0x10/0x10 [ 24.892010] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.892051] ? calculate_sigpending+0x7b/0xa0 [ 24.892101] ? __pfx_kthread+0x10/0x10 [ 24.892135] ret_from_fork+0x116/0x1d0 [ 24.892171] ? __pfx_kthread+0x10/0x10 [ 24.892205] ret_from_fork_asm+0x1a/0x30 [ 24.892264] </TASK> [ 24.892288] [ 24.902058] Allocated by task 294: [ 24.902297] kasan_save_stack+0x45/0x70 [ 24.902522] kasan_save_track+0x18/0x40 [ 24.902702] kasan_save_alloc_info+0x3b/0x50 [ 24.902938] __kasan_kmalloc+0xb7/0xc0 [ 24.903136] __kmalloc_cache_noprof+0x189/0x420 [ 24.904183] kasan_atomics+0x95/0x310 [ 24.905660] kunit_try_run_case+0x1a5/0x480 [ 24.906022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.906471] kthread+0x337/0x6f0 [ 24.906749] ret_from_fork+0x116/0x1d0 [ 24.907059] ret_from_fork_asm+0x1a/0x30 [ 24.907345] [ 24.907513] The buggy address belongs to the object at ffff888102c1c600 [ 24.907513] which belongs to the cache kmalloc-64 of size 64 [ 24.908043] The buggy address is located 0 bytes to the right of [ 24.908043] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.908502] [ 24.908637] The buggy address belongs to the physical page: [ 24.909027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.909543] flags: 0x200000000000000(node=0|zone=2) [ 24.909907] page_type: f5(slab) [ 24.910171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.910442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.910990] page dumped because: kasan: bad access detected [ 24.911357] [ 24.911515] Memory state around the buggy address: [ 24.911779] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.912237] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.912613] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.913037] ^ [ 24.913334] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.913630] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.914108] ================================================================== [ 25.358946] ================================================================== [ 25.359472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 25.359827] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.360132] [ 25.360298] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.360392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.360417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.360453] Call Trace: [ 25.360479] <TASK> [ 25.360506] dump_stack_lvl+0x73/0xb0 [ 25.360560] print_report+0xd1/0x650 [ 25.360596] ? __virt_addr_valid+0x1db/0x2d0 [ 25.360637] ? kasan_atomics_helper+0x1467/0x5450 [ 25.360697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.360742] ? kasan_atomics_helper+0x1467/0x5450 [ 25.360782] kasan_report+0x141/0x180 [ 25.360825] ? kasan_atomics_helper+0x1467/0x5450 [ 25.360888] kasan_check_range+0x10c/0x1c0 [ 25.360928] __kasan_check_write+0x18/0x20 [ 25.360963] kasan_atomics_helper+0x1467/0x5450 [ 25.361003] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.361040] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.361083] ? trace_hardirqs_on+0x37/0xe0 [ 25.361121] ? kasan_atomics+0x152/0x310 [ 25.361164] kasan_atomics+0x1dc/0x310 [ 25.361227] ? __pfx_kasan_atomics+0x10/0x10 [ 25.361266] ? __pfx_kasan_atomics+0x10/0x10 [ 25.361314] kunit_try_run_case+0x1a5/0x480 [ 25.361360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.361413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.361436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.361457] ? __kthread_parkme+0x82/0x180 [ 25.361476] ? preempt_count_sub+0x50/0x80 [ 25.361497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.361518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.361538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.361558] kthread+0x337/0x6f0 [ 25.361576] ? trace_preempt_on+0x20/0xc0 [ 25.361596] ? __pfx_kthread+0x10/0x10 [ 25.361613] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.361632] ? calculate_sigpending+0x7b/0xa0 [ 25.361652] ? __pfx_kthread+0x10/0x10 [ 25.361670] ret_from_fork+0x116/0x1d0 [ 25.361687] ? __pfx_kthread+0x10/0x10 [ 25.361706] ret_from_fork_asm+0x1a/0x30 [ 25.361733] </TASK> [ 25.361744] [ 25.369797] Allocated by task 294: [ 25.370080] kasan_save_stack+0x45/0x70 [ 25.370411] kasan_save_track+0x18/0x40 [ 25.370725] kasan_save_alloc_info+0x3b/0x50 [ 25.371154] __kasan_kmalloc+0xb7/0xc0 [ 25.371446] __kmalloc_cache_noprof+0x189/0x420 [ 25.371758] kasan_atomics+0x95/0x310 [ 25.372106] kunit_try_run_case+0x1a5/0x480 [ 25.372265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.372460] kthread+0x337/0x6f0 [ 25.372599] ret_from_fork+0x116/0x1d0 [ 25.372741] ret_from_fork_asm+0x1a/0x30 [ 25.373092] [ 25.373233] The buggy address belongs to the object at ffff888102c1c600 [ 25.373233] which belongs to the cache kmalloc-64 of size 64 [ 25.374037] The buggy address is located 0 bytes to the right of [ 25.374037] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.374596] [ 25.374697] The buggy address belongs to the physical page: [ 25.374874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.375118] flags: 0x200000000000000(node=0|zone=2) [ 25.375299] page_type: f5(slab) [ 25.375546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.376119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.376620] page dumped because: kasan: bad access detected [ 25.377011] [ 25.377114] Memory state around the buggy address: [ 25.377358] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.377686] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.378243] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.378607] ^ [ 25.378786] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.379007] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.379219] ================================================================== [ 24.957861] ================================================================== [ 24.958412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 24.958896] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.959227] [ 24.959357] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.959446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.959471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.959505] Call Trace: [ 24.959533] <TASK> [ 24.959561] dump_stack_lvl+0x73/0xb0 [ 24.959614] print_report+0xd1/0x650 [ 24.959655] ? __virt_addr_valid+0x1db/0x2d0 [ 24.959698] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.959738] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.959786] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.959854] kasan_report+0x141/0x180 [ 24.959901] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.959953] __asan_report_load4_noabort+0x18/0x20 [ 24.959997] kasan_atomics_helper+0x4a84/0x5450 [ 24.960041] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.960114] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.960162] ? trace_hardirqs_on+0x37/0xe0 [ 24.960203] ? kasan_atomics+0x152/0x310 [ 24.960254] kasan_atomics+0x1dc/0x310 [ 24.960297] ? __pfx_kasan_atomics+0x10/0x10 [ 24.960342] ? __pfx_kasan_atomics+0x10/0x10 [ 24.960402] kunit_try_run_case+0x1a5/0x480 [ 24.960441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.960481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.960523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.960564] ? __kthread_parkme+0x82/0x180 [ 24.960605] ? preempt_count_sub+0x50/0x80 [ 24.960651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.960697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.960740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.960783] kthread+0x337/0x6f0 [ 24.960821] ? trace_preempt_on+0x20/0xc0 [ 24.960897] ? __pfx_kthread+0x10/0x10 [ 24.960939] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.960980] ? calculate_sigpending+0x7b/0xa0 [ 24.961025] ? __pfx_kthread+0x10/0x10 [ 24.961068] ret_from_fork+0x116/0x1d0 [ 24.961105] ? __pfx_kthread+0x10/0x10 [ 24.961145] ret_from_fork_asm+0x1a/0x30 [ 24.961207] </TASK> [ 24.961231] [ 24.972913] Allocated by task 294: [ 24.973193] kasan_save_stack+0x45/0x70 [ 24.973499] kasan_save_track+0x18/0x40 [ 24.973776] kasan_save_alloc_info+0x3b/0x50 [ 24.974086] __kasan_kmalloc+0xb7/0xc0 [ 24.974443] __kmalloc_cache_noprof+0x189/0x420 [ 24.974773] kasan_atomics+0x95/0x310 [ 24.975026] kunit_try_run_case+0x1a5/0x480 [ 24.975189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.975371] kthread+0x337/0x6f0 [ 24.975554] ret_from_fork+0x116/0x1d0 [ 24.975700] ret_from_fork_asm+0x1a/0x30 [ 24.975880] [ 24.976018] The buggy address belongs to the object at ffff888102c1c600 [ 24.976018] which belongs to the cache kmalloc-64 of size 64 [ 24.976789] The buggy address is located 0 bytes to the right of [ 24.976789] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.977623] [ 24.977784] The buggy address belongs to the physical page: [ 24.978193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.978501] flags: 0x200000000000000(node=0|zone=2) [ 24.978681] page_type: f5(slab) [ 24.978818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.979329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.979858] page dumped because: kasan: bad access detected [ 24.980194] [ 24.980283] Memory state around the buggy address: [ 24.980461] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.980680] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.981148] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.981606] ^ [ 24.981956] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.982293] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.982531] ================================================================== [ 24.577315] ================================================================== [ 24.577611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 24.578414] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.578711] [ 24.579148] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.579210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.579228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.579259] Call Trace: [ 24.579285] <TASK> [ 24.579313] dump_stack_lvl+0x73/0xb0 [ 24.579459] print_report+0xd1/0x650 [ 24.579501] ? __virt_addr_valid+0x1db/0x2d0 [ 24.579542] ? kasan_atomics_helper+0x4b54/0x5450 [ 24.579582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.579626] ? kasan_atomics_helper+0x4b54/0x5450 [ 24.579668] kasan_report+0x141/0x180 [ 24.579711] ? kasan_atomics_helper+0x4b54/0x5450 [ 24.579761] __asan_report_load4_noabort+0x18/0x20 [ 24.579799] kasan_atomics_helper+0x4b54/0x5450 [ 24.579824] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.579855] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.579878] ? trace_hardirqs_on+0x37/0xe0 [ 24.579897] ? kasan_atomics+0x152/0x310 [ 24.579920] kasan_atomics+0x1dc/0x310 [ 24.579939] ? __pfx_kasan_atomics+0x10/0x10 [ 24.579960] ? __pfx_kasan_atomics+0x10/0x10 [ 24.579982] kunit_try_run_case+0x1a5/0x480 [ 24.580004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.580024] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.580044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.580068] ? __kthread_parkme+0x82/0x180 [ 24.580094] ? preempt_count_sub+0x50/0x80 [ 24.580114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.580135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.580155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.580176] kthread+0x337/0x6f0 [ 24.580193] ? trace_preempt_on+0x20/0xc0 [ 24.580212] ? __pfx_kthread+0x10/0x10 [ 24.580230] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.580249] ? calculate_sigpending+0x7b/0xa0 [ 24.580269] ? __pfx_kthread+0x10/0x10 [ 24.580288] ret_from_fork+0x116/0x1d0 [ 24.580306] ? __pfx_kthread+0x10/0x10 [ 24.580324] ret_from_fork_asm+0x1a/0x30 [ 24.580353] </TASK> [ 24.580365] [ 24.591107] Allocated by task 294: [ 24.591452] kasan_save_stack+0x45/0x70 [ 24.591825] kasan_save_track+0x18/0x40 [ 24.592145] kasan_save_alloc_info+0x3b/0x50 [ 24.592354] __kasan_kmalloc+0xb7/0xc0 [ 24.592493] __kmalloc_cache_noprof+0x189/0x420 [ 24.592964] kasan_atomics+0x95/0x310 [ 24.593346] kunit_try_run_case+0x1a5/0x480 [ 24.593619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.594095] kthread+0x337/0x6f0 [ 24.594412] ret_from_fork+0x116/0x1d0 [ 24.594575] ret_from_fork_asm+0x1a/0x30 [ 24.594997] [ 24.595161] The buggy address belongs to the object at ffff888102c1c600 [ 24.595161] which belongs to the cache kmalloc-64 of size 64 [ 24.595898] The buggy address is located 0 bytes to the right of [ 24.595898] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.596692] [ 24.597112] The buggy address belongs to the physical page: [ 24.597472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.597917] flags: 0x200000000000000(node=0|zone=2) [ 24.598288] page_type: f5(slab) [ 24.598687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.599312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.599607] page dumped because: kasan: bad access detected [ 24.599948] [ 24.600082] Memory state around the buggy address: [ 24.600483] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.600843] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.601372] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.601808] ^ [ 24.602309] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.602806] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.603213] ================================================================== [ 25.735754] ================================================================== [ 25.736104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 25.736529] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.736956] [ 25.737081] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.737166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.737191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.737230] Call Trace: [ 25.737259] <TASK> [ 25.737288] dump_stack_lvl+0x73/0xb0 [ 25.737342] print_report+0xd1/0x650 [ 25.737399] ? __virt_addr_valid+0x1db/0x2d0 [ 25.737437] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.737472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.737514] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.737551] kasan_report+0x141/0x180 [ 25.737594] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.737644] kasan_check_range+0x10c/0x1c0 [ 25.737700] __kasan_check_write+0x18/0x20 [ 25.737739] kasan_atomics_helper+0x1d7a/0x5450 [ 25.737780] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.737821] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.737919] ? trace_hardirqs_on+0x37/0xe0 [ 25.737974] ? kasan_atomics+0x152/0x310 [ 25.738038] kasan_atomics+0x1dc/0x310 [ 25.738086] ? __pfx_kasan_atomics+0x10/0x10 [ 25.738135] ? __pfx_kasan_atomics+0x10/0x10 [ 25.738186] kunit_try_run_case+0x1a5/0x480 [ 25.738237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.738282] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.738327] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.738387] ? __kthread_parkme+0x82/0x180 [ 25.738429] ? preempt_count_sub+0x50/0x80 [ 25.738469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.738508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.738553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.738597] kthread+0x337/0x6f0 [ 25.738669] ? trace_preempt_on+0x20/0xc0 [ 25.738743] ? __pfx_kthread+0x10/0x10 [ 25.738819] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.738918] ? calculate_sigpending+0x7b/0xa0 [ 25.738982] ? __pfx_kthread+0x10/0x10 [ 25.739025] ret_from_fork+0x116/0x1d0 [ 25.739060] ? __pfx_kthread+0x10/0x10 [ 25.739099] ret_from_fork_asm+0x1a/0x30 [ 25.739157] </TASK> [ 25.739181] [ 25.752029] Allocated by task 294: [ 25.752418] kasan_save_stack+0x45/0x70 [ 25.752696] kasan_save_track+0x18/0x40 [ 25.753052] kasan_save_alloc_info+0x3b/0x50 [ 25.753417] __kasan_kmalloc+0xb7/0xc0 [ 25.753604] __kmalloc_cache_noprof+0x189/0x420 [ 25.753894] kasan_atomics+0x95/0x310 [ 25.754403] kunit_try_run_case+0x1a5/0x480 [ 25.754856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.755240] kthread+0x337/0x6f0 [ 25.755513] ret_from_fork+0x116/0x1d0 [ 25.755693] ret_from_fork_asm+0x1a/0x30 [ 25.755985] [ 25.756124] The buggy address belongs to the object at ffff888102c1c600 [ 25.756124] which belongs to the cache kmalloc-64 of size 64 [ 25.756565] The buggy address is located 0 bytes to the right of [ 25.756565] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.757194] [ 25.757294] The buggy address belongs to the physical page: [ 25.757669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.758262] flags: 0x200000000000000(node=0|zone=2) [ 25.758573] page_type: f5(slab) [ 25.758857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.759153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.759497] page dumped because: kasan: bad access detected [ 25.759853] [ 25.760044] Memory state around the buggy address: [ 25.760204] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.760480] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.760927] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.761280] ^ [ 25.761572] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.761988] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.762280] ================================================================== [ 24.550175] ================================================================== [ 24.550521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 24.551116] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.551697] [ 24.551814] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.551893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.551919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.551956] Call Trace: [ 24.551981] <TASK> [ 24.552009] dump_stack_lvl+0x73/0xb0 [ 24.552062] print_report+0xd1/0x650 [ 24.552104] ? __virt_addr_valid+0x1db/0x2d0 [ 24.552137] ? kasan_atomics_helper+0x3df/0x5450 [ 24.552162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.552193] ? kasan_atomics_helper+0x3df/0x5450 [ 24.552218] kasan_report+0x141/0x180 [ 24.552244] ? kasan_atomics_helper+0x3df/0x5450 [ 24.552281] kasan_check_range+0x10c/0x1c0 [ 24.552309] __kasan_check_read+0x15/0x20 [ 24.552330] kasan_atomics_helper+0x3df/0x5450 [ 24.552349] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.552368] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.552443] ? trace_hardirqs_on+0x37/0xe0 [ 24.552481] ? kasan_atomics+0x152/0x310 [ 24.552542] kasan_atomics+0x1dc/0x310 [ 24.552600] ? __pfx_kasan_atomics+0x10/0x10 [ 24.552658] ? __pfx_kasan_atomics+0x10/0x10 [ 24.552712] kunit_try_run_case+0x1a5/0x480 [ 24.552777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.552866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.552927] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.552974] ? __kthread_parkme+0x82/0x180 [ 24.553025] ? preempt_count_sub+0x50/0x80 [ 24.553049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.553084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.553106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.553126] kthread+0x337/0x6f0 [ 24.553144] ? trace_preempt_on+0x20/0xc0 [ 24.553164] ? __pfx_kthread+0x10/0x10 [ 24.553182] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.553201] ? calculate_sigpending+0x7b/0xa0 [ 24.553222] ? __pfx_kthread+0x10/0x10 [ 24.553241] ret_from_fork+0x116/0x1d0 [ 24.553259] ? __pfx_kthread+0x10/0x10 [ 24.553277] ret_from_fork_asm+0x1a/0x30 [ 24.553305] </TASK> [ 24.553318] [ 24.564077] Allocated by task 294: [ 24.564315] kasan_save_stack+0x45/0x70 [ 24.564522] kasan_save_track+0x18/0x40 [ 24.564767] kasan_save_alloc_info+0x3b/0x50 [ 24.565013] __kasan_kmalloc+0xb7/0xc0 [ 24.565913] __kmalloc_cache_noprof+0x189/0x420 [ 24.566114] kasan_atomics+0x95/0x310 [ 24.566535] kunit_try_run_case+0x1a5/0x480 [ 24.566855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.567374] kthread+0x337/0x6f0 [ 24.567779] ret_from_fork+0x116/0x1d0 [ 24.568107] ret_from_fork_asm+0x1a/0x30 [ 24.568341] [ 24.568443] The buggy address belongs to the object at ffff888102c1c600 [ 24.568443] which belongs to the cache kmalloc-64 of size 64 [ 24.569316] The buggy address is located 0 bytes to the right of [ 24.569316] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.569877] [ 24.569978] The buggy address belongs to the physical page: [ 24.570650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.571322] flags: 0x200000000000000(node=0|zone=2) [ 24.571686] page_type: f5(slab) [ 24.571824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.572208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.572826] page dumped because: kasan: bad access detected [ 24.573205] [ 24.573310] Memory state around the buggy address: [ 24.573517] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.573783] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.574652] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.575244] ^ [ 24.575437] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.575840] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.576601] ================================================================== [ 24.655017] ================================================================== [ 24.655851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 24.656328] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.656774] [ 24.656961] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.657039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.657063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.657100] Call Trace: [ 24.657125] <TASK> [ 24.657150] dump_stack_lvl+0x73/0xb0 [ 24.657201] print_report+0xd1/0x650 [ 24.657241] ? __virt_addr_valid+0x1db/0x2d0 [ 24.657279] ? kasan_atomics_helper+0x565/0x5450 [ 24.657312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.657354] ? kasan_atomics_helper+0x565/0x5450 [ 24.657404] kasan_report+0x141/0x180 [ 24.657442] ? kasan_atomics_helper+0x565/0x5450 [ 24.657486] kasan_check_range+0x10c/0x1c0 [ 24.657528] __kasan_check_write+0x18/0x20 [ 24.657568] kasan_atomics_helper+0x565/0x5450 [ 24.657612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.657653] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.657698] ? trace_hardirqs_on+0x37/0xe0 [ 24.657738] ? kasan_atomics+0x152/0x310 [ 24.657776] kasan_atomics+0x1dc/0x310 [ 24.657814] ? __pfx_kasan_atomics+0x10/0x10 [ 24.657888] ? __pfx_kasan_atomics+0x10/0x10 [ 24.657935] kunit_try_run_case+0x1a5/0x480 [ 24.657984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.658035] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.658088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.658137] ? __kthread_parkme+0x82/0x180 [ 24.658180] ? preempt_count_sub+0x50/0x80 [ 24.658223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.658261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.658305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.658350] kthread+0x337/0x6f0 [ 24.658403] ? trace_preempt_on+0x20/0xc0 [ 24.658447] ? __pfx_kthread+0x10/0x10 [ 24.658490] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.658533] ? calculate_sigpending+0x7b/0xa0 [ 24.658578] ? __pfx_kthread+0x10/0x10 [ 24.658620] ret_from_fork+0x116/0x1d0 [ 24.658660] ? __pfx_kthread+0x10/0x10 [ 24.658700] ret_from_fork_asm+0x1a/0x30 [ 24.658762] </TASK> [ 24.658787] [ 24.666910] Allocated by task 294: [ 24.667158] kasan_save_stack+0x45/0x70 [ 24.667924] kasan_save_track+0x18/0x40 [ 24.668249] kasan_save_alloc_info+0x3b/0x50 [ 24.668525] __kasan_kmalloc+0xb7/0xc0 [ 24.668694] __kmalloc_cache_noprof+0x189/0x420 [ 24.669420] kasan_atomics+0x95/0x310 [ 24.670828] kunit_try_run_case+0x1a5/0x480 [ 24.671198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.671584] kthread+0x337/0x6f0 [ 24.671752] ret_from_fork+0x116/0x1d0 [ 24.672477] ret_from_fork_asm+0x1a/0x30 [ 24.673028] [ 24.673206] The buggy address belongs to the object at ffff888102c1c600 [ 24.673206] which belongs to the cache kmalloc-64 of size 64 [ 24.673656] The buggy address is located 0 bytes to the right of [ 24.673656] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.674713] [ 24.674957] The buggy address belongs to the physical page: [ 24.675231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.675543] flags: 0x200000000000000(node=0|zone=2) [ 24.675753] page_type: f5(slab) [ 24.676273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.676903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.677114] page dumped because: kasan: bad access detected [ 24.677278] [ 24.677338] Memory state around the buggy address: [ 24.677449] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.677567] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.677677] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.677784] ^ [ 24.677928] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.678188] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.678590] ================================================================== [ 25.403975] ================================================================== [ 25.404639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 25.404907] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.405859] [ 25.406449] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.406556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.406580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.406602] Call Trace: [ 25.406619] <TASK> [ 25.406636] dump_stack_lvl+0x73/0xb0 [ 25.406669] print_report+0xd1/0x650 [ 25.406691] ? __virt_addr_valid+0x1db/0x2d0 [ 25.406713] ? kasan_atomics_helper+0x151d/0x5450 [ 25.406733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.406758] ? kasan_atomics_helper+0x151d/0x5450 [ 25.406778] kasan_report+0x141/0x180 [ 25.406799] ? kasan_atomics_helper+0x151d/0x5450 [ 25.406825] kasan_check_range+0x10c/0x1c0 [ 25.406862] __kasan_check_write+0x18/0x20 [ 25.406898] kasan_atomics_helper+0x151d/0x5450 [ 25.406937] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.406978] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.407020] ? trace_hardirqs_on+0x37/0xe0 [ 25.407080] ? kasan_atomics+0x152/0x310 [ 25.407129] kasan_atomics+0x1dc/0x310 [ 25.407166] ? __pfx_kasan_atomics+0x10/0x10 [ 25.407209] ? __pfx_kasan_atomics+0x10/0x10 [ 25.407259] kunit_try_run_case+0x1a5/0x480 [ 25.407302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.407330] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.407350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.407369] ? __kthread_parkme+0x82/0x180 [ 25.407406] ? preempt_count_sub+0x50/0x80 [ 25.407427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.407448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.407469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.407489] kthread+0x337/0x6f0 [ 25.407506] ? trace_preempt_on+0x20/0xc0 [ 25.407525] ? __pfx_kthread+0x10/0x10 [ 25.407543] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.407561] ? calculate_sigpending+0x7b/0xa0 [ 25.407581] ? __pfx_kthread+0x10/0x10 [ 25.407599] ret_from_fork+0x116/0x1d0 [ 25.407616] ? __pfx_kthread+0x10/0x10 [ 25.407634] ret_from_fork_asm+0x1a/0x30 [ 25.407661] </TASK> [ 25.407672] [ 25.415610] Allocated by task 294: [ 25.415763] kasan_save_stack+0x45/0x70 [ 25.415925] kasan_save_track+0x18/0x40 [ 25.416216] kasan_save_alloc_info+0x3b/0x50 [ 25.416543] __kasan_kmalloc+0xb7/0xc0 [ 25.416821] __kmalloc_cache_noprof+0x189/0x420 [ 25.417141] kasan_atomics+0x95/0x310 [ 25.417496] kunit_try_run_case+0x1a5/0x480 [ 25.418651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.419650] kthread+0x337/0x6f0 [ 25.420354] ret_from_fork+0x116/0x1d0 [ 25.420518] ret_from_fork_asm+0x1a/0x30 [ 25.420961] [ 25.421124] The buggy address belongs to the object at ffff888102c1c600 [ 25.421124] which belongs to the cache kmalloc-64 of size 64 [ 25.421760] The buggy address is located 0 bytes to the right of [ 25.421760] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.422725] [ 25.422968] The buggy address belongs to the physical page: [ 25.423215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.423536] flags: 0x200000000000000(node=0|zone=2) [ 25.423748] page_type: f5(slab) [ 25.424281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.424621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.425305] page dumped because: kasan: bad access detected [ 25.425705] [ 