Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
juno-r2 | |
qemu-arm64 | |
qemu-x86_64 |
[ 67.836201] ================================================================== [ 67.843514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 67.850918] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 67.858320] [ 67.859846] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 67.859875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.859884] Hardware name: Thundercomm Dragonboard 845c (DT) [ 67.859894] Call trace: [ 67.859902] show_stack+0x20/0x38 (C) [ 67.859919] dump_stack_lvl+0x8c/0xd0 [ 67.859937] print_report+0x118/0x608 [ 67.859955] kasan_report+0xdc/0x128 [ 67.859972] kasan_check_range+0x100/0x1a8 [ 67.859992] __kasan_check_read+0x20/0x30 [ 67.860008] kasan_atomics_helper+0xdd4/0x4858 [ 67.860026] kasan_atomics+0x198/0x2e0 [ 67.860043] kunit_try_run_case+0x170/0x3f0 [ 67.860061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.860081] kthread+0x328/0x630 [ 67.860094] ret_from_fork+0x10/0x20 [ 67.860110] [ 67.933169] Allocated by task 351: [ 67.936625] kasan_save_stack+0x3c/0x68 [ 67.940523] kasan_save_track+0x20/0x40 [ 67.944420] kasan_save_alloc_info+0x40/0x58 [ 67.948759] __kasan_kmalloc+0xd4/0xd8 [ 67.952568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.957170] kasan_atomics+0xb8/0x2e0 [ 67.960891] kunit_try_run_case+0x170/0x3f0 [ 67.965145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.970704] kthread+0x328/0x630 [ 67.973989] ret_from_fork+0x10/0x20 [ 67.977625] [ 67.979148] The buggy address belongs to the object at ffff0000934cf200 [ 67.979148] which belongs to the cache kmalloc-64 of size 64 [ 67.991629] The buggy address is located 0 bytes to the right of [ 67.991629] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 68.004633] [ 68.006156] The buggy address belongs to the physical page: [ 68.011803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 68.019903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.026511] page_type: f5(slab) [ 68.029712] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 68.037550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.045384] page dumped because: kasan: bad access detected [ 68.051031] [ 68.052554] Memory state around the buggy address: [ 68.057409] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.064722] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.072036] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.079347] ^ [ 68.084203] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.091516] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.098827] ================================================================== [ 66.225295] ================================================================== [ 66.232607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 66.240012] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 66.247501] [ 66.249026] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 66.249055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.249063] Hardware name: Thundercomm Dragonboard 845c (DT) [ 66.249072] Call trace: [ 66.249078] show_stack+0x20/0x38 (C) [ 66.249096] dump_stack_lvl+0x8c/0xd0 [ 66.249114] print_report+0x118/0x608 [ 66.249132] kasan_report+0xdc/0x128 [ 66.249150] kasan_check_range+0x100/0x1a8 [ 66.249168] __kasan_check_write+0x20/0x30 [ 66.249184] kasan_atomics_helper+0xc08/0x4858 [ 66.249202] kasan_atomics+0x198/0x2e0 [ 66.249219] kunit_try_run_case+0x170/0x3f0 [ 66.249236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.249256] kthread+0x328/0x630 [ 66.249268] ret_from_fork+0x10/0x20 [ 66.249286] [ 66.322420] Allocated by task 351: [ 66.325876] kasan_save_stack+0x3c/0x68 [ 66.329774] kasan_save_track+0x20/0x40 [ 66.333671] kasan_save_alloc_info+0x40/0x58 [ 66.338008] __kasan_kmalloc+0xd4/0xd8 [ 66.341818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.346420] kasan_atomics+0xb8/0x2e0 [ 66.350142] kunit_try_run_case+0x170/0x3f0 [ 66.354396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.359965] kthread+0x328/0x630 [ 66.363250] ret_from_fork+0x10/0x20 [ 66.366885] [ 66.368408] The buggy address belongs to the object at ffff0000934cf200 [ 66.368408] which belongs to the cache kmalloc-64 of size 64 [ 66.380887] The buggy address is located 0 bytes to the right of [ 66.380887] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 66.393890] [ 66.395413] The buggy address belongs to the physical page: [ 66.401060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 66.409157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.415764] page_type: f5(slab) [ 66.418963] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 66.426799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.434633] page dumped because: kasan: bad access detected [ 66.440279] [ 66.441802] Memory state around the buggy address: [ 66.446658] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.453970] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.461282] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.468593] ^ [ 66.473450] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.480763] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.488075] ================================================================== [ 69.720719] ================================================================== [ 69.728033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 69.735439] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 69.742929] [ 69.744454] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 69.744483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.744490] Hardware name: Thundercomm Dragonboard 845c (DT) [ 69.744502] Call trace: [ 69.744507] show_stack+0x20/0x38 (C) [ 69.744524] dump_stack_lvl+0x8c/0xd0 [ 69.744541] print_report+0x118/0x608 [ 69.744559] kasan_report+0xdc/0x128 [ 69.744577] kasan_check_range+0x100/0x1a8 [ 69.744596] __kasan_check_write+0x20/0x30 [ 69.744611] kasan_atomics_helper+0xff0/0x4858 [ 69.744629] kasan_atomics+0x198/0x2e0 [ 69.744645] kunit_try_run_case+0x170/0x3f0 [ 69.744662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.744682] kthread+0x328/0x630 [ 69.744695] ret_from_fork+0x10/0x20 [ 69.744711] [ 69.817867] Allocated by task 351: [ 69.821324] kasan_save_stack+0x3c/0x68 [ 69.825224] kasan_save_track+0x20/0x40 [ 69.829121] kasan_save_alloc_info+0x40/0x58 [ 69.833459] __kasan_kmalloc+0xd4/0xd8 [ 69.837268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.841869] kasan_atomics+0xb8/0x2e0 [ 69.845591] kunit_try_run_case+0x170/0x3f0 [ 69.849845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.855414] kthread+0x328/0x630 [ 69.858700] ret_from_fork+0x10/0x20 [ 69.862335] [ 69.863857] The buggy address belongs to the object at ffff0000934cf200 [ 69.863857] which belongs to the cache kmalloc-64 of size 64 [ 69.876336] The buggy address is located 0 bytes to the right of [ 69.876336] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 69.889339] [ 69.890862] The buggy address belongs to the physical page: [ 69.896509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 69.904606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.911214] page_type: f5(slab) [ 69.914413] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 69.922249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.930082] page dumped because: kasan: bad access detected [ 69.935728] [ 69.937250] Memory state around the buggy address: [ 69.942105] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.949418] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.956731] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.964043] ^ [ 69.968899] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.976211] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.983521] ================================================================== [ 63.263223] ================================================================== [ 63.270536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 63.277941] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 63.285433] [ 63.286958] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 63.286987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.286995] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.287005] Call trace: [ 63.287011] show_stack+0x20/0x38 (C) [ 63.287028] dump_stack_lvl+0x8c/0xd0 [ 63.287045] print_report+0x118/0x608 [ 63.287062] kasan_report+0xdc/0x128 [ 63.287081] kasan_check_range+0x100/0x1a8 [ 63.287101] __kasan_check_write+0x20/0x30 [ 63.287117] kasan_atomics_helper+0x7cc/0x4858 [ 63.287135] kasan_atomics+0x198/0x2e0 [ 63.287152] kunit_try_run_case+0x170/0x3f0 [ 63.287169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.287189] kthread+0x328/0x630 [ 63.287204] ret_from_fork+0x10/0x20 [ 63.287220] [ 63.360369] Allocated by task 351: [ 63.363826] kasan_save_stack+0x3c/0x68 [ 63.367724] kasan_save_track+0x20/0x40 [ 63.371621] kasan_save_alloc_info+0x40/0x58 [ 63.375961] __kasan_kmalloc+0xd4/0xd8 [ 63.379771] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.384373] kasan_atomics+0xb8/0x2e0 [ 63.388094] kunit_try_run_case+0x170/0x3f0 [ 63.392348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.397909] kthread+0x328/0x630 [ 63.401196] ret_from_fork+0x10/0x20 [ 63.404831] [ 63.406354] The buggy address belongs to the object at ffff0000934cf200 [ 63.406354] which belongs to the cache kmalloc-64 of size 64 [ 63.418834] The buggy address is located 0 bytes to the right of [ 63.418834] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 63.431840] [ 63.433363] The buggy address belongs to the physical page: [ 63.439011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 63.447109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.453717] page_type: f5(slab) [ 63.456916] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 63.464753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.472588] page dumped because: kasan: bad access detected [ 63.478236] [ 63.479758] Memory state around the buggy address: [ 63.484613] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.491927] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.499240] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.506552] ^ [ 63.511408] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.518722] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.526034] ================================================================== [ 62.452663] ================================================================== [ 62.459975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 62.467380] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 62.474868] [ 62.476393] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 62.476421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.476429] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.476439] Call trace: [ 62.476444] show_stack+0x20/0x38 (C) [ 62.476461] dump_stack_lvl+0x8c/0xd0 [ 62.476479] print_report+0x118/0x608 [ 62.476497] kasan_report+0xdc/0x128 [ 62.476514] kasan_check_range+0x100/0x1a8 [ 62.476534] __kasan_check_write+0x20/0x30 [ 62.476550] kasan_atomics_helper+0x684/0x4858 [ 62.476568] kasan_atomics+0x198/0x2e0 [ 62.476584] kunit_try_run_case+0x170/0x3f0 [ 62.476601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.476621] kthread+0x328/0x630 [ 62.476634] ret_from_fork+0x10/0x20 [ 62.476650] [ 62.549805] Allocated by task 351: [ 62.553260] kasan_save_stack+0x3c/0x68 [ 62.557158] kasan_save_track+0x20/0x40 [ 62.561054] kasan_save_alloc_info+0x40/0x58 [ 62.565393] __kasan_kmalloc+0xd4/0xd8 [ 62.569203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.573805] kasan_atomics+0xb8/0x2e0 [ 62.577527] kunit_try_run_case+0x170/0x3f0 [ 62.581780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.587350] kthread+0x328/0x630 [ 62.590636] ret_from_fork+0x10/0x20 [ 62.594271] [ 62.595793] The buggy address belongs to the object at ffff0000934cf200 [ 62.595793] which belongs to the cache kmalloc-64 of size 64 [ 62.608273] The buggy address is located 0 bytes to the right of [ 62.608273] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 62.621277] [ 62.622800] The buggy address belongs to the physical page: [ 62.628445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 62.636542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.643149] page_type: f5(slab) [ 62.646349] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 62.654187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.662021] page dumped because: kasan: bad access detected [ 62.667667] [ 62.669189] Memory state around the buggy address: [ 62.674045] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.681359] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.688672] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.695984] ^ [ 62.700840] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.708153] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.715465] ================================================================== [ 69.450536] ================================================================== [ 69.457850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 69.465255] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 69.472746] [ 69.474270] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 69.474298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.474307] Hardware name: Thundercomm Dragonboard 845c (DT) [ 69.474316] Call trace: [ 69.474322] show_stack+0x20/0x38 (C) [ 69.474339] dump_stack_lvl+0x8c/0xd0 [ 69.474357] print_report+0x118/0x608 [ 69.474375] kasan_report+0xdc/0x128 [ 69.474393] kasan_check_range+0x100/0x1a8 [ 69.474412] __kasan_check_write+0x20/0x30 [ 69.474427] kasan_atomics_helper+0xf88/0x4858 [ 69.474445] kasan_atomics+0x198/0x2e0 [ 69.474462] kunit_try_run_case+0x170/0x3f0 [ 69.474480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.474501] kthread+0x328/0x630 [ 69.474515] ret_from_fork+0x10/0x20 [ 69.474531] [ 69.547675] Allocated by task 351: [ 69.551131] kasan_save_stack+0x3c/0x68 [ 69.555029] kasan_save_track+0x20/0x40 [ 69.558926] kasan_save_alloc_info+0x40/0x58 [ 69.563265] __kasan_kmalloc+0xd4/0xd8 [ 69.567074] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.571676] kasan_atomics+0xb8/0x2e0 [ 69.575398] kunit_try_run_case+0x170/0x3f0 [ 69.579651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.585222] kthread+0x328/0x630 [ 69.588507] ret_from_fork+0x10/0x20 [ 69.592142] [ 69.593665] The buggy address belongs to the object at ffff0000934cf200 [ 69.593665] which belongs to the cache kmalloc-64 of size 64 [ 69.606144] The buggy address is located 0 bytes to the right of [ 69.606144] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 69.619148] [ 69.620673] The buggy address belongs to the physical page: [ 69.626320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 69.634417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.641025] page_type: f5(slab) [ 69.644225] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 69.652063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.659897] page dumped because: kasan: bad access detected [ 69.665544] [ 69.667066] Memory state around the buggy address: [ 69.671922] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.679234] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.686548] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.693858] ^ [ 69.698714] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.706026] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.713337] ================================================================== [ 62.993034] ================================================================== [ 63.000347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 63.007751] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 63.015240] [ 63.016766] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 63.016794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.016802] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.016813] Call trace: [ 63.016819] show_stack+0x20/0x38 (C) [ 63.016837] dump_stack_lvl+0x8c/0xd0 [ 63.016855] print_report+0x118/0x608 [ 63.016872] kasan_report+0xdc/0x128 [ 63.016891] kasan_check_range+0x100/0x1a8 [ 63.016909] __kasan_check_write+0x20/0x30 [ 63.016924] kasan_atomics_helper+0x760/0x4858 [ 63.016942] kasan_atomics+0x198/0x2e0 [ 63.016959] kunit_try_run_case+0x170/0x3f0 [ 63.016976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.016998] kthread+0x328/0x630 [ 63.017013] ret_from_fork+0x10/0x20 [ 63.017030] [ 63.090180] Allocated by task 351: [ 63.093637] kasan_save_stack+0x3c/0x68 [ 63.097534] kasan_save_track+0x20/0x40 [ 63.101431] kasan_save_alloc_info+0x40/0x58 [ 63.105769] __kasan_kmalloc+0xd4/0xd8 [ 63.109578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.114180] kasan_atomics+0xb8/0x2e0 [ 63.117902] kunit_try_run_case+0x170/0x3f0 [ 63.122155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.127724] kthread+0x328/0x630 [ 63.131010] ret_from_fork+0x10/0x20 [ 63.134644] [ 63.136167] The buggy address belongs to the object at ffff0000934cf200 [ 63.136167] which belongs to the cache kmalloc-64 of size 64 [ 63.148649] The buggy address is located 0 bytes to the right of [ 63.148649] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 63.161653] [ 63.163176] The buggy address belongs to the physical page: [ 63.168823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 63.176920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.183529] page_type: f5(slab) [ 63.186728] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 63.194565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.202398] page dumped because: kasan: bad access detected [ 63.208045] [ 63.209568] Memory state around the buggy address: [ 63.214423] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.221736] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.229049] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.236359] ^ [ 63.241216] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.248529] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.255839] ================================================================== [ 68.106211] ================================================================== [ 68.113524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 68.121017] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 68.128419] [ 68.129945] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 68.129973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.129982] Hardware name: Thundercomm Dragonboard 845c (DT) [ 68.129992] Call trace: [ 68.129997] show_stack+0x20/0x38 (C) [ 68.130015] dump_stack_lvl+0x8c/0xd0 [ 68.130031] print_report+0x118/0x608 [ 68.130051] kasan_report+0xdc/0x128 [ 68.130069] __asan_report_load8_noabort+0x20/0x30 [ 68.130085] kasan_atomics_helper+0x3f58/0x4858 [ 68.130104] kasan_atomics+0x198/0x2e0 [ 68.130120] kunit_try_run_case+0x170/0x3f0 [ 68.130137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.130159] kthread+0x328/0x630 [ 68.130173] ret_from_fork+0x10/0x20 [ 68.130190] [ 68.199993] Allocated by task 351: [ 68.203449] kasan_save_stack+0x3c/0x68 [ 68.207348] kasan_save_track+0x20/0x40 [ 68.211246] kasan_save_alloc_info+0x40/0x58 [ 68.215586] __kasan_kmalloc+0xd4/0xd8 [ 68.219397] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.223999] kasan_atomics+0xb8/0x2e0 [ 68.227721] kunit_try_run_case+0x170/0x3f0 [ 68.231976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.237545] kthread+0x328/0x630 [ 68.240831] ret_from_fork+0x10/0x20 [ 68.244466] [ 68.245989] The buggy address belongs to the object at ffff0000934cf200 [ 68.245989] which belongs to the cache kmalloc-64 of size 64 [ 68.258469] The buggy address is located 0 bytes to the right of [ 68.258469] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 68.271473] [ 68.272996] The buggy address belongs to the physical page: [ 68.278644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 68.286741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.293349] page_type: f5(slab) [ 68.296548] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 68.304385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.312219] page dumped because: kasan: bad access detected [ 68.317865] [ 68.319389] Memory state around the buggy address: [ 68.324244] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.331556] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.338870] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.346181] ^ [ 68.351036] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.358350] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.365660] ================================================================== [ 65.688291] ================================================================== [ 65.695604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 65.703010] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 65.710500] [ 65.712026] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 65.712053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.712061] Hardware name: Thundercomm Dragonboard 845c (DT) [ 65.712073] Call trace: [ 65.712078] show_stack+0x20/0x38 (C) [ 65.712096] dump_stack_lvl+0x8c/0xd0 [ 65.712113] print_report+0x118/0x608 [ 65.712131] kasan_report+0xdc/0x128 [ 65.712150] kasan_check_range+0x100/0x1a8 [ 65.712169] __kasan_check_write+0x20/0x30 [ 65.712184] kasan_atomics_helper+0xb70/0x4858 [ 65.712201] kasan_atomics+0x198/0x2e0 [ 65.712219] kunit_try_run_case+0x170/0x3f0 [ 65.712236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.712256] kthread+0x328/0x630 [ 65.712270] ret_from_fork+0x10/0x20 [ 65.712288] [ 65.785435] Allocated by task 351: [ 65.788890] kasan_save_stack+0x3c/0x68 [ 65.792788] kasan_save_track+0x20/0x40 [ 65.796686] kasan_save_alloc_info+0x40/0x58 [ 65.801024] __kasan_kmalloc+0xd4/0xd8 [ 65.804833] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.809434] kasan_atomics+0xb8/0x2e0 [ 65.813157] kunit_try_run_case+0x170/0x3f0 [ 65.817410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.822970] kthread+0x328/0x630 [ 65.826255] ret_from_fork+0x10/0x20 [ 65.829890] [ 65.831413] The buggy address belongs to the object at ffff0000934cf200 [ 65.831413] which belongs to the cache kmalloc-64 of size 64 [ 65.843893] The buggy address is located 0 bytes to the right of [ 65.843893] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 65.856897] [ 65.858423] The buggy address belongs to the physical page: [ 65.864069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 65.872166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.878774] page_type: f5(slab) [ 65.881973] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 65.889813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.897646] page dumped because: kasan: bad access detected [ 65.903293] [ 65.904816] Memory state around the buggy address: [ 65.909671] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.916984] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.924297] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.931609] ^ [ 65.936465] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.943777] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.951088] ================================================================== [ 75.113532] ================================================================== [ 75.120846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 75.128338] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 75.135828] [ 75.137353] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 75.137381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.137388] Hardware name: Thundercomm Dragonboard 845c (DT) [ 75.137398] Call trace: [ 75.137403] show_stack+0x20/0x38 (C) [ 75.137420] dump_stack_lvl+0x8c/0xd0 [ 75.137438] print_report+0x118/0x608 [ 75.137456] kasan_report+0xdc/0x128 [ 75.137474] kasan_check_range+0x100/0x1a8 [ 75.137495] __kasan_check_write+0x20/0x30 [ 75.137509] kasan_atomics_helper+0x175c/0x4858 [ 75.137527] kasan_atomics+0x198/0x2e0 [ 75.137544] kunit_try_run_case+0x170/0x3f0 [ 75.137561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.137580] kthread+0x328/0x630 [ 75.137593] ret_from_fork+0x10/0x20 [ 75.137610] [ 75.210831] Allocated by task 351: [ 75.214288] kasan_save_stack+0x3c/0x68 [ 75.218185] kasan_save_track+0x20/0x40 [ 75.222082] kasan_save_alloc_info+0x40/0x58 [ 75.226421] __kasan_kmalloc+0xd4/0xd8 [ 75.230229] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.234831] kasan_atomics+0xb8/0x2e0 [ 75.238553] kunit_try_run_case+0x170/0x3f0 [ 75.242806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.248375] kthread+0x328/0x630 [ 75.251660] ret_from_fork+0x10/0x20 [ 75.255295] [ 75.256817] The buggy address belongs to the object at ffff0000934cf200 [ 75.256817] which belongs to the cache kmalloc-64 of size 64 [ 75.269296] The buggy address is located 0 bytes to the right of [ 75.269296] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 75.282299] [ 75.283822] The buggy address belongs to the physical page: [ 75.289468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 75.297565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.304173] page_type: f5(slab) [ 75.307372] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 75.315208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.323041] page dumped because: kasan: bad access detected [ 75.328687] [ 75.330210] Memory state around the buggy address: [ 75.335065] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.342378] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.349691] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.357002] ^ [ 75.361858] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.369170] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.376480] ================================================================== [ 71.883474] ================================================================== [ 71.890786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 71.898279] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 71.905769] [ 71.907294] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 71.907322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.907330] Hardware name: Thundercomm Dragonboard 845c (DT) [ 71.907340] Call trace: [ 71.907345] show_stack+0x20/0x38 (C) [ 71.907362] dump_stack_lvl+0x8c/0xd0 [ 71.907379] print_report+0x118/0x608 [ 71.907397] kasan_report+0xdc/0x128 [ 71.907415] kasan_check_range+0x100/0x1a8 [ 71.907433] __kasan_check_write+0x20/0x30 [ 71.907449] kasan_atomics_helper+0x1384/0x4858 [ 71.907467] kasan_atomics+0x198/0x2e0 [ 71.907484] kunit_try_run_case+0x170/0x3f0 [ 71.907502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.907521] kthread+0x328/0x630 [ 71.907535] ret_from_fork+0x10/0x20 [ 71.907552] [ 71.980787] Allocated by task 351: [ 71.984243] kasan_save_stack+0x3c/0x68 [ 71.988143] kasan_save_track+0x20/0x40 [ 71.992041] kasan_save_alloc_info+0x40/0x58 [ 71.996380] __kasan_kmalloc+0xd4/0xd8 [ 72.000188] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.004790] kasan_atomics+0xb8/0x2e0 [ 72.008512] kunit_try_run_case+0x170/0x3f0 [ 72.012765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.018323] kthread+0x328/0x630 [ 72.021610] ret_from_fork+0x10/0x20 [ 72.025245] [ 72.026768] The buggy address belongs to the object at ffff0000934cf200 [ 72.026768] which belongs to the cache kmalloc-64 of size 64 [ 72.039248] The buggy address is located 0 bytes to the right of [ 72.039248] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 72.052251] [ 72.053774] The buggy address belongs to the physical page: [ 72.059420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 72.067517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.074127] page_type: f5(slab) [ 72.077327] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 72.085165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.092998] page dumped because: kasan: bad access detected [ 72.098645] [ 72.100168] Memory state around the buggy address: [ 72.105025] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.112338] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.119651] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.126962] ^ [ 72.131818] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.139131] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.146442] ================================================================== [ 67.299221] ================================================================== [ 67.306534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 67.313938] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 67.321428] [ 67.322954] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 67.322981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.322990] Hardware name: Thundercomm Dragonboard 845c (DT) [ 67.323001] Call trace: [ 67.323007] show_stack+0x20/0x38 (C) [ 67.323025] dump_stack_lvl+0x8c/0xd0 [ 67.323042] print_report+0x118/0x608 [ 67.323060] kasan_report+0xdc/0x128 [ 67.323079] kasan_check_range+0x100/0x1a8 [ 67.323099] __kasan_check_write+0x20/0x30 [ 67.323114] kasan_atomics_helper+0xd3c/0x4858 [ 67.323133] kasan_atomics+0x198/0x2e0 [ 67.323149] kunit_try_run_case+0x170/0x3f0 [ 67.323166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.323187] kthread+0x328/0x630 [ 67.323201] ret_from_fork+0x10/0x20 [ 67.323217] [ 67.396375] Allocated by task 351: [ 67.399831] kasan_save_stack+0x3c/0x68 [ 67.403730] kasan_save_track+0x20/0x40 [ 67.407627] kasan_save_alloc_info+0x40/0x58 [ 67.411965] __kasan_kmalloc+0xd4/0xd8 [ 67.415773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.420374] kasan_atomics+0xb8/0x2e0 [ 67.424096] kunit_try_run_case+0x170/0x3f0 [ 67.428349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.433918] kthread+0x328/0x630 [ 67.437204] ret_from_fork+0x10/0x20 [ 67.440838] [ 67.442360] The buggy address belongs to the object at ffff0000934cf200 [ 67.442360] which belongs to the cache kmalloc-64 of size 64 [ 67.454840] The buggy address is located 0 bytes to the right of [ 67.454840] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 67.467844] [ 67.469367] The buggy address belongs to the physical page: [ 67.475014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 67.483111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.489719] page_type: f5(slab) [ 67.492919] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 67.500755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.508587] page dumped because: kasan: bad access detected [ 67.514234] [ 67.515756] Memory state around the buggy address: [ 67.520611] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.527923] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.535237] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.542547] ^ [ 67.547403] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.554716] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.562027] ================================================================== [ 60.022922] ================================================================== [ 60.030254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 60.037672] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 60.045172] [ 60.046706] CPU: 0 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 60.046737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.046746] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.046758] Call trace: [ 60.046766] show_stack+0x20/0x38 (C) [ 60.046786] dump_stack_lvl+0x8c/0xd0 [ 60.046805] print_report+0x118/0x608 [ 60.046824] kasan_report+0xdc/0x128 [ 60.046844] kasan_check_range+0x100/0x1a8 [ 60.046866] __kasan_check_write+0x20/0x30 [ 60.046884] kasan_atomics_helper+0x32c/0x4858 [ 60.046903] kasan_atomics+0x198/0x2e0 [ 60.046922] kunit_try_run_case+0x170/0x3f0 [ 60.046940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.046964] kthread+0x328/0x630 [ 60.046978] ret_from_fork+0x10/0x20 [ 60.046997] [ 60.120193] Allocated by task 351: [ 60.123660] kasan_save_stack+0x3c/0x68 [ 60.127567] kasan_save_track+0x20/0x40 [ 60.131473] kasan_save_alloc_info+0x40/0x58 [ 60.135819] __kasan_kmalloc+0xd4/0xd8 [ 60.139638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.144244] kasan_atomics+0xb8/0x2e0 [ 60.147975] kunit_try_run_case+0x170/0x3f0 [ 60.152237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.157806] kthread+0x328/0x630 [ 60.161094] ret_from_fork+0x10/0x20 [ 60.164740] [ 60.166271] The buggy address belongs to the object at ffff0000934cf200 [ 60.166271] which belongs to the cache kmalloc-64 of size 64 [ 60.178760] The buggy address is located 0 bytes to the right of [ 60.178760] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 60.191768] [ 60.193299] The buggy address belongs to the physical page: [ 60.198945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 60.207050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.213674] page_type: f5(slab) [ 60.216874] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 60.224722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.232565] page dumped because: kasan: bad access detected [ 60.238212] [ 60.239742] Memory state around the buggy address: [ 60.244600] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.251915] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.259232] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.266545] ^ [ 60.271406] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.278721] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.286034] ================================================================== [ 71.342745] ================================================================== [ 71.350057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 71.357549] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 71.365040] [ 71.366565] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 71.366594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.366604] Hardware name: Thundercomm Dragonboard 845c (DT) [ 71.366615] Call trace: [ 71.366620] show_stack+0x20/0x38 (C) [ 71.366637] dump_stack_lvl+0x8c/0xd0 [ 71.366654] print_report+0x118/0x608 [ 71.366672] kasan_report+0xdc/0x128 [ 71.366690] kasan_check_range+0x100/0x1a8 [ 71.366710] __kasan_check_write+0x20/0x30 [ 71.366725] kasan_atomics_helper+0x126c/0x4858 [ 71.366743] kasan_atomics+0x198/0x2e0 [ 71.366759] kunit_try_run_case+0x170/0x3f0 [ 71.366776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.366796] kthread+0x328/0x630 [ 71.366810] ret_from_fork+0x10/0x20 [ 71.366826] [ 71.440070] Allocated by task 351: [ 71.443526] kasan_save_stack+0x3c/0x68 [ 71.447426] kasan_save_track+0x20/0x40 [ 71.451325] kasan_save_alloc_info+0x40/0x58 [ 71.455663] __kasan_kmalloc+0xd4/0xd8 [ 71.459472] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.464074] kasan_atomics+0xb8/0x2e0 [ 71.467795] kunit_try_run_case+0x170/0x3f0 [ 71.472048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.477618] kthread+0x328/0x630 [ 71.480903] ret_from_fork+0x10/0x20 [ 71.484538] [ 71.486060] The buggy address belongs to the object at ffff0000934cf200 [ 71.486060] which belongs to the cache kmalloc-64 of size 64 [ 71.498541] The buggy address is located 0 bytes to the right of [ 71.498541] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 71.511546] [ 71.513069] The buggy address belongs to the physical page: [ 71.518716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 71.526813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.533422] page_type: f5(slab) [ 71.536621] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 71.544458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.552291] page dumped because: kasan: bad access detected [ 71.557937] [ 71.559460] Memory state around the buggy address: [ 71.564316] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.571630] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.578943] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.586255] ^ [ 71.591112] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.598425] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.605736] ================================================================== [ 63.803599] ================================================================== [ 63.810912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 63.818405] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 63.825808] [ 63.827333] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 63.827361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.827370] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.827380] Call trace: [ 63.827388] show_stack+0x20/0x38 (C) [ 63.827406] dump_stack_lvl+0x8c/0xd0 [ 63.827424] print_report+0x118/0x608 [ 63.827444] kasan_report+0xdc/0x128 [ 63.827462] __asan_report_load4_noabort+0x20/0x30 [ 63.827479] kasan_atomics_helper+0x42d8/0x4858 [ 63.827499] kasan_atomics+0x198/0x2e0 [ 63.827516] kunit_try_run_case+0x170/0x3f0 [ 63.827535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.827555] kthread+0x328/0x630 [ 63.827569] ret_from_fork+0x10/0x20 [ 63.827587] [ 63.897379] Allocated by task 351: [ 63.900836] kasan_save_stack+0x3c/0x68 [ 63.904734] kasan_save_track+0x20/0x40 [ 63.908632] kasan_save_alloc_info+0x40/0x58 [ 63.912972] __kasan_kmalloc+0xd4/0xd8 [ 63.916780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.921383] kasan_atomics+0xb8/0x2e0 [ 63.925106] kunit_try_run_case+0x170/0x3f0 [ 63.929359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.934930] kthread+0x328/0x630 [ 63.938217] ret_from_fork+0x10/0x20 [ 63.941853] [ 63.943375] The buggy address belongs to the object at ffff0000934cf200 [ 63.943375] which belongs to the cache kmalloc-64 of size 64 [ 63.955855] The buggy address is located 0 bytes to the right of [ 63.955855] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 63.968861] [ 63.970385] The buggy address belongs to the physical page: [ 63.976032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 63.984130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.990740] page_type: f5(slab) [ 63.993938] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 64.001775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.009608] page dumped because: kasan: bad access detected [ 64.015257] [ 64.016781] Memory state around the buggy address: [ 64.021636] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.028948] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.036263] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.043573] ^ [ 64.048430] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.055742] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.063052] ================================================================== [ 64.340619] ================================================================== [ 64.347932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 64.355337] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 64.362827] [ 64.364353] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 64.364382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.364390] Hardware name: Thundercomm Dragonboard 845c (DT) [ 64.364401] Call trace: [ 64.364407] show_stack+0x20/0x38 (C) [ 64.364424] dump_stack_lvl+0x8c/0xd0 [ 64.364442] print_report+0x118/0x608 [ 64.364459] kasan_report+0xdc/0x128 [ 64.364477] kasan_check_range+0x100/0x1a8 [ 64.364497] __kasan_check_write+0x20/0x30 [ 64.364512] kasan_atomics_helper+0x99c/0x4858 [ 64.364531] kasan_atomics+0x198/0x2e0 [ 64.364549] kunit_try_run_case+0x170/0x3f0 [ 64.364565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.364585] kthread+0x328/0x630 [ 64.364599] ret_from_fork+0x10/0x20 [ 64.364616] [ 64.437774] Allocated by task 351: [ 64.441230] kasan_save_stack+0x3c/0x68 [ 64.445129] kasan_save_track+0x20/0x40 [ 64.449026] kasan_save_alloc_info+0x40/0x58 [ 64.453364] __kasan_kmalloc+0xd4/0xd8 [ 64.457173] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.461776] kasan_atomics+0xb8/0x2e0 [ 64.465498] kunit_try_run_case+0x170/0x3f0 [ 64.469750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.475320] kthread+0x328/0x630 [ 64.478607] ret_from_fork+0x10/0x20 [ 64.482243] [ 64.483766] The buggy address belongs to the object at ffff0000934cf200 [ 64.483766] which belongs to the cache kmalloc-64 of size 64 [ 64.496247] The buggy address is located 0 bytes to the right of [ 64.496247] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 64.509252] [ 64.510776] The buggy address belongs to the physical page: [ 64.516424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 64.524521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.531131] page_type: f5(slab) [ 64.534330] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 64.542167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.550001] page dumped because: kasan: bad access detected [ 64.555647] [ 64.557171] Memory state around the buggy address: [ 64.562027] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.569340] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.576654] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.583966] ^ [ 64.588822] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.596134] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.603446] ================================================================== [ 60.561262] ================================================================== [ 60.568583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 60.575994] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 60.583487] [ 60.585023] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 60.585052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.585062] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.585072] Call trace: [ 60.585079] show_stack+0x20/0x38 (C) [ 60.585096] dump_stack_lvl+0x8c/0xd0 [ 60.585115] print_report+0x118/0x608 [ 60.585132] kasan_report+0xdc/0x128 [ 60.585150] kasan_check_range+0x100/0x1a8 [ 60.585169] __kasan_check_write+0x20/0x30 [ 60.585186] kasan_atomics_helper+0x3ac/0x4858 [ 60.585204] kasan_atomics+0x198/0x2e0 [ 60.585221] kunit_try_run_case+0x170/0x3f0 [ 60.585237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.585257] kthread+0x328/0x630 [ 60.585271] ret_from_fork+0x10/0x20 [ 60.585287] [ 60.658437] Allocated by task 351: [ 60.661890] kasan_save_stack+0x3c/0x68 [ 60.665786] kasan_save_track+0x20/0x40 [ 60.669690] kasan_save_alloc_info+0x40/0x58 [ 60.674025] __kasan_kmalloc+0xd4/0xd8 [ 60.677840] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.682440] kasan_atomics+0xb8/0x2e0 [ 60.686167] kunit_try_run_case+0x170/0x3f0 [ 60.690417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.695978] kthread+0x328/0x630 [ 60.699262] ret_from_fork+0x10/0x20 [ 60.702893] [ 60.704424] The buggy address belongs to the object at ffff0000934cf200 [ 60.704424] which belongs to the cache kmalloc-64 of size 64 [ 60.716903] The buggy address is located 0 bytes to the right of [ 60.716903] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 60.729909] [ 60.731441] The buggy address belongs to the physical page: [ 60.737083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 60.745184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.751795] page_type: f5(slab) [ 60.754995] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 60.762837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.770673] page dumped because: kasan: bad access detected [ 60.776313] [ 60.777836] Memory state around the buggy address: [ 60.782688] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.790004] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.797319] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.804634] ^ [ 60.809486] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.816799] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.824114] ================================================================== [ 66.762269] ================================================================== [ 66.769583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 66.776989] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 66.784480] [ 66.786005] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 66.786035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.786043] Hardware name: Thundercomm Dragonboard 845c (DT) [ 66.786052] Call trace: [ 66.786058] show_stack+0x20/0x38 (C) [ 66.786074] dump_stack_lvl+0x8c/0xd0 [ 66.786093] print_report+0x118/0x608 [ 66.786110] kasan_report+0xdc/0x128 [ 66.786129] kasan_check_range+0x100/0x1a8 [ 66.786148] __kasan_check_write+0x20/0x30 [ 66.786162] kasan_atomics_helper+0xca0/0x4858 [ 66.786180] kasan_atomics+0x198/0x2e0 [ 66.786196] kunit_try_run_case+0x170/0x3f0 [ 66.786213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.786233] kthread+0x328/0x630 [ 66.786246] ret_from_fork+0x10/0x20 [ 66.786262] [ 66.859408] Allocated by task 351: [ 66.862865] kasan_save_stack+0x3c/0x68 [ 66.866762] kasan_save_track+0x20/0x40 [ 66.870659] kasan_save_alloc_info+0x40/0x58 [ 66.874997] __kasan_kmalloc+0xd4/0xd8 [ 66.878805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.883407] kasan_atomics+0xb8/0x2e0 [ 66.887129] kunit_try_run_case+0x170/0x3f0 [ 66.891382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.896940] kthread+0x328/0x630 [ 66.900226] ret_from_fork+0x10/0x20 [ 66.903860] [ 66.905382] The buggy address belongs to the object at ffff0000934cf200 [ 66.905382] which belongs to the cache kmalloc-64 of size 64 [ 66.917864] The buggy address is located 0 bytes to the right of [ 66.917864] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 66.930866] [ 66.932389] The buggy address belongs to the physical page: [ 