25.425822] Memory state around the buggy address: [ 25.426346] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.426600] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.427076] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.427553] ^ [ 25.427886] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.428446] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.429305] ================================================================== [ 25.665931] ================================================================== [ 25.667266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 25.667677] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.668261] [ 25.668751] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.668893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.668913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.668933] Call Trace: [ 25.668949] <TASK> [ 25.668965] dump_stack_lvl+0x73/0xb0 [ 25.668996] print_report+0xd1/0x650 [ 25.669016] ? __virt_addr_valid+0x1db/0x2d0 [ 25.669036] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.669054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.669076] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.669095] kasan_report+0x141/0x180 [ 25.669114] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.669137] kasan_check_range+0x10c/0x1c0 [ 25.669156] __kasan_check_write+0x18/0x20 [ 25.669176] kasan_atomics_helper+0x1c18/0x5450 [ 25.669196] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.669214] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.669235] ? trace_hardirqs_on+0x37/0xe0 [ 25.669253] ? kasan_atomics+0x152/0x310 [ 25.669275] kasan_atomics+0x1dc/0x310 [ 25.669295] ? __pfx_kasan_atomics+0x10/0x10 [ 25.669315] ? __pfx_kasan_atomics+0x10/0x10 [ 25.669338] kunit_try_run_case+0x1a5/0x480 [ 25.669360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.669396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.669418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.669438] ? __kthread_parkme+0x82/0x180 [ 25.669456] ? preempt_count_sub+0x50/0x80 [ 25.669477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.669498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.669519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.669540] kthread+0x337/0x6f0 [ 25.669557] ? trace_preempt_on+0x20/0xc0 [ 25.669576] ? __pfx_kthread+0x10/0x10 [ 25.669595] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.669613] ? calculate_sigpending+0x7b/0xa0 [ 25.669633] ? __pfx_kthread+0x10/0x10 [ 25.669652] ret_from_fork+0x116/0x1d0 [ 25.669669] ? __pfx_kthread+0x10/0x10 [ 25.669687] ret_from_fork_asm+0x1a/0x30 [ 25.669715] </TASK> [ 25.669726] [ 25.677793] Allocated by task 294: [ 25.678081] kasan_save_stack+0x45/0x70 [ 25.678410] kasan_save_track+0x18/0x40 [ 25.678808] kasan_save_alloc_info+0x3b/0x50 [ 25.679095] __kasan_kmalloc+0xb7/0xc0 [ 25.679241] __kmalloc_cache_noprof+0x189/0x420 [ 25.679423] kasan_atomics+0x95/0x310 [ 25.679572] kunit_try_run_case+0x1a5/0x480 [ 25.679772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.680206] kthread+0x337/0x6f0 [ 25.680474] ret_from_fork+0x116/0x1d0 [ 25.680742] ret_from_fork_asm+0x1a/0x30 [ 25.681046] [ 25.681208] The buggy address belongs to the object at ffff888102c1c600 [ 25.681208] which belongs to the cache kmalloc-64 of size 64 [ 25.681676] The buggy address is located 0 bytes to the right of [ 25.681676] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.682597] [ 25.682787] The buggy address belongs to the physical page: [ 25.682974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.683214] flags: 0x200000000000000(node=0|zone=2) [ 25.683412] page_type: f5(slab) [ 25.683648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.684236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.684733] page dumped because: kasan: bad access detected [ 25.685131] [ 25.685216] Memory state around the buggy address: [ 25.685391] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.685623] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.686112] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.686665] ^ [ 25.687039] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.687477] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.687693] ================================================================== [ 25.475628] ================================================================== [ 25.476358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 25.476902] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.477375] [ 25.477561] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.477676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.477704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.477741] Call Trace: [ 25.477766] <TASK> [ 25.477809] dump_stack_lvl+0x73/0xb0 [ 25.477860] print_report+0xd1/0x650 [ 25.477899] ? __virt_addr_valid+0x1db/0x2d0 [ 25.477939] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.477978] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.478037] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.478084] kasan_report+0x141/0x180 [ 25.478130] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.478186] kasan_check_range+0x10c/0x1c0 [ 25.478233] __kasan_check_write+0x18/0x20 [ 25.478277] kasan_atomics_helper+0x16e7/0x5450 [ 25.478325] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.478371] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.478435] ? trace_hardirqs_on+0x37/0xe0 [ 25.478480] ? kasan_atomics+0x152/0x310 [ 25.478527] kasan_atomics+0x1dc/0x310 [ 25.478570] ? __pfx_kasan_atomics+0x10/0x10 [ 25.478614] ? __pfx_kasan_atomics+0x10/0x10 [ 25.478665] kunit_try_run_case+0x1a5/0x480 [ 25.478717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.478763] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.478810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.478854] ? __kthread_parkme+0x82/0x180 [ 25.478919] ? preempt_count_sub+0x50/0x80 [ 25.478967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.479016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.479065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.479111] kthread+0x337/0x6f0 [ 25.479151] ? trace_preempt_on+0x20/0xc0 [ 25.479194] ? __pfx_kthread+0x10/0x10 [ 25.479234] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.479277] ? calculate_sigpending+0x7b/0xa0 [ 25.479321] ? __pfx_kthread+0x10/0x10 [ 25.479364] ret_from_fork+0x116/0x1d0 [ 25.479424] ? __pfx_kthread+0x10/0x10 [ 25.479466] ret_from_fork_asm+0x1a/0x30 [ 25.479525] </TASK> [ 25.479549] [ 25.490655] Allocated by task 294: [ 25.490819] kasan_save_stack+0x45/0x70 [ 25.491009] kasan_save_track+0x18/0x40 [ 25.491158] kasan_save_alloc_info+0x3b/0x50 [ 25.491531] __kasan_kmalloc+0xb7/0xc0 [ 25.491888] __kmalloc_cache_noprof+0x189/0x420 [ 25.492240] kasan_atomics+0x95/0x310 [ 25.492525] kunit_try_run_case+0x1a5/0x480 [ 25.492909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.493303] kthread+0x337/0x6f0 [ 25.493625] ret_from_fork+0x116/0x1d0 [ 25.493962] ret_from_fork_asm+0x1a/0x30 [ 25.494186] [ 25.494287] The buggy address belongs to the object at ffff888102c1c600 [ 25.494287] which belongs to the cache kmalloc-64 of size 64 [ 25.494796] The buggy address is located 0 bytes to the right of [ 25.494796] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.495498] [ 25.495645] The buggy address belongs to the physical page: [ 25.495821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.496310] flags: 0x200000000000000(node=0|zone=2) [ 25.496509] page_type: f5(slab) [ 25.496648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.497142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.497458] page dumped because: kasan: bad access detected [ 25.497741] [ 25.497854] Memory state around the buggy address: [ 25.498195] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.498536] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.498968] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.499305] ^ [ 25.499486] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.499702] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.500191] ================================================================== [ 24.813872] ================================================================== [ 24.814308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 24.814584] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.815682] [ 24.815963] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.816047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.816073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.816105] Call Trace: [ 24.816216] <TASK> [ 24.816236] dump_stack_lvl+0x73/0xb0 [ 24.816270] print_report+0xd1/0x650 [ 24.816295] ? __virt_addr_valid+0x1db/0x2d0 [ 24.816327] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.816346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.816369] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.816407] kasan_report+0x141/0x180 [ 24.816428] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.816451] kasan_check_range+0x10c/0x1c0 [ 24.816471] __kasan_check_write+0x18/0x20 [ 24.816490] kasan_atomics_helper+0x8f9/0x5450 [ 24.816511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.816530] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.816550] ? trace_hardirqs_on+0x37/0xe0 [ 24.816569] ? kasan_atomics+0x152/0x310 [ 24.816591] kasan_atomics+0x1dc/0x310 [ 24.816611] ? __pfx_kasan_atomics+0x10/0x10 [ 24.816630] ? __pfx_kasan_atomics+0x10/0x10 [ 24.816653] kunit_try_run_case+0x1a5/0x480 [ 24.816674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.816693] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.816713] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.816733] ? __kthread_parkme+0x82/0x180 [ 24.816751] ? preempt_count_sub+0x50/0x80 [ 24.816772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.816793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.816812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.816837] kthread+0x337/0x6f0 [ 24.816869] ? trace_preempt_on+0x20/0xc0 [ 24.816888] ? __pfx_kthread+0x10/0x10 [ 24.816906] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.816924] ? calculate_sigpending+0x7b/0xa0 [ 24.816944] ? __pfx_kthread+0x10/0x10 [ 24.816963] ret_from_fork+0x116/0x1d0 [ 24.816980] ? __pfx_kthread+0x10/0x10 [ 24.816998] ret_from_fork_asm+0x1a/0x30 [ 24.817026] </TASK> [ 24.817037] [ 24.828371] Allocated by task 294: [ 24.828585] kasan_save_stack+0x45/0x70 [ 24.828861] kasan_save_track+0x18/0x40 [ 24.829635] kasan_save_alloc_info+0x3b/0x50 [ 24.829846] __kasan_kmalloc+0xb7/0xc0 [ 24.830002] __kmalloc_cache_noprof+0x189/0x420 [ 24.830535] kasan_atomics+0x95/0x310 [ 24.830691] kunit_try_run_case+0x1a5/0x480 [ 24.831261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.831610] kthread+0x337/0x6f0 [ 24.831973] ret_from_fork+0x116/0x1d0 [ 24.832129] ret_from_fork_asm+0x1a/0x30 [ 24.832512] [ 24.832675] The buggy address belongs to the object at ffff888102c1c600 [ 24.832675] which belongs to the cache kmalloc-64 of size 64 [ 24.833224] The buggy address is located 0 bytes to the right of [ 24.833224] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.833844] [ 24.833982] The buggy address belongs to the physical page: [ 24.834239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.835076] flags: 0x200000000000000(node=0|zone=2) [ 24.835375] page_type: f5(slab) [ 24.835768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.836286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.836740] page dumped because: kasan: bad access detected [ 24.837130] [ 24.837214] Memory state around the buggy address: [ 24.837683] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.838079] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.838587] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.838962] ^ [ 24.839405] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.839674] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.840288] ================================================================== [ 25.833492] ================================================================== [ 25.833864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 25.834523] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.834971] [ 25.835147] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.835231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.835256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.835291] Call Trace: [ 25.835326] <TASK> [ 25.835353] dump_stack_lvl+0x73/0xb0 [ 25.835433] print_report+0xd1/0x650 [ 25.835474] ? __virt_addr_valid+0x1db/0x2d0 [ 25.835513] ? kasan_atomics_helper+0x4f71/0x5450 [ 25.835553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.835594] ? kasan_atomics_helper+0x4f71/0x5450 [ 25.835635] kasan_report+0x141/0x180 [ 25.835675] ? kasan_atomics_helper+0x4f71/0x5450 [ 25.835725] __asan_report_load8_noabort+0x18/0x20 [ 25.835770] kasan_atomics_helper+0x4f71/0x5450 [ 25.835813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.835861] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.835908] ? trace_hardirqs_on+0x37/0xe0 [ 25.835943] ? kasan_atomics+0x152/0x310 [ 25.836005] kasan_atomics+0x1dc/0x310 [ 25.836049] ? __pfx_kasan_atomics+0x10/0x10 [ 25.836091] ? __pfx_kasan_atomics+0x10/0x10 [ 25.836142] kunit_try_run_case+0x1a5/0x480 [ 25.836188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.836231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.836274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.836317] ? __kthread_parkme+0x82/0x180 [ 25.836353] ? preempt_count_sub+0x50/0x80 [ 25.836412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.836457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.836511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.836553] kthread+0x337/0x6f0 [ 25.836588] ? trace_preempt_on+0x20/0xc0 [ 25.836634] ? __pfx_kthread+0x10/0x10 [ 25.836674] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.836726] ? calculate_sigpending+0x7b/0xa0 [ 25.836769] ? __pfx_kthread+0x10/0x10 [ 25.836807] ret_from_fork+0x116/0x1d0 [ 25.836849] ? __pfx_kthread+0x10/0x10 [ 25.836898] ret_from_fork_asm+0x1a/0x30 [ 25.836953] </TASK> [ 25.836976] [ 25.845343] Allocated by task 294: [ 25.845629] kasan_save_stack+0x45/0x70 [ 25.845981] kasan_save_track+0x18/0x40 [ 25.846229] kasan_save_alloc_info+0x3b/0x50 [ 25.846469] __kasan_kmalloc+0xb7/0xc0 [ 25.846629] __kmalloc_cache_noprof+0x189/0x420 [ 25.846964] kasan_atomics+0x95/0x310 [ 25.847255] kunit_try_run_case+0x1a5/0x480 [ 25.847578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.847863] kthread+0x337/0x6f0 [ 25.848158] ret_from_fork+0x116/0x1d0 [ 25.848309] ret_from_fork_asm+0x1a/0x30 [ 25.848572] [ 25.848720] The buggy address belongs to the object at ffff888102c1c600 [ 25.848720] which belongs to the cache kmalloc-64 of size 64 [ 25.849486] The buggy address is located 0 bytes to the right of [ 25.849486] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.850301] [ 25.850406] The buggy address belongs to the physical page: [ 25.850590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.850841] flags: 0x200000000000000(node=0|zone=2) [ 25.851024] page_type: f5(slab) [ 25.851161] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.851418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.851929] page dumped because: kasan: bad access detected [ 25.852291] [ 25.852443] Memory state around the buggy address: [ 25.852784] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.853279] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.853765] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.854282] ^ [ 25.854597] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.854839] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.855307] ================================================================== [ 24.629667] ================================================================== [ 24.630702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 24.631749] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.632356] [ 24.632510] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.632593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.632612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.632646] Call Trace: [ 24.632672] <TASK> [ 24.632697] dump_stack_lvl+0x73/0xb0 [ 24.632749] print_report+0xd1/0x650 [ 24.632787] ? __virt_addr_valid+0x1db/0x2d0 [ 24.632821] ? kasan_atomics_helper+0x4b3a/0x5450 [ 24.632853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.633200] ? kasan_atomics_helper+0x4b3a/0x5450 [ 24.633228] kasan_report+0x141/0x180 [ 24.633250] ? kasan_atomics_helper+0x4b3a/0x5450 [ 24.633283] __asan_report_store4_noabort+0x1b/0x30 [ 24.633339] kasan_atomics_helper+0x4b3a/0x5450 [ 24.633360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.633397] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.633421] ? trace_hardirqs_on+0x37/0xe0 [ 24.633440] ? kasan_atomics+0x152/0x310 [ 24.633463] kasan_atomics+0x1dc/0x310 [ 24.633482] ? __pfx_kasan_atomics+0x10/0x10 [ 24.633502] ? __pfx_kasan_atomics+0x10/0x10 [ 24.633525] kunit_try_run_case+0x1a5/0x480 [ 24.633547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.633566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.633585] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.633605] ? __kthread_parkme+0x82/0x180 [ 24.633623] ? preempt_count_sub+0x50/0x80 [ 24.633644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.633665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.633685] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.633706] kthread+0x337/0x6f0 [ 24.633723] ? trace_preempt_on+0x20/0xc0 [ 24.633742] ? __pfx_kthread+0x10/0x10 [ 24.633760] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.633778] ? calculate_sigpending+0x7b/0xa0 [ 24.633798] ? __pfx_kthread+0x10/0x10 [ 24.633817] ret_from_fork+0x116/0x1d0 [ 24.633847] ? __pfx_kthread+0x10/0x10 [ 24.633868] ret_from_fork_asm+0x1a/0x30 [ 24.633896] </TASK> [ 24.633908] [ 24.644263] Allocated by task 294: [ 24.644526] kasan_save_stack+0x45/0x70 [ 24.644804] kasan_save_track+0x18/0x40 [ 24.645652] kasan_save_alloc_info+0x3b/0x50 [ 24.645932] __kasan_kmalloc+0xb7/0xc0 [ 24.646157] __kmalloc_cache_noprof+0x189/0x420 [ 24.646422] kasan_atomics+0x95/0x310 [ 24.646698] kunit_try_run_case+0x1a5/0x480 [ 24.646938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.647564] kthread+0x337/0x6f0 [ 24.647720] ret_from_fork+0x116/0x1d0 [ 24.648001] ret_from_fork_asm+0x1a/0x30 [ 24.648209] [ 24.648306] The buggy address belongs to the object at ffff888102c1c600 [ 24.648306] which belongs to the cache kmalloc-64 of size 64 [ 24.648820] The buggy address is located 0 bytes to the right of [ 24.648820] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.649355] [ 24.649509] The buggy address belongs to the physical page: [ 24.649776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.650033] flags: 0x200000000000000(node=0|zone=2) [ 24.650226] page_type: f5(slab) [ 24.650491] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.651009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.651278] page dumped because: kasan: bad access detected [ 24.651640] [ 24.651783] Memory state around the buggy address: [ 24.652076] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.652409] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.652709] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.653074] ^ [ 24.653401] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.653669] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.653957] ================================================================== [ 25.905976] ================================================================== [ 25.906268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 25.906547] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.906795] [ 25.906971] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.907061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.907086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.907127] Call Trace: [ 25.907154] <TASK> [ 25.907183] dump_stack_lvl+0x73/0xb0 [ 25.907235] print_report+0xd1/0x650 [ 25.907275] ? __virt_addr_valid+0x1db/0x2d0 [ 25.907318] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.907358] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.908037] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.908087] kasan_report+0x141/0x180 [ 25.908128] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.908173] kasan_check_range+0x10c/0x1c0 [ 25.908211] __kasan_check_write+0x18/0x20 [ 25.908250] kasan_atomics_helper+0x20c8/0x5450 [ 25.908284] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.908321] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.908363] ? trace_hardirqs_on+0x37/0xe0 [ 25.908416] ? kasan_atomics+0x152/0x310 [ 25.908465] kasan_atomics+0x1dc/0x310 [ 25.908508] ? __pfx_kasan_atomics+0x10/0x10 [ 25.908552] ? __pfx_kasan_atomics+0x10/0x10 [ 25.908604] kunit_try_run_case+0x1a5/0x480 [ 25.908651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.908694] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.908737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.908781] ? __kthread_parkme+0x82/0x180 [ 25.908819] ? preempt_count_sub+0x50/0x80 [ 25.908863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.908908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.908954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.908995] kthread+0x337/0x6f0 [ 25.909034] ? trace_preempt_on+0x20/0xc0 [ 25.909075] ? __pfx_kthread+0x10/0x10 [ 25.909116] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.909167] ? calculate_sigpending+0x7b/0xa0 [ 25.909205] ? __pfx_kthread+0x10/0x10 [ 25.909237] ret_from_fork+0x116/0x1d0 [ 25.909271] ? __pfx_kthread+0x10/0x10 [ 25.909307] ret_from_fork_asm+0x1a/0x30 [ 25.909352] </TASK> [ 25.909365] [ 25.918099] Allocated by task 294: [ 25.918286] kasan_save_stack+0x45/0x70 [ 25.918521] kasan_save_track+0x18/0x40 [ 25.918737] kasan_save_alloc_info+0x3b/0x50 [ 25.918991] __kasan_kmalloc+0xb7/0xc0 [ 25.919263] __kmalloc_cache_noprof+0x189/0x420 [ 25.919597] kasan_atomics+0x95/0x310 [ 25.919746] kunit_try_run_case+0x1a5/0x480 [ 25.919904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.920115] kthread+0x337/0x6f0 [ 25.920252] ret_from_fork+0x116/0x1d0 [ 25.920426] ret_from_fork_asm+0x1a/0x30 [ 25.920781] [ 25.920942] The buggy address belongs to the object at ffff888102c1c600 [ 25.920942] which belongs to the cache kmalloc-64 of size 64 [ 25.921681] The buggy address is located 0 bytes to the right of [ 25.921681] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.922601] [ 25.922684] The buggy address belongs to the physical page: [ 25.922985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.923289] flags: 0x200000000000000(node=0|zone=2) [ 25.923599] page_type: f5(slab) [ 25.923836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.924354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.924589] page dumped because: kasan: bad access detected [ 25.924915] [ 25.925038] Memory state around the buggy address: [ 25.925352] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.925793] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.926125] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.926565] ^ [ 25.926743] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.926972] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.927184] ================================================================== [ 25.978027] ================================================================== [ 25.978467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 25.978754] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.979222] [ 25.980159] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.980254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.980278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.980437] Call Trace: [ 25.980473] <TASK> [ 25.980565] dump_stack_lvl+0x73/0xb0 [ 25.980607] print_report+0xd1/0x650 [ 25.980629] ? __virt_addr_valid+0x1db/0x2d0 [ 25.980649] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.980669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.980691] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.980710] kasan_report+0x141/0x180 [ 25.980729] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.980752] __asan_report_load8_noabort+0x18/0x20 [ 25.980773] kasan_atomics_helper+0x4fa5/0x5450 [ 25.980793] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.980813] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.980855] ? trace_hardirqs_on+0x37/0xe0 [ 25.980875] ? kasan_atomics+0x152/0x310 [ 25.980898] kasan_atomics+0x1dc/0x310 [ 25.980917] ? __pfx_kasan_atomics+0x10/0x10 [ 25.980937] ? __pfx_kasan_atomics+0x10/0x10 [ 25.980959] kunit_try_run_case+0x1a5/0x480 [ 25.980980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.981000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.981019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.981039] ? __kthread_parkme+0x82/0x180 [ 25.981056] ? preempt_count_sub+0x50/0x80 [ 25.981077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.981098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.981118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.981138] kthread+0x337/0x6f0 [ 25.981156] ? trace_preempt_on+0x20/0xc0 [ 25.981176] ? __pfx_kthread+0x10/0x10 [ 25.981194] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.981213] ? calculate_sigpending+0x7b/0xa0 [ 25.981233] ? __pfx_kthread+0x10/0x10 [ 25.981252] ret_from_fork+0x116/0x1d0 [ 25.981269] ? __pfx_kthread+0x10/0x10 [ 25.981287] ret_from_fork_asm+0x1a/0x30 [ 25.981313] </TASK> [ 25.981324] [ 25.990760] Allocated by task 294: [ 25.990999] kasan_save_stack+0x45/0x70 [ 25.991363] kasan_save_track+0x18/0x40 [ 25.991696] kasan_save_alloc_info+0x3b/0x50 [ 25.991953] __kasan_kmalloc+0xb7/0xc0 [ 25.992102] __kmalloc_cache_noprof+0x189/0x420 [ 25.992268] kasan_atomics+0x95/0x310 [ 25.992457] kunit_try_run_case+0x1a5/0x480 [ 25.992752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.993121] kthread+0x337/0x6f0 [ 25.993366] ret_from_fork+0x116/0x1d0 [ 25.993724] ret_from_fork_asm+0x1a/0x30 [ 25.994054] [ 25.994216] The buggy address belongs to the object at ffff888102c1c600 [ 25.994216] which belongs to the cache kmalloc-64 of size 64 [ 25.994592] The buggy address is located 0 bytes to the right of [ 25.994592] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.995101] [ 25.995262] The buggy address belongs to the physical page: [ 25.995719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.996250] flags: 0x200000000000000(node=0|zone=2) [ 25.996609] page_type: f5(slab) [ 25.996899] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.997374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.997765] page dumped because: kasan: bad access detected [ 25.998151] [ 25.998324] Memory state around the buggy address: [ 25.998627] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.999095] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.999336] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.999727] ^ [ 26.000183] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.000660] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.001069] ================================================================== [ 25.501024] ================================================================== [ 25.501346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 25.501805] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.502139] [ 25.502319] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.502420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.502451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.502487] Call Trace: [ 25.502515] <TASK> [ 25.502544] dump_stack_lvl+0x73/0xb0 [ 25.502596] print_report+0xd1/0x650 [ 25.502636] ? __virt_addr_valid+0x1db/0x2d0 [ 25.502676] ? kasan_atomics_helper+0x177f/0x5450 [ 25.502713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.502756] ? kasan_atomics_helper+0x177f/0x5450 [ 25.502792] kasan_report+0x141/0x180 [ 25.502865] ? kasan_atomics_helper+0x177f/0x5450 [ 25.502918] kasan_check_range+0x10c/0x1c0 [ 25.502962] __kasan_check_write+0x18/0x20 [ 25.502998] kasan_atomics_helper+0x177f/0x5450 [ 