66.938035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 66.946132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.952740] page_type: f5(slab) [ 66.955940] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 66.963777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.971611] page dumped because: kasan: bad access detected [ 66.977257] [ 66.978780] Memory state around the buggy address: [ 66.983635] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.990948] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.998260] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.005572] ^ [ 67.010428] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.017741] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.025053] ================================================================== [ 67.032436] ================================================================== [ 67.039748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 67.047239] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 67.054642] [ 67.056167] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 67.056195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.056203] Hardware name: Thundercomm Dragonboard 845c (DT) [ 67.056212] Call trace: [ 67.056218] show_stack+0x20/0x38 (C) [ 67.056235] dump_stack_lvl+0x8c/0xd0 [ 67.056252] print_report+0x118/0x608 [ 67.056271] kasan_report+0xdc/0x128 [ 67.056289] __asan_report_load4_noabort+0x20/0x30 [ 67.056305] kasan_atomics_helper+0x3dd8/0x4858 [ 67.056323] kasan_atomics+0x198/0x2e0 [ 67.056339] kunit_try_run_case+0x170/0x3f0 [ 67.056356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.056375] kthread+0x328/0x630 [ 67.056388] ret_from_fork+0x10/0x20 [ 67.056404] [ 67.126203] Allocated by task 351: [ 67.129659] kasan_save_stack+0x3c/0x68 [ 67.133557] kasan_save_track+0x20/0x40 [ 67.137454] kasan_save_alloc_info+0x40/0x58 [ 67.141791] __kasan_kmalloc+0xd4/0xd8 [ 67.145600] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.150201] kasan_atomics+0xb8/0x2e0 [ 67.153923] kunit_try_run_case+0x170/0x3f0 [ 67.158176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.163745] kthread+0x328/0x630 [ 67.167031] ret_from_fork+0x10/0x20 [ 67.170665] [ 67.172187] The buggy address belongs to the object at ffff0000934cf200 [ 67.172187] which belongs to the cache kmalloc-64 of size 64 [ 67.184666] The buggy address is located 0 bytes to the right of [ 67.184666] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 67.197670] [ 67.199192] The buggy address belongs to the physical page: [ 67.204839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 67.212935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.219543] page_type: f5(slab) [ 67.222742] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 67.230578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.238411] page dumped because: kasan: bad access detected [ 67.244058] [ 67.245579] Memory state around the buggy address: [ 67.250435] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.257747] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.265060] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.272371] ^ [ 67.277227] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.284539] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.291850] ================================================================== [ 70.261240] ================================================================== [ 70.268555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 70.276050] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 70.283541] [ 70.285066] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 70.285096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.285105] Hardware name: Thundercomm Dragonboard 845c (DT) [ 70.285116] Call trace: [ 70.285122] show_stack+0x20/0x38 (C) [ 70.285140] dump_stack_lvl+0x8c/0xd0 [ 70.285158] print_report+0x118/0x608 [ 70.285176] kasan_report+0xdc/0x128 [ 70.285195] kasan_check_range+0x100/0x1a8 [ 70.285215] __kasan_check_write+0x20/0x30 [ 70.285231] kasan_atomics_helper+0x10c0/0x4858 [ 70.285249] kasan_atomics+0x198/0x2e0 [ 70.285266] kunit_try_run_case+0x170/0x3f0 [ 70.285283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.285303] kthread+0x328/0x630 [ 70.285317] ret_from_fork+0x10/0x20 [ 70.285333] [ 70.358578] Allocated by task 351: [ 70.362035] kasan_save_stack+0x3c/0x68 [ 70.365933] kasan_save_track+0x20/0x40 [ 70.369831] kasan_save_alloc_info+0x40/0x58 [ 70.374169] __kasan_kmalloc+0xd4/0xd8 [ 70.377978] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.382581] kasan_atomics+0xb8/0x2e0 [ 70.386302] kunit_try_run_case+0x170/0x3f0 [ 70.390556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.396115] kthread+0x328/0x630 [ 70.399401] ret_from_fork+0x10/0x20 [ 70.403036] [ 70.404560] The buggy address belongs to the object at ffff0000934cf200 [ 70.404560] which belongs to the cache kmalloc-64 of size 64 [ 70.417039] The buggy address is located 0 bytes to the right of [ 70.417039] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 70.430042] [ 70.431564] The buggy address belongs to the physical page: [ 70.437211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 70.445307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.451916] page_type: f5(slab) [ 70.455115] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 70.462952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.470785] page dumped because: kasan: bad access detected [ 70.476431] [ 70.477954] Memory state around the buggy address: [ 70.482809] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.490121] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.497434] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.504746] ^ [ 70.509603] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.516915] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.524226] ================================================================== [ 64.070422] ================================================================== [ 64.077734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 64.085138] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 64.092630] [ 64.094155] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 64.094183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.094191] Hardware name: Thundercomm Dragonboard 845c (DT) [ 64.094200] Call trace: [ 64.094207] show_stack+0x20/0x38 (C) [ 64.094223] dump_stack_lvl+0x8c/0xd0 [ 64.094240] print_report+0x118/0x608 [ 64.094259] kasan_report+0xdc/0x128 [ 64.094277] kasan_check_range+0x100/0x1a8 [ 64.094298] __kasan_check_write+0x20/0x30 [ 64.094313] kasan_atomics_helper+0x934/0x4858 [ 64.094331] kasan_atomics+0x198/0x2e0 [ 64.094348] kunit_try_run_case+0x170/0x3f0 [ 64.094366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.094386] kthread+0x328/0x630 [ 64.094401] ret_from_fork+0x10/0x20 [ 64.094418] [ 64.167576] Allocated by task 351: [ 64.171031] kasan_save_stack+0x3c/0x68 [ 64.174931] kasan_save_track+0x20/0x40 [ 64.178829] kasan_save_alloc_info+0x40/0x58 [ 64.183169] __kasan_kmalloc+0xd4/0xd8 [ 64.186977] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.191580] kasan_atomics+0xb8/0x2e0 [ 64.195302] kunit_try_run_case+0x170/0x3f0 [ 64.199555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.205113] kthread+0x328/0x630 [ 64.208400] ret_from_fork+0x10/0x20 [ 64.212035] [ 64.213558] The buggy address belongs to the object at ffff0000934cf200 [ 64.213558] which belongs to the cache kmalloc-64 of size 64 [ 64.226041] The buggy address is located 0 bytes to the right of [ 64.226041] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 64.239045] [ 64.240569] The buggy address belongs to the physical page: [ 64.246215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 64.254313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.260922] page_type: f5(slab) [ 64.264123] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 64.271960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.279793] page dumped because: kasan: bad access detected [ 64.285441] [ 64.286963] Memory state around the buggy address: [ 64.291819] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.299131] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.306444] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.313756] ^ [ 64.318612] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.325925] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.333236] ================================================================== [ 65.151276] ================================================================== [ 65.158590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 65.165998] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 65.173489] [ 65.175015] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 65.175045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.175052] Hardware name: Thundercomm Dragonboard 845c (DT) [ 65.175062] Call trace: [ 65.175069] show_stack+0x20/0x38 (C) [ 65.175086] dump_stack_lvl+0x8c/0xd0 [ 65.175104] print_report+0x118/0x608 [ 65.175124] kasan_report+0xdc/0x128 [ 65.175141] kasan_check_range+0x100/0x1a8 [ 65.175162] __kasan_check_write+0x20/0x30 [ 65.175177] kasan_atomics_helper+0xad4/0x4858 [ 65.175196] kasan_atomics+0x198/0x2e0 [ 65.175212] kunit_try_run_case+0x170/0x3f0 [ 65.175229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.175249] kthread+0x328/0x630 [ 65.175262] ret_from_fork+0x10/0x20 [ 65.175278] [ 65.248415] Allocated by task 351: [ 65.251871] kasan_save_stack+0x3c/0x68 [ 65.255769] kasan_save_track+0x20/0x40 [ 65.259667] kasan_save_alloc_info+0x40/0x58 [ 65.264005] __kasan_kmalloc+0xd4/0xd8 [ 65.267814] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.272415] kasan_atomics+0xb8/0x2e0 [ 65.276137] kunit_try_run_case+0x170/0x3f0 [ 65.280390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.285949] kthread+0x328/0x630 [ 65.289235] ret_from_fork+0x10/0x20 [ 65.292870] [ 65.294392] The buggy address belongs to the object at ffff0000934cf200 [ 65.294392] which belongs to the cache kmalloc-64 of size 64 [ 65.306872] The buggy address is located 0 bytes to the right of [ 65.306872] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 65.319877] [ 65.321400] The buggy address belongs to the physical page: [ 65.327047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 65.335144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.341753] page_type: f5(slab) [ 65.344953] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 65.352790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.360624] page dumped because: kasan: bad access detected [ 65.366272] [ 65.367794] Memory state around the buggy address: [ 65.372650] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.379963] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.387276] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.394590] ^ [ 65.399446] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.406758] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.414070] ================================================================== [ 69.180385] ================================================================== [ 69.187697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 69.195102] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 69.202591] [ 69.204116] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 69.204144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.204151] Hardware name: Thundercomm Dragonboard 845c (DT) [ 69.204161] Call trace: [ 69.204167] show_stack+0x20/0x38 (C) [ 69.204184] dump_stack_lvl+0x8c/0xd0 [ 69.204203] print_report+0x118/0x608 [ 69.204221] kasan_report+0xdc/0x128 [ 69.204239] kasan_check_range+0x100/0x1a8 [ 69.204258] __kasan_check_write+0x20/0x30 [ 69.204272] kasan_atomics_helper+0xf20/0x4858 [ 69.204290] kasan_atomics+0x198/0x2e0 [ 69.204307] kunit_try_run_case+0x170/0x3f0 [ 69.204324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.204344] kthread+0x328/0x630 [ 69.204357] ret_from_fork+0x10/0x20 [ 69.204373] [ 69.277519] Allocated by task 351: [ 69.280976] kasan_save_stack+0x3c/0x68 [ 69.284874] kasan_save_track+0x20/0x40 [ 69.288771] kasan_save_alloc_info+0x40/0x58 [ 69.293110] __kasan_kmalloc+0xd4/0xd8 [ 69.296918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.301519] kasan_atomics+0xb8/0x2e0 [ 69.305241] kunit_try_run_case+0x170/0x3f0 [ 69.309493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.315062] kthread+0x328/0x630 [ 69.318347] ret_from_fork+0x10/0x20 [ 69.321982] [ 69.323505] The buggy address belongs to the object at ffff0000934cf200 [ 69.323505] which belongs to the cache kmalloc-64 of size 64 [ 69.335985] The buggy address is located 0 bytes to the right of [ 69.335985] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 69.348988] [ 69.350511] The buggy address belongs to the physical page: [ 69.356158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 69.364255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.370863] page_type: f5(slab) [ 69.374061] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 69.381899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.389731] page dumped because: kasan: bad access detected [ 69.395377] [ 69.396899] Memory state around the buggy address: [ 69.401754] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.409066] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.416379] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.423690] ^ [ 69.428546] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.435858] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.443168] ================================================================== [ 70.801977] ================================================================== [ 70.809293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 70.816787] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 70.824278] [ 70.825804] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 70.825833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.825842] Hardware name: Thundercomm Dragonboard 845c (DT) [ 70.825852] Call trace: [ 70.825859] show_stack+0x20/0x38 (C) [ 70.825876] dump_stack_lvl+0x8c/0xd0 [ 70.825895] print_report+0x118/0x608 [ 70.825915] kasan_report+0xdc/0x128 [ 70.825933] kasan_check_range+0x100/0x1a8 [ 70.825953] __kasan_check_write+0x20/0x30 [ 70.825970] kasan_atomics_helper+0x1190/0x4858 [ 70.825988] kasan_atomics+0x198/0x2e0 [ 70.826004] kunit_try_run_case+0x170/0x3f0 [ 70.826022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.826043] kthread+0x328/0x630 [ 70.826057] ret_from_fork+0x10/0x20 [ 70.826073] [ 70.899308] Allocated by task 351: [ 70.902766] kasan_save_stack+0x3c/0x68 [ 70.906665] kasan_save_track+0x20/0x40 [ 70.910563] kasan_save_alloc_info+0x40/0x58 [ 70.914901] __kasan_kmalloc+0xd4/0xd8 [ 70.918711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.923313] kasan_atomics+0xb8/0x2e0 [ 70.927035] kunit_try_run_case+0x170/0x3f0 [ 70.931289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.936858] kthread+0x328/0x630 [ 70.940144] ret_from_fork+0x10/0x20 [ 70.943781] [ 70.945303] The buggy address belongs to the object at ffff0000934cf200 [ 70.945303] which belongs to the cache kmalloc-64 of size 64 [ 70.957784] The buggy address is located 0 bytes to the right of [ 70.957784] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 70.970790] [ 70.972312] The buggy address belongs to the physical page: [ 70.977960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 70.986059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.992668] page_type: f5(slab) [ 70.995868] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 71.003706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.011540] page dumped because: kasan: bad access detected [ 71.017189] [ 71.018712] Memory state around the buggy address: [ 71.023568] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.030880] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.038193] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.045503] ^ [ 71.050361] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.057674] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.064985] ================================================================== [ 59.755972] ================================================================== [ 59.763284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 59.770775] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 59.778173] [ 59.779707] CPU: 6 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 59.779738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.779746] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.779755] Call trace: [ 59.779763] show_stack+0x20/0x38 (C) [ 59.779780] dump_stack_lvl+0x8c/0xd0 [ 59.779798] print_report+0x118/0x608 [ 59.779817] kasan_report+0xdc/0x128 [ 59.779836] __asan_report_load4_noabort+0x20/0x30 [ 59.779853] kasan_atomics_helper+0x40fc/0x4858 [ 59.779873] kasan_atomics+0x198/0x2e0 [ 59.779890] kunit_try_run_case+0x170/0x3f0 [ 59.779909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.779930] kthread+0x328/0x630 [ 59.779945] ret_from_fork+0x10/0x20 [ 59.779962] [ 59.849738] Allocated by task 351: [ 59.853193] kasan_save_stack+0x3c/0x68 [ 59.857099] kasan_save_track+0x20/0x40 [ 59.860994] kasan_save_alloc_info+0x40/0x58 [ 59.865329] __kasan_kmalloc+0xd4/0xd8 [ 59.869136] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.873734] kasan_atomics+0xb8/0x2e0 [ 59.877455] kunit_try_run_case+0x170/0x3f0 [ 59.881704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.887270] kthread+0x328/0x630 [ 59.890552] ret_from_fork+0x10/0x20 [ 59.894185] [ 59.895714] The buggy address belongs to the object at ffff0000934cf200 [ 59.895714] which belongs to the cache kmalloc-64 of size 64 [ 59.908194] The buggy address is located 0 bytes to the right of [ 59.908194] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 59.921200] [ 59.922724] The buggy address belongs to the physical page: [ 59.928365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 59.936467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.943074] page_type: f5(slab) [ 59.946269] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 59.954112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.961950] page dumped because: kasan: bad access detected [ 59.967592] [ 59.969123] Memory state around the buggy address: [ 59.973979] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.981287] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.988593] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.995897] ^ [ 60.000751] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.008057] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.015362] ================================================================== [ 75.383850] ================================================================== [ 75.391163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 75.398655] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 75.406059] [ 75.407584] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 75.407612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.407620] Hardware name: Thundercomm Dragonboard 845c (DT) [ 75.407630] Call trace: [ 75.407636] show_stack+0x20/0x38 (C) [ 75.407652] dump_stack_lvl+0x8c/0xd0 [ 75.407670] print_report+0x118/0x608 [ 75.407687] kasan_report+0xdc/0x128 [ 75.407704] __asan_report_load8_noabort+0x20/0x30 [ 75.407721] kasan_atomics_helper+0x3e20/0x4858 [ 75.407740] kasan_atomics+0x198/0x2e0 [ 75.407757] kunit_try_run_case+0x170/0x3f0 [ 75.407774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.407794] kthread+0x328/0x630 [ 75.407808] ret_from_fork+0x10/0x20 [ 75.407824] [ 75.477624] Allocated by task 351: [ 75.481079] kasan_save_stack+0x3c/0x68 [ 75.484977] kasan_save_track+0x20/0x40 [ 75.488874] kasan_save_alloc_info+0x40/0x58 [ 75.493212] __kasan_kmalloc+0xd4/0xd8 [ 75.497021] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.501623] kasan_atomics+0xb8/0x2e0 [ 75.505344] kunit_try_run_case+0x170/0x3f0 [ 75.509597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.515167] kthread+0x328/0x630 [ 75.518452] ret_from_fork+0x10/0x20 [ 75.522086] [ 75.523609] The buggy address belongs to the object at ffff0000934cf200 [ 75.523609] which belongs to the cache kmalloc-64 of size 64 [ 75.536088] The buggy address is located 0 bytes to the right of [ 75.536088] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 75.549090] [ 75.550613] The buggy address belongs to the physical page: [ 75.556259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 75.564355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.570963] page_type: f5(slab) [ 75.574162] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 75.581998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.589831] page dumped because: kasan: bad access detected [ 75.595477] [ 75.596999] Memory state around the buggy address: [ 75.601855] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.609168] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.616481] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.623792] ^ [ 75.628648] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.635960] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.643270] ================================================================== [ 68.643222] ================================================================== [ 68.650533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 68.658025] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 68.665514] [ 68.667039] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 68.667067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.667075] Hardware name: Thundercomm Dragonboard 845c (DT) [ 68.667086] Call trace: [ 68.667092] show_stack+0x20/0x38 (C) [ 68.667109] dump_stack_lvl+0x8c/0xd0 [ 68.667127] print_report+0x118/0x608 [ 68.667145] kasan_report+0xdc/0x128 [ 68.667162] __asan_report_store8_noabort+0x20/0x30 [ 68.667179] kasan_atomics_helper+0x3e5c/0x4858 [ 68.667198] kasan_atomics+0x198/0x2e0 [ 68.667215] kunit_try_run_case+0x170/0x3f0 [ 68.667233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.667252] kthread+0x328/0x630 [ 68.667266] ret_from_fork+0x10/0x20 [ 68.667282] [ 68.737179] Allocated by task 351: [ 68.740635] kasan_save_stack+0x3c/0x68 [ 68.744534] kasan_save_track+0x20/0x40 [ 68.748432] kasan_save_alloc_info+0x40/0x58 [ 68.752769] __kasan_kmalloc+0xd4/0xd8 [ 68.756578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.761180] kasan_atomics+0xb8/0x2e0 [ 68.764901] kunit_try_run_case+0x170/0x3f0 [ 68.769155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.774724] kthread+0x328/0x630 [ 68.778010] ret_from_fork+0x10/0x20 [ 68.781644] [ 68.783167] The buggy address belongs to the object at ffff0000934cf200 [ 68.783167] which belongs to the cache kmalloc-64 of size 64 [ 68.795647] The buggy address is located 0 bytes to the right of [ 68.795647] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 68.808649] [ 68.810172] The buggy address belongs to the physical page: [ 68.815819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 68.823915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.830524] page_type: f5(slab) [ 68.833723] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 68.841560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.849393] page dumped because: kasan: bad access detected [ 68.855039] [ 68.856562] Memory state around the buggy address: [ 68.861417] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.868730] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.876043] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.883354] ^ [ 68.888211] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.895523] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.902834] ================================================================== [ 58.676944] ================================================================== [ 58.684266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 58.691763] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 58.699250] [ 58.700784] CPU: 7 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 58.700814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.700821] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.700832] Call trace: [ 58.700840] show_stack+0x20/0x38 (C) [ 58.700857] dump_stack_lvl+0x8c/0xd0 [ 58.700875] print_report+0x118/0x608 [ 58.700894] kasan_report+0xdc/0x128 [ 58.700914] __asan_report_store4_noabort+0x20/0x30 [ 58.700930] kasan_atomics_helper+0x3f7c/0x4858 [ 58.700949] kasan_atomics+0x198/0x2e0 [ 58.700966] kunit_try_run_case+0x170/0x3f0 [ 58.700985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.701005] kthread+0x328/0x630 [ 58.701018] ret_from_fork+0x10/0x20 [ 58.701035] [ 58.770923] Allocated by task 351: [ 58.774376] kasan_save_stack+0x3c/0x68 [ 58.778282] kasan_save_track+0x20/0x40 [ 58.782187] kasan_save_alloc_info+0x40/0x58 [ 58.786522] __kasan_kmalloc+0xd4/0xd8 [ 58.790338] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.794936] kasan_atomics+0xb8/0x2e0 [ 58.798655] kunit_try_run_case+0x170/0x3f0 [ 58.802905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.808467] kthread+0x328/0x630 [ 58.811750] ret_from_fork+0x10/0x20 [ 58.815382] [ 58.816914] The buggy address belongs to the object at ffff0000934cf200 [ 58.816914] which belongs to the cache kmalloc-64 of size 64 [ 58.829396] The buggy address is located 0 bytes to the right of [ 58.829396] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 58.842402] [ 58.843933] The buggy address belongs to the physical page: [ 58.849576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 58.857677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.864290] page_type: f5(slab) [ 58.867487] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 58.875331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.883168] page dumped because: kasan: bad access detected [ 58.888807] [ 58.890331] Memory state around the buggy address: [ 58.895184] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.902490] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.909806] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.917111] ^ [ 58.921963] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.929269] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.936573] ================================================================== [ 68.910205] ================================================================== [ 68.917518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 68.924924] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 68.932413] [ 68.933938] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 68.933966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.933974] Hardware name: Thundercomm Dragonboard 845c (DT) [ 68.933985] Call trace: [ 68.933991] show_stack+0x20/0x38 (C) [ 68.934008] dump_stack_lvl+0x8c/0xd0 [ 68.934025] print_report+0x118/0x608 [ 68.934044] kasan_report+0xdc/0x128 [ 68.934062] kasan_check_range+0x100/0x1a8 [ 68.934082] __kasan_check_write+0x20/0x30 [ 68.934097] kasan_atomics_helper+0xeb8/0x4858 [ 68.934115] kasan_atomics+0x198/0x2e0 [ 68.934131] kunit_try_run_case+0x170/0x3f0 [ 68.934149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.934169] kthread+0x328/0x630 [ 68.934182] ret_from_fork+0x10/0x20 [ 68.934199] [ 69.007356] Allocated by task 351: [ 69.010812] kasan_save_stack+0x3c/0x68 [ 69.014710] kasan_save_track+0x20/0x40 [ 69.018607] kasan_save_alloc_info+0x40/0x58 [ 69.022945] __kasan_kmalloc+0xd4/0xd8 [ 69.026754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.031355] kasan_atomics+0xb8/0x2e0 [ 69.035076] kunit_try_run_case+0x170/0x3f0 [ 69.039329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.044898] kthread+0x328/0x630 [ 69.048184] ret_from_fork+0x10/0x20 [ 69.051818] [ 69.053340] The buggy address belongs to the object at ffff0000934cf200 [ 69.053340] which belongs to the cache kmalloc-64 of size 64 [ 69.065820] The buggy address is located 0 bytes to the right of [ 69.065820] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 69.078822] [ 69.080346] The buggy address belongs to the physical page: [ 69.085992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 69.094090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.100698] page_type: f5(slab) [ 69.103897] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 69.111733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.119566] page dumped because: kasan: bad access detected [ 69.125212] [ 69.126734] Memory state around the buggy address: [ 69.131589] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.138901] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.146214] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.153524] ^ [ 69.158380] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.165692] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.173002] ================================================================== [ 73.502045] ================================================================== [ 73.509359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 73.516851] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 73.524341] [ 73.525866] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 73.525895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.525903] Hardware name: Thundercomm Dragonboard 845c (DT) [ 73.525914] Call trace: [ 73.525919] show_stack+0x20/0x38 (C) [ 73.525936] dump_stack_lvl+0x8c/0xd0 [ 73.525953] print_report+0x118/0x608 [ 73.525971] kasan_report+0xdc/0x128 [ 73.525989] kasan_check_range+0x100/0x1a8 [ 73.526008] __kasan_check_write+0x20/0x30 [ 73.526024] kasan_atomics_helper+0x15b4/0x4858 [ 73.526042] kasan_atomics+0x198/0x2e0 [ 73.526059] kunit_try_run_case+0x170/0x3f0 [ 73.526076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.526095] kthread+0x328/0x630 [ 73.526109] ret_from_fork+0x10/0x20 [ 73.526125] [ 73.599368] Allocated by task 351: [ 73.602824] kasan_save_stack+0x3c/0x68 [ 73.606722] kasan_save_track+0x20/0x40 [ 73.610619] kasan_save_alloc_info+0x40/0x58 [ 73.614957] __kasan_kmalloc+0xd4/0xd8 [ 73.618765] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.623366] kasan_atomics+0xb8/0x2e0 [ 73.627088] kunit_try_run_case+0x170/0x3f0 [ 73.631340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.636909] kthread+0x328/0x630 [ 73.640195] ret_from_fork+0x10/0x20 [ 73.643829] [ 73.645351] The buggy address belongs to the object at ffff0000934cf200 [ 73.645351] which belongs to the cache kmalloc-64 of size 64 [ 73.657830] The buggy address is located 0 bytes to the right of [ 73.657830] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 73.670833] [ 73.672356] The buggy address belongs to the physical page: [ 73.678002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 73.686099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.692707] page_type: f5(slab) [ 73.695906] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 73.703742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.711575] page dumped because: kasan: bad access detected [ 73.717222] [ 73.718744] Memory state around the buggy address: [ 73.723600] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.730913] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.738225] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.745536] ^ [ 73.750392] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.757704] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.765014] ================================================================== [ 74.039178] ================================================================== [ 74.046492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 74.053984] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 74.061474] [ 74.062999] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 74.063027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.063034] Hardware name: Thundercomm Dragonboard 845c (DT) [ 74.063044] Call trace: [ 74.063050] show_stack+0x20/0x38 (C) [ 74.063068] dump_stack_lvl+0x8c/0xd0 [ 74.063085] print_report+0x118/0x608 [ 74.063103] kasan_report+0xdc/0x128 [ 74.063121] kasan_check_range+0x100/0x1a8 [ 74.063142] __kasan_check_write+0x20/0x30 [ 74.063157] kasan_atomics_helper+0x1644/0x4858 [ 74.063175] kasan_atomics+0x198/0x2e0 [ 74.063191] kunit_try_run_case+0x170/0x3f0 [ 74.063208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.063227] kthread+0x328/0x630 [ 74.063241] ret_from_fork+0x10/0x20 [ 74.063258] [ 74.136501] Allocated by task 351: [ 74.139958] kasan_save_stack+0x3c/0x68 [ 74.143856] kasan_save_track+0x20/0x40 [ 74.147753] kasan_save_alloc_info+0x40/0x58 [ 74.152092] __kasan_kmalloc+0xd4/0xd8 [ 74.155903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.160504] kasan_atomics+0xb8/0x2e0 [ 74.164226] kunit_try_run_case+0x170/0x3f0 [ 74.168479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.174047] kthread+0x328/0x630 [ 74.177333] ret_from_fork+0x10/0x20 [ 74.180968] [ 74.182490] The buggy address belongs to the object at ffff0000934cf200 [ 74.182490] which belongs to the cache kmalloc-64 of size 64 [ 74.194968] The buggy address is located 0 bytes to the right of [ 74.194968] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 74.207972] [ 74.209496] The buggy address belongs to the physical page: [ 74.215143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 74.223241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.229850] page_type: f5(slab) [ 74.233048] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 74.240885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.248717] page dumped because: kasan: bad access detected [ 74.254364] [ 74.255887] Memory state around the buggy address: [ 74.260742] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.268055] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.275368] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.282679] ^ [ 74.287535] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.294847] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.302157] ================================================================== [ 74.309528] ================================================================== [ 74.316840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 74.324334] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 74.331737] [ 74.333262] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 74.333291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.333298] Hardware name: Thundercomm Dragonboard 845c (DT) [ 74.333308] Call trace: [ 74.333315] show_stack+0x20/0x38 (C) [ 74.333332] dump_stack_lvl+0x8c/0xd0 [ 74.333350] print_report+0x118/0x608 [ 74.333369] kasan_report+0xdc/0x128 [ 74.333387] __asan_report_load8_noabort+0x20/0x30 [ 74.333404] kasan_atomics_helper+0x3df4/0x4858 [ 74.333423] kasan_atomics+0x198/0x2e0 [ 74.333440] kunit_try_run_case+0x170/0x3f0 [ 74.333457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.333477] kthread+0x328/0x630 [ 74.333490] ret_from_fork+0x10/0x20 [ 74.333507] [ 74.403318] Allocated by task 351: [ 74.406773] kasan_save_stack+0x3c/0x68 [ 74.410672] kasan_save_track+0x20/0x40 [ 74.414569] kasan_save_alloc_info+0x40/0x58 [ 74.418908] __kasan_kmalloc+0xd4/0xd8 [ 74.422717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.427319] kasan_atomics+0xb8/0x2e0 [ 74.431041] kunit_try_run_case+0x170/0x3f0 [ 74.435294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.440864] kthread+0x328/0x630 [ 74.444150] ret_from_fork+0x10/0x20 [ 74.447784] [ 74.449306] The buggy address belongs to the object at ffff0000934cf200 [ 74.449306] which belongs to the cache kmalloc-64 of size 64 [ 74.461786] The buggy address is located 0 bytes to the right of [ 74.461786] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 74.474790] [ 74.476314] The buggy address belongs to the physical page: [ 74.481960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 74.490057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.496667] page_type: f5(slab) [ 74.499865] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 74.507703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.515536] page dumped because: kasan: bad access detected [ 74.521183] [ 74.522705] Memory state around the buggy address: [ 74.527561] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.534873] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.542187] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.549497] ^ [ 74.554353] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.561665] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.568977] ================================================================== [ 72.420642] ================================================================== [ 72.427956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 72.435449] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 72.442939] [ 72.444465] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 72.444494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.444503] Hardware name: Thundercomm Dragonboard 845c (DT) [ 72.444513] Call trace: [ 72.444518] show_stack+0x20/0x38 (C) [ 72.444535] dump_stack_lvl+0x8c/0xd0 [ 72.444552] print_report+0x118/0x608 [ 72.444571] kasan_report+0xdc/0x128 [ 72.444589] kasan_check_range+0x100/0x1a8 [ 72.444608] __kasan_check_write+0x20/0x30 [ 72.444622] kasan_atomics_helper+0x1414/0x4858 [ 72.444641] kasan_atomics+0x198/0x2e0 [ 72.444658] kunit_try_run_case+0x170/0x3f0 [ 72.444675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.444696] kthread+0x328/0x630 [ 72.444711] ret_from_fork+0x10/0x20 [ 72.444727] [ 72.517971] Allocated by task 351: [ 72.521426] kasan_save_stack+0x3c/0x68 [ 72.525326] kasan_save_track+0x20/0x40 [ 72.529223] kasan_save_alloc_info+0x40/0x58 [ 72.533562] __kasan_kmalloc+0xd4/0xd8 [ 72.537371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.541973] kasan_atomics+0xb8/0x2e0 [ 72.545695] kunit_try_run_case+0x170/0x3f0 [ 72.549948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.555507] kthread+0x328/0x630 [ 72.558792] ret_from_fork+0x10/0x20 [ 72.562427] [ 72.563950] The buggy address belongs to the object at ffff0000934cf200 [ 72.563950] which belongs to the cache kmalloc-64 of size 64 [ 72.576429] The buggy address is located 0 bytes to the right of [ 72.576429] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 72.589432] [ 72.590955] The buggy address belongs to the physical page: [ 72.596601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 72.604698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.611307] page_type: f5(slab) [ 72.614505] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 72.622342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.630175] page dumped because: kasan: bad access detected [ 72.635822] [ 72.637344] Memory state around the buggy address: [ 72.642199] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.649513] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.656826] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.664137] ^ [ 72.668993] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.676305] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.683615] ================================================================== [ 61.101694] ================================================================== [ 61.109007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 61.116413] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 61.123904] [ 61.125430] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 61.125458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.125466] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.125476] Call trace: [ 61.125481] show_stack+0x20/0x38 (C) [ 61.125499] dump_stack_lvl+0x8c/0xd0 [ 61.125518] print_report+0x118/0x608 [ 61.125537] kasan_report+0xdc/0x128 [ 61.125554] kasan_check_range+0x100/0x1a8 [ 61.125573] __kasan_check_write+0x20/0x30 [ 61.125588] kasan_atomics_helper+0x47c/0x4858 [ 61.125606] kasan_atomics+0x198/0x2e0 [ 61.125622] kunit_try_run_case+0x170/0x3f0 [ 61.125640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.125661] kthread+0x328/0x630 [ 61.125675] ret_from_fork+0x10/0x20 [ 61.125692] [ 61.198838] Allocated by task 351: [ 61.202295] kasan_save_stack+0x3c/0x68 [ 61.206193] kasan_save_track+0x20/0x40 [ 61.210090] kasan_save_alloc_info+0x40/0x58 [ 61.214429] __kasan_kmalloc+0xd4/0xd8 [ 61.218240] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.222841] kasan_atomics+0xb8/0x2e0 [ 61.226564] kunit_try_run_case+0x170/0x3f0 [ 61.230818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.236387] kthread+0x328/0x630 [ 61.239674] ret_from_fork+0x10/0x20 [ 61.243308] [ 61.244841] The buggy address belongs to the object at ffff0000934cf200 [ 61.244841] which belongs to the cache kmalloc-64 of size 64 [ 61.257318] The buggy address is located 0 bytes to the right of [ 61.257318] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 61.270322] [ 61.271846] The buggy address belongs to the physical page: [ 61.277492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 61.285591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.292200] page_type: f5(slab) [ 61.295400] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 61.303238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.311073] page dumped because: kasan: bad access detected [ 61.316721] [ 61.318243] Memory state around the buggy address: [ 61.323098] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.330411] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.337723] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.345034] ^ [ 61.349891] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.357203] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.364513] ================================================================== [ 69.990890] ================================================================== [ 69.998203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 70.005694] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 70.013183] [ 70.014708] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 70.014737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.014745] Hardware name: Thundercomm Dragonboard 845c (DT) [ 70.014756] Call trace: [ 70.014762] show_stack+0x20/0x38 (C) [ 70.014779] dump_stack_lvl+0x8c/0xd0 [ 70.014796] print_report+0x118/0x608 [ 70.014815] kasan_report+0xdc/0x128 [ 70.014833] kasan_check_range+0x100/0x1a8 [ 70.014854] __kasan_check_write+0x20/0x30 [ 70.014871] kasan_atomics_helper+0x1058/0x4858 [ 70.014889] kasan_atomics+0x198/0x2e0 [ 70.014906] kunit_try_run_case+0x170/0x3f0 [ 70.014924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.014943] kthread+0x328/0x630 [ 70.014958] ret_from_fork+0x10/0x20 [ 70.014975] [ 70.088207] Allocated by task 351: [ 70.091663] kasan_save_stack+0x3c/0x68 [ 70.095561] kasan_save_track+0x20/0x40 [ 70.099458] kasan_save_alloc_info+0x40/0x58 [ 70.103797] __kasan_kmalloc+0xd4/0xd8 [ 70.107605] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.112207] kasan_atomics+0xb8/0x2e0 [ 70.115928] kunit_try_run_case+0x170/0x3f0 [ 70.120182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.125742] kthread+0x328/0x630 [ 70.129028] ret_from_fork+0x10/0x20 [ 70.132663] [ 70.134186] The buggy address belongs to the object at ffff0000934cf200 [ 70.134186] which belongs to the cache kmalloc-64 of size 64 [ 70.146666] The buggy address is located 0 bytes to the right of [ 70.146666] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 70.159670] [ 70.161193] The buggy address belongs to the physical page: [ 70.166840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 70.174938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.181547] page_type: f5(slab) [ 70.184745] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 70.192582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.200417] page dumped because: kasan: bad access detected [ 70.206063] [ 70.207586] Memory state around the buggy address: [ 70.212441] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.219753] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.227068] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.234378] ^ [ 70.239234] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.246546] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.253856] ================================================================== [ 64.610817] ================================================================== [ 64.618127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 64.625532] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 64.633023] [ 64.634549] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 64.634577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.634584] Hardware name: Thundercomm Dragonboard 845c (DT) [ 64.634594] Call trace: [ 64.634601] show_stack+0x20/0x38 (C) [ 64.634617] dump_stack_lvl+0x8c/0xd0 [ 64.634635] print_report+0x118/0x608 [ 64.634655] kasan_report+0xdc/0x128 [ 64.634673] kasan_check_range+0x100/0x1a8 [ 64.634693] __kasan_check_write+0x20/0x30 [ 64.634708] kasan_atomics_helper+0xa04/0x4858 [ 64.634727] kasan_atomics+0x198/0x2e0 [ 64.634744] kunit_try_run_case+0x170/0x3f0 [ 64.634762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.634782] kthread+0x328/0x630 [ 64.634797] ret_from_fork+0x10/0x20 [ 64.634813] [ 64.707962] Allocated by task 351: [ 64.711418] kasan_save_stack+0x3c/0x68 [ 64.715315] kasan_save_track+0x20/0x40 [ 64.719212] kasan_save_alloc_info+0x40/0x58 [ 64.723551] __kasan_kmalloc+0xd4/0xd8 [ 64.727360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.731961] kasan_atomics+0xb8/0x2e0 [ 64.735683] kunit_try_run_case+0x170/0x3f0 [ 64.739936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.745505] kthread+0x328/0x630 [ 64.748792] ret_from_fork+0x10/0x20 [ 64.752427] [ 64.753949] The buggy address belongs to the object at ffff0000934cf200 [ 64.753949] which belongs to the cache kmalloc-64 of size 64 [ 64.766428] The buggy address is located 0 bytes to the right of [ 64.766428] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 64.779431] [ 64.780956] The buggy address belongs to the physical page: [ 64.786601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 64.794699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.801308] page_type: f5(slab) [ 64.804508] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 64.812345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.820179] page dumped because: kasan: bad access detected [ 64.825829] [ 64.827352] Memory state around the buggy address: [ 64.832218] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.839539] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.846856] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.854169] ^ [ 64.859028] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.866343] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.873657] ================================================================== [ 75.650653] ================================================================== [ 75.657964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 75.665457] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 75.672947] [ 75.674472] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 75.674500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.674507] Hardware name: Thundercomm Dragonboard 845c (DT) [ 75.674517] Call trace: [ 75.674522] show_stack+0x20/0x38 (C) [ 75.674539] dump_stack_lvl+0x8c/0xd0 [ 75.674557] print_report+0x118/0x608 [ 75.674576] kasan_report+0xdc/0x128 [ 75.674593] kasan_check_range+0x100/0x1a8 [ 75.674613] __kasan_check_write+0x20/0x30 [ 75.674628] kasan_atomics_helper+0x17ec/0x4858 [ 75.674647] kasan_atomics+0x198/0x2e0 [ 75.674664] kunit_try_run_case+0x170/0x3f0 [ 75.674681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.674701] kthread+0x328/0x630 [ 75.674715] ret_from_fork+0x10/0x20 [ 75.674731] [ 75.747952] Allocated by task 351: [ 75.751408] kasan_save_stack+0x3c/0x68 [ 75.755306] kasan_save_track+0x20/0x40 [ 75.759203] kasan_save_alloc_info+0x40/0x58 [ 75.763541] __kasan_kmalloc+0xd4/0xd8 [ 75.767350] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.771952] kasan_atomics+0xb8/0x2e0 [ 75.775673] kunit_try_run_case+0x170/0x3f0 [ 75.779927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.785496] kthread+0x328/0x630 [ 75.788782] ret_from_fork+0x10/0x20 [ 75.792417] [ 75.793939] The buggy address belongs to the object at ffff0000934cf200 [ 75.793939] which belongs to the cache kmalloc-64 of size 64 [ 75.806418] The buggy address is located 0 bytes to the right of [ 75.806418] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 75.819422] [ 75.820945] The buggy address belongs to the physical page: [ 75.826592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 75.834689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.841296] page_type: f5(slab) [ 75.844496] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 75.852332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.860165] page dumped because: kasan: bad access detected [ 75.865812] [ 75.867334] Memory state around the buggy address: [ 75.872189] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.879502] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.886814] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.894124] ^ [ 75.898980] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.906292] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.913602] ================================================================== [ 68.373030] ================================================================== [ 68.380344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 68.387749] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 68.395238] [ 68.396763] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 68.396791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.396799] Hardware name: Thundercomm Dragonboard 845c (DT) [ 68.396809] Call trace: [ 68.396816] show_stack+0x20/0x38 (C) [ 68.396833] dump_stack_lvl+0x8c/0xd0 [ 68.396851] print_report+0x118/0x608 [ 68.396869] kasan_report+0xdc/0x128 [ 68.396887] kasan_check_range+0x100/0x1a8 [ 68.396908] __kasan_check_write+0x20/0x30 [ 68.396925] kasan_atomics_helper+0xe44/0x4858 [ 68.396942] kasan_atomics+0x198/0x2e0 [ 68.396959] kunit_try_run_case+0x170/0x3f0 [ 68.396976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.396998] kthread+0x328/0x630 [ 68.397011] ret_from_fork+0x10/0x20 [ 68.397027] [ 68.470186] Allocated by task 351: [ 68.473642] kasan_save_stack+0x3c/0x68 [ 68.477539] kasan_save_track+0x20/0x40 [ 68.481436] kasan_save_alloc_info+0x40/0x58 [ 68.485775] __kasan_kmalloc+0xd4/0xd8 [ 68.489583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.494185] kasan_atomics+0xb8/0x2e0 [ 68.497906] kunit_try_run_case+0x170/0x3f0 [ 68.502161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.507730] kthread+0x328/0x630 [ 68.511015] ret_from_fork+0x10/0x20 [ 68.514650] [ 68.516171] The buggy address belongs to the object at ffff0000934cf200 [ 68.516171] which belongs to the cache kmalloc-64 of size 64 [ 68.528650] The buggy address is located 0 bytes to the right of [ 68.528650] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 68.541654] [ 68.543177] The buggy address belongs to the physical page: [ 68.548824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 68.556921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.563530] page_type: f5(slab) [ 68.566729] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 68.574567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.582400] page dumped because: kasan: bad access detected [ 68.588046] [ 68.589568] Memory state around the buggy address: [ 68.594423] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.601735] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.609048] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.616359] ^ [ 68.621216] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.628528] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.635840] ================================================================== [ 62.722848] ================================================================== [ 62.730160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 62.737566] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 62.745055] [ 62.746581] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 62.746609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.746617] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.746628] Call trace: [ 62.746634] show_stack+0x20/0x38 (C) [ 62.746650] dump_stack_lvl+0x8c/0xd0 [ 62.746668] print_report+0x118/0x608 [ 62.746686] kasan_report+0xdc/0x128 [ 62.746704] kasan_check_range+0x100/0x1a8 [ 62.746722] __kasan_check_write+0x20/0x30 [ 62.746738] kasan_atomics_helper+0x6ec/0x4858 [ 62.746756] kasan_atomics+0x198/0x2e0 [ 62.746774] kunit_try_run_case+0x170/0x3f0 [ 62.746792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.746812] kthread+0x328/0x630 [ 62.746826] ret_from_fork+0x10/0x20 [ 62.746842] [ 62.820003] Allocated by task 351: [ 62.823459] kasan_save_stack+0x3c/0x68 [ 62.827357] kasan_save_track+0x20/0x40 [ 62.831254] kasan_save_alloc_info+0x40/0x58 [ 62.835593] __kasan_kmalloc+0xd4/0xd8 [ 62.839401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.844004] kasan_atomics+0xb8/0x2e0 [ 62.847727] kunit_try_run_case+0x170/0x3f0 [ 62.851980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.857539] kthread+0x328/0x630 [ 62.860825] ret_from_fork+0x10/0x20 [ 62.864461] [ 62.865984] The buggy address belongs to the object at ffff0000934cf200 [ 62.865984] which belongs to the cache kmalloc-64 of size 64 [ 62.878467] The buggy address is located 0 bytes to the right of [ 62.878467] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 62.891471] [ 62.892995] The buggy address belongs to the physical page: [ 62.898642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 62.906739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.913348] page_type: f5(slab) [ 62.916548] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 62.924386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.932219] page dumped because: kasan: bad access detected [ 62.937867] [ 62.939390] Memory state around the buggy address: [ 62.944245] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.951559] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.958873] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.966185] ^ [ 62.971041] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.978354] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.985665] ================================================================== [ 61.642068] ================================================================== [ 61.649382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 61.656787] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 61.664278] [ 61.665803] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 61.665831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.665838] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.665847] Call trace: [ 61.665853] show_stack+0x20/0x38 (C) [ 61.665869] dump_stack_lvl+0x8c/0xd0 [ 61.665887] print_report+0x118/0x608 [ 61.665904] kasan_report+0xdc/0x128 [ 61.665922] kasan_check_range+0x100/0x1a8 [ 61.665941] __kasan_check_write+0x20/0x30 [ 61.665957] kasan_atomics_helper+0x54c/0x4858 [ 61.665974] kasan_atomics+0x198/0x2e0 [ 61.665991] kunit_try_run_case+0x170/0x3f0 [ 61.666009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.666029] kthread+0x328/0x630 [ 61.666041] ret_from_fork+0x10/0x20 [ 61.666057] [ 61.739214] Allocated by task 351: [ 61.742670] kasan_save_stack+0x3c/0x68 [ 61.746567] kasan_save_track+0x20/0x40 [ 61.750464] kasan_save_alloc_info+0x40/0x58 [ 61.754801] __kasan_kmalloc+0xd4/0xd8 [ 61.758610] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.763211] kasan_atomics+0xb8/0x2e0 [ 61.766933] kunit_try_run_case+0x170/0x3f0 [ 61.771187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.776755] kthread+0x328/0x630 [ 61.780041] ret_from_fork+0x10/0x20 [ 61.783676] [ 61.785198] The buggy address belongs to the object at ffff0000934cf200 [ 61.785198] which belongs to the cache kmalloc-64 of size 64 [ 61.797676] The buggy address is located 0 bytes to the right of [ 61.797676] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 61.810679] [ 61.812203] The buggy address belongs to the physical page: [ 61.817849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 61.825946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.832554] page_type: f5(slab) [ 61.835754] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 61.843592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.851424] page dumped because: kasan: bad access detected [ 61.857072] [ 61.858594] Memory state around the buggy address: [ 61.863450] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.870763] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.878075] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.885387] ^ [ 61.890244] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.897557] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.904869] ================================================================== [ 71.072363] ================================================================== [ 71.079679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 71.087173] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 71.094666] [ 71.096191] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 71.096222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.096231] Hardware name: Thundercomm Dragonboard 845c (DT) [ 71.096241] Call trace: [ 71.096246] show_stack+0x20/0x38 (C) [ 71.096264] dump_stack_lvl+0x8c/0xd0 [ 71.096283] print_report+0x118/0x608 [ 71.096301] kasan_report+0xdc/0x128 [ 71.096318] kasan_check_range+0x100/0x1a8 [ 71.096338] __kasan_check_write+0x20/0x30 [ 71.096355] kasan_atomics_helper+0x11f8/0x4858 [ 71.096375] kasan_atomics+0x198/0x2e0 [ 71.096392] kunit_try_run_case+0x170/0x3f0 [ 71.096409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.096430] kthread+0x328/0x630 [ 71.096443] ret_from_fork+0x10/0x20 [ 71.096460] [ 71.169695] Allocated by task 351: [ 71.173152] kasan_save_stack+0x3c/0x68 [ 71.177051] kasan_save_track+0x20/0x40 [ 71.180947] kasan_save_alloc_info+0x40/0x58 [ 71.185285] __kasan_kmalloc+0xd4/0xd8 [ 71.189095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.193697] kasan_atomics+0xb8/0x2e0 [ 71.197419] kunit_try_run_case+0x170/0x3f0 [ 71.201672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.207241] kthread+0x328/0x630 [ 71.210526] ret_from_fork+0x10/0x20 [ 71.214162] [ 71.215684] The buggy address belongs to the object at ffff0000934cf200 [ 71.215684] which belongs to the cache kmalloc-64 of size 64 [ 71.228165] The buggy address is located 0 bytes to the right of [ 71.228165] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 71.241170] [ 71.242693] The buggy address belongs to the physical page: [ 71.248339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 71.256436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.263046] page_type: f5(slab) [ 71.266245] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 71.274083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.281916] page dumped because: kasan: bad access detected [ 71.287562] [ 71.289085] Memory state around the buggy address: [ 71.293941] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.301254] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.308567] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.315878] ^ [ 71.320735] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.328047] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.335358] ================================================================== [ 64.881056] ================================================================== [ 64.888373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 64.895781] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 64.903273] [ 64.904801] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 64.904831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.904839] Hardware name: Thundercomm Dragonboard 845c (DT) [ 64.904849] Call trace: [ 64.904855] show_stack+0x20/0x38 (C) [ 64.904874] dump_stack_lvl+0x8c/0xd0 [ 64.904892] print_report+0x118/0x608 [ 64.904911] kasan_report+0xdc/0x128 [ 64.904929] kasan_check_range+0x100/0x1a8 [ 64.904948] __kasan_check_write+0x20/0x30 [ 64.904963] kasan_atomics_helper+0xa6c/0x4858 [ 64.904983] kasan_atomics+0x198/0x2e0 [ 64.905000] kunit_try_run_case+0x170/0x3f0 [ 64.905019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.905039] kthread+0x328/0x630 [ 64.905052] ret_from_fork+0x10/0x20 [ 64.905069] [ 64.978231] Allocated by task 351: [ 64.981689] kasan_save_stack+0x3c/0x68 [ 64.985588] kasan_save_track+0x20/0x40 [ 64.989486] kasan_save_alloc_info+0x40/0x58 [ 64.993824] __kasan_kmalloc+0xd4/0xd8 [ 64.997632] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.002234] kasan_atomics+0xb8/0x2e0 [ 65.005956] kunit_try_run_case+0x170/0x3f0 [ 65.010211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.015769] kthread+0x328/0x630 [ 65.019056] ret_from_fork+0x10/0x20 [ 65.022690] [ 65.024214] The buggy address belongs to the object at ffff0000934cf200 [ 65.024214] which belongs to the cache kmalloc-64 of size 64 [ 65.036696] The buggy address is located 0 bytes to the right of [ 65.036696] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 65.049700] [ 65.051225] The buggy address belongs to the physical page: [ 65.056872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 65.064969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.071579] page_type: f5(slab) [ 65.074779] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 65.082618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.090451] page dumped because: kasan: bad access detected [ 65.096098] [ 65.097622] Memory state around the buggy address: [ 65.102478] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.109791] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.117106] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.124417] ^ [ 65.129275] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.136587] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.143899] ================================================================== [ 60.294195] ================================================================== [ 60.301517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 60.309019] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 60.316514] [ 60.318043] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 60.318073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.318082] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.318094] Call trace: [ 60.318102] show_stack+0x20/0x38 (C) [ 60.318121] dump_stack_lvl+0x8c/0xd0 [ 60.318141] print_report+0x118/0x608 [ 60.318160] kasan_report+0xdc/0x128 [ 60.318178] __asan_report_store4_noabort+0x20/0x30 [ 60.318195] kasan_atomics_helper+0x3f94/0x4858 [ 60.318215] kasan_atomics+0x198/0x2e0 [ 60.318232] kunit_try_run_case+0x170/0x3f0 [ 60.318249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.318271] kthread+0x328/0x630 [ 60.318285] ret_from_fork+0x10/0x20 [ 60.318303] [ 60.388184] Allocated by task 351: [ 60.391640] kasan_save_stack+0x3c/0x68 [ 60.395547] kasan_save_track+0x20/0x40 [ 60.399451] kasan_save_alloc_info+0x40/0x58 [ 60.403784] __kasan_kmalloc+0xd4/0xd8 [ 60.407591] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.412189] kasan_atomics+0xb8/0x2e0 [ 60.415908] kunit_try_run_case+0x170/0x3f0 [ 60.420156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.425723] kthread+0x328/0x630 [ 60.429005] ret_from_fork+0x10/0x20 [ 60.432636] [ 60.434159] The buggy address belongs to the object at ffff0000934cf200 [ 60.434159] which belongs to the cache kmalloc-64 of size 64 [ 60.446638] The buggy address is located 0 bytes to the right of [ 60.446638] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 60.459649] [ 60.461171] The buggy address belongs to the physical page: [ 60.466816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 60.474915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.481528] page_type: f5(slab) [ 60.484723] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 60.492566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.500397] page dumped because: kasan: bad access detected [ 60.506040] [ 60.507571] Memory state around the buggy address: [ 60.512424] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.519741] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.527051] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.534363] ^ [ 60.539216] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.546523] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.553836] ================================================================== [ 65.421457] ================================================================== [ 65.428771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 65.436265] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 65.443668] [ 65.445195] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 65.445224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.445233] Hardware name: Thundercomm Dragonboard 845c (DT) [ 65.445244] Call trace: [ 65.445250] show_stack+0x20/0x38 (C) [ 65.445267] dump_stack_lvl+0x8c/0xd0 [ 65.445284] print_report+0x118/0x608 [ 65.445302] kasan_report+0xdc/0x128 [ 65.445320] __asan_report_load4_noabort+0x20/0x30 [ 65.445337] kasan_atomics_helper+0x3dcc/0x4858 [ 65.445355] kasan_atomics+0x198/0x2e0 [ 65.445372] kunit_try_run_case+0x170/0x3f0 [ 65.445390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.445411] kthread+0x328/0x630 [ 65.445425] ret_from_fork+0x10/0x20 [ 65.445441] [ 65.515244] Allocated by task 351: [ 65.518701] kasan_save_stack+0x3c/0x68 [ 65.522600] kasan_save_track+0x20/0x40 [ 65.526499] kasan_save_alloc_info+0x40/0x58 [ 65.530838] __kasan_kmalloc+0xd4/0xd8 [ 65.534646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.539249] kasan_atomics+0xb8/0x2e0 [ 65.542970] kunit_try_run_case+0x170/0x3f0 [ 65.547225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.552795] kthread+0x328/0x630 [ 65.556081] ret_from_fork+0x10/0x20 [ 65.559717] [ 65.561239] The buggy address belongs to the object at ffff0000934cf200 [ 65.561239] which belongs to the cache kmalloc-64 of size 64 [ 65.573721] The buggy address is located 0 bytes to the right of [ 65.573721] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 65.586724] [ 65.588248] The buggy address belongs to the physical page: [ 65.593896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 65.601993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.608602] page_type: f5(slab) [ 65.611802] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 65.619639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.627473] page dumped because: kasan: bad access detected [ 65.633121] [ 65.634642] Memory state around the buggy address: [ 65.639499] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.646812] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.654126] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.661438] ^ [ 65.666295] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.673608] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.680919] ================================================================== [ 58.402238] ================================================================== [ 58.417295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 58.424797] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 58.432208] [ 58.433739] CPU: 7 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 58.433771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.433780] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.433795] Call trace: [ 58.433802] show_stack+0x20/0x38 (C) [ 58.433822] dump_stack_lvl+0x8c/0xd0 [ 58.433841] print_report+0x118/0x608 [ 58.433860] kasan_report+0xdc/0x128 [ 58.433878] __asan_report_load4_noabort+0x20/0x30 [ 58.433895] kasan_atomics_helper+0x40a8/0x4858 [ 58.433914] kasan_atomics+0x198/0x2e0 [ 58.433932] kunit_try_run_case+0x170/0x3f0 [ 58.433952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.433973] kthread+0x328/0x630 [ 58.433989] ret_from_fork+0x10/0x20 [ 58.434007] [ 58.503820] Allocated by task 351: [ 58.507278] kasan_save_stack+0x3c/0x68 [ 58.511175] kasan_save_track+0x20/0x40 [ 58.515069] kasan_save_alloc_info+0x40/0x58 [ 58.519403] __kasan_kmalloc+0xd4/0xd8 [ 58.523210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.527805] kasan_atomics+0xb8/0x2e0 [ 58.531524] kunit_try_run_case+0x170/0x3f0 [ 58.535774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.541340] kthread+0x328/0x630 [ 58.544621] ret_from_fork+0x10/0x20 [ 58.548253] [ 58.549777] The buggy address belongs to the object at ffff0000934cf200 [ 58.549777] which belongs to the cache kmalloc-64 of size 64 [ 58.562259] The buggy address is located 0 bytes to the right of [ 58.562259] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 58.575264] [ 58.576796] The buggy address belongs to the physical page: [ 58.582438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 58.590537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.597148] page_type: f5(slab) [ 58.600343] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 58.608183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.616018] page dumped because: kasan: bad access detected [ 58.621659] [ 58.623191] Memory state around the buggy address: [ 58.628049] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.635366] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.642680] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.649993] ^ [ 58.654845] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.662159] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.669472] ================================================================== [ 72.690986] ================================================================== [ 72.698299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 72.705791] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 72.713281] [ 72.714806] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 72.714834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.714843] Hardware name: Thundercomm Dragonboard 845c (DT) [ 72.714853] Call trace: [ 72.714859] show_stack+0x20/0x38 (C) [ 72.714876] dump_stack_lvl+0x8c/0xd0 [ 72.714893] print_report+0x118/0x608 [ 72.714912] kasan_report+0xdc/0x128 [ 72.714930] kasan_check_range+0x100/0x1a8 [ 72.714949] __kasan_check_write+0x20/0x30 [ 72.714964] kasan_atomics_helper+0x147c/0x4858 [ 72.714983] kasan_atomics+0x198/0x2e0 [ 72.715000] kunit_try_run_case+0x170/0x3f0 [ 72.715018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.715039] kthread+0x328/0x630 [ 72.715052] ret_from_fork+0x10/0x20 [ 72.715069] [ 72.788302] Allocated by task 351: [ 72.791758] kasan_save_stack+0x3c/0x68 [ 72.795657] kasan_save_track+0x20/0x40 [ 72.799554] kasan_save_alloc_info+0x40/0x58 [ 72.803893] __kasan_kmalloc+0xd4/0xd8 [ 72.807702] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.812304] kasan_atomics+0xb8/0x2e0 [ 72.816026] kunit_try_run_case+0x170/0x3f0 [ 72.820279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.825848] kthread+0x328/0x630 [ 72.829135] ret_from_fork+0x10/0x20 [ 72.832771] [ 72.834293] The buggy address belongs to the object at ffff0000934cf200 [ 72.834293] which belongs to the cache kmalloc-64 of size 64 [ 72.846774] The buggy address is located 0 bytes to the right of [ 72.846774] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 72.859777] [ 72.861301] The buggy address belongs to the physical page: [ 72.866948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 72.875044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.881653] page_type: f5(slab) [ 72.884853] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 72.892690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.900523] page dumped because: kasan: bad access detected [ 72.906170] [ 72.907692] Memory state around the buggy address: [ 72.912548] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.919861] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.927175] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.934487] ^ [ 72.939343] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.946656] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.953966] ================================================================== [ 72.961349] ================================================================== [ 72.968663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 72.976155] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 72.983645] [ 72.985170] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 72.985198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.985207] Hardware name: Thundercomm Dragonboard 845c (DT) [ 72.985217] Call trace: [ 72.985222] show_stack+0x20/0x38 (C) [ 72.985239] dump_stack_lvl+0x8c/0xd0 [ 72.985257] print_report+0x118/0x608 [ 72.985275] kasan_report+0xdc/0x128 [ 72.985294] kasan_check_range+0x100/0x1a8 [ 72.985313] __kasan_check_write+0x20/0x30 [ 72.985329] kasan_atomics_helper+0x14e4/0x4858 [ 72.985347] kasan_atomics+0x198/0x2e0 [ 72.985364] kunit_try_run_case+0x170/0x3f0 [ 72.985381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.985402] kthread+0x328/0x630 [ 72.985416] ret_from_fork+0x10/0x20 [ 72.985432] [ 73.058677] Allocated by task 351: [ 73.062133] kasan_save_stack+0x3c/0x68 [ 73.066032] kasan_save_track+0x20/0x40 [ 73.069929] kasan_save_alloc_info+0x40/0x58 [ 73.074267] __kasan_kmalloc+0xd4/0xd8 [ 73.078076] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.082678] kasan_atomics+0xb8/0x2e0 [ 73.086400] kunit_try_run_case+0x170/0x3f0 [ 73.090653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.096222] kthread+0x328/0x630 [ 73.099509] ret_from_fork+0x10/0x20 [ 73.103143] [ 73.104666] The buggy address belongs to the object at ffff0000934cf200 [ 73.104666] which belongs to the cache kmalloc-64 of size 64 [ 73.117146] The buggy address is located 0 bytes to the right of [ 73.117146] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 73.130149] [ 73.131672] The buggy address belongs to the physical page: [ 73.137318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 73.145415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.152023] page_type: f5(slab) [ 73.155222] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 73.163060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.170893] page dumped because: kasan: bad access detected [ 73.176540] [ 73.178063] Memory state around the buggy address: [ 73.182919] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.190232] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.197546] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.204856] ^ [ 73.209712] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.217024] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.224334] ================================================================== [ 73.772384] ================================================================== [ 73.779698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 73.787191] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 73.794594] [ 73.796119] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 73.796147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.796155] Hardware name: Thundercomm Dragonboard 845c (DT) [ 73.796164] Call trace: [ 73.796170] show_stack+0x20/0x38 (C) [ 73.796187] dump_stack_lvl+0x8c/0xd0 [ 73.796204] print_report+0x118/0x608 [ 73.796223] kasan_report+0xdc/0x128 [ 73.796241] __asan_report_load8_noabort+0x20/0x30 [ 73.796257] kasan_atomics_helper+0x3db0/0x4858 [ 73.796276] kasan_atomics+0x198/0x2e0 [ 73.796292] kunit_try_run_case+0x170/0x3f0 [ 73.796310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.796330] kthread+0x328/0x630 [ 73.796343] ret_from_fork+0x10/0x20 [ 73.796359] [ 73.866149] Allocated by task 351: [ 73.869606] kasan_save_stack+0x3c/0x68 [ 73.873504] kasan_save_track+0x20/0x40 [ 73.877400] kasan_save_alloc_info+0x40/0x58 [ 73.881738] __kasan_kmalloc+0xd4/0xd8 [ 73.885547] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.890149] kasan_atomics+0xb8/0x2e0 [ 73.893870] kunit_try_run_case+0x170/0x3f0 [ 73.898123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.903692] kthread+0x328/0x630 [ 73.906977] ret_from_fork+0x10/0x20 [ 73.910612] [ 73.912134] The buggy address belongs to the object at ffff0000934cf200 [ 73.912134] which belongs to the cache kmalloc-64 of size 64 [ 73.924613] The buggy address is located 0 bytes to the right of [ 73.924613] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 73.937616] [ 73.939138] The buggy address belongs to the physical page: [ 73.944784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 73.952880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.959488] page_type: f5(slab) [ 73.962687] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 73.970524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.978358] page dumped because: kasan: bad access detected [ 73.984004] [ 73.985526] Memory state around the buggy address: [ 73.990381] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.997693] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.005006] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.012317] ^ [ 74.017174] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.024486] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.031796] ================================================================== [ 65.958472] ================================================================== [ 65.965785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 65.973280] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 65.980683] [ 65.982208] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 65.982236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.982245] Hardware name: Thundercomm Dragonboard 845c (DT) [ 65.982256] Call trace: [ 65.982264] show_stack+0x20/0x38 (C) [ 65.982281] dump_stack_lvl+0x8c/0xd0 [ 65.982298] print_report+0x118/0x608 [ 65.982316] kasan_report+0xdc/0x128 [ 65.982335] __asan_report_load4_noabort+0x20/0x30 [ 65.982351] kasan_atomics_helper+0x3dbc/0x4858 [ 65.982369] kasan_atomics+0x198/0x2e0 [ 65.982385] kunit_try_run_case+0x170/0x3f0 [ 65.982403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.982423] kthread+0x328/0x630 [ 65.982437] ret_from_fork+0x10/0x20 [ 65.982454] [ 66.052253] Allocated by task 351: [ 66.055710] kasan_save_stack+0x3c/0x68 [ 66.059609] kasan_save_track+0x20/0x40 [ 66.063506] kasan_save_alloc_info+0x40/0x58 [ 66.067845] __kasan_kmalloc+0xd4/0xd8 [ 66.071654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.076256] kasan_atomics+0xb8/0x2e0 [ 66.079978] kunit_try_run_case+0x170/0x3f0 [ 66.084231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.089800] kthread+0x328/0x630 [ 66.093087] ret_from_fork+0x10/0x20 [ 66.096722] [ 66.098245] The buggy address belongs to the object at ffff0000934cf200 [ 66.098245] which belongs to the cache kmalloc-64 of size 64 [ 66.110725] The buggy address is located 0 bytes to the right of [ 66.110725] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 66.123730] [ 66.125253] The buggy address belongs to the physical page: [ 66.130900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 66.138998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.145606] page_type: f5(slab) [ 66.148806] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 66.156644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.164478] page dumped because: kasan: bad access detected [ 66.170126] [ 66.171648] Memory state around the buggy address: [ 66.176503] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.183818] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.191131] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.198441] ^ [ 66.203299] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.210613] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.217924] ================================================================== [ 61.371886] ================================================================== [ 61.379201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 61.386607] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 61.394098] [ 61.395624] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 61.395653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.395660] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.395670] Call trace: [ 61.395676] show_stack+0x20/0x38 (C) [ 61.395693] dump_stack_lvl+0x8c/0xd0 [ 61.395710] print_report+0x118/0x608 [ 61.395728] kasan_report+0xdc/0x128 [ 61.395745] kasan_check_range+0x100/0x1a8 [ 61.395766] __kasan_check_write+0x20/0x30 [ 61.395780] kasan_atomics_helper+0x4e4/0x4858 [ 61.395797] kasan_atomics+0x198/0x2e0 [ 61.395814] kunit_try_run_case+0x170/0x3f0 [ 61.395831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.395852] kthread+0x328/0x630 [ 61.395865] ret_from_fork+0x10/0x20 [ 61.395882] [ 61.469039] Allocated by task 351: [ 61.472495] kasan_save_stack+0x3c/0x68 [ 61.476393] kasan_save_track+0x20/0x40 [ 61.480290] kasan_save_alloc_info+0x40/0x58 [ 61.484628] __kasan_kmalloc+0xd4/0xd8 [ 61.488437] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.493038] kasan_atomics+0xb8/0x2e0 [ 61.496761] kunit_try_run_case+0x170/0x3f0 [ 61.501014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.506573] kthread+0x328/0x630 [ 61.509860] ret_from_fork+0x10/0x20 [ 61.513495] [ 61.515018] The buggy address belongs to the object at ffff0000934cf200 [ 61.515018] which belongs to the cache kmalloc-64 of size 64 [ 61.527493] The buggy address is located 0 bytes to the right of [ 61.527493] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 61.540496] [ 61.542019] The buggy address belongs to the physical page: [ 61.547664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 61.555762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.562370] page_type: f5(slab) [ 61.565568] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 61.573406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.581239] page dumped because: kasan: bad access detected [ 61.586886] [ 61.588408] Memory state around the buggy address: [ 61.593264] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.600577] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.607891] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.615202] ^ [ 61.620058] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.627371] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.634682] ================================================================== [ 61.912278] ================================================================== [ 61.919594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 61.927001] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 61.934491] [ 61.936018] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 61.936045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.936053] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.936064] Call trace: [ 61.936070] show_stack+0x20/0x38 (C) [ 61.936087] dump_stack_lvl+0x8c/0xd0 [ 61.936105] print_report+0x118/0x608 [ 61.936123] kasan_report+0xdc/0x128 [ 61.936141] kasan_check_range+0x100/0x1a8 [ 61.936161] __kasan_check_write+0x20/0x30 [ 61.936176] kasan_atomics_helper+0x5b4/0x4858 [ 61.936194] kasan_atomics+0x198/0x2e0 [ 61.936211] kunit_try_run_case+0x170/0x3f0 [ 61.936228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.936249] kthread+0x328/0x630 [ 61.936263] ret_from_fork+0x10/0x20 [ 61.936279] [ 62.009439] Allocated by task 351: [ 62.012895] kasan_save_stack+0x3c/0x68 [ 62.016795] kasan_save_track+0x20/0x40 [ 62.020692] kasan_save_alloc_info+0x40/0x58 [ 62.025030] __kasan_kmalloc+0xd4/0xd8 [ 62.028840] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.033442] kasan_atomics+0xb8/0x2e0 [ 62.037164] kunit_try_run_case+0x170/0x3f0 [ 62.041417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.046978] kthread+0x328/0x630 [ 62.050263] ret_from_fork+0x10/0x20 [ 62.053897] [ 62.055420] The buggy address belongs to the object at ffff0000934cf200 [ 62.055420] which belongs to the cache kmalloc-64 of size 64 [ 62.067900] The buggy address is located 0 bytes to the right of [ 62.067900] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 62.080903] [ 62.082426] The buggy address belongs to the physical page: [ 62.088073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 62.096169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.102778] page_type: f5(slab) [ 62.105977] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 62.113813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.121647] page dumped because: kasan: bad access detected [ 62.127294] [ 62.128817] Memory state around the buggy address: [ 62.133673] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.140987] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.148300] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.155611] ^ [ 62.160468] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.167780] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.175091] ================================================================== [ 62.182481] ================================================================== [ 62.189795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 62.197201] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 62.204692] [ 62.206217] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 62.206245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.206252] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.206262] Call trace: [ 62.206268] show_stack+0x20/0x38 (C) [ 62.206286] dump_stack_lvl+0x8c/0xd0 [ 62.206303] print_report+0x118/0x608 [ 62.206321] kasan_report+0xdc/0x128 [ 62.206338] kasan_check_range+0x100/0x1a8 [ 62.206357] __kasan_check_write+0x20/0x30 [ 62.206372] kasan_atomics_helper+0x61c/0x4858 [ 62.206391] kasan_atomics+0x198/0x2e0 [ 62.206407] kunit_try_run_case+0x170/0x3f0 [ 62.206425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.206444] kthread+0x328/0x630 [ 62.206457] ret_from_fork+0x10/0x20 [ 62.206473] [ 62.279631] Allocated by task 351: [ 62.283087] kasan_save_stack+0x3c/0x68 [ 62.286986] kasan_save_track+0x20/0x40 [ 62.290884] kasan_save_alloc_info+0x40/0x58 [ 62.295222] __kasan_kmalloc+0xd4/0xd8 [ 62.299031] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.303633] kasan_atomics+0xb8/0x2e0 [ 62.307354] kunit_try_run_case+0x170/0x3f0 [ 62.311608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.317177] kthread+0x328/0x630 [ 62.320462] ret_from_fork+0x10/0x20 [ 62.324097] [ 62.325619] The buggy address belongs to the object at ffff0000934cf200 [ 62.325619] which belongs to the cache kmalloc-64 of size 64 [ 62.338099] The buggy address is located 0 bytes to the right of [ 62.338099] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 62.351103] [ 62.352627] The buggy address belongs to the physical page: [ 62.358273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 62.366370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.372978] page_type: f5(slab) [ 62.376177] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 62.384014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.391848] page dumped because: kasan: bad access detected [ 62.397496] [ 62.399019] Memory state around the buggy address: [ 62.403875] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.411188] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.418502] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.425813] ^ [ 62.430670] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.437982] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.445293] ================================================================== [ 58.944180] ================================================================== [ 58.951512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 58.958930] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 58.966333] [ 58.967869] CPU: 0 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 58.967899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.967909] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.967921] Call trace: [ 58.967930] show_stack+0x20/0x38 (C) [ 58.967948] dump_stack_lvl+0x8c/0xd0 [ 58.967967] print_report+0x118/0x608 [ 58.967988] kasan_report+0xdc/0x128 [ 58.968008] kasan_check_range+0x100/0x1a8 [ 58.968029] __kasan_check_read+0x20/0x30 [ 58.968047] kasan_atomics_helper+0x1ec/0x4858 [ 58.968066] kasan_atomics+0x198/0x2e0 [ 58.968086] kunit_try_run_case+0x170/0x3f0 [ 58.968106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.968128] kthread+0x328/0x630 [ 58.968143] ret_from_fork+0x10/0x20 [ 58.968161] [ 59.041274] Allocated by task 351: [ 59.044740] kasan_save_stack+0x3c/0x68 [ 59.048647] kasan_save_track+0x20/0x40 [ 59.052553] kasan_save_alloc_info+0x40/0x58 [ 59.056898] __kasan_kmalloc+0xd4/0xd8 [ 59.060715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.065322] kasan_atomics+0xb8/0x2e0 [ 59.069053] kunit_try_run_case+0x170/0x3f0 [ 59.073316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.078886] kthread+0x328/0x630 [ 59.082174] ret_from_fork+0x10/0x20 [ 59.085817] [ 59.087348] The buggy address belongs to the object at ffff0000934cf200 [ 59.087348] which belongs to the cache kmalloc-64 of size 64 [ 59.099837] The buggy address is located 0 bytes to the right of [ 59.099837] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 59.112845] [ 59.114377] The buggy address belongs to the physical page: [ 59.120023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 59.128128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.134745] page_type: f5(slab) [ 59.137945] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 59.145794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.153636] page dumped because: kasan: bad access detected [ 59.159283] [ 59.160813] Memory state around the buggy address: [ 59.165672] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.172988] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.180304] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.187618] ^ [ 59.192480] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.199795] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.207108] ================================================================== [ 60.831486] ================================================================== [ 60.838796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 60.846196] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 60.853680] [ 60.855206] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 60.855235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.855244] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.855255] Call trace: [ 60.855261] show_stack+0x20/0x38 (C) [ 60.855278] dump_stack_lvl+0x8c/0xd0 [ 60.855297] print_report+0x118/0x608 [ 60.855315] kasan_report+0xdc/0x128 [ 60.855334] kasan_check_range+0x100/0x1a8 [ 60.855353] __kasan_check_write+0x20/0x30 [ 60.855371] kasan_atomics_helper+0x414/0x4858 [ 60.855389] kasan_atomics+0x198/0x2e0 [ 60.855406] kunit_try_run_case+0x170/0x3f0 [ 60.855423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.855445] kthread+0x328/0x630 [ 60.855458] ret_from_fork+0x10/0x20 [ 60.855475] [ 60.928624] Allocated by task 351: [ 60.932080] kasan_save_stack+0x3c/0x68 [ 60.935979] kasan_save_track+0x20/0x40 [ 60.939875] kasan_save_alloc_info+0x40/0x58 [ 60.944214] __kasan_kmalloc+0xd4/0xd8 [ 60.948023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.952627] kasan_atomics+0xb8/0x2e0 [ 60.956349] kunit_try_run_case+0x170/0x3f0 [ 60.960601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.966171] kthread+0x328/0x630 [ 60.969458] ret_from_fork+0x10/0x20 [ 60.973093] [ 60.974616] The buggy address belongs to the object at ffff0000934cf200 [ 60.974616] which belongs to the cache kmalloc-64 of size 64 [ 60.987098] The buggy address is located 0 bytes to the right of [ 60.987098] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 61.000102] [ 61.001626] The buggy address belongs to the physical page: [ 61.007273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 61.015370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.021981] page_type: f5(slab) [ 61.025181] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 61.033018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.040852] page dumped because: kasan: bad access detected [ 61.046499] [ 61.048021] Memory state around the buggy address: [ 61.052877] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.060191] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.067504] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.074815] ^ [ 61.079672] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.086985] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.094296] ================================================================== [ 59.214550] ================================================================== [ 59.221877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 59.229294] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 59.236798] [ 59.238331] CPU: 0 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 59.238362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.238371] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.238385] Call trace: [ 59.238394] show_stack+0x20/0x38 (C) [ 59.238412] dump_stack_lvl+0x8c/0xd0 [ 59.238432] print_report+0x118/0x608 [ 59.238451] kasan_report+0xdc/0x128 [ 59.238473] kasan_check_range+0x100/0x1a8 [ 59.238495] __kasan_check_write+0x20/0x30 [ 59.238511] kasan_atomics_helper+0x24c/0x4858 [ 59.238531] kasan_atomics+0x198/0x2e0 [ 59.238550] kunit_try_run_case+0x170/0x3f0 [ 59.238568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.238591] kthread+0x328/0x630 [ 59.238607] ret_from_fork+0x10/0x20 [ 59.238625] [ 59.311837] Allocated by task 351: [ 59.315299] kasan_save_stack+0x3c/0x68 [ 59.319211] kasan_save_track+0x20/0x40 [ 59.323121] kasan_save_alloc_info+0x40/0x58 [ 59.327460] __kasan_kmalloc+0xd4/0xd8 [ 59.331283] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.335893] kasan_atomics+0xb8/0x2e0 [ 59.339619] kunit_try_run_case+0x170/0x3f0 [ 59.343871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.349442] kthread+0x328/0x630 [ 59.352732] ret_from_fork+0x10/0x20 [ 59.356373] [ 59.357902] The buggy address belongs to the object at ffff0000934cf200 [ 59.357902] which belongs to the cache kmalloc-64 of size 64 [ 59.370393] The buggy address is located 0 bytes to the right of [ 59.370393] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 59.383410] [ 59.384944] The buggy address belongs to the physical page: [ 59.390596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 59.398699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.405324] page_type: f5(slab) [ 59.408529] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 59.416376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.424218] page dumped because: kasan: bad access detected [ 59.429868] [ 59.431397] Memory state around the buggy address: [ 59.436257] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.443576] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.450890] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.458213] ^ [ 59.463078] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.470394] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.477716] ================================================================== [ 74.846713] ================================================================== [ 74.854027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 74.861518] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 74.868920] [ 74.870445] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 74.870474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.870482] Hardware name: Thundercomm Dragonboard 845c (DT) [ 74.870492] Call trace: [ 74.870498] show_stack+0x20/0x38 (C) [ 74.870515] dump_stack_lvl+0x8c/0xd0 [ 74.870532] print_report+0x118/0x608 [ 74.870550] kasan_report+0xdc/0x128 [ 74.870568] __asan_report_load8_noabort+0x20/0x30 [ 74.870584] kasan_atomics_helper+0x3e10/0x4858 [ 74.870602] kasan_atomics+0x198/0x2e0 [ 74.870619] kunit_try_run_case+0x170/0x3f0 [ 74.870636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.870656] kthread+0x328/0x630 [ 74.870670] ret_from_fork+0x10/0x20 [ 74.870687] [ 74.940498] Allocated by task 351: [ 74.943955] kasan_save_stack+0x3c/0x68 [ 74.947854] kasan_save_track+0x20/0x40 [ 74.951751] kasan_save_alloc_info+0x40/0x58 [ 74.956090] __kasan_kmalloc+0xd4/0xd8 [ 74.959900] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.964500] kasan_atomics+0xb8/0x2e0 [ 74.968222] kunit_try_run_case+0x170/0x3f0 [ 74.972475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.978046] kthread+0x328/0x630 [ 74.981331] ret_from_fork+0x10/0x20 [ 74.984966] [ 74.986488] The buggy address belongs to the object at ffff0000934cf200 [ 74.986488] which belongs to the cache kmalloc-64 of size 64 [ 74.998967] The buggy address is located 0 bytes to the right of [ 74.998967] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 75.011970] [ 75.013493] The buggy address belongs to the physical page: [ 75.019139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 75.027237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.033845] page_type: f5(slab) [ 75.037044] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 75.044881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.052713] page dumped because: kasan: bad access detected [ 75.058360] [ 75.059881] Memory state around the buggy address: [ 75.064736] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.072049] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.079361] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.086672] ^ [ 75.091527] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.098839] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.106149] ================================================================== [ 74.576359] ================================================================== [ 74.583673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 74.591164] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 74.598653] [ 74.600178] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 74.600206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.600215] Hardware name: Thundercomm Dragonboard 845c (DT) [ 74.600224] Call trace: [ 74.600230] show_stack+0x20/0x38 (C) [ 74.600246] dump_stack_lvl+0x8c/0xd0 [ 74.600264] print_report+0x118/0x608 [ 74.600283] kasan_report+0xdc/0x128 [ 74.600301] kasan_check_range+0x100/0x1a8 [ 74.600321] __kasan_check_write+0x20/0x30 [ 74.600336] kasan_atomics_helper+0x16d0/0x4858 [ 74.600355] kasan_atomics+0x198/0x2e0 [ 74.600371] kunit_try_run_case+0x170/0x3f0 [ 74.600389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.600410] kthread+0x328/0x630 [ 74.600424] ret_from_fork+0x10/0x20 [ 74.600441] [ 74.673685] Allocated by task 351: [ 74.677141] kasan_save_stack+0x3c/0x68 [ 74.681039] kasan_save_track+0x20/0x40 [ 74.684936] kasan_save_alloc_info+0x40/0x58 [ 74.689275] __kasan_kmalloc+0xd4/0xd8 [ 74.693084] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.697686] kasan_atomics+0xb8/0x2e0 [ 74.701408] kunit_try_run_case+0x170/0x3f0 [ 74.705661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.711231] kthread+0x328/0x630 [ 74.714517] ret_from_fork+0x10/0x20 [ 74.718152] [ 74.719675] The buggy address belongs to the object at ffff0000934cf200 [ 74.719675] which belongs to the cache kmalloc-64 of size 64 [ 74.732154] The buggy address is located 0 bytes to the right of [ 74.732154] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 74.745157] [ 74.746680] The buggy address belongs to the physical page: [ 74.752327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 74.760424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.767033] page_type: f5(slab) [ 74.770232] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 74.778070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.785903] page dumped because: kasan: bad access detected [ 74.791550] [ 74.793073] Memory state around the buggy address: [ 74.797929] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.805241] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.812554] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.819864] ^ [ 74.824720] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.832032] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.839344] ================================================================== [ 73.231704] ================================================================== [ 73.239018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 73.246509] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 73.253999] [ 73.255524] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 73.255552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.255560] Hardware name: Thundercomm Dragonboard 845c (DT) [ 73.255570] Call trace: [ 73.255576] show_stack+0x20/0x38 (C) [ 73.255592] dump_stack_lvl+0x8c/0xd0 [ 73.255610] print_report+0x118/0x608 [ 73.255627] kasan_report+0xdc/0x128 [ 73.255646] kasan_check_range+0x100/0x1a8 [ 73.255665] __kasan_check_write+0x20/0x30 [ 73.255681] kasan_atomics_helper+0x154c/0x4858 [ 73.255699] kasan_atomics+0x198/0x2e0 [ 73.255715] kunit_try_run_case+0x170/0x3f0 [ 73.255732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.255752] kthread+0x328/0x630 [ 73.255765] ret_from_fork+0x10/0x20 [ 73.255781] [ 73.329014] Allocated by task 351: [ 73.332470] kasan_save_stack+0x3c/0x68 [ 73.336368] kasan_save_track+0x20/0x40 [ 73.340265] kasan_save_alloc_info+0x40/0x58 [ 73.344603] __kasan_kmalloc+0xd4/0xd8 [ 73.348411] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.353013] kasan_atomics+0xb8/0x2e0 [ 73.356734] kunit_try_run_case+0x170/0x3f0 [ 73.360987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.366556] kthread+0x328/0x630 [ 73.369842] ret_from_fork+0x10/0x20 [ 73.373477] [ 73.374999] The buggy address belongs to the object at ffff0000934cf200 [ 73.374999] which belongs to the cache kmalloc-64 of size 64 [ 73.387479] The buggy address is located 0 bytes to the right of [ 73.387479] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 73.400484] [ 73.402007] The buggy address belongs to the physical page: [ 73.407653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 73.415749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.422357] page_type: f5(slab) [ 73.425556] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 73.433392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.441225] page dumped because: kasan: bad access detected [ 73.446871] [ 73.448393] Memory state around the buggy address: [ 73.453249] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.460561] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.467874] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.475184] ^ [ 73.480041] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.487352] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.494663] ================================================================== [ 70.531597] ================================================================== [ 70.538910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 70.546401] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 70.553891] [ 70.555416] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 70.555445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.555454] Hardware name: Thundercomm Dragonboard 845c (DT) [ 70.555463] Call trace: [ 70.555469] show_stack+0x20/0x38 (C) [ 70.555485] dump_stack_lvl+0x8c/0xd0 [ 70.555503] print_report+0x118/0x608 [ 70.555520] kasan_report+0xdc/0x128 [ 70.555538] kasan_check_range+0x100/0x1a8 [ 70.555557] __kasan_check_write+0x20/0x30 [ 70.555574] kasan_atomics_helper+0x1128/0x4858 [ 70.555593] kasan_atomics+0x198/0x2e0 [ 70.555610] kunit_try_run_case+0x170/0x3f0 [ 70.555628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.555647] kthread+0x328/0x630 [ 70.555660] ret_from_fork+0x10/0x20 [ 70.555677] [ 70.628906] Allocated by task 351: [ 70.632363] kasan_save_stack+0x3c/0x68 [ 70.636260] kasan_save_track+0x20/0x40 [ 70.640157] kasan_save_alloc_info+0x40/0x58 [ 70.644495] __kasan_kmalloc+0xd4/0xd8 [ 70.648304] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.652906] kasan_atomics+0xb8/0x2e0 [ 70.656627] kunit_try_run_case+0x170/0x3f0 [ 70.660880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.666439] kthread+0x328/0x630 [ 70.669725] ret_from_fork+0x10/0x20 [ 70.673360] [ 70.674882] The buggy address belongs to the object at ffff0000934cf200 [ 70.674882] which belongs to the cache kmalloc-64 of size 64 [ 70.687361] The buggy address is located 0 bytes to the right of [ 70.687361] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 70.700367] [ 70.701897] The buggy address belongs to the physical page: [ 70.707546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 70.715648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.722259] page_type: f5(slab) [ 70.725461] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 70.733299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.741132] page dumped because: kasan: bad access detected [ 70.746779] [ 70.748302] Memory state around the buggy address: [ 70.753158] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.760471] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.767785] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.775097] ^ [ 70.779955] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.787268] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.794579] ================================================================== [ 66.495458] ================================================================== [ 66.502772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 66.510264] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 66.517669] [ 66.519195] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 66.519224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.519231] Hardware name: Thundercomm Dragonboard 845c (DT) [ 66.519243] Call trace: [ 66.519249] show_stack+0x20/0x38 (C) [ 66.519266] dump_stack_lvl+0x8c/0xd0 [ 66.519285] print_report+0x118/0x608 [ 66.519303] kasan_report+0xdc/0x128 [ 66.519321] __asan_report_load4_noabort+0x20/0x30 [ 66.519338] kasan_atomics_helper+0x3de4/0x4858 [ 66.519355] kasan_atomics+0x198/0x2e0 [ 66.519371] kunit_try_run_case+0x170/0x3f0 [ 66.519388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.519408] kthread+0x328/0x630 [ 66.519420] ret_from_fork+0x10/0x20 [ 66.519438] [ 66.589248] Allocated by task 351: [ 66.592706] kasan_save_stack+0x3c/0x68 [ 66.596604] kasan_save_track+0x20/0x40 [ 66.600500] kasan_save_alloc_info+0x40/0x58 [ 66.604838] __kasan_kmalloc+0xd4/0xd8 [ 66.608647] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.613249] kasan_atomics+0xb8/0x2e0 [ 66.616971] kunit_try_run_case+0x170/0x3f0 [ 66.621224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.626784] kthread+0x328/0x630 [ 66.630071] ret_from_fork+0x10/0x20 [ 66.633706] [ 66.635229] The buggy address belongs to the object at ffff0000934cf200 [ 66.635229] which belongs to the cache kmalloc-64 of size 64 [ 66.647710] The buggy address is located 0 bytes to the right of [ 66.647710] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 66.660713] [ 66.662237] The buggy address belongs to the physical page: [ 66.667883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 66.675980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.682589] page_type: f5(slab) [ 66.685788] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 66.693624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.701458] page dumped because: kasan: bad access detected [ 66.707104] [ 66.708626] Memory state around the buggy address: [ 66.713482] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.720794] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.728107] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.735419] ^ [ 66.740275] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.747588] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.754899] ================================================================== [ 59.485876] ================================================================== [ 59.493205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 59.500617] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 59.508025] [ 59.509555] CPU: 6 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 59.509587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.509595] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.509606] Call trace: [ 59.509614] show_stack+0x20/0x38 (C) [ 59.509634] dump_stack_lvl+0x8c/0xd0 [ 59.509653] print_report+0x118/0x608 [ 59.509672] kasan_report+0xdc/0x128 [ 59.509691] kasan_check_range+0x100/0x1a8 [ 59.509711] __kasan_check_read+0x20/0x30 [ 59.509728] kasan_atomics_helper+0x2b0/0x4858 [ 59.509747] kasan_atomics+0x198/0x2e0 [ 59.509764] kunit_try_run_case+0x170/0x3f0 [ 59.509784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.509805] kthread+0x328/0x630 [ 59.509819] ret_from_fork+0x10/0x20 [ 59.509838] [ 59.582909] Allocated by task 351: [ 59.586362] kasan_save_stack+0x3c/0x68 [ 59.590261] kasan_save_track+0x20/0x40 [ 59.594166] kasan_save_alloc_info+0x40/0x58 [ 59.598503] __kasan_kmalloc+0xd4/0xd8 [ 59.602319] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.606920] kasan_atomics+0xb8/0x2e0 [ 59.610638] kunit_try_run_case+0x170/0x3f0 [ 59.614891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.620455] kthread+0x328/0x630 [ 59.623737] ret_from_fork+0x10/0x20 [ 59.627369] [ 59.628892] The buggy address belongs to the object at ffff0000934cf200 [ 59.628892] which belongs to the cache kmalloc-64 of size 64 [ 59.641375] The buggy address is located 0 bytes to the right of [ 59.641375] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 59.654382] [ 59.655914] The buggy address belongs to the physical page: [ 59.661560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 59.669663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.676276] page_type: f5(slab) [ 59.679473] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 59.687308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.695146] page dumped because: kasan: bad access detected [ 59.700787] [ 59.702310] Memory state around the buggy address: [ 59.707161] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.714468] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.721775] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.729080] ^ [ 59.733936] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.741241] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.748545] ================================================================== [ 71.613109] ================================================================== [ 71.620420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 71.627913] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 71.635403] [ 71.636928] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 71.636957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.636965] Hardware name: Thundercomm Dragonboard 845c (DT) [ 71.636975] Call trace: [ 71.636980] show_stack+0x20/0x38 (C) [ 71.636998] dump_stack_lvl+0x8c/0xd0 [ 71.637017] print_report+0x118/0x608 [ 71.637035] kasan_report+0xdc/0x128 [ 71.637052] kasan_check_range+0x100/0x1a8 [ 71.637071] __kasan_check_write+0x20/0x30 [ 71.637087] kasan_atomics_helper+0x12d8/0x4858 [ 71.637107] kasan_atomics+0x198/0x2e0 [ 71.637123] kunit_try_run_case+0x170/0x3f0 [ 71.637140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.637160] kthread+0x328/0x630 [ 71.637173] ret_from_fork+0x10/0x20 [ 71.637190] [ 71.710436] Allocated by task 351: [ 71.713893] kasan_save_stack+0x3c/0x68 [ 71.717791] kasan_save_track+0x20/0x40 [ 71.721688] kasan_save_alloc_info+0x40/0x58 [ 71.726026] __kasan_kmalloc+0xd4/0xd8 [ 71.729836] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.734439] kasan_atomics+0xb8/0x2e0 [ 71.738160] kunit_try_run_case+0x170/0x3f0 [ 71.742413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.747983] kthread+0x328/0x630 [ 71.751268] ret_from_fork+0x10/0x20 [ 71.754903] [ 71.756426] The buggy address belongs to the object at ffff0000934cf200 [ 71.756426] which belongs to the cache kmalloc-64 of size 64 [ 71.768906] The buggy address is located 0 bytes to the right of [ 71.768906] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 71.781909] [ 71.783432] The buggy address belongs to the physical page: [ 71.789079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 71.797176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.803784] page_type: f5(slab) [ 71.806983] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 71.814819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.822651] page dumped because: kasan: bad access detected [ 71.828298] [ 71.829821] Memory state around the buggy address: [ 71.834677] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.841990] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.849302] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.856612] ^ [ 71.861468] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.868780] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.876091] ================================================================== [ 67.569410] ================================================================== [ 67.576721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 67.584212] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 67.591615] [ 67.593140] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 67.593169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.593177] Hardware name: Thundercomm Dragonboard 845c (DT) [ 67.593187] Call trace: [ 67.593193] show_stack+0x20/0x38 (C) [ 67.593209] dump_stack_lvl+0x8c/0xd0 [ 67.593227] print_report+0x118/0x608 [ 67.593246] kasan_report+0xdc/0x128 [ 67.593264] __asan_report_load4_noabort+0x20/0x30 [ 67.593281] kasan_atomics_helper+0x3e04/0x4858 [ 67.593301] kasan_atomics+0x198/0x2e0 [ 67.593319] kunit_try_run_case+0x170/0x3f0 [ 67.593336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.593356] kthread+0x328/0x630 [ 67.593370] ret_from_fork+0x10/0x20 [ 67.593387] [ 67.663184] Allocated by task 351: [ 67.666640] kasan_save_stack+0x3c/0x68 [ 67.670538] kasan_save_track+0x20/0x40 [ 67.674437] kasan_save_alloc_info+0x40/0x58 [ 67.678776] __kasan_kmalloc+0xd4/0xd8 [ 67.682584] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.687185] kasan_atomics+0xb8/0x2e0 [ 67.690907] kunit_try_run_case+0x170/0x3f0 [ 67.695160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.700718] kthread+0x328/0x630 [ 67.704005] ret_from_fork+0x10/0x20 [ 67.707639] [ 67.709161] The buggy address belongs to the object at ffff0000934cf200 [ 67.709161] which belongs to the cache kmalloc-64 of size 64 [ 67.721640] The buggy address is located 0 bytes to the right of [ 67.721640] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 67.734643] [ 67.736168] The buggy address belongs to the physical page: [ 67.741815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 67.749910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.756520] page_type: f5(slab) [ 67.759718] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 67.767555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.775388] page dumped because: kasan: bad access detected [ 67.781035] [ 67.782557] Memory state around the buggy address: [ 67.787412] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.794724] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.802037] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.809349] ^ [ 67.814205] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.821518] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.828829] ================================================================== [ 72.153813] ================================================================== [ 72.161128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 72.168620] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 72.176024] [ 72.177550] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 72.177579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.177587] Hardware name: Thundercomm Dragonboard 845c (DT) [ 72.177596] Call trace: [ 72.177602] show_stack+0x20/0x38 (C) [ 72.177619] dump_stack_lvl+0x8c/0xd0 [ 72.177637] print_report+0x118/0x608 [ 72.177656] kasan_report+0xdc/0x128 [ 72.177673] __asan_report_load8_noabort+0x20/0x30 [ 72.177690] kasan_atomics_helper+0x3f04/0x4858 [ 72.177709] kasan_atomics+0x198/0x2e0 [ 72.177725] kunit_try_run_case+0x170/0x3f0 [ 72.177742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.177763] kthread+0x328/0x630 [ 72.177776] ret_from_fork+0x10/0x20 [ 72.177792] [ 72.247602] Allocated by task 351: [ 72.251058] kasan_save_stack+0x3c/0x68 [ 72.254958] kasan_save_track+0x20/0x40 [ 72.258855] kasan_save_alloc_info+0x40/0x58 [ 72.263193] __kasan_kmalloc+0xd4/0xd8 [ 72.267002] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.271603] kasan_atomics+0xb8/0x2e0 [ 72.275325] kunit_try_run_case+0x170/0x3f0 [ 72.279580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.285149] kthread+0x328/0x630 [ 72.288434] ret_from_fork+0x10/0x20 [ 72.292069] [ 72.293591] The buggy address belongs to the object at ffff0000934cf200 [ 72.293591] which belongs to the cache kmalloc-64 of size 64 [ 72.306072] The buggy address is located 0 bytes to the right of [ 72.306072] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 72.319075] [ 72.320599] The buggy address belongs to the physical page: [ 72.326246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 72.334343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.340952] page_type: f5(slab) [ 72.344151] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 72.351988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.359820] page dumped because: kasan: bad access detected [ 72.365467] [ 72.366988] Memory state around the buggy address: [ 72.371843] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.379156] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.386468] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.393778] ^ [ 72.398634] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.405947] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.413258] ================================================================== [ 63.533405] ================================================================== [ 63.540717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 63.548122] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351 [ 63.555611] [ 63.557138] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 63.557166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.557175] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.557186] Call trace: [ 63.557193] show_stack+0x20/0x38 (C) [ 63.557210] dump_stack_lvl+0x8c/0xd0 [ 63.557229] print_report+0x118/0x608 [ 63.557248] kasan_report+0xdc/0x128 [ 63.557267] kasan_check_range+0x100/0x1a8 [ 63.557287] __kasan_check_write+0x20/0x30 [ 63.557304] kasan_atomics_helper+0x894/0x4858 [ 63.557323] kasan_atomics+0x198/0x2e0 [ 63.557340] kunit_try_run_case+0x170/0x3f0 [ 63.557358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.557379] kthread+0x328/0x630 [ 63.557392] ret_from_fork+0x10/0x20 [ 63.557411] [ 63.630558] Allocated by task 351: [ 63.634014] kasan_save_stack+0x3c/0x68 [ 63.637914] kasan_save_track+0x20/0x40 [ 63.641811] kasan_save_alloc_info+0x40/0x58 [ 63.646148] __kasan_kmalloc+0xd4/0xd8 [ 63.649957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.654559] kasan_atomics+0xb8/0x2e0 [ 63.658281] kunit_try_run_case+0x170/0x3f0 [ 63.662535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.668094] kthread+0x328/0x630 [ 63.671380] ret_from_fork+0x10/0x20 [ 63.675014] [ 63.676537] The buggy address belongs to the object at ffff0000934cf200 [ 63.676537] which belongs to the cache kmalloc-64 of size 64 [ 63.689019] The buggy address is located 0 bytes to the right of [ 63.689019] allocated 48-byte region [ffff0000934cf200, ffff0000934cf230) [ 63.702024] [ 63.703548] The buggy address belongs to the physical page: [ 63.709195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf [ 63.717292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.723901] page_type: f5(slab) [ 63.727102] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 63.734939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.742773] page dumped because: kasan: bad access detected [ 63.748421] [ 63.749943] Memory state around the buggy address: [ 63.754798] ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.762111] ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.769425] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.776735] ^ [ 63.781592] ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.788905] ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.796215] ==================================================================
[ 1525.426849] ================================================================== [ 1525.426859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 1525.426874] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.426888] [ 1525.426894] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.426919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.426927] Hardware name: ARM Juno development board (r2) (DT) [ 1525.426937] Call trace: [ 1525.426942] show_stack+0x20/0x38 (C) [ 1525.426957] dump_stack_lvl+0x8c/0xd0 [ 1525.426973] print_report+0x118/0x608 [ 1525.426991] kasan_report+0xdc/0x128 [ 1525.427008] kasan_check_range+0x100/0x1a8 [ 1525.427027] __kasan_check_write+0x20/0x30 [ 1525.427041] kasan_atomics_helper+0xff0/0x4858 [ 1525.427057] kasan_atomics+0x198/0x2e0 [ 1525.427073] kunit_try_run_case+0x170/0x3f0 [ 1525.427089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.427108] kthread+0x328/0x630 [ 1525.427120] ret_from_fork+0x10/0x20 [ 1525.427136] [ 1525.427140] Allocated by task 336: [ 1525.427147] kasan_save_stack+0x3c/0x68 [ 1525.427162] kasan_save_track+0x20/0x40 [ 1525.427176] kasan_save_alloc_info+0x40/0x58 [ 1525.427188] __kasan_kmalloc+0xd4/0xd8 [ 1525.427202] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.427215] kasan_atomics+0xb8/0x2e0 [ 1525.427228] kunit_try_run_case+0x170/0x3f0 [ 1525.427241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.427257] kthread+0x328/0x630 [ 1525.427267] ret_from_fork+0x10/0x20 [ 1525.427279] [ 1525.427283] The buggy address belongs to the object at ffff000826289e00 [ 1525.427283] which belongs to the cache kmalloc-64 of size 64 [ 1525.427299] The buggy address is located 0 bytes to the right of [ 1525.427299] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.427318] [ 1525.427322] The buggy address belongs to the physical page: [ 1525.427330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.427344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.427357] page_type: f5(slab) [ 1525.427368] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.427382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.427393] page dumped because: kasan: bad access detected [ 1525.427402] [ 1525.427406] Memory state around the buggy address: [ 1525.427414] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.427426] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.427438] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.427449] ^ [ 1525.427458] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.427471] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.427481] ================================================================== [ 1525.437243] ================================================================== [ 1525.437253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 1525.437268] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.437282] [ 1525.437288] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.437314] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.437322] Hardware name: ARM Juno development board (r2) (DT) [ 1525.437332] Call trace: [ 1525.437337] show_stack+0x20/0x38 (C) [ 1525.437352] dump_stack_lvl+0x8c/0xd0 [ 1525.437368] print_report+0x118/0x608 [ 1525.437386] kasan_report+0xdc/0x128 [ 1525.437403] kasan_check_range+0x100/0x1a8 [ 1525.437421] __kasan_check_write+0x20/0x30 [ 1525.437436] kasan_atomics_helper+0x1644/0x4858 [ 1525.437453] kasan_atomics+0x198/0x2e0 [ 1525.437469] kunit_try_run_case+0x170/0x3f0 [ 1525.437485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.437504] kthread+0x328/0x630 [ 1525.437516] ret_from_fork+0x10/0x20 [ 1525.437531] [ 1525.437535] Allocated by task 336: [ 1525.437543] kasan_save_stack+0x3c/0x68 [ 1525.437557] kasan_save_track+0x20/0x40 [ 1525.437572] kasan_save_alloc_info+0x40/0x58 [ 1525.437583] __kasan_kmalloc+0xd4/0xd8 [ 1525.437597] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.437610] kasan_atomics+0xb8/0x2e0 [ 1525.437623] kunit_try_run_case+0x170/0x3f0 [ 1525.437636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.437652] kthread+0x328/0x630 [ 1525.437662] ret_from_fork+0x10/0x20 [ 1525.437674] [ 1525.437678] The buggy address belongs to the object at ffff000826289e00 [ 1525.437678] which belongs to the cache kmalloc-64 of size 64 [ 1525.437695] The buggy address is located 0 bytes to the right of [ 1525.437695] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.437714] [ 1525.437718] The buggy address belongs to the physical page: [ 1525.437726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.437740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.437753] page_type: f5(slab) [ 1525.437764] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.437778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.437789] page dumped because: kasan: bad access detected [ 1525.437798] [ 1525.437802] Memory state around the buggy address: [ 1525.437810] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.437822] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.437835] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.437845] ^ [ 1525.437854] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.437866] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.437877] ================================================================== [ 1525.439167] ================================================================== [ 1525.439176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 1525.439191] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.439206] [ 1525.439212] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.439237] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.439245] Hardware name: ARM Juno development board (r2) (DT) [ 1525.439255] Call trace: [ 1525.439260] show_stack+0x20/0x38 (C) [ 1525.439276] dump_stack_lvl+0x8c/0xd0 [ 1525.439292] print_report+0x118/0x608 [ 1525.439310] kasan_report+0xdc/0x128 [ 1525.439327] __asan_report_load8_noabort+0x20/0x30 [ 1525.439342] kasan_atomics_helper+0x3e10/0x4858 [ 1525.439359] kasan_atomics+0x198/0x2e0 [ 1525.439375] kunit_try_run_case+0x170/0x3f0 [ 1525.439391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.439410] kthread+0x328/0x630 [ 1525.439423] ret_from_fork+0x10/0x20 [ 1525.439438] [ 1525.439442] Allocated by task 336: [ 1525.439449] kasan_save_stack+0x3c/0x68 [ 1525.439464] kasan_save_track+0x20/0x40 [ 1525.439478] kasan_save_alloc_info+0x40/0x58 [ 1525.439489] __kasan_kmalloc+0xd4/0xd8 [ 1525.439503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.439517] kasan_atomics+0xb8/0x2e0 [ 1525.439530] kunit_try_run_case+0x170/0x3f0 [ 1525.439543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.439558] kthread+0x328/0x630 [ 1525.439568] ret_from_fork+0x10/0x20 [ 1525.439581] [ 1525.439585] The buggy address belongs to the object at ffff000826289e00 [ 1525.439585] which belongs to the cache kmalloc-64 of size 64 [ 1525.439601] The buggy address is located 0 bytes to the right of [ 1525.439601] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.439620] [ 1525.439625] The buggy address belongs to the physical page: [ 1525.439632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.439647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.439660] page_type: f5(slab) [ 1525.439670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.439685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.439696] page dumped because: kasan: bad access detected [ 1525.439704] [ 1525.439708] Memory state around the buggy address: [ 1525.439717] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.439729] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.439741] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.439752] ^ [ 1525.439761] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.439773] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.439784] ================================================================== [ 1525.422952] ================================================================== [ 1525.422961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 1525.422976] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.422990] [ 1525.422996] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.423022] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.423030] Hardware name: ARM Juno development board (r2) (DT) [ 1525.423039] Call trace: [ 1525.423044] show_stack+0x20/0x38 (C) [ 1525.423059] dump_stack_lvl+0x8c/0xd0 [ 1525.423076] print_report+0x118/0x608 [ 1525.423093] kasan_report+0xdc/0x128 [ 1525.423110] __asan_report_load8_noabort+0x20/0x30 [ 1525.423126] kasan_atomics_helper+0x3f58/0x4858 [ 1525.423143] kasan_atomics+0x198/0x2e0 [ 1525.423158] kunit_try_run_case+0x170/0x3f0 [ 1525.423175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.423194] kthread+0x328/0x630 [ 1525.423206] ret_from_fork+0x10/0x20 [ 1525.423222] [ 1525.423226] Allocated by task 336: [ 1525.423233] kasan_save_stack+0x3c/0x68 [ 1525.423249] kasan_save_track+0x20/0x40 [ 1525.423263] kasan_save_alloc_info+0x40/0x58 [ 1525.423274] __kasan_kmalloc+0xd4/0xd8 [ 1525.423289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.423302] kasan_atomics+0xb8/0x2e0 [ 1525.423315] kunit_try_run_case+0x170/0x3f0 [ 1525.423329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.423345] kthread+0x328/0x630 [ 1525.423355] ret_from_fork+0x10/0x20 [ 1525.423367] [ 1525.423371] The buggy address belongs to the object at ffff000826289e00 [ 1525.423371] which belongs to the cache kmalloc-64 of size 64 [ 1525.423389] The buggy address is located 0 bytes to the right of [ 1525.423389] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.423407] [ 1525.423412] The buggy address belongs to the physical page: [ 1525.423420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.423434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.423448] page_type: f5(slab) [ 1525.423458] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.423473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.423484] page dumped because: kasan: bad access detected [ 1525.423493] [ 1525.423497] Memory state around the buggy address: [ 1525.423506] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.423519] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.423531] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.423542] ^ [ 1525.423551] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.423564] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.423575] ================================================================== [ 1525.422304] ================================================================== [ 1525.422314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 1525.422329] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.422343] [ 1525.422350] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.422375] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.422383] Hardware name: ARM Juno development board (r2) (DT) [ 1525.422392] Call trace: [ 1525.422398] show_stack+0x20/0x38 (C) [ 1525.422413] dump_stack_lvl+0x8c/0xd0 [ 1525.422429] print_report+0x118/0x608 [ 1525.422447] kasan_report+0xdc/0x128 [ 1525.422464] kasan_check_range+0x100/0x1a8 [ 1525.422482] __kasan_check_read+0x20/0x30 [ 1525.422496] kasan_atomics_helper+0xdd4/0x4858 [ 1525.422513] kasan_atomics+0x198/0x2e0 [ 1525.422528] kunit_try_run_case+0x170/0x3f0 [ 1525.422545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.422563] kthread+0x328/0x630 [ 1525.422575] ret_from_fork+0x10/0x20 [ 1525.422591] [ 1525.422595] Allocated by task 336: [ 1525.422602] kasan_save_stack+0x3c/0x68 [ 1525.422617] kasan_save_track+0x20/0x40 [ 1525.422631] kasan_save_alloc_info+0x40/0x58 [ 1525.422643] __kasan_kmalloc+0xd4/0xd8 [ 1525.422657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.422670] kasan_atomics+0xb8/0x2e0 [ 1525.422683] kunit_try_run_case+0x170/0x3f0 [ 1525.422696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.422712] kthread+0x328/0x630 [ 1525.422721] ret_from_fork+0x10/0x20 [ 1525.422734] [ 1525.422738] The buggy address belongs to the object at ffff000826289e00 [ 1525.422738] which belongs to the cache kmalloc-64 of size 64 [ 1525.422754] The buggy address is located 0 bytes to the right of [ 1525.422754] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.422773] [ 1525.422778] The buggy address belongs to the physical page: [ 1525.422785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.422800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.422813] page_type: f5(slab) [ 1525.422823] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.422839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.422850] page dumped because: kasan: bad access detected [ 1525.422859] [ 1525.422863] Memory state around the buggy address: [ 1525.422871] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.422884] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.422896] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.422907] ^ [ 1525.422916] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.422929] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.422940] ================================================================== [ 1525.424264] ================================================================== [ 1525.424275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 1525.424292] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.424306] [ 1525.424312] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.424338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.424346] Hardware name: ARM Juno development board (r2) (DT) [ 1525.424356] Call trace: [ 1525.424361] show_stack+0x20/0x38 (C) [ 1525.424377] dump_stack_lvl+0x8c/0xd0 [ 1525.424393] print_report+0x118/0x608 [ 1525.424411] kasan_report+0xdc/0x128 [ 1525.424427] __asan_report_store8_noabort+0x20/0x30 [ 1525.424443] kasan_atomics_helper+0x3e5c/0x4858 [ 1525.424460] kasan_atomics+0x198/0x2e0 [ 1525.424476] kunit_try_run_case+0x170/0x3f0 [ 1525.424492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.424511] kthread+0x328/0x630 [ 1525.424523] ret_from_fork+0x10/0x20 [ 1525.424539] [ 1525.424543] Allocated by task 336: [ 1525.424550] kasan_save_stack+0x3c/0x68 [ 1525.424565] kasan_save_track+0x20/0x40 [ 1525.424579] kasan_save_alloc_info+0x40/0x58 [ 1525.424590] __kasan_kmalloc+0xd4/0xd8 [ 1525.424604] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.424618] kasan_atomics+0xb8/0x2e0 [ 1525.424631] kunit_try_run_case+0x170/0x3f0 [ 1525.424644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.424660] kthread+0x328/0x630 [ 1525.424670] ret_from_fork+0x10/0x20 [ 1525.424682] [ 1525.424686] The buggy address belongs to the object at ffff000826289e00 [ 1525.424686] which belongs to the cache kmalloc-64 of size 64 [ 1525.424702] The buggy address is located 0 bytes to the right of [ 1525.424702] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.424721] [ 1525.424725] The buggy address belongs to the physical page: [ 1525.424734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.424748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.424761] page_type: f5(slab) [ 1525.424772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.424787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.424798] page dumped because: kasan: bad access detected [ 1525.424806] [ 1525.424810] Memory state around the buggy address: [ 