25.503034] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.503071] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.503111] ? trace_hardirqs_on+0x37/0xe0 [ 25.503150] ? kasan_atomics+0x152/0x310 [ 25.503196] kasan_atomics+0x1dc/0x310 [ 25.503239] ? __pfx_kasan_atomics+0x10/0x10 [ 25.503282] ? __pfx_kasan_atomics+0x10/0x10 [ 25.503327] kunit_try_run_case+0x1a5/0x480 [ 25.503370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.503423] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.503461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.503505] ? __kthread_parkme+0x82/0x180 [ 25.503545] ? preempt_count_sub+0x50/0x80 [ 25.503591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.503637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.503682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.503722] kthread+0x337/0x6f0 [ 25.503752] ? trace_preempt_on+0x20/0xc0 [ 25.503786] ? __pfx_kthread+0x10/0x10 [ 25.503822] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.503890] ? calculate_sigpending+0x7b/0xa0 [ 25.503931] ? __pfx_kthread+0x10/0x10 [ 25.503970] ret_from_fork+0x116/0x1d0 [ 25.504004] ? __pfx_kthread+0x10/0x10 [ 25.504041] ret_from_fork_asm+0x1a/0x30 [ 25.504101] </TASK> [ 25.504126] [ 25.512037] Allocated by task 294: [ 25.512305] kasan_save_stack+0x45/0x70 [ 25.512590] kasan_save_track+0x18/0x40 [ 25.512875] kasan_save_alloc_info+0x3b/0x50 [ 25.513140] __kasan_kmalloc+0xb7/0xc0 [ 25.513345] __kmalloc_cache_noprof+0x189/0x420 [ 25.513641] kasan_atomics+0x95/0x310 [ 25.513788] kunit_try_run_case+0x1a5/0x480 [ 25.513976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.514181] kthread+0x337/0x6f0 [ 25.514348] ret_from_fork+0x116/0x1d0 [ 25.514625] ret_from_fork_asm+0x1a/0x30 [ 25.514940] [ 25.515089] The buggy address belongs to the object at ffff888102c1c600 [ 25.515089] which belongs to the cache kmalloc-64 of size 64 [ 25.515852] The buggy address is located 0 bytes to the right of [ 25.515852] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.516321] [ 25.516480] The buggy address belongs to the physical page: [ 25.516717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.517064] flags: 0x200000000000000(node=0|zone=2) [ 25.517247] page_type: f5(slab) [ 25.517480] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.517970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.518341] page dumped because: kasan: bad access detected [ 25.518585] [ 25.518675] Memory state around the buggy address: [ 25.518863] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.519082] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.519298] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.519707] ^ [ 25.520044] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.520543] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.521028] ================================================================== [ 25.125258] ================================================================== [ 25.125854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 25.126402] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.126956] [ 25.127148] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.127230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.127256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.127292] Call Trace: [ 25.127331] <TASK> [ 25.127360] dump_stack_lvl+0x73/0xb0 [ 25.127440] print_report+0xd1/0x650 [ 25.127493] ? __virt_addr_valid+0x1db/0x2d0 [ 25.127546] ? kasan_atomics_helper+0x1079/0x5450 [ 25.127596] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.127652] ? kasan_atomics_helper+0x1079/0x5450 [ 25.127697] kasan_report+0x141/0x180 [ 25.127749] ? kasan_atomics_helper+0x1079/0x5450 [ 25.127808] kasan_check_range+0x10c/0x1c0 [ 25.127901] __kasan_check_write+0x18/0x20 [ 25.127947] kasan_atomics_helper+0x1079/0x5450 [ 25.127999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.128051] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.128105] ? trace_hardirqs_on+0x37/0xe0 [ 25.128147] ? kasan_atomics+0x152/0x310 [ 25.128199] kasan_atomics+0x1dc/0x310 [ 25.128234] ? __pfx_kasan_atomics+0x10/0x10 [ 25.128270] ? __pfx_kasan_atomics+0x10/0x10 [ 25.128316] kunit_try_run_case+0x1a5/0x480 [ 25.128362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.128415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.128458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.128503] ? __kthread_parkme+0x82/0x180 [ 25.128544] ? preempt_count_sub+0x50/0x80 [ 25.128590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.128636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.128682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.128728] kthread+0x337/0x6f0 [ 25.128765] ? trace_preempt_on+0x20/0xc0 [ 25.128808] ? __pfx_kthread+0x10/0x10 [ 25.128879] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.128923] ? calculate_sigpending+0x7b/0xa0 [ 25.128968] ? __pfx_kthread+0x10/0x10 [ 25.129012] ret_from_fork+0x116/0x1d0 [ 25.129051] ? __pfx_kthread+0x10/0x10 [ 25.129092] ret_from_fork_asm+0x1a/0x30 [ 25.129153] </TASK> [ 25.129178] [ 25.137781] Allocated by task 294: [ 25.138128] kasan_save_stack+0x45/0x70 [ 25.138543] kasan_save_track+0x18/0x40 [ 25.138894] kasan_save_alloc_info+0x3b/0x50 [ 25.139191] __kasan_kmalloc+0xb7/0xc0 [ 25.139341] __kmalloc_cache_noprof+0x189/0x420 [ 25.139502] kasan_atomics+0x95/0x310 [ 25.139735] kunit_try_run_case+0x1a5/0x480 [ 25.140107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.140565] kthread+0x337/0x6f0 [ 25.140908] ret_from_fork+0x116/0x1d0 [ 25.141244] ret_from_fork_asm+0x1a/0x30 [ 25.141551] [ 25.141709] The buggy address belongs to the object at ffff888102c1c600 [ 25.141709] which belongs to the cache kmalloc-64 of size 64 [ 25.142588] The buggy address is located 0 bytes to the right of [ 25.142588] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.143491] [ 25.143669] The buggy address belongs to the physical page: [ 25.144073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.144654] flags: 0x200000000000000(node=0|zone=2) [ 25.144853] page_type: f5(slab) [ 25.145116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.145643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.146007] page dumped because: kasan: bad access detected [ 25.146200] [ 25.146281] Memory state around the buggy address: [ 25.146433] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.146971] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.147488] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.148027] ^ [ 25.148468] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.149049] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.149553] ================================================================== [ 25.312091] ================================================================== [ 25.312867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 25.313364] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.313769] [ 25.313933] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.314027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.314054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.314093] Call Trace: [ 25.314121] <TASK> [ 25.314168] dump_stack_lvl+0x73/0xb0 [ 25.314226] print_report+0xd1/0x650 [ 25.314266] ? __virt_addr_valid+0x1db/0x2d0 [ 25.314305] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.314340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.314401] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.314463] kasan_report+0x141/0x180 [ 25.314504] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.314554] kasan_check_range+0x10c/0x1c0 [ 25.314593] __kasan_check_read+0x15/0x20 [ 25.314634] kasan_atomics_helper+0x13b5/0x5450 [ 25.314676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.314721] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.314784] ? trace_hardirqs_on+0x37/0xe0 [ 25.314825] ? kasan_atomics+0x152/0x310 [ 25.314869] kasan_atomics+0x1dc/0x310 [ 25.314909] ? __pfx_kasan_atomics+0x10/0x10 [ 25.314948] ? __pfx_kasan_atomics+0x10/0x10 [ 25.314997] kunit_try_run_case+0x1a5/0x480 [ 25.315044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.315088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.315126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.315165] ? __kthread_parkme+0x82/0x180 [ 25.315204] ? preempt_count_sub+0x50/0x80 [ 25.315248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.315313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.315362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.315418] kthread+0x337/0x6f0 [ 25.315458] ? trace_preempt_on+0x20/0xc0 [ 25.315498] ? __pfx_kthread+0x10/0x10 [ 25.315518] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.315537] ? calculate_sigpending+0x7b/0xa0 [ 25.315559] ? __pfx_kthread+0x10/0x10 [ 25.315578] ret_from_fork+0x116/0x1d0 [ 25.315596] ? __pfx_kthread+0x10/0x10 [ 25.315614] ret_from_fork_asm+0x1a/0x30 [ 25.315642] </TASK> [ 25.315653] [ 25.324010] Allocated by task 294: [ 25.324373] kasan_save_stack+0x45/0x70 [ 25.324686] kasan_save_track+0x18/0x40 [ 25.325507] kasan_save_alloc_info+0x3b/0x50 [ 25.325728] __kasan_kmalloc+0xb7/0xc0 [ 25.326175] __kmalloc_cache_noprof+0x189/0x420 [ 25.326430] kasan_atomics+0x95/0x310 [ 25.326579] kunit_try_run_case+0x1a5/0x480 [ 25.326740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.326922] kthread+0x337/0x6f0 [ 25.327060] ret_from_fork+0x116/0x1d0 [ 25.327319] ret_from_fork_asm+0x1a/0x30 [ 25.327619] [ 25.327766] The buggy address belongs to the object at ffff888102c1c600 [ 25.327766] which belongs to the cache kmalloc-64 of size 64 [ 25.328527] The buggy address is located 0 bytes to the right of [ 25.328527] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.329503] [ 25.329641] The buggy address belongs to the physical page: [ 25.329833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.330321] flags: 0x200000000000000(node=0|zone=2) [ 25.330578] page_type: f5(slab) [ 25.330829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.331101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.331328] page dumped because: kasan: bad access detected [ 25.331703] [ 25.331841] Memory state around the buggy address: [ 25.332266] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.332665] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.333224] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.333534] ^ [ 25.333762] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.334182] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.334429] ================================================================== [ 24.914778] ================================================================== [ 24.915245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 24.915631] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.916050] [ 24.916217] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.916300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.916327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.916364] Call Trace: [ 24.916447] <TASK> [ 24.916493] dump_stack_lvl+0x73/0xb0 [ 24.916546] print_report+0xd1/0x650 [ 24.916599] ? __virt_addr_valid+0x1db/0x2d0 [ 24.916633] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.916668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.916707] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.916745] kasan_report+0x141/0x180 [ 24.916801] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.916874] kasan_check_range+0x10c/0x1c0 [ 24.916919] __kasan_check_write+0x18/0x20 [ 24.916962] kasan_atomics_helper+0xb6a/0x5450 [ 24.917004] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.917045] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.917090] ? trace_hardirqs_on+0x37/0xe0 [ 24.917130] ? kasan_atomics+0x152/0x310 [ 24.917180] kasan_atomics+0x1dc/0x310 [ 24.917223] ? __pfx_kasan_atomics+0x10/0x10 [ 24.917267] ? __pfx_kasan_atomics+0x10/0x10 [ 24.917312] kunit_try_run_case+0x1a5/0x480 [ 24.917358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.917414] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.917458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.917502] ? __kthread_parkme+0x82/0x180 [ 24.917541] ? preempt_count_sub+0x50/0x80 [ 24.917586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.917627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.917650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.917672] kthread+0x337/0x6f0 [ 24.917689] ? trace_preempt_on+0x20/0xc0 [ 24.917709] ? __pfx_kthread+0x10/0x10 [ 24.917727] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.917745] ? calculate_sigpending+0x7b/0xa0 [ 24.917769] ? __pfx_kthread+0x10/0x10 [ 24.917803] ret_from_fork+0x116/0x1d0 [ 24.917861] ? __pfx_kthread+0x10/0x10 [ 24.917893] ret_from_fork_asm+0x1a/0x30 [ 24.917947] </TASK> [ 24.917968] [ 24.926314] Allocated by task 294: [ 24.926638] kasan_save_stack+0x45/0x70 [ 24.927003] kasan_save_track+0x18/0x40 [ 24.927288] kasan_save_alloc_info+0x3b/0x50 [ 24.927589] __kasan_kmalloc+0xb7/0xc0 [ 24.927880] __kmalloc_cache_noprof+0x189/0x420 [ 24.928126] kasan_atomics+0x95/0x310 [ 24.928281] kunit_try_run_case+0x1a5/0x480 [ 24.928536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.928955] kthread+0x337/0x6f0 [ 24.929210] ret_from_fork+0x116/0x1d0 [ 24.929486] ret_from_fork_asm+0x1a/0x30 [ 24.929742] [ 24.929918] The buggy address belongs to the object at ffff888102c1c600 [ 24.929918] which belongs to the cache kmalloc-64 of size 64 [ 24.930311] The buggy address is located 0 bytes to the right of [ 24.930311] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.931172] [ 24.931324] The buggy address belongs to the physical page: [ 24.931531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.931920] flags: 0x200000000000000(node=0|zone=2) [ 24.932237] page_type: f5(slab) [ 24.932514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.932905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.933201] page dumped because: kasan: bad access detected [ 24.933396] [ 24.933552] Memory state around the buggy address: [ 24.933907] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.934372] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.935242] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.935482] ^ [ 24.935646] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.935862] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.936074] ================================================================== [ 25.429805] ================================================================== [ 25.430527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 25.431410] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.431709] [ 25.431867] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.431946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.431960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.431980] Call Trace: [ 25.431995] <TASK> [ 25.432011] dump_stack_lvl+0x73/0xb0 [ 25.432042] print_report+0xd1/0x650 [ 25.432062] ? __virt_addr_valid+0x1db/0x2d0 [ 25.432083] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.432117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.432140] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.432159] kasan_report+0x141/0x180 [ 25.432178] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.432201] kasan_check_range+0x10c/0x1c0 [ 25.432221] __kasan_check_write+0x18/0x20 [ 25.432241] kasan_atomics_helper+0x15b6/0x5450 [ 25.432261] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.432279] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.432300] ? trace_hardirqs_on+0x37/0xe0 [ 25.432319] ? kasan_atomics+0x152/0x310 [ 25.432341] kasan_atomics+0x1dc/0x310 [ 25.432360] ? __pfx_kasan_atomics+0x10/0x10 [ 25.432398] ? __pfx_kasan_atomics+0x10/0x10 [ 25.432728] kunit_try_run_case+0x1a5/0x480 [ 25.432756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.432777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.432798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.432818] ? __kthread_parkme+0x82/0x180 [ 25.432859] ? preempt_count_sub+0x50/0x80 [ 25.432880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.432901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.432923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.432944] kthread+0x337/0x6f0 [ 25.432962] ? trace_preempt_on+0x20/0xc0 [ 25.432982] ? __pfx_kthread+0x10/0x10 [ 25.433000] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.433018] ? calculate_sigpending+0x7b/0xa0 [ 25.433039] ? __pfx_kthread+0x10/0x10 [ 25.433057] ret_from_fork+0x116/0x1d0 [ 25.433074] ? __pfx_kthread+0x10/0x10 [ 25.433093] ret_from_fork_asm+0x1a/0x30 [ 25.433120] </TASK> [ 25.433132] [ 25.441741] Allocated by task 294: [ 25.442027] kasan_save_stack+0x45/0x70 [ 25.442342] kasan_save_track+0x18/0x40 [ 25.442654] kasan_save_alloc_info+0x3b/0x50 [ 25.443066] __kasan_kmalloc+0xb7/0xc0 [ 25.443309] __kmalloc_cache_noprof+0x189/0x420 [ 25.443615] kasan_atomics+0x95/0x310 [ 25.443886] kunit_try_run_case+0x1a5/0x480 [ 25.444059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.444246] kthread+0x337/0x6f0 [ 25.444396] ret_from_fork+0x116/0x1d0 [ 25.444540] ret_from_fork_asm+0x1a/0x30 [ 25.444690] [ 25.444843] The buggy address belongs to the object at ffff888102c1c600 [ 25.444843] which belongs to the cache kmalloc-64 of size 64 [ 25.445831] The buggy address is located 0 bytes to the right of [ 25.445831] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.446899] [ 25.446988] The buggy address belongs to the physical page: [ 25.447161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.447410] flags: 0x200000000000000(node=0|zone=2) [ 25.447588] page_type: f5(slab) [ 25.447723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.448204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.448728] page dumped because: kasan: bad access detected [ 25.449201] [ 25.449335] Memory state around the buggy address: [ 25.449676] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.451165] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.451659] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.452219] ^ [ 25.452589] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.453097] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.453815] ================================================================== [ 25.335125] ================================================================== [ 25.335820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 25.336086] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.336313] [ 25.336448] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.336520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.336547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.336584] Call Trace: [ 25.336612] <TASK> [ 25.336640] dump_stack_lvl+0x73/0xb0 [ 25.336691] print_report+0xd1/0x650 [ 25.336733] ? __virt_addr_valid+0x1db/0x2d0 [ 25.336776] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.336815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.336856] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.336897] kasan_report+0x141/0x180 [ 25.336987] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.337041] __asan_report_load8_noabort+0x18/0x20 [ 25.337086] kasan_atomics_helper+0x4eae/0x5450 [ 25.337154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.337189] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.337227] ? trace_hardirqs_on+0x37/0xe0 [ 25.337263] ? kasan_atomics+0x152/0x310 [ 25.337313] kasan_atomics+0x1dc/0x310 [ 25.337357] ? __pfx_kasan_atomics+0x10/0x10 [ 25.337423] ? __pfx_kasan_atomics+0x10/0x10 [ 25.337476] kunit_try_run_case+0x1a5/0x480 [ 25.337524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.337564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.337606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.337649] ? __kthread_parkme+0x82/0x180 [ 25.337689] ? preempt_count_sub+0x50/0x80 [ 25.337734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.337781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.337825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.337868] kthread+0x337/0x6f0 [ 25.337906] ? trace_preempt_on+0x20/0xc0 [ 25.337947] ? __pfx_kthread+0x10/0x10 [ 25.337988] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.338042] ? calculate_sigpending+0x7b/0xa0 [ 25.338090] ? __pfx_kthread+0x10/0x10 [ 25.338138] ret_from_fork+0x116/0x1d0 [ 25.338180] ? __pfx_kthread+0x10/0x10 [ 25.338225] ret_from_fork_asm+0x1a/0x30 [ 25.338291] </TASK> [ 25.338319] [ 25.345932] Allocated by task 294: [ 25.346106] kasan_save_stack+0x45/0x70 [ 25.346286] kasan_save_track+0x18/0x40 [ 25.346588] kasan_save_alloc_info+0x3b/0x50 [ 25.346919] __kasan_kmalloc+0xb7/0xc0 [ 25.347211] __kmalloc_cache_noprof+0x189/0x420 [ 25.347658] kasan_atomics+0x95/0x310 [ 25.347964] kunit_try_run_case+0x1a5/0x480 [ 25.348269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.348642] kthread+0x337/0x6f0 [ 25.348891] ret_from_fork+0x116/0x1d0 [ 25.349144] ret_from_fork_asm+0x1a/0x30 [ 25.349441] [ 25.349591] The buggy address belongs to the object at ffff888102c1c600 [ 25.349591] which belongs to the cache kmalloc-64 of size 64 [ 25.350055] The buggy address is located 0 bytes to the right of [ 25.350055] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.350440] [ 25.350538] The buggy address belongs to the physical page: [ 25.350729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.350981] flags: 0x200000000000000(node=0|zone=2) [ 25.351156] page_type: f5(slab) [ 25.351336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.351837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.352485] page dumped because: kasan: bad access detected [ 25.352845] [ 25.353003] Memory state around the buggy address: [ 25.353335] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.353805] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.354302] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.354714] ^ [ 25.355012] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.356189] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.356626] ================================================================== [ 24.936759] ================================================================== [ 24.937302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 24.937786] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.938208] [ 24.938353] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.938449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.938476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.938514] Call Trace: [ 24.938543] <TASK> [ 24.938572] dump_stack_lvl+0x73/0xb0 [ 24.938626] print_report+0xd1/0x650 [ 24.938670] ? __virt_addr_valid+0x1db/0x2d0 [ 24.938710] ? kasan_atomics_helper+0xc70/0x5450 [ 24.938750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.938796] ? kasan_atomics_helper+0xc70/0x5450 [ 24.938868] kasan_report+0x141/0x180 [ 24.938914] ? kasan_atomics_helper+0xc70/0x5450 [ 24.938965] kasan_check_range+0x10c/0x1c0 [ 24.939009] __kasan_check_write+0x18/0x20 [ 24.939052] kasan_atomics_helper+0xc70/0x5450 [ 24.939092] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.939132] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.939178] ? trace_hardirqs_on+0x37/0xe0 [ 24.939218] ? kasan_atomics+0x152/0x310 [ 24.939266] kasan_atomics+0x1dc/0x310 [ 24.939310] ? __pfx_kasan_atomics+0x10/0x10 [ 24.939354] ? __pfx_kasan_atomics+0x10/0x10 [ 24.939416] kunit_try_run_case+0x1a5/0x480 [ 24.939465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.939508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.939550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.939595] ? __kthread_parkme+0x82/0x180 [ 24.939635] ? preempt_count_sub+0x50/0x80 [ 24.939681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.939726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.939771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.939815] kthread+0x337/0x6f0 [ 24.939879] ? trace_preempt_on+0x20/0xc0 [ 24.939923] ? __pfx_kthread+0x10/0x10 [ 24.939965] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.940006] ? calculate_sigpending+0x7b/0xa0 [ 24.940052] ? __pfx_kthread+0x10/0x10 [ 24.940125] ret_from_fork+0x116/0x1d0 [ 24.940163] ? __pfx_kthread+0x10/0x10 [ 24.940203] ret_from_fork_asm+0x1a/0x30 [ 24.940265] </TASK> [ 24.940288] [ 24.947869] Allocated by task 294: [ 24.948142] kasan_save_stack+0x45/0x70 [ 24.948444] kasan_save_track+0x18/0x40 [ 24.948722] kasan_save_alloc_info+0x3b/0x50 [ 24.949016] __kasan_kmalloc+0xb7/0xc0 [ 24.949283] __kmalloc_cache_noprof+0x189/0x420 [ 24.949527] kasan_atomics+0x95/0x310 [ 24.949758] kunit_try_run_case+0x1a5/0x480 [ 24.949998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.950234] kthread+0x337/0x6f0 [ 24.950395] ret_from_fork+0x116/0x1d0 [ 24.950678] ret_from_fork_asm+0x1a/0x30 [ 24.950998] [ 24.951125] The buggy address belongs to the object at ffff888102c1c600 [ 24.951125] which belongs to the cache kmalloc-64 of size 64 [ 24.951776] The buggy address is located 0 bytes to the right of [ 24.951776] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.952154] [ 24.952245] The buggy address belongs to the physical page: [ 24.952435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.952678] flags: 0x200000000000000(node=0|zone=2) [ 24.952879] page_type: f5(slab) [ 24.953016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.953249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.953593] page dumped because: kasan: bad access detected [ 24.953967] [ 24.954129] Memory state around the buggy address: [ 24.954484] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.954989] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.955455] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.955923] ^ [ 24.956228] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.956670] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.957103] ================================================================== [ 25.262406] ================================================================== [ 25.262976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 25.263473] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.263948] [ 25.264113] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.264187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.264200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.264220] Call Trace: [ 25.264234] <TASK> [ 25.264249] dump_stack_lvl+0x73/0xb0 [ 25.264275] print_report+0xd1/0x650 [ 25.264295] ? __virt_addr_valid+0x1db/0x2d0 [ 25.264315] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.264333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.264356] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.264421] kasan_report+0x141/0x180 [ 25.264461] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.264500] kasan_check_range+0x10c/0x1c0 [ 25.264534] __kasan_check_write+0x18/0x20 [ 25.264572] kasan_atomics_helper+0x12e6/0x5450 [ 25.264611] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.264649] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.264692] ? trace_hardirqs_on+0x37/0xe0 [ 25.264731] ? kasan_atomics+0x152/0x310 [ 25.264780] kasan_atomics+0x1dc/0x310 [ 25.264823] ? __pfx_kasan_atomics+0x10/0x10 [ 25.264880] ? __pfx_kasan_atomics+0x10/0x10 [ 25.264931] kunit_try_run_case+0x1a5/0x480 [ 25.264980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.265021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.265064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.265108] ? __kthread_parkme+0x82/0x180 [ 25.265148] ? preempt_count_sub+0x50/0x80 [ 25.265192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.265238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.265285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.265330] kthread+0x337/0x6f0 [ 25.265369] ? trace_preempt_on+0x20/0xc0 [ 25.265427] ? __pfx_kthread+0x10/0x10 [ 25.265467] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.265509] ? calculate_sigpending+0x7b/0xa0 [ 25.265554] ? __pfx_kthread+0x10/0x10 [ 25.265597] ret_from_fork+0x116/0x1d0 [ 25.265636] ? __pfx_kthread+0x10/0x10 [ 25.265678] ret_from_fork_asm+0x1a/0x30 [ 25.265738] </TASK> [ 25.265762] [ 25.277354] Allocated by task 294: [ 25.277660] kasan_save_stack+0x45/0x70 [ 25.278048] kasan_save_track+0x18/0x40 [ 25.278407] kasan_save_alloc_info+0x3b/0x50 [ 25.278773] __kasan_kmalloc+0xb7/0xc0 [ 25.279087] __kmalloc_cache_noprof+0x189/0x420 [ 25.279364] kasan_atomics+0x95/0x310 [ 25.279533] kunit_try_run_case+0x1a5/0x480 [ 25.279760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.280060] kthread+0x337/0x6f0 [ 25.280249] ret_from_fork+0x116/0x1d0 [ 25.280409] ret_from_fork_asm+0x1a/0x30 [ 25.280663] [ 25.280806] The buggy address belongs to the object at ffff888102c1c600 [ 25.280806] which belongs to the cache kmalloc-64 of size 64 [ 25.281310] The buggy address is located 0 bytes to the right of [ 25.281310] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.281714] [ 25.281890] The buggy address belongs to the physical page: [ 25.282255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.282570] flags: 0x200000000000000(node=0|zone=2) [ 25.282923] page_type: f5(slab) [ 25.283071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.283565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.283933] page dumped because: kasan: bad access detected [ 25.284205] [ 25.284292] Memory state around the buggy address: [ 25.284559] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.284920] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.285290] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.285506] ^ [ 25.285796] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.286191] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.286539] ================================================================== [ 25.856285] ================================================================== [ 25.856807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 25.857312] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.857609] [ 25.857792] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.857872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.857897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.857931] Call Trace: [ 25.857965] <TASK> [ 25.857995] dump_stack_lvl+0x73/0xb0 [ 25.858073] print_report+0xd1/0x650 [ 25.858121] ? __virt_addr_valid+0x1db/0x2d0 [ 25.858168] ? kasan_atomics_helper+0x2006/0x5450 [ 25.858211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.858261] ? kasan_atomics_helper+0x2006/0x5450 [ 25.858303] kasan_report+0x141/0x180 [ 25.858349] ? kasan_atomics_helper+0x2006/0x5450 [ 25.858415] kasan_check_range+0x10c/0x1c0 [ 25.858459] __kasan_check_write+0x18/0x20 [ 25.858504] kasan_atomics_helper+0x2006/0x5450 [ 25.858551] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.858597] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.858645] ? trace_hardirqs_on+0x37/0xe0 [ 25.858686] ? kasan_atomics+0x152/0x310 [ 25.858739] kasan_atomics+0x1dc/0x310 [ 25.858785] ? __pfx_kasan_atomics+0x10/0x10 [ 25.858831] ? __pfx_kasan_atomics+0x10/0x10 [ 25.858900] kunit_try_run_case+0x1a5/0x480 [ 25.858949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.859013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.859071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.859115] ? __kthread_parkme+0x82/0x180 [ 25.859156] ? preempt_count_sub+0x50/0x80 [ 25.859202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.859246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.859290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.859334] kthread+0x337/0x6f0 [ 25.859373] ? trace_preempt_on+0x20/0xc0 [ 25.859428] ? __pfx_kthread+0x10/0x10 [ 25.859470] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.859509] ? calculate_sigpending+0x7b/0xa0 [ 25.859554] ? __pfx_kthread+0x10/0x10 [ 25.859595] ret_from_fork+0x116/0x1d0 [ 25.859633] ? __pfx_kthread+0x10/0x10 [ 25.859672] ret_from_fork_asm+0x1a/0x30 [ 25.859733] </TASK> [ 25.859757] [ 25.868613] Allocated by task 294: [ 25.868834] kasan_save_stack+0x45/0x70 [ 25.869082] kasan_save_track+0x18/0x40 [ 25.869251] kasan_save_alloc_info+0x3b/0x50 [ 25.871541] __kasan_kmalloc+0xb7/0xc0 [ 25.871912] __kmalloc_cache_noprof+0x189/0x420 [ 25.872260] kasan_atomics+0x95/0x310 [ 25.872559] kunit_try_run_case+0x1a5/0x480 [ 25.873192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.873784] kthread+0x337/0x6f0 [ 25.874394] ret_from_fork+0x116/0x1d0 [ 25.874577] ret_from_fork_asm+0x1a/0x30 [ 25.874741] [ 25.874829] The buggy address belongs to the object at ffff888102c1c600 [ 25.874829] which belongs to the cache kmalloc-64 of size 64 [ 25.875475] The buggy address is located 0 bytes to the right of [ 25.875475] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.876087] [ 25.876265] The buggy address belongs to the physical page: [ 25.876562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.876939] flags: 0x200000000000000(node=0|zone=2) [ 25.877157] page_type: f5(slab) [ 25.877407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.877725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.877945] page dumped because: kasan: bad access detected [ 25.878136] [ 25.878223] Memory state around the buggy address: [ 25.878397] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.878619] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.879115] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.879588] ^ [ 25.879941] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.880450] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.880889] ================================================================== [ 26.027336] ================================================================== [ 26.027566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 26.027844] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 26.028711] [ 26.029442] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 26.029502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.029516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.029535] Call Trace: [ 26.029550] <TASK> [ 26.029566] dump_stack_lvl+0x73/0xb0 [ 26.029597] print_report+0xd1/0x650 [ 26.029618] ? __virt_addr_valid+0x1db/0x2d0 [ 26.029638] ? kasan_atomics_helper+0x5115/0x5450 [ 26.029657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.029679] ? kasan_atomics_helper+0x5115/0x5450 [ 26.029698] kasan_report+0x141/0x180 [ 26.029717] ? kasan_atomics_helper+0x5115/0x5450 [ 26.029739] __asan_report_load8_noabort+0x18/0x20 [ 26.029760] kasan_atomics_helper+0x5115/0x5450 [ 26.029779] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.029800] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.029820] ? trace_hardirqs_on+0x37/0xe0 [ 26.029976] ? kasan_atomics+0x152/0x310 [ 26.030048] kasan_atomics+0x1dc/0x310 [ 26.030120] ? __pfx_kasan_atomics+0x10/0x10 [ 26.030166] ? __pfx_kasan_atomics+0x10/0x10 [ 26.030213] kunit_try_run_case+0x1a5/0x480 [ 26.030252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.030291] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.030329] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.030368] ? __kthread_parkme+0x82/0x180 [ 26.030421] ? preempt_count_sub+0x50/0x80 [ 26.030462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.030497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.030532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.030572] kthread+0x337/0x6f0 [ 26.030608] ? trace_preempt_on+0x20/0xc0 [ 26.030651] ? __pfx_kthread+0x10/0x10 [ 26.030689] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.030719] ? calculate_sigpending+0x7b/0xa0 [ 26.030742] ? __pfx_kthread+0x10/0x10 [ 26.030760] ret_from_fork+0x116/0x1d0 [ 26.030778] ? __pfx_kthread+0x10/0x10 [ 26.030796] ret_from_fork_asm+0x1a/0x30 [ 26.030824] </TASK> [ 26.030867] [ 26.040878] Allocated by task 294: [ 26.041210] kasan_save_stack+0x45/0x70 [ 26.041555] kasan_save_track+0x18/0x40 [ 26.041887] kasan_save_alloc_info+0x3b/0x50 [ 26.042205] __kasan_kmalloc+0xb7/0xc0 [ 26.042428] __kmalloc_cache_noprof+0x189/0x420 [ 26.042752] kasan_atomics+0x95/0x310 [ 26.043070] kunit_try_run_case+0x1a5/0x480 [ 26.043351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.043636] kthread+0x337/0x6f0 [ 26.043937] ret_from_fork+0x116/0x1d0 [ 26.044252] ret_from_fork_asm+0x1a/0x30 [ 26.044475] [ 26.044639] The buggy address belongs to the object at ffff888102c1c600 [ 26.044639] which belongs to the cache kmalloc-64 of size 64 [ 26.045297] The buggy address is located 0 bytes to the right of [ 26.045297] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 26.045978] [ 26.046234] The buggy address belongs to the physical page: [ 26.046728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 26.047371] flags: 0x200000000000000(node=0|zone=2) [ 26.047680] page_type: f5(slab) [ 26.047875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.048262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.048662] page dumped because: kasan: bad access detected [ 26.049030] [ 26.049179] Memory state around the buggy address: [ 26.049431] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.049901] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.050197] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.050589] ^ [ 26.050930] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.051197] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.051667] ================================================================== [ 25.927762] ================================================================== [ 25.928014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 25.928250] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.928611] [ 25.928778] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.928858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.928884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.928923] Call Trace: [ 25.928950] <TASK> [ 25.928974] dump_stack_lvl+0x73/0xb0 [ 25.929029] print_report+0xd1/0x650 [ 25.929070] ? __virt_addr_valid+0x1db/0x2d0 [ 25.929110] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.929150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.929198] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.929240] kasan_report+0x141/0x180 [ 25.929284] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.929335] __asan_report_load8_noabort+0x18/0x20 [ 25.929395] kasan_atomics_helper+0x4fb2/0x5450 [ 25.929441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.929484] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.929529] ? trace_hardirqs_on+0x37/0xe0 [ 25.929567] ? kasan_atomics+0x152/0x310 [ 25.929617] kasan_atomics+0x1dc/0x310 [ 25.929660] ? __pfx_kasan_atomics+0x10/0x10 [ 25.929702] ? __pfx_kasan_atomics+0x10/0x10 [ 25.929751] kunit_try_run_case+0x1a5/0x480 [ 25.929798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.929855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.929895] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.929939] ? __kthread_parkme+0x82/0x180 [ 25.929979] ? preempt_count_sub+0x50/0x80 [ 25.930034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.930114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.930164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.930213] kthread+0x337/0x6f0 [ 25.930253] ? trace_preempt_on+0x20/0xc0 [ 25.930296] ? __pfx_kthread+0x10/0x10 [ 25.930340] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.930398] ? calculate_sigpending+0x7b/0xa0 [ 25.930447] ? __pfx_kthread+0x10/0x10 [ 25.930493] ret_from_fork+0x116/0x1d0 [ 25.930534] ? __pfx_kthread+0x10/0x10 [ 25.930578] ret_from_fork_asm+0x1a/0x30 [ 25.930643] </TASK> [ 25.930669] [ 25.939631] Allocated by task 294: [ 25.939861] kasan_save_stack+0x45/0x70 [ 25.940022] kasan_save_track+0x18/0x40 [ 25.940199] kasan_save_alloc_info+0x3b/0x50 [ 25.940360] __kasan_kmalloc+0xb7/0xc0 [ 25.940728] __kmalloc_cache_noprof+0x189/0x420 [ 25.941110] kasan_atomics+0x95/0x310 [ 25.941392] kunit_try_run_case+0x1a5/0x480 [ 25.941672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.942090] kthread+0x337/0x6f0 [ 25.942260] ret_from_fork+0x116/0x1d0 [ 25.942534] ret_from_fork_asm+0x1a/0x30 [ 25.942699] [ 25.942795] The buggy address belongs to the object at ffff888102c1c600 [ 25.942795] which belongs to the cache kmalloc-64 of size 64 [ 25.943542] The buggy address is located 0 bytes to the right of [ 25.943542] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.944033] [ 25.944179] The buggy address belongs to the physical page: [ 25.944541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.944949] flags: 0x200000000000000(node=0|zone=2) [ 25.945128] page_type: f5(slab) [ 25.945266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.945667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.946278] page dumped because: kasan: bad access detected [ 25.946545] [ 25.946669] Memory state around the buggy address: [ 25.946979] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.947287] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.947605] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.947921] ^ [ 25.948135] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.948358] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.948582] ================================================================== [ 24.604022] ================================================================== [ 24.604961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 24.605124] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.605245] [ 24.605300] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.605341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.605353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.605371] Call Trace: [ 24.605408] <TASK> [ 24.605424] dump_stack_lvl+0x73/0xb0 [ 24.605450] print_report+0xd1/0x650 [ 24.605469] ? __virt_addr_valid+0x1db/0x2d0 [ 24.605490] ? kasan_atomics_helper+0x4a0/0x5450 [ 24.605507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.605529] ? kasan_atomics_helper+0x4a0/0x5450 [ 24.605548] kasan_report+0x141/0x180 [ 24.605567] ? kasan_atomics_helper+0x4a0/0x5450 [ 24.605589] kasan_check_range+0x10c/0x1c0 [ 24.605609] __kasan_check_write+0x18/0x20 [ 24.605629] kasan_atomics_helper+0x4a0/0x5450 [ 24.605648] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.605667] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.605688] ? trace_hardirqs_on+0x37/0xe0 [ 24.605706] ? kasan_atomics+0x152/0x310 [ 24.605728] kasan_atomics+0x1dc/0x310 [ 24.605747] ? __pfx_kasan_atomics+0x10/0x10 [ 24.605767] ? __pfx_kasan_atomics+0x10/0x10 [ 24.605790] kunit_try_run_case+0x1a5/0x480 [ 24.605810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.605835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.605867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.605901] ? __kthread_parkme+0x82/0x180 [ 24.605935] ? preempt_count_sub+0x50/0x80 [ 24.605975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.606347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.606459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.606536] kthread+0x337/0x6f0 [ 24.606575] ? trace_preempt_on+0x20/0xc0 [ 24.606788] ? __pfx_kthread+0x10/0x10 [ 24.606852] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.606879] ? calculate_sigpending+0x7b/0xa0 [ 24.606901] ? __pfx_kthread+0x10/0x10 [ 24.606920] ret_from_fork+0x116/0x1d0 [ 24.606939] ? __pfx_kthread+0x10/0x10 [ 24.606957] ret_from_fork_asm+0x1a/0x30 [ 24.606985] </TASK> [ 24.606996] [ 24.617627] Allocated by task 294: [ 24.617783] kasan_save_stack+0x45/0x70 [ 24.618292] kasan_save_track+0x18/0x40 [ 24.618905] kasan_save_alloc_info+0x3b/0x50 [ 24.619245] __kasan_kmalloc+0xb7/0xc0 [ 24.619433] __kmalloc_cache_noprof+0x189/0x420 [ 24.619603] kasan_atomics+0x95/0x310 [ 24.619753] kunit_try_run_case+0x1a5/0x480 [ 24.619941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.620228] kthread+0x337/0x6f0 [ 24.620499] ret_from_fork+0x116/0x1d0 [ 24.620755] ret_from_fork_asm+0x1a/0x30 [ 24.620937] [ 24.621093] The buggy address belongs to the object at ffff888102c1c600 [ 24.621093] which belongs to the cache kmalloc-64 of size 64 [ 24.621841] The buggy address is located 0 bytes to the right of [ 24.621841] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.622496] [ 24.622726] The buggy address belongs to the physical page: [ 24.623227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.623751] flags: 0x200000000000000(node=0|zone=2) [ 24.624623] page_type: f5(slab) [ 24.624903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.625450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.625822] page dumped because: kasan: bad access detected [ 24.626200] [ 24.626410] Memory state around the buggy address: [ 24.626615] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.627045] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.627433] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.627771] ^ [ 24.627986] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.628213] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.628573] ================================================================== [ 25.379848] ================================================================== [ 25.380427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 25.380946] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.381429] [ 25.381598] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.381683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.381711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.381749] Call Trace: [ 25.381776] <TASK> [ 25.381804] dump_stack_lvl+0x73/0xb0 [ 25.381856] print_report+0xd1/0x650 [ 25.381899] ? __virt_addr_valid+0x1db/0x2d0 [ 25.381938] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.381977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.382032] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.382080] kasan_report+0x141/0x180 [ 25.382146] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.382194] __asan_report_store8_noabort+0x1b/0x30 [ 25.382245] kasan_atomics_helper+0x50d4/0x5450 [ 25.382288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.382328] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.382390] ? trace_hardirqs_on+0x37/0xe0 [ 25.382436] ? kasan_atomics+0x152/0x310 [ 25.382490] kasan_atomics+0x1dc/0x310 [ 25.382538] ? __pfx_kasan_atomics+0x10/0x10 [ 25.382585] ? __pfx_kasan_atomics+0x10/0x10 [ 25.382641] kunit_try_run_case+0x1a5/0x480 [ 25.382692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.382737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.382784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.382829] ? __kthread_parkme+0x82/0x180 [ 25.382869] ? preempt_count_sub+0x50/0x80 [ 25.382934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.382979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.383022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.383067] kthread+0x337/0x6f0 [ 25.383105] ? trace_preempt_on+0x20/0xc0 [ 25.383148] ? __pfx_kthread+0x10/0x10 [ 25.383187] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.383228] ? calculate_sigpending+0x7b/0xa0 [ 25.383271] ? __pfx_kthread+0x10/0x10 [ 25.383314] ret_from_fork+0x116/0x1d0 [ 25.383351] ? __pfx_kthread+0x10/0x10 [ 25.383404] ret_from_fork_asm+0x1a/0x30 [ 25.383466] </TASK> [ 25.383490] [ 25.392934] Allocated by task 294: [ 25.393092] kasan_save_stack+0x45/0x70 [ 25.393253] kasan_save_track+0x18/0x40 [ 25.394101] kasan_save_alloc_info+0x3b/0x50 [ 25.394328] __kasan_kmalloc+0xb7/0xc0 [ 25.394506] __kmalloc_cache_noprof+0x189/0x420 [ 25.394692] kasan_atomics+0x95/0x310 [ 25.394850] kunit_try_run_case+0x1a5/0x480 [ 25.395057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.395281] kthread+0x337/0x6f0 [ 25.395440] ret_from_fork+0x116/0x1d0 [ 25.395603] ret_from_fork_asm+0x1a/0x30 [ 25.395780] [ 25.396637] The buggy address belongs to the object at ffff888102c1c600 [ 25.396637] which belongs to the cache kmalloc-64 of size 64 [ 25.397014] The buggy address is located 0 bytes to the right of [ 25.397014] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.398006] [ 25.398158] The buggy address belongs to the physical page: [ 25.398394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.398609] flags: 0x200000000000000(node=0|zone=2) [ 25.399131] page_type: f5(slab) [ 25.399321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.399718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.400195] page dumped because: kasan: bad access detected [ 25.400395] [ 25.400483] Memory state around the buggy address: [ 25.400672] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.401371] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.401728] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.402560] ^ [ 25.402822] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.403124] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.403416] ================================================================== [ 24.841145] ================================================================== [ 24.841927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 24.842633] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 24.843108] [ 24.843235] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.843331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.843356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.843409] Call Trace: [ 24.843437] <TASK> [ 24.843463] dump_stack_lvl+0x73/0xb0 [ 24.843517] print_report+0xd1/0x650 [ 24.843555] ? __virt_addr_valid+0x1db/0x2d0 [ 24.843582] ? kasan_atomics_helper+0x992/0x5450 [ 24.843601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.843630] ? kasan_atomics_helper+0x992/0x5450 [ 24.843649] kasan_report+0x141/0x180 [ 24.843669] ? kasan_atomics_helper+0x992/0x5450 [ 24.843691] kasan_check_range+0x10c/0x1c0 [ 24.843711] __kasan_check_write+0x18/0x20 [ 24.843745] kasan_atomics_helper+0x992/0x5450 [ 24.843767] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.843787] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.843807] ? trace_hardirqs_on+0x37/0xe0 [ 24.843826] ? kasan_atomics+0x152/0x310 [ 24.843860] kasan_atomics+0x1dc/0x310 [ 24.843879] ? __pfx_kasan_atomics+0x10/0x10 [ 24.843900] ? __pfx_kasan_atomics+0x10/0x10 [ 24.843922] kunit_try_run_case+0x1a5/0x480 [ 24.843944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.843963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.843983] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.844003] ? __kthread_parkme+0x82/0x180 [ 24.844021] ? preempt_count_sub+0x50/0x80 [ 24.844041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.844062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.844083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.844103] kthread+0x337/0x6f0 [ 24.844121] ? trace_preempt_on+0x20/0xc0 [ 24.844140] ? __pfx_kthread+0x10/0x10 [ 24.844158] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.844177] ? calculate_sigpending+0x7b/0xa0 [ 24.844196] ? __pfx_kthread+0x10/0x10 [ 24.844216] ret_from_fork+0x116/0x1d0 [ 24.844233] ? __pfx_kthread+0x10/0x10 [ 24.844251] ret_from_fork_asm+0x1a/0x30 [ 24.844278] </TASK> [ 24.844290] [ 24.854953] Allocated by task 294: [ 24.855112] kasan_save_stack+0x45/0x70 [ 24.855275] kasan_save_track+0x18/0x40 [ 24.855434] kasan_save_alloc_info+0x3b/0x50 [ 24.855593] __kasan_kmalloc+0xb7/0xc0 [ 24.855870] __kmalloc_cache_noprof+0x189/0x420 [ 24.856211] kasan_atomics+0x95/0x310 [ 24.856489] kunit_try_run_case+0x1a5/0x480 [ 24.856777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.857170] kthread+0x337/0x6f0 [ 24.857417] ret_from_fork+0x116/0x1d0 [ 24.857657] ret_from_fork_asm+0x1a/0x30 [ 24.857978] [ 24.858092] The buggy address belongs to the object at ffff888102c1c600 [ 24.858092] which belongs to the cache kmalloc-64 of size 64 [ 24.858563] The buggy address is located 0 bytes to the right of [ 24.858563] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 24.859391] [ 24.859490] The buggy address belongs to the physical page: [ 24.859667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 24.860163] flags: 0x200000000000000(node=0|zone=2) [ 24.860536] page_type: f5(slab) [ 24.860778] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.861206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.861513] page dumped because: kasan: bad access detected [ 24.861935] [ 24.862081] Memory state around the buggy address: [ 24.862286] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.862539] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.862769] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.863018] ^ [ 24.863347] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.863816] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.864296] ================================================================== [ 25.027334] ================================================================== [ 25.028137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 25.029579] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294 [ 25.030153] [ 25.030606] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 25.030672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.030686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.030706] Call Trace: [ 25.030722] <TASK> [ 25.030738] dump_stack_lvl+0x73/0xb0 [ 25.030771] print_report+0xd1/0x650 [ 25.030791] ? __virt_addr_valid+0x1db/0x2d0 [ 25.030812] ? kasan_atomics_helper+0xe78/0x5450 [ 25.030835] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.030913] ? kasan_atomics_helper+0xe78/0x5450 [ 25.030955] kasan_report+0x141/0x180 [ 25.030998] ? kasan_atomics_helper+0xe78/0x5450 [ 25.031047] kasan_check_range+0x10c/0x1c0 [ 25.031092] __kasan_check_write+0x18/0x20 [ 25.031136] kasan_atomics_helper+0xe78/0x5450 [ 25.031177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.031239] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.031600] ? trace_hardirqs_on+0x37/0xe0 [ 25.031652] ? kasan_atomics+0x152/0x310 [ 25.031702] kasan_atomics+0x1dc/0x310 [ 25.031746] ? __pfx_kasan_atomics+0x10/0x10 [ 25.031788] ? __pfx_kasan_atomics+0x10/0x10 [ 25.031847] kunit_try_run_case+0x1a5/0x480 [ 25.031897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.031936] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.032009] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.032073] ? __kthread_parkme+0x82/0x180 [ 25.032118] ? preempt_count_sub+0x50/0x80 [ 25.032166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.032213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.032260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.032304] kthread+0x337/0x6f0 [ 25.032342] ? trace_preempt_on+0x20/0xc0 [ 25.032399] ? __pfx_kthread+0x10/0x10 [ 25.032441] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.032482] ? calculate_sigpending+0x7b/0xa0 [ 25.032507] ? __pfx_kthread+0x10/0x10 [ 25.032527] ret_from_fork+0x116/0x1d0 [ 25.032545] ? __pfx_kthread+0x10/0x10 [ 25.032564] ret_from_fork_asm+0x1a/0x30 [ 25.032591] </TASK> [ 25.032603] [ 25.044024] Allocated by task 294: [ 25.044173] kasan_save_stack+0x45/0x70 [ 25.044496] kasan_save_track+0x18/0x40 [ 25.044724] kasan_save_alloc_info+0x3b/0x50 [ 25.045501] __kasan_kmalloc+0xb7/0xc0 [ 25.045699] __kmalloc_cache_noprof+0x189/0x420 [ 25.046079] kasan_atomics+0x95/0x310 [ 25.046271] kunit_try_run_case+0x1a5/0x480 [ 25.046503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.046726] kthread+0x337/0x6f0 [ 25.047481] ret_from_fork+0x116/0x1d0 [ 25.047654] ret_from_fork_asm+0x1a/0x30 [ 25.047813] [ 25.047971] The buggy address belongs to the object at ffff888102c1c600 [ 25.047971] which belongs to the cache kmalloc-64 of size 64 [ 25.048481] The buggy address is located 0 bytes to the right of [ 25.048481] allocated 48-byte region [ffff888102c1c600, ffff888102c1c630) [ 25.049115] [ 25.049323] The buggy address belongs to the physical page: [ 25.049692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c [ 25.050245] flags: 0x200000000000000(node=0|zone=2) [ 25.050525] page_type: f5(slab) [ 25.050867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.051190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.051435] page dumped because: kasan: bad access detected [ 25.051784] [ 25.051984] Memory state around the buggy address: [ 25.052373] ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.052911] ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.053304] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.053663] ^ [ 25.053956] ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.054555] ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.054910] ==================================================================