1525.424819] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.424831] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.424844] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.424855] ^ [ 1525.424864] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.424876] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.424887] ================================================================== [ 1525.421674] ================================================================== [ 1525.421684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 1525.421699] Read of size 4 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.421713] [ 1525.421719] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.421744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.421752] Hardware name: ARM Juno development board (r2) (DT) [ 1525.421762] Call trace: [ 1525.421767] show_stack+0x20/0x38 (C) [ 1525.421782] dump_stack_lvl+0x8c/0xd0 [ 1525.421799] print_report+0x118/0x608 [ 1525.421816] kasan_report+0xdc/0x128 [ 1525.421833] __asan_report_load4_noabort+0x20/0x30 [ 1525.421848] kasan_atomics_helper+0x3e04/0x4858 [ 1525.421865] kasan_atomics+0x198/0x2e0 [ 1525.421881] kunit_try_run_case+0x170/0x3f0 [ 1525.421897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.421916] kthread+0x328/0x630 [ 1525.421928] ret_from_fork+0x10/0x20 [ 1525.421944] [ 1525.421948] Allocated by task 336: [ 1525.421955] kasan_save_stack+0x3c/0x68 [ 1525.421969] kasan_save_track+0x20/0x40 [ 1525.421984] kasan_save_alloc_info+0x40/0x58 [ 1525.421994] __kasan_kmalloc+0xd4/0xd8 [ 1525.422009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.422022] kasan_atomics+0xb8/0x2e0 [ 1525.422035] kunit_try_run_case+0x170/0x3f0 [ 1525.422048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.422064] kthread+0x328/0x630 [ 1525.422074] ret_from_fork+0x10/0x20 [ 1525.422086] [ 1525.422090] The buggy address belongs to the object at ffff000826289e00 [ 1525.422090] which belongs to the cache kmalloc-64 of size 64 [ 1525.422106] The buggy address is located 0 bytes to the right of [ 1525.422106] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.422125] [ 1525.422130] The buggy address belongs to the physical page: [ 1525.422137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.422152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.422165] page_type: f5(slab) [ 1525.422176] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.422191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.422202] page dumped because: kasan: bad access detected [ 1525.422211] [ 1525.422215] Memory state around the buggy address: [ 1525.422223] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.422236] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.422249] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.422259] ^ [ 1525.422269] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.422281] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.422292] ================================================================== [ 1525.428154] ================================================================== [ 1525.428165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 1525.428181] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.428195] [ 1525.428201] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.428227] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.428235] Hardware name: ARM Juno development board (r2) (DT) [ 1525.428245] Call trace: [ 1525.428250] show_stack+0x20/0x38 (C) [ 1525.428266] dump_stack_lvl+0x8c/0xd0 [ 1525.428282] print_report+0x118/0x608 [ 1525.428300] kasan_report+0xdc/0x128 [ 1525.428317] kasan_check_range+0x100/0x1a8 [ 1525.428336] __kasan_check_write+0x20/0x30 [ 1525.428350] kasan_atomics_helper+0x10c0/0x4858 [ 1525.428367] kasan_atomics+0x198/0x2e0 [ 1525.428382] kunit_try_run_case+0x170/0x3f0 [ 1525.428398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.428417] kthread+0x328/0x630 [ 1525.428429] ret_from_fork+0x10/0x20 [ 1525.428445] [ 1525.428449] Allocated by task 336: [ 1525.428456] kasan_save_stack+0x3c/0x68 [ 1525.428471] kasan_save_track+0x20/0x40 [ 1525.428485] kasan_save_alloc_info+0x40/0x58 [ 1525.428496] __kasan_kmalloc+0xd4/0xd8 [ 1525.428510] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.428524] kasan_atomics+0xb8/0x2e0 [ 1525.428536] kunit_try_run_case+0x170/0x3f0 [ 1525.428550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.428565] kthread+0x328/0x630 [ 1525.428575] ret_from_fork+0x10/0x20 [ 1525.428588] [ 1525.428592] The buggy address belongs to the object at ffff000826289e00 [ 1525.428592] which belongs to the cache kmalloc-64 of size 64 [ 1525.428608] The buggy address is located 0 bytes to the right of [ 1525.428608] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.428627] [ 1525.428631] The buggy address belongs to the physical page: [ 1525.428639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.428653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.428667] page_type: f5(slab) [ 1525.428678] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.428692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.428704] page dumped because: kasan: bad access detected [ 1525.428712] [ 1525.428716] Memory state around the buggy address: [ 1525.428724] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.428737] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.428749] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.428760] ^ [ 1525.428769] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.428781] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.428792] ================================================================== [ 1525.426201] ================================================================== [ 1525.426211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 1525.426226] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.426241] [ 1525.426247] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.426273] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.426281] Hardware name: ARM Juno development board (r2) (DT) [ 1525.426291] Call trace: [ 1525.426296] show_stack+0x20/0x38 (C) [ 1525.426311] dump_stack_lvl+0x8c/0xd0 [ 1525.426328] print_report+0x118/0x608 [ 1525.426346] kasan_report+0xdc/0x128 [ 1525.426362] kasan_check_range+0x100/0x1a8 [ 1525.426381] __kasan_check_write+0x20/0x30 [ 1525.426395] kasan_atomics_helper+0xf88/0x4858 [ 1525.426412] kasan_atomics+0x198/0x2e0 [ 1525.426427] kunit_try_run_case+0x170/0x3f0 [ 1525.426444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.426463] kthread+0x328/0x630 [ 1525.426475] ret_from_fork+0x10/0x20 [ 1525.426490] [ 1525.426495] Allocated by task 336: [ 1525.426502] kasan_save_stack+0x3c/0x68 [ 1525.426516] kasan_save_track+0x20/0x40 [ 1525.426531] kasan_save_alloc_info+0x40/0x58 [ 1525.426542] __kasan_kmalloc+0xd4/0xd8 [ 1525.426556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.426569] kasan_atomics+0xb8/0x2e0 [ 1525.426582] kunit_try_run_case+0x170/0x3f0 [ 1525.426596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.426612] kthread+0x328/0x630 [ 1525.426622] ret_from_fork+0x10/0x20 [ 1525.426634] [ 1525.426638] The buggy address belongs to the object at ffff000826289e00 [ 1525.426638] which belongs to the cache kmalloc-64 of size 64 [ 1525.426655] The buggy address is located 0 bytes to the right of [ 1525.426655] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.426673] [ 1525.426678] The buggy address belongs to the physical page: [ 1525.426686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.426700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.426713] page_type: f5(slab) [ 1525.426723] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.426738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.426749] page dumped because: kasan: bad access detected [ 1525.426757] [ 1525.426761] Memory state around the buggy address: [ 1525.426769] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.426782] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.426794] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.426805] ^ [ 1525.426814] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.426827] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.426837] ================================================================== [ 1525.432055] ================================================================== [ 1525.432066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 1525.432082] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.432096] [ 1525.432102] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.432128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.432136] Hardware name: ARM Juno development board (r2) (DT) [ 1525.432146] Call trace: [ 1525.432151] show_stack+0x20/0x38 (C) [ 1525.432166] dump_stack_lvl+0x8c/0xd0 [ 1525.432183] print_report+0x118/0x608 [ 1525.432200] kasan_report+0xdc/0x128 [ 1525.432217] kasan_check_range+0x100/0x1a8 [ 1525.432236] __kasan_check_write+0x20/0x30 [ 1525.432250] kasan_atomics_helper+0x1384/0x4858 [ 1525.432267] kasan_atomics+0x198/0x2e0 [ 1525.432282] kunit_try_run_case+0x170/0x3f0 [ 1525.432298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.432317] kthread+0x328/0x630 [ 1525.432329] ret_from_fork+0x10/0x20 [ 1525.432344] [ 1525.432349] Allocated by task 336: [ 1525.432356] kasan_save_stack+0x3c/0x68 [ 1525.432371] kasan_save_track+0x20/0x40 [ 1525.432385] kasan_save_alloc_info+0x40/0x58 [ 1525.432396] __kasan_kmalloc+0xd4/0xd8 [ 1525.432410] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.432424] kasan_atomics+0xb8/0x2e0 [ 1525.432437] kunit_try_run_case+0x170/0x3f0 [ 1525.432450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.432466] kthread+0x328/0x630 [ 1525.432475] ret_from_fork+0x10/0x20 [ 1525.432488] [ 1525.432492] The buggy address belongs to the object at ffff000826289e00 [ 1525.432492] which belongs to the cache kmalloc-64 of size 64 [ 1525.432508] The buggy address is located 0 bytes to the right of [ 1525.432508] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.432527] [ 1525.432532] The buggy address belongs to the physical page: [ 1525.432539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.432554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.432567] page_type: f5(slab) [ 1525.432578] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.432592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.432603] page dumped because: kasan: bad access detected [ 1525.432611] [ 1525.432616] Memory state around the buggy address: [ 1525.432624] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.432636] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.432648] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.432659] ^ [ 1525.432668] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.432680] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.432691] ================================================================== [ 1525.431395] ================================================================== [ 1525.431405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 1525.431420] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.431434] [ 1525.431440] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.431465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.431473] Hardware name: ARM Juno development board (r2) (DT) [ 1525.431483] Call trace: [ 1525.431488] show_stack+0x20/0x38 (C) [ 1525.431503] dump_stack_lvl+0x8c/0xd0 [ 1525.431520] print_report+0x118/0x608 [ 1525.431537] kasan_report+0xdc/0x128 [ 1525.431554] kasan_check_range+0x100/0x1a8 [ 1525.431573] __kasan_check_write+0x20/0x30 [ 1525.431587] kasan_atomics_helper+0x12d8/0x4858 [ 1525.431604] kasan_atomics+0x198/0x2e0 [ 1525.431620] kunit_try_run_case+0x170/0x3f0 [ 1525.431636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.431654] kthread+0x328/0x630 [ 1525.431667] ret_from_fork+0x10/0x20 [ 1525.431682] [ 1525.431686] Allocated by task 336: [ 1525.431693] kasan_save_stack+0x3c/0x68 [ 1525.431708] kasan_save_track+0x20/0x40 [ 1525.431722] kasan_save_alloc_info+0x40/0x58 [ 1525.431733] __kasan_kmalloc+0xd4/0xd8 [ 1525.431748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.431761] kasan_atomics+0xb8/0x2e0 [ 1525.431774] kunit_try_run_case+0x170/0x3f0 [ 1525.431787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.431803] kthread+0x328/0x630 [ 1525.431813] ret_from_fork+0x10/0x20 [ 1525.431825] [ 1525.431829] The buggy address belongs to the object at ffff000826289e00 [ 1525.431829] which belongs to the cache kmalloc-64 of size 64 [ 1525.431846] The buggy address is located 0 bytes to the right of [ 1525.431846] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.431865] [ 1525.431869] The buggy address belongs to the physical page: [ 1525.431877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.431892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.431904] page_type: f5(slab) [ 1525.431915] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.431929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.431941] page dumped because: kasan: bad access detected [ 1525.431949] [ 1525.431953] Memory state around the buggy address: [ 1525.431961] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.431974] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.431986] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.431996] ^ [ 1525.432005] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.432018] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.432029] ================================================================== [ 1525.432703] ================================================================== [ 1525.432713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 1525.432728] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.432742] [ 1525.432748] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.432774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.432782] Hardware name: ARM Juno development board (r2) (DT) [ 1525.432792] Call trace: [ 1525.432797] show_stack+0x20/0x38 (C) [ 1525.432812] dump_stack_lvl+0x8c/0xd0 [ 1525.432829] print_report+0x118/0x608 [ 1525.432847] kasan_report+0xdc/0x128 [ 1525.432864] __asan_report_load8_noabort+0x20/0x30 [ 1525.432880] kasan_atomics_helper+0x3f04/0x4858 [ 1525.432897] kasan_atomics+0x198/0x2e0 [ 1525.432913] kunit_try_run_case+0x170/0x3f0 [ 1525.432929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.432948] kthread+0x328/0x630 [ 1525.432960] ret_from_fork+0x10/0x20 [ 1525.432976] [ 1525.432980] Allocated by task 336: [ 1525.432987] kasan_save_stack+0x3c/0x68 [ 1525.433002] kasan_save_track+0x20/0x40 [ 1525.433016] kasan_save_alloc_info+0x40/0x58 [ 1525.433027] __kasan_kmalloc+0xd4/0xd8 [ 1525.433041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.433054] kasan_atomics+0xb8/0x2e0 [ 1525.433067] kunit_try_run_case+0x170/0x3f0 [ 1525.433081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.433096] kthread+0x328/0x630 [ 1525.433106] ret_from_fork+0x10/0x20 [ 1525.433118] [ 1525.433123] The buggy address belongs to the object at ffff000826289e00 [ 1525.433123] which belongs to the cache kmalloc-64 of size 64 [ 1525.433139] The buggy address is located 0 bytes to the right of [ 1525.433139] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.433158] [ 1525.433162] The buggy address belongs to the physical page: [ 1525.433170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.433185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.433198] page_type: f5(slab) [ 1525.433208] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.433222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.433234] page dumped because: kasan: bad access detected [ 1525.433242] [ 1525.433246] Memory state around the buggy address: [ 1525.433255] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.433267] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.433279] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.433290] ^ [ 1525.433299] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.433311] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.433322] ================================================================== [ 1525.425550] ================================================================== [ 1525.425560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 1525.425576] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.425590] [ 1525.425596] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.425622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.425630] Hardware name: ARM Juno development board (r2) (DT) [ 1525.425639] Call trace: [ 1525.425645] show_stack+0x20/0x38 (C) [ 1525.425660] dump_stack_lvl+0x8c/0xd0 [ 1525.425677] print_report+0x118/0x608 [ 1525.425695] kasan_report+0xdc/0x128 [ 1525.425712] kasan_check_range+0x100/0x1a8 [ 1525.425730] __kasan_check_write+0x20/0x30 [ 1525.425745] kasan_atomics_helper+0xf20/0x4858 [ 1525.425761] kasan_atomics+0x198/0x2e0 [ 1525.425777] kunit_try_run_case+0x170/0x3f0 [ 1525.425793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.425812] kthread+0x328/0x630 [ 1525.425824] ret_from_fork+0x10/0x20 [ 1525.425840] [ 1525.425844] Allocated by task 336: [ 1525.425852] kasan_save_stack+0x3c/0x68 [ 1525.425866] kasan_save_track+0x20/0x40 [ 1525.425880] kasan_save_alloc_info+0x40/0x58 [ 1525.425892] __kasan_kmalloc+0xd4/0xd8 [ 1525.425905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.425919] kasan_atomics+0xb8/0x2e0 [ 1525.425932] kunit_try_run_case+0x170/0x3f0 [ 1525.425945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.425962] kthread+0x328/0x630 [ 1525.425971] ret_from_fork+0x10/0x20 [ 1525.425984] [ 1525.425988] The buggy address belongs to the object at ffff000826289e00 [ 1525.425988] which belongs to the cache kmalloc-64 of size 64 [ 1525.426005] The buggy address is located 0 bytes to the right of [ 1525.426005] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.426023] [ 1525.426028] The buggy address belongs to the physical page: [ 1525.426036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.426050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.426063] page_type: f5(slab) [ 1525.426074] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.426088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.426100] page dumped because: kasan: bad access detected [ 1525.426108] [ 1525.426112] Memory state around the buggy address: [ 1525.426120] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.426133] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.426146] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.426157] ^ [ 1525.426166] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.426178] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.426189] ================================================================== [ 1525.421025] ================================================================== [ 1525.421035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 1525.421050] Write of size 4 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.421064] [ 1525.421070] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.421096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.421104] Hardware name: ARM Juno development board (r2) (DT) [ 1525.421114] Call trace: [ 1525.421119] show_stack+0x20/0x38 (C) [ 1525.421134] dump_stack_lvl+0x8c/0xd0 [ 1525.421151] print_report+0x118/0x608 [ 1525.421168] kasan_report+0xdc/0x128 [ 1525.421185] kasan_check_range+0x100/0x1a8 [ 1525.421203] __kasan_check_write+0x20/0x30 [ 1525.421218] kasan_atomics_helper+0xd3c/0x4858 [ 1525.421234] kasan_atomics+0x198/0x2e0 [ 1525.421250] kunit_try_run_case+0x170/0x3f0 [ 1525.421266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.421285] kthread+0x328/0x630 [ 1525.421297] ret_from_fork+0x10/0x20 [ 1525.421313] [ 1525.421317] Allocated by task 336: [ 1525.421325] kasan_save_stack+0x3c/0x68 [ 1525.421339] kasan_save_track+0x20/0x40 [ 1525.421353] kasan_save_alloc_info+0x40/0x58 [ 1525.421365] __kasan_kmalloc+0xd4/0xd8 [ 1525.421378] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.421392] kasan_atomics+0xb8/0x2e0 [ 1525.421405] kunit_try_run_case+0x170/0x3f0 [ 1525.421418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.421434] kthread+0x328/0x630 [ 1525.421444] ret_from_fork+0x10/0x20 [ 1525.421456] [ 1525.421460] The buggy address belongs to the object at ffff000826289e00 [ 1525.421460] which belongs to the cache kmalloc-64 of size 64 [ 1525.421477] The buggy address is located 0 bytes to the right of [ 1525.421477] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.421496] [ 1525.421500] The buggy address belongs to the physical page: [ 1525.421508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.421523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.421536] page_type: f5(slab) [ 1525.421547] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.421562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.421573] page dumped because: kasan: bad access detected [ 1525.421582] [ 1525.421586] Memory state around the buggy address: [ 1525.421594] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.421607] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.421619] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.421630] ^ [ 1525.421639] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.421651] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.421662] ================================================================== [ 1525.424900] ================================================================== [ 1525.424909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 1525.424925] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.424939] [ 1525.424945] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.424971] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.424980] Hardware name: ARM Juno development board (r2) (DT) [ 1525.424990] Call trace: [ 1525.424995] show_stack+0x20/0x38 (C) [ 1525.425010] dump_stack_lvl+0x8c/0xd0 [ 1525.425027] print_report+0x118/0x608 [ 1525.425044] kasan_report+0xdc/0x128 [ 1525.425061] kasan_check_range+0x100/0x1a8 [ 1525.425079] __kasan_check_write+0x20/0x30 [ 1525.425093] kasan_atomics_helper+0xeb8/0x4858 [ 1525.425110] kasan_atomics+0x198/0x2e0 [ 1525.425126] kunit_try_run_case+0x170/0x3f0 [ 1525.425142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.425161] kthread+0x328/0x630 [ 1525.425173] ret_from_fork+0x10/0x20 [ 1525.425189] [ 1525.425194] Allocated by task 336: [ 1525.425200] kasan_save_stack+0x3c/0x68 [ 1525.425215] kasan_save_track+0x20/0x40 [ 1525.425229] kasan_save_alloc_info+0x40/0x58 [ 1525.425241] __kasan_kmalloc+0xd4/0xd8 [ 1525.425255] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.425269] kasan_atomics+0xb8/0x2e0 [ 1525.425282] kunit_try_run_case+0x170/0x3f0 [ 1525.425295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.425311] kthread+0x328/0x630 [ 1525.425321] ret_from_fork+0x10/0x20 [ 1525.425333] [ 1525.425338] The buggy address belongs to the object at ffff000826289e00 [ 1525.425338] which belongs to the cache kmalloc-64 of size 64 [ 1525.425354] The buggy address is located 0 bytes to the right of [ 1525.425354] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.425373] [ 1525.425378] The buggy address belongs to the physical page: [ 1525.425385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.425400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.425413] page_type: f5(slab) [ 1525.425423] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.425438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.425449] page dumped because: kasan: bad access detected [ 1525.425458] [ 1525.425462] Memory state around the buggy address: [ 1525.425470] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.425483] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.425495] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.425506] ^ [ 1525.425515] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.425528] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.425538] ================================================================== [ 1525.430101] ================================================================== [ 1525.430110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 1525.430125] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.430140] [ 1525.430145] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.430171] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.430179] Hardware name: ARM Juno development board (r2) (DT) [ 1525.430189] Call trace: [ 1525.430194] show_stack+0x20/0x38 (C) [ 1525.430210] dump_stack_lvl+0x8c/0xd0 [ 1525.430226] print_report+0x118/0x608 [ 1525.430243] kasan_report+0xdc/0x128 [ 1525.430260] kasan_check_range+0x100/0x1a8 [ 1525.430279] __kasan_check_write+0x20/0x30 [ 1525.430293] kasan_atomics_helper+0x11f8/0x4858 [ 1525.430310] kasan_atomics+0x198/0x2e0 [ 1525.430326] kunit_try_run_case+0x170/0x3f0 [ 1525.430341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.430360] kthread+0x328/0x630 [ 1525.430373] ret_from_fork+0x10/0x20 [ 1525.430388] [ 1525.430392] Allocated by task 336: [ 1525.430399] kasan_save_stack+0x3c/0x68 [ 1525.430414] kasan_save_track+0x20/0x40 [ 1525.430428] kasan_save_alloc_info+0x40/0x58 [ 1525.430439] __kasan_kmalloc+0xd4/0xd8 [ 1525.430453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.430467] kasan_atomics+0xb8/0x2e0 [ 1525.430480] kunit_try_run_case+0x170/0x3f0 [ 1525.430493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.430509] kthread+0x328/0x630 [ 1525.430519] ret_from_fork+0x10/0x20 [ 1525.430531] [ 1525.430535] The buggy address belongs to the object at ffff000826289e00 [ 1525.430535] which belongs to the cache kmalloc-64 of size 64 [ 1525.430552] The buggy address is located 0 bytes to the right of [ 1525.430552] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.430571] [ 1525.430575] The buggy address belongs to the physical page: [ 1525.430583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.430597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.430610] page_type: f5(slab) [ 1525.430621] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.430635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.430647] page dumped because: kasan: bad access detected [ 1525.430655] [ 1525.430659] Memory state around the buggy address: [ 1525.430667] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.430680] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.430692] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.430702] ^ [ 1525.430712] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.430725] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.430736] ================================================================== [ 1525.437889] ================================================================== [ 1525.437899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 1525.437914] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.437928] [ 1525.437934] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.437959] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.437968] Hardware name: ARM Juno development board (r2) (DT) [ 1525.437978] Call trace: [ 1525.437983] show_stack+0x20/0x38 (C) [ 1525.437998] dump_stack_lvl+0x8c/0xd0 [ 1525.438015] print_report+0x118/0x608 [ 1525.438032] kasan_report+0xdc/0x128 [ 1525.438050] __asan_report_load8_noabort+0x20/0x30 [ 1525.438065] kasan_atomics_helper+0x3df4/0x4858 [ 1525.438082] kasan_atomics+0x198/0x2e0 [ 1525.438098] kunit_try_run_case+0x170/0x3f0 [ 1525.438115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.438134] kthread+0x328/0x630 [ 1525.438146] ret_from_fork+0x10/0x20 [ 1525.438161] [ 1525.438165] Allocated by task 336: [ 1525.438173] kasan_save_stack+0x3c/0x68 [ 1525.438187] kasan_save_track+0x20/0x40 [ 1525.438201] kasan_save_alloc_info+0x40/0x58 [ 1525.438213] __kasan_kmalloc+0xd4/0xd8 [ 1525.438226] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.438240] kasan_atomics+0xb8/0x2e0 [ 1525.438253] kunit_try_run_case+0x170/0x3f0 [ 1525.438266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.438282] kthread+0x328/0x630 [ 1525.438291] ret_from_fork+0x10/0x20 [ 1525.438304] [ 1525.438308] The buggy address belongs to the object at ffff000826289e00 [ 1525.438308] which belongs to the cache kmalloc-64 of size 64 [ 1525.438324] The buggy address is located 0 bytes to the right of [ 1525.438324] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.438343] [ 1525.438347] The buggy address belongs to the physical page: [ 1525.438355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.438370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.438383] page_type: f5(slab) [ 1525.438393] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.438408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.438419] page dumped because: kasan: bad access detected [ 1525.438428] [ 1525.438432] Memory state around the buggy address: [ 1525.438439] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.438452] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.438464] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.438475] ^ [ 1525.438483] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.438496] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.438507] ================================================================== [ 1525.433981] ================================================================== [ 1525.433990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 1525.434006] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.434020] [ 1525.434026] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.434051] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.434059] Hardware name: ARM Juno development board (r2) (DT) [ 1525.434069] Call trace: [ 1525.434074] show_stack+0x20/0x38 (C) [ 1525.434089] dump_stack_lvl+0x8c/0xd0 [ 1525.434106] print_report+0x118/0x608 [ 1525.434123] kasan_report+0xdc/0x128 [ 1525.434140] kasan_check_range+0x100/0x1a8 [ 1525.434159] __kasan_check_write+0x20/0x30 [ 1525.434173] kasan_atomics_helper+0x147c/0x4858 [ 1525.434190] kasan_atomics+0x198/0x2e0 [ 1525.434206] kunit_try_run_case+0x170/0x3f0 [ 1525.434221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.434240] kthread+0x328/0x630 [ 1525.434252] ret_from_fork+0x10/0x20 [ 1525.434268] [ 1525.434272] Allocated by task 336: [ 1525.434280] kasan_save_stack+0x3c/0x68 [ 1525.434294] kasan_save_track+0x20/0x40 [ 1525.434308] kasan_save_alloc_info+0x40/0x58 [ 1525.434320] __kasan_kmalloc+0xd4/0xd8 [ 1525.434333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.434347] kasan_atomics+0xb8/0x2e0 [ 1525.434360] kunit_try_run_case+0x170/0x3f0 [ 1525.434373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.434389] kthread+0x328/0x630 [ 1525.434398] ret_from_fork+0x10/0x20 [ 1525.434411] [ 1525.434415] The buggy address belongs to the object at ffff000826289e00 [ 1525.434415] which belongs to the cache kmalloc-64 of size 64 [ 1525.434431] The buggy address is located 0 bytes to the right of [ 1525.434431] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.434450] [ 1525.434455] The buggy address belongs to the physical page: [ 1525.434463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.434477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.434490] page_type: f5(slab) [ 1525.434500] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.434515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.434526] page dumped because: kasan: bad access detected [ 1525.434534] [ 1525.434539] Memory state around the buggy address: [ 1525.434547] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.434559] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.434571] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.434582] ^ [ 1525.434591] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.434603] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.434614] ================================================================== [ 1525.427493] ================================================================== [ 1525.427502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 1525.427518] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.427532] [ 1525.427538] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.427563] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.427571] Hardware name: ARM Juno development board (r2) (DT) [ 1525.427581] Call trace: [ 1525.427586] show_stack+0x20/0x38 (C) [ 1525.427601] dump_stack_lvl+0x8c/0xd0 [ 1525.427618] print_report+0x118/0x608 [ 1525.427635] kasan_report+0xdc/0x128 [ 1525.427652] kasan_check_range+0x100/0x1a8 [ 1525.427671] __kasan_check_write+0x20/0x30 [ 1525.427685] kasan_atomics_helper+0x1058/0x4858 [ 1525.427702] kasan_atomics+0x198/0x2e0 [ 1525.427717] kunit_try_run_case+0x170/0x3f0 [ 1525.427734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.427752] kthread+0x328/0x630 [ 1525.427765] ret_from_fork+0x10/0x20 [ 1525.427781] [ 1525.427785] Allocated by task 336: [ 1525.427792] kasan_save_stack+0x3c/0x68 [ 1525.427807] kasan_save_track+0x20/0x40 [ 1525.427821] kasan_save_alloc_info+0x40/0x58 [ 1525.427832] __kasan_kmalloc+0xd4/0xd8 [ 1525.427846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.427860] kasan_atomics+0xb8/0x2e0 [ 1525.427873] kunit_try_run_case+0x170/0x3f0 [ 1525.427886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.427902] kthread+0x328/0x630 [ 1525.427911] ret_from_fork+0x10/0x20 [ 1525.427924] [ 1525.427928] The buggy address belongs to the object at ffff000826289e00 [ 1525.427928] which belongs to the cache kmalloc-64 of size 64 [ 1525.427945] The buggy address is located 0 bytes to the right of [ 1525.427945] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.427963] [ 1525.427968] The buggy address belongs to the physical page: [ 1525.427976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.427990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.428003] page_type: f5(slab) [ 1525.428014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.428028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.428039] page dumped because: kasan: bad access detected [ 1525.428048] [ 1525.428052] Memory state around the buggy address: [ 1525.428060] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.428072] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.428085] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.428095] ^ [ 1525.428104] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.428116] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.428127] ================================================================== [ 1525.423587] ================================================================== [ 1525.423597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 1525.423612] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.423626] [ 1525.423632] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.423658] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.423666] Hardware name: ARM Juno development board (r2) (DT) [ 1525.423675] Call trace: [ 1525.423680] show_stack+0x20/0x38 (C) [ 1525.423695] dump_stack_lvl+0x8c/0xd0 [ 1525.423712] print_report+0x118/0x608 [ 1525.423729] kasan_report+0xdc/0x128 [ 1525.423746] kasan_check_range+0x100/0x1a8 [ 1525.423765] __kasan_check_write+0x20/0x30 [ 1525.423779] kasan_atomics_helper+0xe44/0x4858 [ 1525.423795] kasan_atomics+0x198/0x2e0 [ 1525.423811] kunit_try_run_case+0x170/0x3f0 [ 1525.423827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.423846] kthread+0x328/0x630 [ 1525.423859] ret_from_fork+0x10/0x20 [ 1525.423874] [ 1525.423878] Allocated by task 336: [ 1525.423885] kasan_save_stack+0x3c/0x68 [ 1525.423900] kasan_save_track+0x20/0x40 [ 1525.423914] kasan_save_alloc_info+0x40/0x58 [ 1525.423925] __kasan_kmalloc+0xd4/0xd8 [ 1525.423939] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.423953] kasan_atomics+0xb8/0x2e0 [ 1525.423965] kunit_try_run_case+0x170/0x3f0 [ 1525.423979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.423995] kthread+0x328/0x630 [ 1525.424004] ret_from_fork+0x10/0x20 [ 1525.424017] [ 1525.424021] The buggy address belongs to the object at ffff000826289e00 [ 1525.424021] which belongs to the cache kmalloc-64 of size 64 [ 1525.424037] The buggy address is located 0 bytes to the right of [ 1525.424037] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.424056] [ 1525.424060] The buggy address belongs to the physical page: [ 1525.424068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.424083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.424096] page_type: f5(slab) [ 1525.424107] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.424121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.424133] page dumped because: kasan: bad access detected [ 1525.424141] [ 1525.424145] Memory state around the buggy address: [ 1525.424154] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.424166] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.424179] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.424189] ^ [ 1525.424198] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.424211] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.424222] ================================================================== [ 1525.428804] ================================================================== [ 1525.428814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 1525.428829] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.428843] [ 1525.428849] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.428875] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.428883] Hardware name: ARM Juno development board (r2) (DT) [ 1525.428893] Call trace: [ 1525.428898] show_stack+0x20/0x38 (C) [ 1525.428914] dump_stack_lvl+0x8c/0xd0 [ 1525.428930] print_report+0x118/0x608 [ 1525.428947] kasan_report+0xdc/0x128 [ 1525.428965] kasan_check_range+0x100/0x1a8 [ 1525.428983] __kasan_check_write+0x20/0x30 [ 1525.428997] kasan_atomics_helper+0x1128/0x4858 [ 1525.429014] kasan_atomics+0x198/0x2e0 [ 1525.429030] kunit_try_run_case+0x170/0x3f0 [ 1525.429047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.429065] kthread+0x328/0x630 [ 1525.429078] ret_from_fork+0x10/0x20 [ 1525.429093] [ 1525.429097] Allocated by task 336: [ 1525.429104] kasan_save_stack+0x3c/0x68 [ 1525.429119] kasan_save_track+0x20/0x40 [ 1525.429133] kasan_save_alloc_info+0x40/0x58 [ 1525.429144] __kasan_kmalloc+0xd4/0xd8 [ 1525.429158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.429172] kasan_atomics+0xb8/0x2e0 [ 1525.429184] kunit_try_run_case+0x170/0x3f0 [ 1525.429198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.429214] kthread+0x328/0x630 [ 1525.429223] ret_from_fork+0x10/0x20 [ 1525.429235] [ 1525.429240] The buggy address belongs to the object at ffff000826289e00 [ 1525.429240] which belongs to the cache kmalloc-64 of size 64 [ 1525.429256] The buggy address is located 0 bytes to the right of [ 1525.429256] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.429275] [ 1525.429279] The buggy address belongs to the physical page: [ 1525.429287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.429302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.429315] page_type: f5(slab) [ 1525.429325] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.429340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.429351] page dumped because: kasan: bad access detected [ 1525.429360] [ 1525.429364] Memory state around the buggy address: [ 1525.429372] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.429385] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.429397] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.429408] ^ [ 1525.429416] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.429429] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.429440] ================================================================== [ 1525.438519] ================================================================== [ 1525.438528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 1525.438543] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.438557] [ 1525.438563] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.438589] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.438597] Hardware name: ARM Juno development board (r2) (DT) [ 1525.438607] Call trace: [ 1525.438612] show_stack+0x20/0x38 (C) [ 1525.438628] dump_stack_lvl+0x8c/0xd0 [ 1525.438644] print_report+0x118/0x608 [ 1525.438662] kasan_report+0xdc/0x128 [ 1525.438679] kasan_check_range+0x100/0x1a8 [ 1525.438699] __kasan_check_write+0x20/0x30 [ 1525.438713] kasan_atomics_helper+0x16d0/0x4858 [ 1525.438730] kasan_atomics+0x198/0x2e0 [ 1525.438746] kunit_try_run_case+0x170/0x3f0 [ 1525.438762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.438781] kthread+0x328/0x630 [ 1525.438794] ret_from_fork+0x10/0x20 [ 1525.438809] [ 1525.438813] Allocated by task 336: [ 1525.438821] kasan_save_stack+0x3c/0x68 [ 1525.438835] kasan_save_track+0x20/0x40 [ 1525.438849] kasan_save_alloc_info+0x40/0x58 [ 1525.438861] __kasan_kmalloc+0xd4/0xd8 [ 1525.438875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.438889] kasan_atomics+0xb8/0x2e0 [ 1525.438901] kunit_try_run_case+0x170/0x3f0 [ 1525.438915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.438930] kthread+0x328/0x630 [ 1525.438940] ret_from_fork+0x10/0x20 [ 1525.438952] [ 1525.438956] The buggy address belongs to the object at ffff000826289e00 [ 1525.438956] which belongs to the cache kmalloc-64 of size 64 [ 1525.438973] The buggy address is located 0 bytes to the right of [ 1525.438973] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.438992] [ 1525.438996] The buggy address belongs to the physical page: [ 1525.439004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.439018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.439031] page_type: f5(slab) [ 1525.439041] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.439056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.439068] page dumped because: kasan: bad access detected [ 1525.439076] [ 1525.439080] Memory state around the buggy address: [ 1525.439088] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.439100] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.439112] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.439123] ^ [ 1525.439131] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.439144] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.439155] ================================================================== [ 1525.429452] ================================================================== [ 1525.429462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 1525.429477] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.429491] [ 1525.429497] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.429523] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.429531] Hardware name: ARM Juno development board (r2) (DT) [ 1525.429541] Call trace: [ 1525.429546] show_stack+0x20/0x38 (C) [ 1525.429562] dump_stack_lvl+0x8c/0xd0 [ 1525.429578] print_report+0x118/0x608 [ 1525.429595] kasan_report+0xdc/0x128 [ 1525.429612] kasan_check_range+0x100/0x1a8 [ 1525.429631] __kasan_check_write+0x20/0x30 [ 1525.429645] kasan_atomics_helper+0x1190/0x4858 [ 1525.429663] kasan_atomics+0x198/0x2e0 [ 1525.429678] kunit_try_run_case+0x170/0x3f0 [ 1525.429694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.429713] kthread+0x328/0x630 [ 1525.429725] ret_from_fork+0x10/0x20 [ 1525.429741] [ 1525.429745] Allocated by task 336: [ 1525.429752] kasan_save_stack+0x3c/0x68 [ 1525.429767] kasan_save_track+0x20/0x40 [ 1525.429781] kasan_save_alloc_info+0x40/0x58 [ 1525.429792] __kasan_kmalloc+0xd4/0xd8 [ 1525.429806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.429819] kasan_atomics+0xb8/0x2e0 [ 1525.429832] kunit_try_run_case+0x170/0x3f0 [ 1525.429846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.429862] kthread+0x328/0x630 [ 1525.429871] ret_from_fork+0x10/0x20 [ 1525.429884] [ 1525.429888] The buggy address belongs to the object at ffff000826289e00 [ 1525.429888] which belongs to the cache kmalloc-64 of size 64 [ 1525.429905] The buggy address is located 0 bytes to the right of [ 1525.429905] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.429924] [ 1525.429928] The buggy address belongs to the physical page: [ 1525.429936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.429951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.429964] page_type: f5(slab) [ 1525.429974] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.429989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.430000] page dumped because: kasan: bad access detected [ 1525.430009] [ 1525.430013] Memory state around the buggy address: [ 1525.430021] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.430034] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.430046] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.430056] ^ [ 1525.430065] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.430078] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.430088] ================================================================== [ 1525.430748] ================================================================== [ 1525.430758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 1525.430773] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.430787] [ 1525.430793] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.430819] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.430827] Hardware name: ARM Juno development board (r2) (DT) [ 1525.430837] Call trace: [ 1525.430842] show_stack+0x20/0x38 (C) [ 1525.430858] dump_stack_lvl+0x8c/0xd0 [ 1525.430874] print_report+0x118/0x608 [ 1525.430891] kasan_report+0xdc/0x128 [ 1525.430908] kasan_check_range+0x100/0x1a8 [ 1525.430927] __kasan_check_write+0x20/0x30 [ 1525.430941] kasan_atomics_helper+0x126c/0x4858 [ 1525.430958] kasan_atomics+0x198/0x2e0 [ 1525.430974] kunit_try_run_case+0x170/0x3f0 [ 1525.430990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.431009] kthread+0x328/0x630 [ 1525.431021] ret_from_fork+0x10/0x20 [ 1525.431036] [ 1525.431040] Allocated by task 336: [ 1525.431048] kasan_save_stack+0x3c/0x68 [ 1525.431063] kasan_save_track+0x20/0x40 [ 1525.431077] kasan_save_alloc_info+0x40/0x58 [ 1525.431088] __kasan_kmalloc+0xd4/0xd8 [ 1525.431102] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.431115] kasan_atomics+0xb8/0x2e0 [ 1525.431128] kunit_try_run_case+0x170/0x3f0 [ 1525.431141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.431157] kthread+0x328/0x630 [ 1525.431166] ret_from_fork+0x10/0x20 [ 1525.431179] [ 1525.431183] The buggy address belongs to the object at ffff000826289e00 [ 1525.431183] which belongs to the cache kmalloc-64 of size 64 [ 1525.431200] The buggy address is located 0 bytes to the right of [ 1525.431200] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.431219] [ 1525.431223] The buggy address belongs to the physical page: [ 1525.431231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.431245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.431258] page_type: f5(slab) [ 1525.431269] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.431283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.431295] page dumped because: kasan: bad access detected [ 1525.431303] [ 1525.431307] Memory state around the buggy address: [ 1525.431315] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.431328] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.431340] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.431351] ^ [ 1525.431360] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.431372] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.431383] ================================================================== [ 1525.434626] ================================================================== [ 1525.434635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 1525.434650] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.434664] [ 1525.434670] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.434696] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.434705] Hardware name: ARM Juno development board (r2) (DT) [ 1525.434714] Call trace: [ 1525.434720] show_stack+0x20/0x38 (C) [ 1525.434735] dump_stack_lvl+0x8c/0xd0 [ 1525.434751] print_report+0x118/0x608 [ 1525.434769] kasan_report+0xdc/0x128 [ 1525.434786] kasan_check_range+0x100/0x1a8 [ 1525.434805] __kasan_check_write+0x20/0x30 [ 1525.434819] kasan_atomics_helper+0x14e4/0x4858 [ 1525.434837] kasan_atomics+0x198/0x2e0 [ 1525.434852] kunit_try_run_case+0x170/0x3f0 [ 1525.434868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.434887] kthread+0x328/0x630 [ 1525.434900] ret_from_fork+0x10/0x20 [ 1525.434915] [ 1525.434919] Allocated by task 336: [ 1525.434927] kasan_save_stack+0x3c/0x68 [ 1525.434941] kasan_save_track+0x20/0x40 [ 1525.434955] kasan_save_alloc_info+0x40/0x58 [ 1525.434967] __kasan_kmalloc+0xd4/0xd8 [ 1525.434980] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.434994] kasan_atomics+0xb8/0x2e0 [ 1525.435007] kunit_try_run_case+0x170/0x3f0 [ 1525.435020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.435036] kthread+0x328/0x630 [ 1525.435045] ret_from_fork+0x10/0x20 [ 1525.435058] [ 1525.435062] The buggy address belongs to the object at ffff000826289e00 [ 1525.435062] which belongs to the cache kmalloc-64 of size 64 [ 1525.435078] The buggy address is located 0 bytes to the right of [ 1525.435078] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.435097] [ 1525.435102] The buggy address belongs to the physical page: [ 1525.435109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.435124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.435137] page_type: f5(slab) [ 1525.435147] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.435161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.435173] page dumped because: kasan: bad access detected [ 1525.435181] [ 1525.435185] Memory state around the buggy address: [ 1525.435193] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.435206] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.435218] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.435229] ^ [ 1525.435238] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.435250] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.435262] ================================================================== [ 1525.435274] ================================================================== [ 1525.435284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 1525.435299] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.435313] [ 1525.435319] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.435345] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.435353] Hardware name: ARM Juno development board (r2) (DT) [ 1525.435362] Call trace: [ 1525.435368] show_stack+0x20/0x38 (C) [ 1525.435383] dump_stack_lvl+0x8c/0xd0 [ 1525.435400] print_report+0x118/0x608 [ 1525.435417] kasan_report+0xdc/0x128 [ 1525.435435] kasan_check_range+0x100/0x1a8 [ 1525.435453] __kasan_check_write+0x20/0x30 [ 1525.435467] kasan_atomics_helper+0x154c/0x4858 [ 1525.435485] kasan_atomics+0x198/0x2e0 [ 1525.435501] kunit_try_run_case+0x170/0x3f0 [ 1525.435517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.435535] kthread+0x328/0x630 [ 1525.435548] ret_from_fork+0x10/0x20 [ 1525.435564] [ 1525.435568] Allocated by task 336: [ 1525.435576] kasan_save_stack+0x3c/0x68 [ 1525.435591] kasan_save_track+0x20/0x40 [ 1525.435605] kasan_save_alloc_info+0x40/0x58 [ 1525.435617] __kasan_kmalloc+0xd4/0xd8 [ 1525.435630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.435644] kasan_atomics+0xb8/0x2e0 [ 1525.435658] kunit_try_run_case+0x170/0x3f0 [ 1525.435671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.435687] kthread+0x328/0x630 [ 1525.435697] ret_from_fork+0x10/0x20 [ 1525.435710] [ 1525.435714] The buggy address belongs to the object at ffff000826289e00 [ 1525.435714] which belongs to the cache kmalloc-64 of size 64 [ 1525.435731] The buggy address is located 0 bytes to the right of [ 1525.435731] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.435750] [ 1525.435755] The buggy address belongs to the physical page: [ 1525.435763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.435777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.435791] page_type: f5(slab) [ 1525.435801] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.435816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.435827] page dumped because: kasan: bad access detected [ 1525.435835] [ 1525.435840] Memory state around the buggy address: [ 1525.435847] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.435860] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.435872] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.435883] ^ [ 1525.435892] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.435904] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.435915] ================================================================== [ 1525.435928] ================================================================== [ 1525.435938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 1525.435953] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.435967] [ 1525.435973] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.435998] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.436007] Hardware name: ARM Juno development board (r2) (DT) [ 1525.436016] Call trace: [ 1525.436022] show_stack+0x20/0x38 (C) [ 1525.436037] dump_stack_lvl+0x8c/0xd0 [ 1525.436053] print_report+0x118/0x608 [ 1525.436071] kasan_report+0xdc/0x128 [ 1525.436088] kasan_check_range+0x100/0x1a8 [ 1525.436107] __kasan_check_write+0x20/0x30 [ 1525.436121] kasan_atomics_helper+0x15b4/0x4858 [ 1525.436139] kasan_atomics+0x198/0x2e0 [ 1525.436154] kunit_try_run_case+0x170/0x3f0 [ 1525.436170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.436189] kthread+0x328/0x630 [ 1525.436201] ret_from_fork+0x10/0x20 [ 1525.436217] [ 1525.436221] Allocated by task 336: [ 1525.436228] kasan_save_stack+0x3c/0x68 [ 1525.436243] kasan_save_track+0x20/0x40 [ 1525.436257] kasan_save_alloc_info+0x40/0x58 [ 1525.436269] __kasan_kmalloc+0xd4/0xd8 [ 1525.436282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.436296] kasan_atomics+0xb8/0x2e0 [ 1525.436309] kunit_try_run_case+0x170/0x3f0 [ 1525.436322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.436338] kthread+0x328/0x630 [ 1525.436348] ret_from_fork+0x10/0x20 [ 1525.436360] [ 1525.436364] The buggy address belongs to the object at ffff000826289e00 [ 1525.436364] which belongs to the cache kmalloc-64 of size 64 [ 1525.436381] The buggy address is located 0 bytes to the right of [ 1525.436381] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.436400] [ 1525.436404] The buggy address belongs to the physical page: [ 1525.436412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.436426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.436440] page_type: f5(slab) [ 1525.436450] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.436465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.436476] page dumped because: kasan: bad access detected [ 1525.436484] [ 1525.436488] Memory state around the buggy address: [ 1525.436496] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.436509] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.436521] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.436532] ^ [ 1525.436541] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.436554] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.436565] ================================================================== [ 1525.439796] ================================================================== [ 1525.439806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 1525.439821] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.439835] [ 1525.439841] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.439867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.439875] Hardware name: ARM Juno development board (r2) (DT) [ 1525.439885] Call trace: [ 1525.439890] show_stack+0x20/0x38 (C) [ 1525.439906] dump_stack_lvl+0x8c/0xd0 [ 1525.439923] print_report+0x118/0x608 [ 1525.439940] kasan_report+0xdc/0x128 [ 1525.439958] kasan_check_range+0x100/0x1a8 [ 1525.439976] __kasan_check_write+0x20/0x30 [ 1525.439990] kasan_atomics_helper+0x175c/0x4858 [ 1525.440007] kasan_atomics+0x198/0x2e0 [ 1525.440023] kunit_try_run_case+0x170/0x3f0 [ 1525.440040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.440059] kthread+0x328/0x630 [ 1525.440071] ret_from_fork+0x10/0x20 [ 1525.440087] [ 1525.440091] Allocated by task 336: [ 1525.440098] kasan_save_stack+0x3c/0x68 [ 1525.440112] kasan_save_track+0x20/0x40 [ 1525.440127] kasan_save_alloc_info+0x40/0x58 [ 1525.440137] __kasan_kmalloc+0xd4/0xd8 [ 1525.440152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.440166] kasan_atomics+0xb8/0x2e0 [ 1525.440178] kunit_try_run_case+0x170/0x3f0 [ 1525.440192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.440208] kthread+0x328/0x630 [ 1525.440217] ret_from_fork+0x10/0x20 [ 1525.440230] [ 1525.440234] The buggy address belongs to the object at ffff000826289e00 [ 1525.440234] which belongs to the cache kmalloc-64 of size 64 [ 1525.440250] The buggy address is located 0 bytes to the right of [ 1525.440250] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.440269] [ 1525.440274] The buggy address belongs to the physical page: [ 1525.440281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.440295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.440309] page_type: f5(slab) [ 1525.440319] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.440334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.440345] page dumped because: kasan: bad access detected [ 1525.440353] [ 1525.440358] Memory state around the buggy address: [ 1525.440366] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.440378] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.440391] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.440402] ^ [ 1525.440410] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.440422] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.440433] ================================================================== [ 1525.440460] ================================================================== [ 1525.440471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 1525.440487] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.440501] [ 1525.440507] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.440533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.440541] Hardware name: ARM Juno development board (r2) (DT) [ 1525.440550] Call trace: [ 1525.440556] show_stack+0x20/0x38 (C) [ 1525.440571] dump_stack_lvl+0x8c/0xd0 [ 1525.440588] print_report+0x118/0x608 [ 1525.440605] kasan_report+0xdc/0x128 [ 1525.440623] __asan_report_load8_noabort+0x20/0x30 [ 1525.440638] kasan_atomics_helper+0x3e20/0x4858 [ 1525.440655] kasan_atomics+0x198/0x2e0 [ 1525.440671] kunit_try_run_case+0x170/0x3f0 [ 1525.440687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.440706] kthread+0x328/0x630 [ 1525.440719] ret_from_fork+0x10/0x20 [ 1525.440735] [ 1525.440739] Allocated by task 336: [ 1525.440746] kasan_save_stack+0x3c/0x68 [ 1525.440761] kasan_save_track+0x20/0x40 [ 1525.440775] kasan_save_alloc_info+0x40/0x58 [ 1525.440786] __kasan_kmalloc+0xd4/0xd8 [ 1525.440799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.440813] kasan_atomics+0xb8/0x2e0 [ 1525.440826] kunit_try_run_case+0x170/0x3f0 [ 1525.440839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.440855] kthread+0x328/0x630 [ 1525.440864] ret_from_fork+0x10/0x20 [ 1525.440877] [ 1525.440881] The buggy address belongs to the object at ffff000826289e00 [ 1525.440881] which belongs to the cache kmalloc-64 of size 64 [ 1525.440898] The buggy address is located 0 bytes to the right of [ 1525.440898] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.440917] [ 1525.440921] The buggy address belongs to the physical page: [ 1525.440929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.440944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.440957] page_type: f5(slab) [ 1525.440967] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.440982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.440993] page dumped because: kasan: bad access detected [ 1525.441002] [ 1525.441006] Memory state around the buggy address: [ 1525.441014] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.441026] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.441038] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.441049] ^ [ 1525.441058] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.441070] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.441080] ================================================================== [ 1525.436607] ================================================================== [ 1525.436619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 1525.436635] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.436649] [ 1525.436655] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.436682] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.436690] Hardware name: ARM Juno development board (r2) (DT) [ 1525.436700] Call trace: [ 1525.436705] show_stack+0x20/0x38 (C) [ 1525.436721] dump_stack_lvl+0x8c/0xd0 [ 1525.436738] print_report+0x118/0x608 [ 1525.436755] kasan_report+0xdc/0x128 [ 1525.436772] __asan_report_load8_noabort+0x20/0x30 [ 1525.436787] kasan_atomics_helper+0x3db0/0x4858 [ 1525.436805] kasan_atomics+0x198/0x2e0 [ 1525.436821] kunit_try_run_case+0x170/0x3f0 [ 1525.436837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.436855] kthread+0x328/0x630 [ 1525.436867] ret_from_fork+0x10/0x20 [ 1525.436883] [ 1525.436887] Allocated by task 336: [ 1525.436894] kasan_save_stack+0x3c/0x68 [ 1525.436909] kasan_save_track+0x20/0x40 [ 1525.436923] kasan_save_alloc_info+0x40/0x58 [ 1525.436934] __kasan_kmalloc+0xd4/0xd8 [ 1525.436949] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.436962] kasan_atomics+0xb8/0x2e0 [ 1525.436975] kunit_try_run_case+0x170/0x3f0 [ 1525.436988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.437004] kthread+0x328/0x630 [ 1525.437013] ret_from_fork+0x10/0x20 [ 1525.437026] [ 1525.437030] The buggy address belongs to the object at ffff000826289e00 [ 1525.437030] which belongs to the cache kmalloc-64 of size 64 [ 1525.437047] The buggy address is located 0 bytes to the right of [ 1525.437047] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.437066] [ 1525.437070] The buggy address belongs to the physical page: [ 1525.437078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.437093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.437106] page_type: f5(slab) [ 1525.437117] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.437131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.437142] page dumped because: kasan: bad access detected [ 1525.437151] [ 1525.437155] Memory state around the buggy address: [ 1525.437163] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.437176] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.437188] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.437198] ^ [ 1525.437207] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.437220] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.437231] ================================================================== [ 1525.441093] ================================================================== [ 1525.441103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 1525.441118] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.441132] [ 1525.441138] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.441164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.441172] Hardware name: ARM Juno development board (r2) (DT) [ 1525.441181] Call trace: [ 1525.441187] show_stack+0x20/0x38 (C) [ 1525.441202] dump_stack_lvl+0x8c/0xd0 [ 1525.441219] print_report+0x118/0x608 [ 1525.441237] kasan_report+0xdc/0x128 [ 1525.441254] kasan_check_range+0x100/0x1a8 [ 1525.441273] __kasan_check_write+0x20/0x30 [ 1525.441288] kasan_atomics_helper+0x17ec/0x4858 [ 1525.441305] kasan_atomics+0x198/0x2e0 [ 1525.441321] kunit_try_run_case+0x170/0x3f0 [ 1525.441337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.441356] kthread+0x328/0x630 [ 1525.441369] ret_from_fork+0x10/0x20 [ 1525.441384] [ 1525.441389] Allocated by task 336: [ 1525.441396] kasan_save_stack+0x3c/0x68 [ 1525.441410] kasan_save_track+0x20/0x40 [ 1525.441424] kasan_save_alloc_info+0x40/0x58 [ 1525.441435] __kasan_kmalloc+0xd4/0xd8 [ 1525.441449] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.441463] kasan_atomics+0xb8/0x2e0 [ 1525.441476] kunit_try_run_case+0x170/0x3f0 [ 1525.441489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.441505] kthread+0x328/0x630 [ 1525.441514] ret_from_fork+0x10/0x20 [ 1525.441527] [ 1525.441532] The buggy address belongs to the object at ffff000826289e00 [ 1525.441532] which belongs to the cache kmalloc-64 of size 64 [ 1525.441548] The buggy address is located 0 bytes to the right of [ 1525.441548] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.441567] [ 1525.441571] The buggy address belongs to the physical page: [ 1525.441579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.441593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.441606] page_type: f5(slab) [ 1525.441617] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.441632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.441643] page dumped because: kasan: bad access detected [ 1525.441651] [ 1525.441655] Memory state around the buggy address: [ 1525.441663] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.441676] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.441688] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.441699] ^ [ 1525.441708] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.441720] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.441731] ================================================================== [ 1525.433334] ================================================================== [ 1525.433344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 1525.433359] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.433373] [ 1525.433379] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.433405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.433413] Hardware name: ARM Juno development board (r2) (DT) [ 1525.433423] Call trace: [ 1525.433428] show_stack+0x20/0x38 (C) [ 1525.433443] dump_stack_lvl+0x8c/0xd0 [ 1525.433460] print_report+0x118/0x608 [ 1525.433477] kasan_report+0xdc/0x128 [ 1525.433494] kasan_check_range+0x100/0x1a8 [ 1525.433513] __kasan_check_write+0x20/0x30 [ 1525.433527] kasan_atomics_helper+0x1414/0x4858 [ 1525.433544] kasan_atomics+0x198/0x2e0 [ 1525.433560] kunit_try_run_case+0x170/0x3f0 [ 1525.433576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.433594] kthread+0x328/0x630 [ 1525.433606] ret_from_fork+0x10/0x20 [ 1525.433622] [ 1525.433626] Allocated by task 336: [ 1525.433633] kasan_save_stack+0x3c/0x68 [ 1525.433648] kasan_save_track+0x20/0x40 [ 1525.433662] kasan_save_alloc_info+0x40/0x58 [ 1525.433673] __kasan_kmalloc+0xd4/0xd8 [ 1525.433687] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.433701] kasan_atomics+0xb8/0x2e0 [ 1525.433714] kunit_try_run_case+0x170/0x3f0 [ 1525.433727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.433742] kthread+0x328/0x630 [ 1525.433752] ret_from_fork+0x10/0x20 [ 1525.433764] [ 1525.433769] The buggy address belongs to the object at ffff000826289e00 [ 1525.433769] which belongs to the cache kmalloc-64 of size 64 [ 1525.433785] The buggy address is located 0 bytes to the right of [ 1525.433785] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.433804] [ 1525.433809] The buggy address belongs to the physical page: [ 1525.433816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.433831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.433844] page_type: f5(slab) [ 1525.433855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.433869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.433880] page dumped because: kasan: bad access detected [ 1525.433888] [ 1525.433893] Memory state around the buggy address: [ 1525.433901] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.433913] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.433925] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.433936] ^ [ 1525.433945] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.433958] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.433968] ==================================================================
[ 29.816823] ================================================================== [ 29.816870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 29.816919] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.816981] [ 29.817012] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.817114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.817142] Hardware name: linux,dummy-virt (DT) [ 29.817283] Call trace: [ 29.817317] show_stack+0x20/0x38 (C) [ 29.817371] dump_stack_lvl+0x8c/0xd0 [ 29.818073] print_report+0x118/0x608 [ 29.818163] kasan_report+0xdc/0x128 [ 29.818672] kasan_check_range+0x100/0x1a8 [ 29.818733] __kasan_check_write+0x20/0x30 [ 29.818807] kasan_atomics_helper+0x15b4/0x4858 [ 29.818873] kasan_atomics+0x198/0x2e0 [ 29.818930] kunit_try_run_case+0x170/0x3f0 [ 29.819136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.819224] kthread+0x328/0x630 [ 29.819270] ret_from_fork+0x10/0x20 [ 29.819346] [ 29.819377] Allocated by task 277: [ 29.819750] kasan_save_stack+0x3c/0x68 [ 29.820030] kasan_save_track+0x20/0x40 [ 29.820229] kasan_save_alloc_info+0x40/0x58 [ 29.820288] __kasan_kmalloc+0xd4/0xd8 [ 29.820328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.820375] kasan_atomics+0xb8/0x2e0 [ 29.820415] kunit_try_run_case+0x170/0x3f0 [ 29.820627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.820984] kthread+0x328/0x630 [ 29.821241] ret_from_fork+0x10/0x20 [ 29.821479] [ 29.821816] The buggy address belongs to the object at fff00000c451ca00 [ 29.821816] which belongs to the cache kmalloc-64 of size 64 [ 29.821890] The buggy address is located 0 bytes to the right of [ 29.821890] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.822310] [ 29.822463] The buggy address belongs to the physical page: [ 29.822709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.822820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.823073] page_type: f5(slab) [ 29.823173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.823433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.823478] page dumped because: kasan: bad access detected [ 29.823557] [ 29.823968] Memory state around the buggy address: [ 29.824031] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.824357] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.824671] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.824725] ^ [ 29.825065] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.825500] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.825736] ================================================================== [ 29.843464] ================================================================== [ 29.843604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 29.843841] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.843976] [ 29.844026] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.844298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.844497] Hardware name: linux,dummy-virt (DT) [ 29.844553] Call trace: [ 29.845143] show_stack+0x20/0x38 (C) [ 29.845300] dump_stack_lvl+0x8c/0xd0 [ 29.845413] print_report+0x118/0x608 [ 29.845462] kasan_report+0xdc/0x128 [ 29.845698] __asan_report_load8_noabort+0x20/0x30 [ 29.845777] kasan_atomics_helper+0x3df4/0x4858 [ 29.846832] kasan_atomics+0x198/0x2e0 [ 29.846925] kunit_try_run_case+0x170/0x3f0 [ 29.846979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.847067] kthread+0x328/0x630 [ 29.847162] ret_from_fork+0x10/0x20 [ 29.847262] [ 29.847438] Allocated by task 277: [ 29.847807] kasan_save_stack+0x3c/0x68 [ 29.848264] kasan_save_track+0x20/0x40 [ 29.848534] kasan_save_alloc_info+0x40/0x58 [ 29.848683] __kasan_kmalloc+0xd4/0xd8 [ 29.848729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.848771] kasan_atomics+0xb8/0x2e0 [ 29.849047] kunit_try_run_case+0x170/0x3f0 [ 29.849507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.849759] kthread+0x328/0x630 [ 29.849804] ret_from_fork+0x10/0x20 [ 29.849954] [ 29.850178] The buggy address belongs to the object at fff00000c451ca00 [ 29.850178] which belongs to the cache kmalloc-64 of size 64 [ 29.850345] The buggy address is located 0 bytes to the right of [ 29.850345] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.850561] [ 29.850602] The buggy address belongs to the physical page: [ 29.850636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.850719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.850770] page_type: f5(slab) [ 29.850809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.850870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.850912] page dumped because: kasan: bad access detected [ 29.850955] [ 29.850980] Memory state around the buggy address: [ 29.851011] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.851066] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.851111] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.851161] ^ [ 29.851197] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.851242] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.851292] ================================================================== [ 29.598943] ================================================================== [ 29.598996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.599253] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.599329] [ 29.599362] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.599564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.599663] Hardware name: linux,dummy-virt (DT) [ 29.599729] Call trace: [ 29.599756] show_stack+0x20/0x38 (C) [ 29.600119] dump_stack_lvl+0x8c/0xd0 [ 29.600180] print_report+0x118/0x608 [ 29.600230] kasan_report+0xdc/0x128 [ 29.600425] __asan_report_load4_noabort+0x20/0x30 [ 29.600531] kasan_atomics_helper+0x3dd8/0x4858 [ 29.600981] kasan_atomics+0x198/0x2e0 [ 29.601593] kunit_try_run_case+0x170/0x3f0 [ 29.601811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.601958] kthread+0x328/0x630 [ 29.602295] ret_from_fork+0x10/0x20 [ 29.602698] [ 29.602784] Allocated by task 277: [ 29.602846] kasan_save_stack+0x3c/0x68 [ 29.602904] kasan_save_track+0x20/0x40 [ 29.602951] kasan_save_alloc_info+0x40/0x58 [ 29.603000] __kasan_kmalloc+0xd4/0xd8 [ 29.603040] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.603091] kasan_atomics+0xb8/0x2e0 [ 29.603139] kunit_try_run_case+0x170/0x3f0 [ 29.603184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.603233] kthread+0x328/0x630 [ 29.603287] ret_from_fork+0x10/0x20 [ 29.603323] [ 29.603345] The buggy address belongs to the object at fff00000c451ca00 [ 29.603345] which belongs to the cache kmalloc-64 of size 64 [ 29.603404] The buggy address is located 0 bytes to the right of [ 29.603404] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.603469] [ 29.603500] The buggy address belongs to the physical page: [ 29.603553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.603608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.603658] page_type: f5(slab) [ 29.603718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.603799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.603841] page dumped because: kasan: bad access detected [ 29.603874] [ 29.603909] Memory state around the buggy address: [ 29.603943] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.603997] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.604042] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.604120] ^ [ 29.604260] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605228] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605513] ================================================================== [ 29.792773] ================================================================== [ 29.792920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 29.793144] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.793270] [ 29.793304] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.793394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.793604] Hardware name: linux,dummy-virt (DT) [ 29.793645] Call trace: [ 29.793668] show_stack+0x20/0x38 (C) [ 29.793722] dump_stack_lvl+0x8c/0xd0 [ 29.793770] print_report+0x118/0x608 [ 29.793961] kasan_report+0xdc/0x128 [ 29.794026] kasan_check_range+0x100/0x1a8 [ 29.794098] __kasan_check_write+0x20/0x30 [ 29.794147] kasan_atomics_helper+0x147c/0x4858 [ 29.794202] kasan_atomics+0x198/0x2e0 [ 29.794260] kunit_try_run_case+0x170/0x3f0 [ 29.794311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.794365] kthread+0x328/0x630 [ 29.794409] ret_from_fork+0x10/0x20 [ 29.794468] [ 29.794497] Allocated by task 277: [ 29.794528] kasan_save_stack+0x3c/0x68 [ 29.794571] kasan_save_track+0x20/0x40 [ 29.794618] kasan_save_alloc_info+0x40/0x58 [ 29.794659] __kasan_kmalloc+0xd4/0xd8 [ 29.794698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.794747] kasan_atomics+0xb8/0x2e0 [ 29.794799] kunit_try_run_case+0x170/0x3f0 [ 29.794840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.794896] kthread+0x328/0x630 [ 29.794934] ret_from_fork+0x10/0x20 [ 29.794972] [ 29.794993] The buggy address belongs to the object at fff00000c451ca00 [ 29.794993] which belongs to the cache kmalloc-64 of size 64 [ 29.795062] The buggy address is located 0 bytes to the right of [ 29.795062] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.795839] [ 29.795887] The buggy address belongs to the physical page: [ 29.795922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.795977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.796027] page_type: f5(slab) [ 29.796418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.796670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.797205] page dumped because: kasan: bad access detected [ 29.797390] [ 29.797415] Memory state around the buggy address: [ 29.797626] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.797878] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.797954] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.798219] ^ [ 29.798437] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.798775] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.798825] ================================================================== [ 29.711766] ================================================================== [ 29.711835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.711919] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.711990] [ 29.712068] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.712158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.712199] Hardware name: linux,dummy-virt (DT) [ 29.712383] Call trace: [ 29.712444] show_stack+0x20/0x38 (C) [ 29.712572] dump_stack_lvl+0x8c/0xd0 [ 29.712715] print_report+0x118/0x608 [ 29.713008] kasan_report+0xdc/0x128 [ 29.713125] kasan_check_range+0x100/0x1a8 [ 29.713308] __kasan_check_write+0x20/0x30 [ 29.713405] kasan_atomics_helper+0x10c0/0x4858 [ 29.713464] kasan_atomics+0x198/0x2e0 [ 29.714187] kunit_try_run_case+0x170/0x3f0 [ 29.714277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.714336] kthread+0x328/0x630 [ 29.714681] ret_from_fork+0x10/0x20 [ 29.715132] [ 29.715212] Allocated by task 277: [ 29.715318] kasan_save_stack+0x3c/0x68 [ 29.715506] kasan_save_track+0x20/0x40 [ 29.715755] kasan_save_alloc_info+0x40/0x58 [ 29.716028] __kasan_kmalloc+0xd4/0xd8 [ 29.716194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.716395] kasan_atomics+0xb8/0x2e0 [ 29.716444] kunit_try_run_case+0x170/0x3f0 [ 29.716609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.716860] kthread+0x328/0x630 [ 29.717071] ret_from_fork+0x10/0x20 [ 29.717237] [ 29.717267] The buggy address belongs to the object at fff00000c451ca00 [ 29.717267] which belongs to the cache kmalloc-64 of size 64 [ 29.717481] The buggy address is located 0 bytes to the right of [ 29.717481] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.717724] [ 29.717763] The buggy address belongs to the physical page: [ 29.717928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.718185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.718244] page_type: f5(slab) [ 29.718516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.718804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.718853] page dumped because: kasan: bad access detected [ 29.719080] [ 29.719220] Memory state around the buggy address: [ 29.719608] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.719674] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.719866] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.720141] ^ [ 29.720188] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720375] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720469] ================================================================== [ 29.811518] ================================================================== [ 29.811753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 29.811817] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.811867] [ 29.811909] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.812140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.812435] Hardware name: linux,dummy-virt (DT) [ 29.812647] Call trace: [ 29.812891] show_stack+0x20/0x38 (C) [ 29.812976] dump_stack_lvl+0x8c/0xd0 [ 29.813114] print_report+0x118/0x608 [ 29.813404] kasan_report+0xdc/0x128 [ 29.813695] kasan_check_range+0x100/0x1a8 [ 29.813912] __kasan_check_write+0x20/0x30 [ 29.814330] kasan_atomics_helper+0x154c/0x4858 [ 29.814584] kasan_atomics+0x198/0x2e0 [ 29.814711] kunit_try_run_case+0x170/0x3f0 [ 29.814831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.814937] kthread+0x328/0x630 [ 29.815116] ret_from_fork+0x10/0x20 [ 29.815193] [ 29.815220] Allocated by task 277: [ 29.815265] kasan_save_stack+0x3c/0x68 [ 29.815309] kasan_save_track+0x20/0x40 [ 29.815350] kasan_save_alloc_info+0x40/0x58 [ 29.815388] __kasan_kmalloc+0xd4/0xd8 [ 29.815428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.815477] kasan_atomics+0xb8/0x2e0 [ 29.815517] kunit_try_run_case+0x170/0x3f0 [ 29.815557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.815619] kthread+0x328/0x630 [ 29.815663] ret_from_fork+0x10/0x20 [ 29.815702] [ 29.815722] The buggy address belongs to the object at fff00000c451ca00 [ 29.815722] which belongs to the cache kmalloc-64 of size 64 [ 29.815781] The buggy address is located 0 bytes to the right of [ 29.815781] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.815847] [ 29.815888] The buggy address belongs to the physical page: [ 29.815939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.815994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.816051] page_type: f5(slab) [ 29.816100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.816152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.816194] page dumped because: kasan: bad access detected [ 29.816226] [ 29.816247] Memory state around the buggy address: [ 29.816284] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816329] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816379] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.816442] ^ [ 29.816499] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.816542] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.816590] ================================================================== [ 29.730174] ================================================================== [ 29.730230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.730283] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.730341] [ 29.730517] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.730776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.730980] Hardware name: linux,dummy-virt (DT) [ 29.731025] Call trace: [ 29.731092] show_stack+0x20/0x38 (C) [ 29.731302] dump_stack_lvl+0x8c/0xd0 [ 29.731440] print_report+0x118/0x608 [ 29.731494] kasan_report+0xdc/0x128 [ 29.731541] kasan_check_range+0x100/0x1a8 [ 29.731592] __kasan_check_write+0x20/0x30 [ 29.731638] kasan_atomics_helper+0x1190/0x4858 [ 29.731688] kasan_atomics+0x198/0x2e0 [ 29.732049] kunit_try_run_case+0x170/0x3f0 [ 29.732291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.732472] kthread+0x328/0x630 [ 29.732718] ret_from_fork+0x10/0x20 [ 29.733161] [ 29.733186] Allocated by task 277: [ 29.733255] kasan_save_stack+0x3c/0x68 [ 29.733475] kasan_save_track+0x20/0x40 [ 29.733551] kasan_save_alloc_info+0x40/0x58 [ 29.733724] __kasan_kmalloc+0xd4/0xd8 [ 29.733948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.734000] kasan_atomics+0xb8/0x2e0 [ 29.734326] kunit_try_run_case+0x170/0x3f0 [ 29.734488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.734689] kthread+0x328/0x630 [ 29.734741] ret_from_fork+0x10/0x20 [ 29.734780] [ 29.734801] The buggy address belongs to the object at fff00000c451ca00 [ 29.734801] which belongs to the cache kmalloc-64 of size 64 [ 29.735030] The buggy address is located 0 bytes to the right of [ 29.735030] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.735156] [ 29.735197] The buggy address belongs to the physical page: [ 29.735233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.735287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.735334] page_type: f5(slab) [ 29.735376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.735435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.735487] page dumped because: kasan: bad access detected [ 29.735530] [ 29.735549] Memory state around the buggy address: [ 29.735582] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.735634] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.735677] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.735726] ^ [ 29.735793] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736072] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736156] ================================================================== [ 29.747747] ================================================================== [ 29.747871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.747981] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.748032] [ 29.748073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.748400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.748462] Hardware name: linux,dummy-virt (DT) [ 29.748589] Call trace: [ 29.748648] show_stack+0x20/0x38 (C) [ 29.748847] dump_stack_lvl+0x8c/0xd0 [ 29.749083] print_report+0x118/0x608 [ 29.749260] kasan_report+0xdc/0x128 [ 29.749403] kasan_check_range+0x100/0x1a8 [ 29.749510] __kasan_check_write+0x20/0x30 [ 29.749712] kasan_atomics_helper+0x126c/0x4858 [ 29.749906] kasan_atomics+0x198/0x2e0 [ 29.750221] kunit_try_run_case+0x170/0x3f0 [ 29.750296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.750352] kthread+0x328/0x630 [ 29.750516] ret_from_fork+0x10/0x20 [ 29.750589] [ 29.750622] Allocated by task 277: [ 29.750660] kasan_save_stack+0x3c/0x68 [ 29.750712] kasan_save_track+0x20/0x40 [ 29.750760] kasan_save_alloc_info+0x40/0x58 [ 29.750800] __kasan_kmalloc+0xd4/0xd8 [ 29.750839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.750880] kasan_atomics+0xb8/0x2e0 [ 29.750916] kunit_try_run_case+0x170/0x3f0 [ 29.750967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.751014] kthread+0x328/0x630 [ 29.751333] ret_from_fork+0x10/0x20 [ 29.751653] [ 29.751715] The buggy address belongs to the object at fff00000c451ca00 [ 29.751715] which belongs to the cache kmalloc-64 of size 64 [ 29.752149] The buggy address is located 0 bytes to the right of [ 29.752149] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.752406] [ 29.752432] The buggy address belongs to the physical page: [ 29.752467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.752522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.752571] page_type: f5(slab) [ 29.752610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.753241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.753580] page dumped because: kasan: bad access detected [ 29.753819] [ 29.753867] Memory state around the buggy address: [ 29.754229] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.754491] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.754750] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.754801] ^ [ 29.754839] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.755071] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.755318] ================================================================== [ 29.774088] ================================================================== [ 29.774441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 29.774785] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.774964] [ 29.775073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.775500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.775710] Hardware name: linux,dummy-virt (DT) [ 29.775803] Call trace: [ 29.775828] show_stack+0x20/0x38 (C) [ 29.775884] dump_stack_lvl+0x8c/0xd0 [ 29.776003] print_report+0x118/0x608 [ 29.776070] kasan_report+0xdc/0x128 [ 29.776118] __asan_report_load8_noabort+0x20/0x30 [ 29.776167] kasan_atomics_helper+0x3f04/0x4858 [ 29.776219] kasan_atomics+0x198/0x2e0 [ 29.776266] kunit_try_run_case+0x170/0x3f0 [ 29.776318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.776384] kthread+0x328/0x630 [ 29.776430] ret_from_fork+0x10/0x20 [ 29.776482] [ 29.776511] Allocated by task 277: [ 29.776551] kasan_save_stack+0x3c/0x68 [ 29.776605] kasan_save_track+0x20/0x40 [ 29.776650] kasan_save_alloc_info+0x40/0x58 [ 29.776689] __kasan_kmalloc+0xd4/0xd8 [ 29.776728] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.776769] kasan_atomics+0xb8/0x2e0 [ 29.776808] kunit_try_run_case+0x170/0x3f0 [ 29.776862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.776909] kthread+0x328/0x630 [ 29.776949] ret_from_fork+0x10/0x20 [ 29.776997] [ 29.777017] The buggy address belongs to the object at fff00000c451ca00 [ 29.777017] which belongs to the cache kmalloc-64 of size 64 [ 29.777398] The buggy address is located 0 bytes to the right of [ 29.777398] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.777807] [ 29.777863] The buggy address belongs to the physical page: [ 29.777915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.777987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.778463] page_type: f5(slab) [ 29.778797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.778993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.779120] page dumped because: kasan: bad access detected [ 29.779201] [ 29.779595] Memory state around the buggy address: [ 29.779711] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.779959] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.780035] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.780142] ^ [ 29.780447] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780503] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780940] ================================================================== [ 29.525954] ================================================================== [ 29.526038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.526114] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.526173] [ 29.526204] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.526291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.526320] Hardware name: linux,dummy-virt (DT) [ 29.526468] Call trace: [ 29.526501] show_stack+0x20/0x38 (C) [ 29.526554] dump_stack_lvl+0x8c/0xd0 [ 29.526603] print_report+0x118/0x608 [ 29.526653] kasan_report+0xdc/0x128 [ 29.526700] kasan_check_range+0x100/0x1a8 [ 29.526751] __kasan_check_write+0x20/0x30 [ 29.526823] kasan_atomics_helper+0xa6c/0x4858 [ 29.526874] kasan_atomics+0x198/0x2e0 [ 29.526930] kunit_try_run_case+0x170/0x3f0 [ 29.526978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.527032] kthread+0x328/0x630 [ 29.527661] ret_from_fork+0x10/0x20 [ 29.527722] [ 29.527742] Allocated by task 277: [ 29.527806] kasan_save_stack+0x3c/0x68 [ 29.527930] kasan_save_track+0x20/0x40 [ 29.528120] kasan_save_alloc_info+0x40/0x58 [ 29.528239] __kasan_kmalloc+0xd4/0xd8 [ 29.528462] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.528776] kasan_atomics+0xb8/0x2e0 [ 29.528922] kunit_try_run_case+0x170/0x3f0 [ 29.529068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.529180] kthread+0x328/0x630 [ 29.529692] ret_from_fork+0x10/0x20 [ 29.529902] [ 29.529946] The buggy address belongs to the object at fff00000c451ca00 [ 29.529946] which belongs to the cache kmalloc-64 of size 64 [ 29.530041] The buggy address is located 0 bytes to the right of [ 29.530041] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.530151] [ 29.530346] The buggy address belongs to the physical page: [ 29.530521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.530776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.531022] page_type: f5(slab) [ 29.531123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.531285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.531420] page dumped because: kasan: bad access detected [ 29.531460] [ 29.531501] Memory state around the buggy address: [ 29.531999] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.532156] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.532325] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.532614] ^ [ 29.532763] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.532837] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.533031] ================================================================== [ 29.781485] ================================================================== [ 29.781746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 29.782076] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.782450] [ 29.782525] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.782624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.782831] Hardware name: linux,dummy-virt (DT) [ 29.782877] Call trace: [ 29.782907] show_stack+0x20/0x38 (C) [ 29.782960] dump_stack_lvl+0x8c/0xd0 [ 29.783435] print_report+0x118/0x608 [ 29.783520] kasan_report+0xdc/0x128 [ 29.783574] kasan_check_range+0x100/0x1a8 [ 29.783802] __kasan_check_write+0x20/0x30 [ 29.783871] kasan_atomics_helper+0x1414/0x4858 [ 29.783923] kasan_atomics+0x198/0x2e0 [ 29.783970] kunit_try_run_case+0x170/0x3f0 [ 29.784019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.784460] kthread+0x328/0x630 [ 29.784729] ret_from_fork+0x10/0x20 [ 29.784888] [ 29.784996] Allocated by task 277: [ 29.785597] kasan_save_stack+0x3c/0x68 [ 29.785752] kasan_save_track+0x20/0x40 [ 29.786066] kasan_save_alloc_info+0x40/0x58 [ 29.786464] __kasan_kmalloc+0xd4/0xd8 [ 29.786645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.786986] kasan_atomics+0xb8/0x2e0 [ 29.787353] kunit_try_run_case+0x170/0x3f0 [ 29.787570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.787637] kthread+0x328/0x630 [ 29.787672] ret_from_fork+0x10/0x20 [ 29.788073] [ 29.788117] The buggy address belongs to the object at fff00000c451ca00 [ 29.788117] which belongs to the cache kmalloc-64 of size 64 [ 29.788343] The buggy address is located 0 bytes to the right of [ 29.788343] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.788461] [ 29.788486] The buggy address belongs to the physical page: [ 29.788520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.788780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.789037] page_type: f5(slab) [ 29.789421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.789616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.789718] page dumped because: kasan: bad access detected [ 29.789783] [ 29.789990] Memory state around the buggy address: [ 29.790191] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.790284] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.790540] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.790727] ^ [ 29.790933] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.790987] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.791205] ================================================================== [ 29.800997] ================================================================== [ 29.801050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 29.801589] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.801744] [ 29.801778] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.802090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.802231] Hardware name: linux,dummy-virt (DT) [ 29.802474] Call trace: [ 29.802500] show_stack+0x20/0x38 (C) [ 29.802662] dump_stack_lvl+0x8c/0xd0 [ 29.802876] print_report+0x118/0x608 [ 29.802937] kasan_report+0xdc/0x128 [ 29.802991] kasan_check_range+0x100/0x1a8 [ 29.803040] __kasan_check_write+0x20/0x30 [ 29.803098] kasan_atomics_helper+0x14e4/0x4858 [ 29.803448] kasan_atomics+0x198/0x2e0 [ 29.803826] kunit_try_run_case+0x170/0x3f0 [ 29.803954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.804161] kthread+0x328/0x630 [ 29.804355] ret_from_fork+0x10/0x20 [ 29.804578] [ 29.804640] Allocated by task 277: [ 29.805027] kasan_save_stack+0x3c/0x68 [ 29.805601] kasan_save_track+0x20/0x40 [ 29.805668] kasan_save_alloc_info+0x40/0x58 [ 29.806022] __kasan_kmalloc+0xd4/0xd8 [ 29.806219] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.806375] kasan_atomics+0xb8/0x2e0 [ 29.806685] kunit_try_run_case+0x170/0x3f0 [ 29.806833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.807013] kthread+0x328/0x630 [ 29.807254] ret_from_fork+0x10/0x20 [ 29.807657] [ 29.807687] The buggy address belongs to the object at fff00000c451ca00 [ 29.807687] which belongs to the cache kmalloc-64 of size 64 [ 29.807763] The buggy address is located 0 bytes to the right of [ 29.807763] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.808010] [ 29.808285] The buggy address belongs to the physical page: [ 29.808405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.808684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.808744] page_type: f5(slab) [ 29.809005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.809306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.809536] page dumped because: kasan: bad access detected [ 29.809731] [ 29.809774] Memory state around the buggy address: [ 29.809925] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.809996] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.810047] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.810233] ^ [ 29.810441] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810734] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810848] ================================================================== [ 29.737786] ================================================================== [ 29.737846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.737900] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.738066] [ 29.738101] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.738198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.738431] Hardware name: linux,dummy-virt (DT) [ 29.738797] Call trace: [ 29.738840] show_stack+0x20/0x38 (C) [ 29.738893] dump_stack_lvl+0x8c/0xd0 [ 29.739095] print_report+0x118/0x608 [ 29.739169] kasan_report+0xdc/0x128 [ 29.739303] kasan_check_range+0x100/0x1a8 [ 29.739353] __kasan_check_write+0x20/0x30 [ 29.739415] kasan_atomics_helper+0x11f8/0x4858 [ 29.739604] kasan_atomics+0x198/0x2e0 [ 29.739668] kunit_try_run_case+0x170/0x3f0 [ 29.739719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.740433] kthread+0x328/0x630 [ 29.740762] ret_from_fork+0x10/0x20 [ 29.740859] [ 29.740926] Allocated by task 277: [ 29.740990] kasan_save_stack+0x3c/0x68 [ 29.741088] kasan_save_track+0x20/0x40 [ 29.741163] kasan_save_alloc_info+0x40/0x58 [ 29.741217] __kasan_kmalloc+0xd4/0xd8 [ 29.741257] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.741467] kasan_atomics+0xb8/0x2e0 [ 29.741617] kunit_try_run_case+0x170/0x3f0 [ 29.742002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.742199] kthread+0x328/0x630 [ 29.742397] ret_from_fork+0x10/0x20 [ 29.742932] [ 29.743116] The buggy address belongs to the object at fff00000c451ca00 [ 29.743116] which belongs to the cache kmalloc-64 of size 64 [ 29.743365] The buggy address is located 0 bytes to the right of [ 29.743365] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.743589] [ 29.743812] The buggy address belongs to the physical page: [ 29.744044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.744297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.744546] page_type: f5(slab) [ 29.744631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.744936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.745087] page dumped because: kasan: bad access detected [ 29.745193] [ 29.745271] Memory state around the buggy address: [ 29.745358] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.745547] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.745755] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.745826] ^ [ 29.745923] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746081] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746183] ================================================================== [ 29.654434] ================================================================== [ 29.654488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.654541] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.654592] [ 29.654623] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.654712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.655661] Hardware name: linux,dummy-virt (DT) [ 29.655751] Call trace: [ 29.655897] show_stack+0x20/0x38 (C) [ 29.656109] dump_stack_lvl+0x8c/0xd0 [ 29.656398] print_report+0x118/0x608 [ 29.656544] kasan_report+0xdc/0x128 [ 29.656818] __asan_report_store8_noabort+0x20/0x30 [ 29.657222] kasan_atomics_helper+0x3e5c/0x4858 [ 29.657426] kasan_atomics+0x198/0x2e0 [ 29.657508] kunit_try_run_case+0x170/0x3f0 [ 29.657640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.657722] kthread+0x328/0x630 [ 29.657776] ret_from_fork+0x10/0x20 [ 29.657835] [ 29.657862] Allocated by task 277: [ 29.657899] kasan_save_stack+0x3c/0x68 [ 29.657945] kasan_save_track+0x20/0x40 [ 29.657985] kasan_save_alloc_info+0x40/0x58 [ 29.658023] __kasan_kmalloc+0xd4/0xd8 [ 29.658073] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.658114] kasan_atomics+0xb8/0x2e0 [ 29.658166] kunit_try_run_case+0x170/0x3f0 [ 29.658215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.658261] kthread+0x328/0x630 [ 29.658304] ret_from_fork+0x10/0x20 [ 29.658352] [ 29.658387] The buggy address belongs to the object at fff00000c451ca00 [ 29.658387] which belongs to the cache kmalloc-64 of size 64 [ 29.658446] The buggy address is located 0 bytes to the right of [ 29.658446] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.658511] [ 29.658534] The buggy address belongs to the physical page: [ 29.658589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.658657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.658706] page_type: f5(slab) [ 29.658746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.658797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.658839] page dumped because: kasan: bad access detected [ 29.658881] [ 29.658904] Memory state around the buggy address: [ 29.658946] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.659001] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.659045] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.659771] ^ [ 29.659839] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.659887] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.660294] ================================================================== [ 29.835498] ================================================================== [ 29.835551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 29.835605] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.835803] [ 29.835838] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.835927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.836369] Hardware name: linux,dummy-virt (DT) [ 29.836460] Call trace: [ 29.836597] show_stack+0x20/0x38 (C) [ 29.836759] dump_stack_lvl+0x8c/0xd0 [ 29.836884] print_report+0x118/0x608 [ 29.836931] kasan_report+0xdc/0x128 [ 29.836988] kasan_check_range+0x100/0x1a8 [ 29.837203] __kasan_check_write+0x20/0x30 [ 29.837289] kasan_atomics_helper+0x1644/0x4858 [ 29.837467] kasan_atomics+0x198/0x2e0 [ 29.837703] kunit_try_run_case+0x170/0x3f0 [ 29.837873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.838171] kthread+0x328/0x630 [ 29.838373] ret_from_fork+0x10/0x20 [ 29.838449] [ 29.838470] Allocated by task 277: [ 29.838511] kasan_save_stack+0x3c/0x68 [ 29.838555] kasan_save_track+0x20/0x40 [ 29.838595] kasan_save_alloc_info+0x40/0x58 [ 29.838652] __kasan_kmalloc+0xd4/0xd8 [ 29.838693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.838735] kasan_atomics+0xb8/0x2e0 [ 29.838772] kunit_try_run_case+0x170/0x3f0 [ 29.838813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.838868] kthread+0x328/0x630 [ 29.838904] ret_from_fork+0x10/0x20 [ 29.838957] [ 29.838987] The buggy address belongs to the object at fff00000c451ca00 [ 29.838987] which belongs to the cache kmalloc-64 of size 64 [ 29.839047] The buggy address is located 0 bytes to the right of [ 29.839047] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.839423] [ 29.839793] The buggy address belongs to the physical page: [ 29.839864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.840196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.840593] page_type: f5(slab) [ 29.840744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.841160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.841692] page dumped because: kasan: bad access detected [ 29.841752] [ 29.841806] Memory state around the buggy address: [ 29.841868] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.842051] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.842439] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.842568] ^ [ 29.842614] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.842695] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.842738] ================================================================== [ 29.851560] ================================================================== [ 29.851609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 29.851657] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.851708] [ 29.851738] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.852354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.852471] Hardware name: linux,dummy-virt (DT) [ 29.852514] Call trace: [ 29.852539] show_stack+0x20/0x38 (C) [ 29.852592] dump_stack_lvl+0x8c/0xd0 [ 29.852944] print_report+0x118/0x608 [ 29.853226] kasan_report+0xdc/0x128 [ 29.853539] kasan_check_range+0x100/0x1a8 [ 29.853658] __kasan_check_write+0x20/0x30 [ 29.853835] kasan_atomics_helper+0x16d0/0x4858 [ 29.854224] kasan_atomics+0x198/0x2e0 [ 29.854315] kunit_try_run_case+0x170/0x3f0 [ 29.854498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.854714] kthread+0x328/0x630 [ 29.854767] ret_from_fork+0x10/0x20 [ 29.855066] [ 29.855247] Allocated by task 277: [ 29.855585] kasan_save_stack+0x3c/0x68 [ 29.855844] kasan_save_track+0x20/0x40 [ 29.855953] kasan_save_alloc_info+0x40/0x58 [ 29.856446] __kasan_kmalloc+0xd4/0xd8 [ 29.856591] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.856660] kasan_atomics+0xb8/0x2e0 [ 29.856729] kunit_try_run_case+0x170/0x3f0 [ 29.856771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.857101] kthread+0x328/0x630 [ 29.857346] ret_from_fork+0x10/0x20 [ 29.857558] [ 29.857616] The buggy address belongs to the object at fff00000c451ca00 [ 29.857616] which belongs to the cache kmalloc-64 of size 64 [ 29.857914] The buggy address is located 0 bytes to the right of [ 29.857914] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.858377] [ 29.858580] The buggy address belongs to the physical page: [ 29.858644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.858738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.858996] page_type: f5(slab) [ 29.859167] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.859579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.859712] page dumped because: kasan: bad access detected [ 29.859838] [ 29.859905] Memory state around the buggy address: [ 29.859987] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.860364] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.860494] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.860700] ^ [ 29.860744] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.860915] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.861142] ================================================================== [ 29.662791] ================================================================== [ 29.662916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.663227] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.663281] [ 29.663314] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.663536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.663787] Hardware name: linux,dummy-virt (DT) [ 29.663947] Call trace: [ 29.664203] show_stack+0x20/0x38 (C) [ 29.664605] dump_stack_lvl+0x8c/0xd0 [ 29.664733] print_report+0x118/0x608 [ 29.664955] kasan_report+0xdc/0x128 [ 29.665395] kasan_check_range+0x100/0x1a8 [ 29.665589] __kasan_check_write+0x20/0x30 [ 29.666121] kasan_atomics_helper+0xeb8/0x4858 [ 29.666446] kasan_atomics+0x198/0x2e0 [ 29.666568] kunit_try_run_case+0x170/0x3f0 [ 29.666722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.666934] kthread+0x328/0x630 [ 29.667029] ret_from_fork+0x10/0x20 [ 29.667619] [ 29.667730] Allocated by task 277: [ 29.667840] kasan_save_stack+0x3c/0x68 [ 29.667895] kasan_save_track+0x20/0x40 [ 29.667936] kasan_save_alloc_info+0x40/0x58 [ 29.667974] __kasan_kmalloc+0xd4/0xd8 [ 29.668271] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.668501] kasan_atomics+0xb8/0x2e0 [ 29.668971] kunit_try_run_case+0x170/0x3f0 [ 29.669156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.669398] kthread+0x328/0x630 [ 29.669486] ret_from_fork+0x10/0x20 [ 29.669666] [ 29.669729] The buggy address belongs to the object at fff00000c451ca00 [ 29.669729] which belongs to the cache kmalloc-64 of size 64 [ 29.669792] The buggy address is located 0 bytes to the right of [ 29.669792] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.670006] [ 29.670127] The buggy address belongs to the physical page: [ 29.670545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.670646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.670826] page_type: f5(slab) [ 29.671024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.671407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.671534] page dumped because: kasan: bad access detected [ 29.671637] [ 29.671686] Memory state around the buggy address: [ 29.671722] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.672041] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.672281] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.672516] ^ [ 29.672740] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.672826] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.672939] ================================================================== [ 29.764693] ================================================================== [ 29.764746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 29.764798] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.764866] [ 29.764897] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.765356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.765548] Hardware name: linux,dummy-virt (DT) [ 29.765725] Call trace: [ 29.765766] show_stack+0x20/0x38 (C) [ 29.765820] dump_stack_lvl+0x8c/0xd0 [ 29.765930] print_report+0x118/0x608 [ 29.766019] kasan_report+0xdc/0x128 [ 29.766085] kasan_check_range+0x100/0x1a8 [ 29.766304] __kasan_check_write+0x20/0x30 [ 29.766368] kasan_atomics_helper+0x1384/0x4858 [ 29.766698] kasan_atomics+0x198/0x2e0 [ 29.766812] kunit_try_run_case+0x170/0x3f0 [ 29.767338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.767417] kthread+0x328/0x630 [ 29.767465] ret_from_fork+0x10/0x20 [ 29.767801] [ 29.767849] Allocated by task 277: [ 29.767883] kasan_save_stack+0x3c/0x68 [ 29.767929] kasan_save_track+0x20/0x40 [ 29.767970] kasan_save_alloc_info+0x40/0x58 [ 29.768009] __kasan_kmalloc+0xd4/0xd8 [ 29.768580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.769004] kasan_atomics+0xb8/0x2e0 [ 29.769240] kunit_try_run_case+0x170/0x3f0 [ 29.769327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.769685] kthread+0x328/0x630 [ 29.769747] ret_from_fork+0x10/0x20 [ 29.769908] [ 29.770157] The buggy address belongs to the object at fff00000c451ca00 [ 29.770157] which belongs to the cache kmalloc-64 of size 64 [ 29.770363] The buggy address is located 0 bytes to the right of [ 29.770363] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.770582] [ 29.770752] The buggy address belongs to the physical page: [ 29.770985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.771204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.771412] page_type: f5(slab) [ 29.771494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.771548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.771780] page dumped because: kasan: bad access detected [ 29.772166] [ 29.772345] Memory state around the buggy address: [ 29.772419] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.772569] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.772616] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.772670] ^ [ 29.772714] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.773287] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.773554] ================================================================== [ 29.674148] ================================================================== [ 29.674382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.674460] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.674663] [ 29.674875] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.675012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.675069] Hardware name: linux,dummy-virt (DT) [ 29.675105] Call trace: [ 29.675588] show_stack+0x20/0x38 (C) [ 29.675701] dump_stack_lvl+0x8c/0xd0 [ 29.675772] print_report+0x118/0x608 [ 29.676156] kasan_report+0xdc/0x128 [ 29.676278] kasan_check_range+0x100/0x1a8 [ 29.676532] __kasan_check_write+0x20/0x30 [ 29.676612] kasan_atomics_helper+0xf20/0x4858 [ 29.676667] kasan_atomics+0x198/0x2e0 [ 29.676995] kunit_try_run_case+0x170/0x3f0 [ 29.677160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.677535] kthread+0x328/0x630 [ 29.677800] ret_from_fork+0x10/0x20 [ 29.678018] [ 29.678127] Allocated by task 277: [ 29.678326] kasan_save_stack+0x3c/0x68 [ 29.678629] kasan_save_track+0x20/0x40 [ 29.678865] kasan_save_alloc_info+0x40/0x58 [ 29.678917] __kasan_kmalloc+0xd4/0xd8 [ 29.678957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.679304] kasan_atomics+0xb8/0x2e0 [ 29.679771] kunit_try_run_case+0x170/0x3f0 [ 29.680076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.680259] kthread+0x328/0x630 [ 29.680301] ret_from_fork+0x10/0x20 [ 29.680340] [ 29.680363] The buggy address belongs to the object at fff00000c451ca00 [ 29.680363] which belongs to the cache kmalloc-64 of size 64 [ 29.680428] The buggy address is located 0 bytes to the right of [ 29.680428] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.680492] [ 29.680523] The buggy address belongs to the physical page: [ 29.680553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.680626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.680683] page_type: f5(slab) [ 29.680732] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.680792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.680840] page dumped because: kasan: bad access detected [ 29.680873] [ 29.680892] Memory state around the buggy address: [ 29.680933] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.680979] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.681028] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.681079] ^ [ 29.681127] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.681186] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.681235] ================================================================== [ 29.607019] ================================================================== [ 29.607389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.607488] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.607543] [ 29.607574] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.607662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.607916] Hardware name: linux,dummy-virt (DT) [ 29.608307] Call trace: [ 29.608409] show_stack+0x20/0x38 (C) [ 29.608494] dump_stack_lvl+0x8c/0xd0 [ 29.608626] print_report+0x118/0x608 [ 29.608681] kasan_report+0xdc/0x128 [ 29.608878] kasan_check_range+0x100/0x1a8 [ 29.609325] __kasan_check_write+0x20/0x30 [ 29.609546] kasan_atomics_helper+0xd3c/0x4858 [ 29.609787] kasan_atomics+0x198/0x2e0 [ 29.610011] kunit_try_run_case+0x170/0x3f0 [ 29.610274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.610493] kthread+0x328/0x630 [ 29.610556] ret_from_fork+0x10/0x20 [ 29.610672] [ 29.610850] Allocated by task 277: [ 29.611000] kasan_save_stack+0x3c/0x68 [ 29.611230] kasan_save_track+0x20/0x40 [ 29.611463] kasan_save_alloc_info+0x40/0x58 [ 29.611597] __kasan_kmalloc+0xd4/0xd8 [ 29.611638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.611755] kasan_atomics+0xb8/0x2e0 [ 29.612208] kunit_try_run_case+0x170/0x3f0 [ 29.612439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.612544] kthread+0x328/0x630 [ 29.612595] ret_from_fork+0x10/0x20 [ 29.612838] [ 29.612936] The buggy address belongs to the object at fff00000c451ca00 [ 29.612936] which belongs to the cache kmalloc-64 of size 64 [ 29.613228] The buggy address is located 0 bytes to the right of [ 29.613228] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.613400] [ 29.613479] The buggy address belongs to the physical page: [ 29.613529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.613847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.614205] page_type: f5(slab) [ 29.614396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.614650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.614790] page dumped because: kasan: bad access detected [ 29.614891] [ 29.615000] Memory state around the buggy address: [ 29.615033] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.615246] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.615720] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.615936] ^ [ 29.616026] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.616207] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.616286] ================================================================== [ 29.826232] ================================================================== [ 29.826302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 29.826355] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.826595] [ 29.826638] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.826729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.827026] Hardware name: linux,dummy-virt (DT) [ 29.827323] Call trace: [ 29.827416] show_stack+0x20/0x38 (C) [ 29.827478] dump_stack_lvl+0x8c/0xd0 [ 29.827689] print_report+0x118/0x608 [ 29.827892] kasan_report+0xdc/0x128 [ 29.827963] __asan_report_load8_noabort+0x20/0x30 [ 29.828153] kasan_atomics_helper+0x3db0/0x4858 [ 29.828260] kasan_atomics+0x198/0x2e0 [ 29.828410] kunit_try_run_case+0x170/0x3f0 [ 29.828469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.828524] kthread+0x328/0x630 [ 29.828569] ret_from_fork+0x10/0x20 [ 29.828920] [ 29.829257] Allocated by task 277: [ 29.829314] kasan_save_stack+0x3c/0x68 [ 29.829431] kasan_save_track+0x20/0x40 [ 29.829647] kasan_save_alloc_info+0x40/0x58 [ 29.830163] __kasan_kmalloc+0xd4/0xd8 [ 29.830329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.830520] kasan_atomics+0xb8/0x2e0 [ 29.830726] kunit_try_run_case+0x170/0x3f0 [ 29.830792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.831348] kthread+0x328/0x630 [ 29.831427] ret_from_fork+0x10/0x20 [ 29.831603] [ 29.831641] The buggy address belongs to the object at fff00000c451ca00 [ 29.831641] which belongs to the cache kmalloc-64 of size 64 [ 29.831839] The buggy address is located 0 bytes to the right of [ 29.831839] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.832076] [ 29.832103] The buggy address belongs to the physical page: [ 29.832138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.832194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.832243] page_type: f5(slab) [ 29.832578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.832906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.833093] page dumped because: kasan: bad access detected [ 29.833222] [ 29.833396] Memory state around the buggy address: [ 29.833565] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.833746] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.833848] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.833946] ^ [ 29.834121] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.834205] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.834253] ================================================================== [ 29.626710] ================================================================== [ 29.626773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.626826] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.626901] [ 29.626938] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.627239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.627283] Hardware name: linux,dummy-virt (DT) [ 29.627607] Call trace: [ 29.627706] show_stack+0x20/0x38 (C) [ 29.627768] dump_stack_lvl+0x8c/0xd0 [ 29.628145] print_report+0x118/0x608 [ 29.628262] kasan_report+0xdc/0x128 [ 29.628628] kasan_check_range+0x100/0x1a8 [ 29.628789] __kasan_check_read+0x20/0x30 [ 29.628845] kasan_atomics_helper+0xdd4/0x4858 [ 29.629156] kasan_atomics+0x198/0x2e0 [ 29.629724] kunit_try_run_case+0x170/0x3f0 [ 29.630205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.630402] kthread+0x328/0x630 [ 29.630496] ret_from_fork+0x10/0x20 [ 29.630655] [ 29.630797] Allocated by task 277: [ 29.631107] kasan_save_stack+0x3c/0x68 [ 29.631328] kasan_save_track+0x20/0x40 [ 29.631497] kasan_save_alloc_info+0x40/0x58 [ 29.631545] __kasan_kmalloc+0xd4/0xd8 [ 29.631585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.631787] kasan_atomics+0xb8/0x2e0 [ 29.631964] kunit_try_run_case+0x170/0x3f0 [ 29.632259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.632317] kthread+0x328/0x630 [ 29.632473] ret_from_fork+0x10/0x20 [ 29.632546] [ 29.632585] The buggy address belongs to the object at fff00000c451ca00 [ 29.632585] which belongs to the cache kmalloc-64 of size 64 [ 29.632654] The buggy address is located 0 bytes to the right of [ 29.632654] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.632720] [ 29.632758] The buggy address belongs to the physical page: [ 29.632797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.632852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.633264] page_type: f5(slab) [ 29.633389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.633792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.633870] page dumped because: kasan: bad access detected [ 29.634077] [ 29.634303] Memory state around the buggy address: [ 29.634513] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.634585] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.634712] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.634813] ^ [ 29.634906] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.634950] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.635124] ================================================================== [ 29.887450] ================================================================== [ 29.887534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 29.887588] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.887784] [ 29.887880] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.888097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.888243] Hardware name: linux,dummy-virt (DT) [ 29.888287] Call trace: [ 29.888311] show_stack+0x20/0x38 (C) [ 29.888364] dump_stack_lvl+0x8c/0xd0 [ 29.888577] print_report+0x118/0x608 [ 29.889079] kasan_report+0xdc/0x128 [ 29.889238] kasan_check_range+0x100/0x1a8 [ 29.889363] __kasan_check_write+0x20/0x30 [ 29.889505] kasan_atomics_helper+0x17ec/0x4858 [ 29.889639] kasan_atomics+0x198/0x2e0 [ 29.889697] kunit_try_run_case+0x170/0x3f0 [ 29.889934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.890098] kthread+0x328/0x630 [ 29.890374] ret_from_fork+0x10/0x20 [ 29.890499] [ 29.890696] Allocated by task 277: [ 29.890872] kasan_save_stack+0x3c/0x68 [ 29.891273] kasan_save_track+0x20/0x40 [ 29.891349] kasan_save_alloc_info+0x40/0x58 [ 29.891480] __kasan_kmalloc+0xd4/0xd8 [ 29.891690] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.891833] kasan_atomics+0xb8/0x2e0 [ 29.892216] kunit_try_run_case+0x170/0x3f0 [ 29.892270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.892317] kthread+0x328/0x630 [ 29.892353] ret_from_fork+0x10/0x20 [ 29.892391] [ 29.892413] The buggy address belongs to the object at fff00000c451ca00 [ 29.892413] which belongs to the cache kmalloc-64 of size 64 [ 29.892943] The buggy address is located 0 bytes to the right of [ 29.892943] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.893498] [ 29.893879] The buggy address belongs to the physical page: [ 29.894169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.894254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.894307] page_type: f5(slab) [ 29.894359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.894410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.894453] page dumped because: kasan: bad access detected [ 29.894593] [ 29.894621] Memory state around the buggy address: [ 29.894656] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.894702] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.894768] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.894809] ^ [ 29.894853] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.894904] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.894951] ================================================================== [ 29.862394] ================================================================== [ 29.862468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 29.862531] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.862673] [ 29.862707] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.862803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.862957] Hardware name: linux,dummy-virt (DT) [ 29.863040] Call trace: [ 29.863095] show_stack+0x20/0x38 (C) [ 29.863159] dump_stack_lvl+0x8c/0xd0 [ 29.863529] print_report+0x118/0x608 [ 29.863616] kasan_report+0xdc/0x128 [ 29.863726] __asan_report_load8_noabort+0x20/0x30 [ 29.863793] kasan_atomics_helper+0x3e10/0x4858 [ 29.863844] kasan_atomics+0x198/0x2e0 [ 29.864179] kunit_try_run_case+0x170/0x3f0 [ 29.864260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.864430] kthread+0x328/0x630 [ 29.864644] ret_from_fork+0x10/0x20 [ 29.864916] [ 29.864940] Allocated by task 277: [ 29.864973] kasan_save_stack+0x3c/0x68 [ 29.865157] kasan_save_track+0x20/0x40 [ 29.865208] kasan_save_alloc_info+0x40/0x58 [ 29.865247] __kasan_kmalloc+0xd4/0xd8 [ 29.865470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.865524] kasan_atomics+0xb8/0x2e0 [ 29.865591] kunit_try_run_case+0x170/0x3f0 [ 29.865633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.865678] kthread+0x328/0x630 [ 29.865724] ret_from_fork+0x10/0x20 [ 29.865764] [ 29.865785] The buggy address belongs to the object at fff00000c451ca00 [ 29.865785] which belongs to the cache kmalloc-64 of size 64 [ 29.865855] The buggy address is located 0 bytes to the right of [ 29.865855] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.865922] [ 29.865942] The buggy address belongs to the physical page: [ 29.865984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.866044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.866125] page_type: f5(slab) [ 29.866170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.866234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.866276] page dumped because: kasan: bad access detected [ 29.866318] [ 29.866344] Memory state around the buggy address: [ 29.866383] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.866427] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.866471] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.866509] ^ [ 29.866555] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.866611] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.866662] ================================================================== [ 29.534338] ================================================================== [ 29.534391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.534446] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.534499] [ 29.535112] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.535477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.535529] Hardware name: linux,dummy-virt (DT) [ 29.535619] Call trace: [ 29.535646] show_stack+0x20/0x38 (C) [ 29.535919] dump_stack_lvl+0x8c/0xd0 [ 29.535994] print_report+0x118/0x608 [ 29.536503] kasan_report+0xdc/0x128 [ 29.536693] kasan_check_range+0x100/0x1a8 [ 29.536851] __kasan_check_write+0x20/0x30 [ 29.537498] kunit_try_run_case+0x170/0x3f0 [ 29.539178] [ 29.539366] The buggy address belongs to the physical page: [ 29.539451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.539501] page_type: f5(slab) [ 29.539549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.539601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.539643] page dumped because: kasan: bad access detected [ 29.539675] [ 29.539705] Memory state around the buggy address: [ 29.539738] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.540042] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.540340] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.540423] ^ [ 29.540740] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540896] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.541075] ================================================================== [ 29.695907] ================================================================== [ 29.695965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.696042] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.696107] [ 29.696139] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.696226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.696253] Hardware name: linux,dummy-virt (DT) [ 29.696299] Call trace: [ 29.696323] show_stack+0x20/0x38 (C) [ 29.696372] dump_stack_lvl+0x8c/0xd0 [ 29.696421] print_report+0x118/0x608 [ 29.696468] kasan_report+0xdc/0x128 [ 29.696525] kasan_check_range+0x100/0x1a8 [ 29.696577] __kasan_check_write+0x20/0x30 [ 29.696638] kasan_atomics_helper+0xff0/0x4858 [ 29.696688] kasan_atomics+0x198/0x2e0 [ 29.696735] kunit_try_run_case+0x170/0x3f0 [ 29.696784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.696839] kthread+0x328/0x630 [ 29.696882] ret_from_fork+0x10/0x20 [ 29.696931] [ 29.696951] Allocated by task 277: [ 29.696980] kasan_save_stack+0x3c/0x68 [ 29.697022] kasan_save_track+0x20/0x40 [ 29.697328] kasan_save_alloc_info+0x40/0x58 [ 29.697673] __kasan_kmalloc+0xd4/0xd8 [ 29.698105] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.698194] kasan_atomics+0xb8/0x2e0 [ 29.698273] kunit_try_run_case+0x170/0x3f0 [ 29.698518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.698682] kthread+0x328/0x630 [ 29.698864] ret_from_fork+0x10/0x20 [ 29.698946] [ 29.699268] The buggy address belongs to the object at fff00000c451ca00 [ 29.699268] which belongs to the cache kmalloc-64 of size 64 [ 29.699623] The buggy address is located 0 bytes to the right of [ 29.699623] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.700184] [ 29.700245] The buggy address belongs to the physical page: [ 29.700278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.700332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.700546] page_type: f5(slab) [ 29.700967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.701484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.701542] page dumped because: kasan: bad access detected [ 29.701703] [ 29.702139] Memory state around the buggy address: [ 29.702457] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.702605] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.702908] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.703301] ^ [ 29.703475] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.703602] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.703854] ================================================================== [ 29.756284] ================================================================== [ 29.756336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.756793] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.756864] [ 29.757108] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.757211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.757248] Hardware name: linux,dummy-virt (DT) [ 29.757279] Call trace: [ 29.757303] show_stack+0x20/0x38 (C) [ 29.757355] dump_stack_lvl+0x8c/0xd0 [ 29.757636] print_report+0x118/0x608 [ 29.757714] kasan_report+0xdc/0x128 [ 29.758038] kasan_check_range+0x100/0x1a8 [ 29.758193] __kasan_check_write+0x20/0x30 [ 29.758246] kasan_atomics_helper+0x12d8/0x4858 [ 29.758419] kasan_atomics+0x198/0x2e0 [ 29.758489] kunit_try_run_case+0x170/0x3f0 [ 29.758543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.758801] kthread+0x328/0x630 [ 29.758979] ret_from_fork+0x10/0x20 [ 29.759231] [ 29.759279] Allocated by task 277: [ 29.759329] kasan_save_stack+0x3c/0x68 [ 29.759376] kasan_save_track+0x20/0x40 [ 29.759948] kasan_save_alloc_info+0x40/0x58 [ 29.760163] __kasan_kmalloc+0xd4/0xd8 [ 29.760247] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.760290] kasan_atomics+0xb8/0x2e0 [ 29.760327] kunit_try_run_case+0x170/0x3f0 [ 29.760369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.760417] kthread+0x328/0x630 [ 29.760454] ret_from_fork+0x10/0x20 [ 29.761140] [ 29.761256] The buggy address belongs to the object at fff00000c451ca00 [ 29.761256] which belongs to the cache kmalloc-64 of size 64 [ 29.761323] The buggy address is located 0 bytes to the right of [ 29.761323] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.761953] [ 29.761995] The buggy address belongs to the physical page: [ 29.762031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.762096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.762203] page_type: f5(slab) [ 29.762246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.762316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.762360] page dumped because: kasan: bad access detected [ 29.762393] [ 29.762424] Memory state around the buggy address: [ 29.762457] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.762502] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.762555] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.762596] ^ [ 29.762636] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.762681] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.762736] ================================================================== [ 29.878320] ================================================================== [ 29.878536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 29.878685] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.878761] [ 29.878820] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.878981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.879037] Hardware name: linux,dummy-virt (DT) [ 29.879220] Call trace: [ 29.879247] show_stack+0x20/0x38 (C) [ 29.879453] dump_stack_lvl+0x8c/0xd0 [ 29.879515] print_report+0x118/0x608 [ 29.879803] kasan_report+0xdc/0x128 [ 29.880298] __asan_report_load8_noabort+0x20/0x30 [ 29.880388] kasan_atomics_helper+0x3e20/0x4858 [ 29.880443] kasan_atomics+0x198/0x2e0 [ 29.880491] kunit_try_run_case+0x170/0x3f0 [ 29.880690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.881202] kthread+0x328/0x630 [ 29.881335] ret_from_fork+0x10/0x20 [ 29.881438] [ 29.881476] Allocated by task 277: [ 29.881653] kasan_save_stack+0x3c/0x68 [ 29.881868] kasan_save_track+0x20/0x40 [ 29.882098] kasan_save_alloc_info+0x40/0x58 [ 29.882271] __kasan_kmalloc+0xd4/0xd8 [ 29.882322] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.882566] kasan_atomics+0xb8/0x2e0 [ 29.882740] kunit_try_run_case+0x170/0x3f0 [ 29.883103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.883260] kthread+0x328/0x630 [ 29.883299] ret_from_fork+0x10/0x20 [ 29.883497] [ 29.883708] The buggy address belongs to the object at fff00000c451ca00 [ 29.883708] which belongs to the cache kmalloc-64 of size 64 [ 29.883904] The buggy address is located 0 bytes to the right of [ 29.883904] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.884111] [ 29.884137] The buggy address belongs to the physical page: [ 29.884322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.884588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.884723] page_type: f5(slab) [ 29.885110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.885250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.885355] page dumped because: kasan: bad access detected [ 29.885389] [ 29.885556] Memory state around the buggy address: [ 29.885739] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.885790] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.885834] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.885875] ^ [ 29.885943] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.885987] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.886028] ================================================================== [ 29.617917] ================================================================== [ 29.617969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.618032] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.618519] [ 29.618598] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.618693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.618723] Hardware name: linux,dummy-virt (DT) [ 29.618755] Call trace: [ 29.618778] show_stack+0x20/0x38 (C) [ 29.618832] dump_stack_lvl+0x8c/0xd0 [ 29.618883] print_report+0x118/0x608 [ 29.618932] kasan_report+0xdc/0x128 [ 29.619002] __asan_report_load4_noabort+0x20/0x30 [ 29.619068] kasan_atomics_helper+0x3e04/0x4858 [ 29.619136] kasan_atomics+0x198/0x2e0 [ 29.619193] kunit_try_run_case+0x170/0x3f0 [ 29.619251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.619311] kthread+0x328/0x630 [ 29.619355] ret_from_fork+0x10/0x20 [ 29.619415] [ 29.619444] Allocated by task 277: [ 29.619475] kasan_save_stack+0x3c/0x68 [ 29.619518] kasan_save_track+0x20/0x40 [ 29.619573] kasan_save_alloc_info+0x40/0x58 [ 29.619622] __kasan_kmalloc+0xd4/0xd8 [ 29.619663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.619707] kasan_atomics+0xb8/0x2e0 [ 29.619744] kunit_try_run_case+0x170/0x3f0 [ 29.620532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.620592] kthread+0x328/0x630 [ 29.621025] ret_from_fork+0x10/0x20 [ 29.621274] [ 29.621329] The buggy address belongs to the object at fff00000c451ca00 [ 29.621329] which belongs to the cache kmalloc-64 of size 64 [ 29.621525] The buggy address is located 0 bytes to the right of [ 29.621525] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.621778] [ 29.621819] The buggy address belongs to the physical page: [ 29.621870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.622205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.622387] page_type: f5(slab) [ 29.622499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.622578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.622974] page dumped because: kasan: bad access detected [ 29.623214] [ 29.623418] Memory state around the buggy address: [ 29.623494] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.623637] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.623751] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.623940] ^ [ 29.623982] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.624121] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.624348] ================================================================== [ 29.705377] ================================================================== [ 29.705441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.705706] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.705786] [ 29.706073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.706290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.706506] Hardware name: linux,dummy-virt (DT) [ 29.706669] Call trace: [ 29.706841] show_stack+0x20/0x38 (C) [ 29.707027] dump_stack_lvl+0x8c/0xd0 [ 29.707359] print_report+0x118/0x608 [ 29.707533] kasan_report+0xdc/0x128 [ 29.707596] kasan_check_range+0x100/0x1a8 [ 29.707935] __kasan_check_write+0x20/0x30 [ 29.708148] kasan_atomics_helper+0x1058/0x4858 [ 29.708282] kasan_atomics+0x198/0x2e0 [ 29.708336] kunit_try_run_case+0x170/0x3f0 [ 29.708393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.708594] kthread+0x328/0x630 [ 29.708836] ret_from_fork+0x10/0x20 [ 29.709006] [ 29.709040] Allocated by task 277: [ 29.709085] kasan_save_stack+0x3c/0x68 [ 29.709143] kasan_save_track+0x20/0x40 [ 29.709184] kasan_save_alloc_info+0x40/0x58 [ 29.709221] __kasan_kmalloc+0xd4/0xd8 [ 29.709262] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.709314] kasan_atomics+0xb8/0x2e0 [ 29.709371] kunit_try_run_case+0x170/0x3f0 [ 29.709413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.709477] kthread+0x328/0x630 [ 29.709527] ret_from_fork+0x10/0x20 [ 29.709565] [ 29.709593] The buggy address belongs to the object at fff00000c451ca00 [ 29.709593] which belongs to the cache kmalloc-64 of size 64 [ 29.709675] The buggy address is located 0 bytes to the right of [ 29.709675] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.709750] [ 29.709787] The buggy address belongs to the physical page: [ 29.709827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.709889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.709951] page_type: f5(slab) [ 29.709992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.710044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.710094] page dumped because: kasan: bad access detected [ 29.710127] [ 29.710165] Memory state around the buggy address: [ 29.710198] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.710256] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.710307] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.710356] ^ [ 29.710400] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710451] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710500] ================================================================== [ 29.490137] ================================================================== [ 29.490204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.490258] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.490318] [ 29.490351] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.490441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.490478] Hardware name: linux,dummy-virt (DT) [ 29.490511] Call trace: [ 29.490544] show_stack+0x20/0x38 (C) [ 29.490595] dump_stack_lvl+0x8c/0xd0 [ 29.490644] print_report+0x118/0x608 [ 29.490701] kasan_report+0xdc/0x128 [ 29.490750] __asan_report_load4_noabort+0x20/0x30 [ 29.490801] kasan_atomics_helper+0x42d8/0x4858 [ 29.490863] kasan_atomics+0x198/0x2e0 [ 29.490912] kunit_try_run_case+0x170/0x3f0 [ 29.490968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.491023] kthread+0x328/0x630 [ 29.491466] ret_from_fork+0x10/0x20 [ 29.491527] [ 29.491594] Allocated by task 277: [ 29.491628] kasan_save_stack+0x3c/0x68 [ 29.492294] kasan_save_track+0x20/0x40 [ 29.492375] kasan_save_alloc_info+0x40/0x58 [ 29.492416] __kasan_kmalloc+0xd4/0xd8 [ 29.492456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.492497] kasan_atomics+0xb8/0x2e0 [ 29.492537] kunit_try_run_case+0x170/0x3f0 [ 29.492940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.493509] kthread+0x328/0x630 [ 29.493614] ret_from_fork+0x10/0x20 [ 29.493709] [ 29.493773] The buggy address belongs to the object at fff00000c451ca00 [ 29.493773] which belongs to the cache kmalloc-64 of size 64 [ 29.494174] The buggy address is located 0 bytes to the right of [ 29.494174] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.494312] [ 29.494337] The buggy address belongs to the physical page: [ 29.494779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.494856] page_type: f5(slab) [ 29.495203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.496341] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.499377] ================================================================== [ 29.721382] ================================================================== [ 29.721571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.721752] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.721815] [ 29.721849] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.721941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.722136] Hardware name: linux,dummy-virt (DT) [ 29.722346] Call trace: [ 29.722393] show_stack+0x20/0x38 (C) [ 29.722449] dump_stack_lvl+0x8c/0xd0 [ 29.722659] print_report+0x118/0x608 [ 29.722756] kasan_report+0xdc/0x128 [ 29.723091] kasan_check_range+0x100/0x1a8 [ 29.723172] __kasan_check_write+0x20/0x30 [ 29.723391] kasan_atomics_helper+0x1128/0x4858 [ 29.723456] kasan_atomics+0x198/0x2e0 [ 29.723603] kunit_try_run_case+0x170/0x3f0 [ 29.723659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.723715] kthread+0x328/0x630 [ 29.724073] ret_from_fork+0x10/0x20 [ 29.724486] [ 29.724586] Allocated by task 277: [ 29.724624] kasan_save_stack+0x3c/0x68 [ 29.724672] kasan_save_track+0x20/0x40 [ 29.724712] kasan_save_alloc_info+0x40/0x58 [ 29.724759] __kasan_kmalloc+0xd4/0xd8 [ 29.724921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.725136] kasan_atomics+0xb8/0x2e0 [ 29.725219] kunit_try_run_case+0x170/0x3f0 [ 29.725583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.725936] kthread+0x328/0x630 [ 29.726193] ret_from_fork+0x10/0x20 [ 29.726244] [ 29.726266] The buggy address belongs to the object at fff00000c451ca00 [ 29.726266] which belongs to the cache kmalloc-64 of size 64 [ 29.726432] The buggy address is located 0 bytes to the right of [ 29.726432] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.726946] [ 29.726983] The buggy address belongs to the physical page: [ 29.727036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.727102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.727153] page_type: f5(slab) [ 29.727388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.727677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.727925] page dumped because: kasan: bad access detected [ 29.728197] [ 29.728248] Memory state around the buggy address: [ 29.728450] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.728681] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.728733] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.728773] ^ [ 29.728841] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.728886] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.728942] ================================================================== [ 29.868490] ================================================================== [ 29.868702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 29.869014] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.869095] [ 29.869144] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.869321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.869390] Hardware name: linux,dummy-virt (DT) [ 29.869425] Call trace: [ 29.869449] show_stack+0x20/0x38 (C) [ 29.869682] dump_stack_lvl+0x8c/0xd0 [ 29.869754] print_report+0x118/0x608 [ 29.869896] kasan_report+0xdc/0x128 [ 29.870147] kasan_check_range+0x100/0x1a8 [ 29.870703] __kasan_check_write+0x20/0x30 [ 29.870781] kasan_atomics_helper+0x175c/0x4858 [ 29.870833] kasan_atomics+0x198/0x2e0 [ 29.870880] kunit_try_run_case+0x170/0x3f0 [ 29.871031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.871151] kthread+0x328/0x630 [ 29.871214] ret_from_fork+0x10/0x20 [ 29.871554] [ 29.871590] Allocated by task 277: [ 29.871893] kasan_save_stack+0x3c/0x68 [ 29.872274] kasan_save_track+0x20/0x40 [ 29.872364] kasan_save_alloc_info+0x40/0x58 [ 29.872420] __kasan_kmalloc+0xd4/0xd8 [ 29.872460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.872502] kasan_atomics+0xb8/0x2e0 [ 29.872540] kunit_try_run_case+0x170/0x3f0 [ 29.873014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.873321] kthread+0x328/0x630 [ 29.873452] ret_from_fork+0x10/0x20 [ 29.873581] [ 29.873639] The buggy address belongs to the object at fff00000c451ca00 [ 29.873639] which belongs to the cache kmalloc-64 of size 64 [ 29.873947] The buggy address is located 0 bytes to the right of [ 29.873947] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.874362] [ 29.874881] The buggy address belongs to the physical page: [ 29.875043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.875241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.875560] page_type: f5(slab) [ 29.875609] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.876036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.876234] page dumped because: kasan: bad access detected [ 29.876456] [ 29.876504] Memory state around the buggy address: [ 29.876661] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.876772] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.877152] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.877242] ^ [ 29.877323] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.877449] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.877561] ================================================================== [ 29.683045] ================================================================== [ 29.683559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.683633] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.683685] [ 29.683715] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.683802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.684290] Hardware name: linux,dummy-virt (DT) [ 29.684618] Call trace: [ 29.684770] show_stack+0x20/0x38 (C) [ 29.684849] dump_stack_lvl+0x8c/0xd0 [ 29.684920] print_report+0x118/0x608 [ 29.685281] kasan_report+0xdc/0x128 [ 29.685370] kasan_check_range+0x100/0x1a8 [ 29.685478] __kasan_check_write+0x20/0x30 [ 29.685541] kasan_atomics_helper+0xf88/0x4858 [ 29.685749] kasan_atomics+0x198/0x2e0 [ 29.685954] kunit_try_run_case+0x170/0x3f0 [ 29.686188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.686309] kthread+0x328/0x630 [ 29.686357] ret_from_fork+0x10/0x20 [ 29.686663] [ 29.686995] Allocated by task 277: [ 29.687150] kasan_save_stack+0x3c/0x68 [ 29.687393] kasan_save_track+0x20/0x40 [ 29.688196] kasan_save_alloc_info+0x40/0x58 [ 29.688259] __kasan_kmalloc+0xd4/0xd8 [ 29.688301] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.688493] kasan_atomics+0xb8/0x2e0 [ 29.688896] kunit_try_run_case+0x170/0x3f0 [ 29.689241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.689449] kthread+0x328/0x630 [ 29.689518] ret_from_fork+0x10/0x20 [ 29.689690] [ 29.690222] The buggy address belongs to the object at fff00000c451ca00 [ 29.690222] which belongs to the cache kmalloc-64 of size 64 [ 29.690291] The buggy address is located 0 bytes to the right of [ 29.690291] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.690488] [ 29.690823] The buggy address belongs to the physical page: [ 29.690865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.691181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.691709] page_type: f5(slab) [ 29.691785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.691859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.691915] page dumped because: kasan: bad access detected [ 29.691947] [ 29.691968] Memory state around the buggy address: [ 29.692456] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.692666] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.692845] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.692945] ^ [ 29.693180] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.693830] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.693972] ================================================================== [ 29.508792] ================================================================== [ 29.508978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.509188] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.509253] [ 29.509415] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.509517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.509725] Hardware name: linux,dummy-virt (DT) [ 29.509770] Call trace: [ 29.509796] show_stack+0x20/0x38 (C) [ 29.509960] dump_stack_lvl+0x8c/0xd0 [ 29.510022] print_report+0x118/0x608 [ 29.510166] kasan_report+0xdc/0x128 [ 29.510284] kasan_check_range+0x100/0x1a8 [ 29.510402] __kasan_check_write+0x20/0x30 [ 29.510451] kasan_atomics_helper+0x99c/0x4858 [ 29.510502] kasan_atomics+0x198/0x2e0 [ 29.510547] kunit_try_run_case+0x170/0x3f0 [ 29.511020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.511122] kthread+0x328/0x630 [ 29.511327] ret_from_fork+0x10/0x20 [ 29.511394] [ 29.511414] Allocated by task 277: [ 29.511642] kasan_save_stack+0x3c/0x68 [ 29.511796] kasan_save_track+0x20/0x40 [ 29.512028] kasan_save_alloc_info+0x40/0x58 [ 29.512089] __kasan_kmalloc+0xd4/0xd8 [ 29.512129] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.512365] kasan_atomics+0xb8/0x2e0 [ 29.512597] kunit_try_run_case+0x170/0x3f0 [ 29.512709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.512907] kthread+0x328/0x630 [ 29.512948] ret_from_fork+0x10/0x20 [ 29.513021] [ 29.513232] The buggy address belongs to the object at fff00000c451ca00 [ 29.513232] which belongs to the cache kmalloc-64 of size 64 [ 29.513331] The buggy address is located 0 bytes to the right of [ 29.513331] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.513540] [ 29.513567] The buggy address belongs to the physical page: [ 29.513601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.513656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.513734] page_type: f5(slab) [ 29.513774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.513839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.513881] page dumped because: kasan: bad access detected [ 29.513923] [ 29.513944] Memory state around the buggy address: [ 29.513984] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.514038] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.514095] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.514152] ^ [ 29.514249] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.515894] [ 29.516292] Call trace: [ 29.517317] kasan_check_range+0x100/0x1a8 [ 29.521837] [ 29.521939] The buggy address belongs to the physical page: [ 29.522045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.522162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.522350] page_type: f5(slab) [ 29.522424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.522799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.523039] page dumped because: kasan: bad access detected [ 29.523192] [ 29.523252] Memory state around the buggy address: [ 29.523424] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523655] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523867] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.524044] ^ [ 29.524143] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.524192] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.524233] ================================================================== [ 29.636385] ================================================================== [ 29.636437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.636653] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.637065] [ 29.637192] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.637289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.637320] Hardware name: linux,dummy-virt (DT) [ 29.637479] Call trace: [ 29.637506] show_stack+0x20/0x38 (C) [ 29.637562] dump_stack_lvl+0x8c/0xd0 [ 29.637645] print_report+0x118/0x608 [ 29.637978] kasan_report+0xdc/0x128 [ 29.638068] __asan_report_load8_noabort+0x20/0x30 [ 29.638176] kasan_atomics_helper+0x3f58/0x4858 [ 29.638270] kasan_atomics+0x198/0x2e0 [ 29.638668] kunit_try_run_case+0x170/0x3f0 [ 29.638747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.639087] kthread+0x328/0x630 [ 29.639329] ret_from_fork+0x10/0x20 [ 29.639480] [ 29.639508] Allocated by task 277: [ 29.639740] kasan_save_stack+0x3c/0x68 [ 29.639813] kasan_save_track+0x20/0x40 [ 29.639855] kasan_save_alloc_info+0x40/0x58 [ 29.640134] __kasan_kmalloc+0xd4/0xd8 [ 29.640178] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.640227] kasan_atomics+0xb8/0x2e0 [ 29.640266] kunit_try_run_case+0x170/0x3f0 [ 29.640582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.640821] kthread+0x328/0x630 [ 29.641038] ret_from_fork+0x10/0x20 [ 29.641092] [ 29.641168] The buggy address belongs to the object at fff00000c451ca00 [ 29.641168] which belongs to the cache kmalloc-64 of size 64 [ 29.641232] The buggy address is located 0 bytes to the right of [ 29.641232] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.641297] [ 29.641338] The buggy address belongs to the physical page: [ 29.641369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.641436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.641497] page_type: f5(slab) [ 29.641544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.641597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.641673] page dumped because: kasan: bad access detected [ 29.641716] [ 29.641750] Memory state around the buggy address: [ 29.641782] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.641828] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.641881] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.641932] ^ [ 29.641976] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.642030] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.642079] ================================================================== [ 29.643522] ================================================================== [ 29.643575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.643631] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.644110] [ 29.644187] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.644960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.645022] Hardware name: linux,dummy-virt (DT) [ 29.645131] Call trace: [ 29.645159] show_stack+0x20/0x38 (C) [ 29.645233] dump_stack_lvl+0x8c/0xd0 [ 29.645609] print_report+0x118/0x608 [ 29.645688] kasan_report+0xdc/0x128 [ 29.645869] kasan_check_range+0x100/0x1a8 [ 29.646105] __kasan_check_write+0x20/0x30 [ 29.646184] kasan_atomics_helper+0xe44/0x4858 [ 29.646373] kasan_atomics+0x198/0x2e0 [ 29.646617] kunit_try_run_case+0x170/0x3f0 [ 29.646814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.647010] kthread+0x328/0x630 [ 29.647089] ret_from_fork+0x10/0x20 [ 29.647593] [ 29.647676] Allocated by task 277: [ 29.647829] kasan_save_stack+0x3c/0x68 [ 29.648021] kasan_save_track+0x20/0x40 [ 29.648247] kasan_save_alloc_info+0x40/0x58 [ 29.648386] __kasan_kmalloc+0xd4/0xd8 [ 29.648530] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.648897] kasan_atomics+0xb8/0x2e0 [ 29.648975] kunit_try_run_case+0x170/0x3f0 [ 29.649017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.649331] kthread+0x328/0x630 [ 29.649615] ret_from_fork+0x10/0x20 [ 29.649795] [ 29.649920] The buggy address belongs to the object at fff00000c451ca00 [ 29.649920] which belongs to the cache kmalloc-64 of size 64 [ 29.650380] The buggy address is located 0 bytes to the right of [ 29.650380] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.650615] [ 29.650710] The buggy address belongs to the physical page: [ 29.650984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.651182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.651480] page_type: f5(slab) [ 29.651555] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.651742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.651797] page dumped because: kasan: bad access detected [ 29.651958] [ 29.652254] Memory state around the buggy address: [ 29.652298] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.652344] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.652521] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.652752] ^ [ 29.652797] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.653112] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.653207] ==================================================================
[ 25.471365] ================================================================== [ 25.471758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 25.472476] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.472861] [ 25.473060] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.473114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.473127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.473154] Call Trace: [ 25.473177] <TASK> [ 25.473202] dump_stack_lvl+0x73/0xb0 [ 25.473252] print_report+0xd1/0x650 [ 25.473277] ? __virt_addr_valid+0x1db/0x2d0 [ 25.473314] ? kasan_atomics_helper+0x1818/0x5450 [ 25.473336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.473363] ? kasan_atomics_helper+0x1818/0x5450 [ 25.473385] kasan_report+0x141/0x180 [ 25.473407] ? kasan_atomics_helper+0x1818/0x5450 [ 25.473433] kasan_check_range+0x10c/0x1c0 [ 25.473456] __kasan_check_write+0x18/0x20 [ 25.473480] kasan_atomics_helper+0x1818/0x5450 [ 25.473503] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.473528] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.473555] ? kasan_atomics+0x152/0x310 [ 25.473582] kasan_atomics+0x1dc/0x310 [ 25.473604] ? __pfx_kasan_atomics+0x10/0x10 [ 25.473628] ? trace_hardirqs_on+0x37/0xe0 [ 25.473652] ? __pfx_read_tsc+0x10/0x10 [ 25.473676] ? ktime_get_ts64+0x86/0x230 [ 25.473702] kunit_try_run_case+0x1a5/0x480 [ 25.473728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.473753] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.473780] ? __kthread_parkme+0x82/0x180 [ 25.473802] ? preempt_count_sub+0x50/0x80 [ 25.473827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.473851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.473875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.473900] kthread+0x337/0x6f0 [ 25.473922] ? trace_preempt_on+0x20/0xc0 [ 25.473944] ? __pfx_kthread+0x10/0x10 [ 25.473965] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.473991] ? calculate_sigpending+0x7b/0xa0 [ 25.474036] ? __pfx_kthread+0x10/0x10 [ 25.474059] ret_from_fork+0x116/0x1d0 [ 25.474079] ? __pfx_kthread+0x10/0x10 [ 25.474100] ret_from_fork_asm+0x1a/0x30 [ 25.474132] </TASK> [ 25.474145] [ 25.486526] Allocated by task 294: [ 25.486692] kasan_save_stack+0x45/0x70 [ 25.486846] kasan_save_track+0x18/0x40 [ 25.486975] kasan_save_alloc_info+0x3b/0x50 [ 25.487412] __kasan_kmalloc+0xb7/0xc0 [ 25.487757] __kmalloc_cache_noprof+0x189/0x420 [ 25.488192] kasan_atomics+0x95/0x310 [ 25.488560] kunit_try_run_case+0x1a5/0x480 [ 25.488948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.489457] kthread+0x337/0x6f0 [ 25.489757] ret_from_fork+0x116/0x1d0 [ 25.490132] ret_from_fork_asm+0x1a/0x30 [ 25.490512] [ 25.490688] The buggy address belongs to the object at ffff888100aaa000 [ 25.490688] which belongs to the cache kmalloc-64 of size 64 [ 25.491445] The buggy address is located 0 bytes to the right of [ 25.491445] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.492516] [ 25.492591] The buggy address belongs to the physical page: [ 25.492763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.493001] flags: 0x200000000000000(node=0|zone=2) [ 25.493471] page_type: f5(slab) [ 25.493790] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.494460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.495125] page dumped because: kasan: bad access detected [ 25.495612] [ 25.495760] Memory state around the buggy address: [ 25.496226] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.496706] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.497195] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.497699] ^ [ 25.497895] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.498515] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.498724] ================================================================== [ 25.045418] ================================================================== [ 25.045764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 25.046153] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.046492] [ 25.046603] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.046654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.046668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.046693] Call Trace: [ 25.046715] <TASK> [ 25.046735] dump_stack_lvl+0x73/0xb0 [ 25.046763] print_report+0xd1/0x650 [ 25.046786] ? __virt_addr_valid+0x1db/0x2d0 [ 25.046811] ? kasan_atomics_helper+0xe78/0x5450 [ 25.046833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.046861] ? kasan_atomics_helper+0xe78/0x5450 [ 25.046883] kasan_report+0x141/0x180 [ 25.046906] ? kasan_atomics_helper+0xe78/0x5450 [ 25.046932] kasan_check_range+0x10c/0x1c0 [ 25.046956] __kasan_check_write+0x18/0x20 [ 25.046981] kasan_atomics_helper+0xe78/0x5450 [ 25.047031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.047060] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.047086] ? kasan_atomics+0x152/0x310 [ 25.047114] kasan_atomics+0x1dc/0x310 [ 25.047137] ? __pfx_kasan_atomics+0x10/0x10 [ 25.047161] ? trace_hardirqs_on+0x37/0xe0 [ 25.047186] ? __pfx_read_tsc+0x10/0x10 [ 25.047209] ? ktime_get_ts64+0x86/0x230 [ 25.047244] kunit_try_run_case+0x1a5/0x480 [ 25.047270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.047296] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.047324] ? __kthread_parkme+0x82/0x180 [ 25.047350] ? preempt_count_sub+0x50/0x80 [ 25.047377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.047404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.047429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.047454] kthread+0x337/0x6f0 [ 25.047475] ? trace_preempt_on+0x20/0xc0 [ 25.047500] ? __pfx_kthread+0x10/0x10 [ 25.047521] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.047546] ? calculate_sigpending+0x7b/0xa0 [ 25.047571] ? __pfx_kthread+0x10/0x10 [ 25.047593] ret_from_fork+0x116/0x1d0 [ 25.047613] ? __pfx_kthread+0x10/0x10 [ 25.047634] ret_from_fork_asm+0x1a/0x30 [ 25.047667] </TASK> [ 25.047679] [ 25.054745] Allocated by task 294: [ 25.054919] kasan_save_stack+0x45/0x70 [ 25.055122] kasan_save_track+0x18/0x40 [ 25.055302] kasan_save_alloc_info+0x3b/0x50 [ 25.055492] __kasan_kmalloc+0xb7/0xc0 [ 25.055656] __kmalloc_cache_noprof+0x189/0x420 [ 25.055842] kasan_atomics+0x95/0x310 [ 25.055991] kunit_try_run_case+0x1a5/0x480 [ 25.056214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.056447] kthread+0x337/0x6f0 [ 25.056591] ret_from_fork+0x116/0x1d0 [ 25.056723] ret_from_fork_asm+0x1a/0x30 [ 25.056917] [ 25.057025] The buggy address belongs to the object at ffff888100aaa000 [ 25.057025] which belongs to the cache kmalloc-64 of size 64 [ 25.057492] The buggy address is located 0 bytes to the right of [ 25.057492] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.057919] [ 25.057994] The buggy address belongs to the physical page: [ 25.058182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.058545] flags: 0x200000000000000(node=0|zone=2) [ 25.058775] page_type: f5(slab) [ 25.058946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.059331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.059626] page dumped because: kasan: bad access detected [ 25.059811] [ 25.059875] Memory state around the buggy address: [ 25.060046] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.060372] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.060693] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.060989] ^ [ 25.061201] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.061500] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.061771] ================================================================== [ 25.062430] ================================================================== [ 25.062765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 25.063152] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.063495] [ 25.063599] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.063645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.063658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.063682] Call Trace: [ 25.063700] <TASK> [ 25.063718] dump_stack_lvl+0x73/0xb0 [ 25.063745] print_report+0xd1/0x650 [ 25.063768] ? __virt_addr_valid+0x1db/0x2d0 [ 25.063792] ? kasan_atomics_helper+0xf10/0x5450 [ 25.063815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.063841] ? kasan_atomics_helper+0xf10/0x5450 [ 25.063864] kasan_report+0x141/0x180 [ 25.063887] ? kasan_atomics_helper+0xf10/0x5450 [ 25.063913] kasan_check_range+0x10c/0x1c0 [ 25.063937] __kasan_check_write+0x18/0x20 [ 25.063962] kasan_atomics_helper+0xf10/0x5450 [ 25.063985] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.064036] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.064062] ? kasan_atomics+0x152/0x310 [ 25.064089] kasan_atomics+0x1dc/0x310 [ 25.064112] ? __pfx_kasan_atomics+0x10/0x10 [ 25.064135] ? trace_hardirqs_on+0x37/0xe0 [ 25.064159] ? __pfx_read_tsc+0x10/0x10 [ 25.064183] ? ktime_get_ts64+0x86/0x230 [ 25.064209] kunit_try_run_case+0x1a5/0x480 [ 25.065287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.065332] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.065364] ? __kthread_parkme+0x82/0x180 [ 25.065387] ? preempt_count_sub+0x50/0x80 [ 25.065414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.065440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.065465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.065489] kthread+0x337/0x6f0 [ 25.065510] ? trace_preempt_on+0x20/0xc0 [ 25.065534] ? __pfx_kthread+0x10/0x10 [ 25.065556] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.065580] ? calculate_sigpending+0x7b/0xa0 [ 25.065604] ? __pfx_kthread+0x10/0x10 [ 25.065626] ret_from_fork+0x116/0x1d0 [ 25.065646] ? __pfx_kthread+0x10/0x10 [ 25.065667] ret_from_fork_asm+0x1a/0x30 [ 25.065698] </TASK> [ 25.065711] [ 25.081420] Allocated by task 294: [ 25.081613] kasan_save_stack+0x45/0x70 [ 25.081819] kasan_save_track+0x18/0x40 [ 25.081990] kasan_save_alloc_info+0x3b/0x50 [ 25.082180] __kasan_kmalloc+0xb7/0xc0 [ 25.082361] __kmalloc_cache_noprof+0x189/0x420 [ 25.082566] kasan_atomics+0x95/0x310 [ 25.082738] kunit_try_run_case+0x1a5/0x480 [ 25.082921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.083806] kthread+0x337/0x6f0 [ 25.084080] ret_from_fork+0x116/0x1d0 [ 25.084237] ret_from_fork_asm+0x1a/0x30 [ 25.084630] [ 25.084726] The buggy address belongs to the object at ffff888100aaa000 [ 25.084726] which belongs to the cache kmalloc-64 of size 64 [ 25.085613] The buggy address is located 0 bytes to the right of [ 25.085613] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.086395] [ 25.086620] The buggy address belongs to the physical page: [ 25.087042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.087553] flags: 0x200000000000000(node=0|zone=2) [ 25.087956] page_type: f5(slab) [ 25.088316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.088802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.089301] page dumped because: kasan: bad access detected [ 25.089725] [ 25.089817] Memory state around the buggy address: [ 25.090196] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.090511] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.090802] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.091399] ^ [ 25.091672] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.092149] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.092639] ================================================================== [ 25.094113] ================================================================== [ 25.094469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 25.094786] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.095342] [ 25.095717] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.095779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.095794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.095819] Call Trace: [ 25.095843] <TASK> [ 25.095902] dump_stack_lvl+0x73/0xb0 [ 25.095936] print_report+0xd1/0x650 [ 25.095959] ? __virt_addr_valid+0x1db/0x2d0 [ 25.095984] ? kasan_atomics_helper+0xfa9/0x5450 [ 25.096006] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.096044] ? kasan_atomics_helper+0xfa9/0x5450 [ 25.096066] kasan_report+0x141/0x180 [ 25.096090] ? kasan_atomics_helper+0xfa9/0x5450 [ 25.096116] kasan_check_range+0x10c/0x1c0 [ 25.096141] __kasan_check_write+0x18/0x20 [ 25.096165] kasan_atomics_helper+0xfa9/0x5450 [ 25.096188] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.096213] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.096252] ? kasan_atomics+0x152/0x310 [ 25.096279] kasan_atomics+0x1dc/0x310 [ 25.096302] ? __pfx_kasan_atomics+0x10/0x10 [ 25.096325] ? trace_hardirqs_on+0x37/0xe0 [ 25.096350] ? __pfx_read_tsc+0x10/0x10 [ 25.096373] ? ktime_get_ts64+0x86/0x230 [ 25.096399] kunit_try_run_case+0x1a5/0x480 [ 25.096425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.096450] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.096478] ? __kthread_parkme+0x82/0x180 [ 25.096500] ? preempt_count_sub+0x50/0x80 [ 25.096524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.096549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.096574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.096598] kthread+0x337/0x6f0 [ 25.096619] ? trace_preempt_on+0x20/0xc0 [ 25.096642] ? __pfx_kthread+0x10/0x10 [ 25.096664] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.096688] ? calculate_sigpending+0x7b/0xa0 [ 25.096714] ? __pfx_kthread+0x10/0x10 [ 25.096737] ret_from_fork+0x116/0x1d0 [ 25.096757] ? __pfx_kthread+0x10/0x10 [ 25.096778] ret_from_fork_asm+0x1a/0x30 [ 25.096810] </TASK> [ 25.096822] [ 25.107819] Allocated by task 294: [ 25.108150] kasan_save_stack+0x45/0x70 [ 25.108358] kasan_save_track+0x18/0x40 [ 25.108535] kasan_save_alloc_info+0x3b/0x50 [ 25.108723] __kasan_kmalloc+0xb7/0xc0 [ 25.108884] __kmalloc_cache_noprof+0x189/0x420 [ 25.109157] kasan_atomics+0x95/0x310 [ 25.109310] kunit_try_run_case+0x1a5/0x480 [ 25.109454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.109664] kthread+0x337/0x6f0 [ 25.109828] ret_from_fork+0x116/0x1d0 [ 25.110012] ret_from_fork_asm+0x1a/0x30 [ 25.110179] [ 25.110256] The buggy address belongs to the object at ffff888100aaa000 [ 25.110256] which belongs to the cache kmalloc-64 of size 64 [ 25.110876] The buggy address is located 0 bytes to the right of [ 25.110876] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.111466] [ 25.111564] The buggy address belongs to the physical page: [ 25.111816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.112197] flags: 0x200000000000000(node=0|zone=2) [ 25.112368] page_type: f5(slab) [ 25.112633] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.112922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.113201] page dumped because: kasan: bad access detected [ 25.113381] [ 25.113469] Memory state around the buggy address: [ 25.113688] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.114007] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.114277] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.114588] ^ [ 25.114809] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.115131] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.115443] ================================================================== [ 24.768893] ================================================================== [ 24.769173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 24.770364] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.770718] [ 24.770838] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.770894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.770908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.770933] Call Trace: [ 24.770955] <TASK> [ 24.770978] dump_stack_lvl+0x73/0xb0 [ 24.771010] print_report+0xd1/0x650 [ 24.771042] ? __virt_addr_valid+0x1db/0x2d0 [ 24.771069] ? kasan_atomics_helper+0x565/0x5450 [ 24.771091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.771118] ? kasan_atomics_helper+0x565/0x5450 [ 24.771140] kasan_report+0x141/0x180 [ 24.771162] ? kasan_atomics_helper+0x565/0x5450 [ 24.771189] kasan_check_range+0x10c/0x1c0 [ 24.771212] __kasan_check_write+0x18/0x20 [ 24.771464] kasan_atomics_helper+0x565/0x5450 [ 24.771487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.771513] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.771540] ? kasan_atomics+0x152/0x310 [ 24.771589] kasan_atomics+0x1dc/0x310 [ 24.771613] ? __pfx_kasan_atomics+0x10/0x10 [ 24.771636] ? trace_hardirqs_on+0x37/0xe0 [ 24.771660] ? __pfx_read_tsc+0x10/0x10 [ 24.771684] ? ktime_get_ts64+0x86/0x230 [ 24.771710] kunit_try_run_case+0x1a5/0x480 [ 24.771737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.771784] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.771812] ? __kthread_parkme+0x82/0x180 [ 24.771834] ? preempt_count_sub+0x50/0x80 [ 24.771858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.771884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.771908] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.771933] kthread+0x337/0x6f0 [ 24.771953] ? trace_preempt_on+0x20/0xc0 [ 24.771976] ? __pfx_kthread+0x10/0x10 [ 24.771997] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.772033] ? calculate_sigpending+0x7b/0xa0 [ 24.772059] ? __pfx_kthread+0x10/0x10 [ 24.772081] ret_from_fork+0x116/0x1d0 [ 24.772102] ? __pfx_kthread+0x10/0x10 [ 24.772126] ret_from_fork_asm+0x1a/0x30 [ 24.772162] </TASK> [ 24.772175] [ 24.781800] Allocated by task 294: [ 24.782005] kasan_save_stack+0x45/0x70 [ 24.782200] kasan_save_track+0x18/0x40 [ 24.782345] kasan_save_alloc_info+0x3b/0x50 [ 24.782491] __kasan_kmalloc+0xb7/0xc0 [ 24.782677] __kmalloc_cache_noprof+0x189/0x420 [ 24.782898] kasan_atomics+0x95/0x310 [ 24.783058] kunit_try_run_case+0x1a5/0x480 [ 24.783261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.783453] kthread+0x337/0x6f0 [ 24.783618] ret_from_fork+0x116/0x1d0 [ 24.783803] ret_from_fork_asm+0x1a/0x30 [ 24.783998] [ 24.784097] The buggy address belongs to the object at ffff888100aaa000 [ 24.784097] which belongs to the cache kmalloc-64 of size 64 [ 24.784528] The buggy address is located 0 bytes to the right of [ 24.784528] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.785297] [ 24.785722] The buggy address belongs to the physical page: [ 24.785960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.786508] flags: 0x200000000000000(node=0|zone=2) [ 24.786717] page_type: f5(slab) [ 24.786874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.787492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.787859] page dumped because: kasan: bad access detected [ 24.788258] [ 24.788335] Memory state around the buggy address: [ 24.788568] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.788870] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.789420] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.789785] ^ [ 24.790146] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.790575] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.790995] ================================================================== [ 25.349827] ================================================================== [ 25.350400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 25.350699] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.350920] [ 25.351003] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.351057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.351070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.351095] Call Trace: [ 25.351116] <TASK> [ 25.351136] dump_stack_lvl+0x73/0xb0 [ 25.351164] print_report+0xd1/0x650 [ 25.351187] ? __virt_addr_valid+0x1db/0x2d0 [ 25.351212] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.351246] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.351275] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.351297] kasan_report+0x141/0x180 [ 25.351320] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.351346] __asan_report_store8_noabort+0x1b/0x30 [ 25.351371] kasan_atomics_helper+0x50d4/0x5450 [ 25.351395] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.351421] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.351447] ? kasan_atomics+0x152/0x310 [ 25.351476] kasan_atomics+0x1dc/0x310 [ 25.351498] ? __pfx_kasan_atomics+0x10/0x10 [ 25.351522] ? trace_hardirqs_on+0x37/0xe0 [ 25.351546] ? __pfx_read_tsc+0x10/0x10 [ 25.351570] ? ktime_get_ts64+0x86/0x230 [ 25.351596] kunit_try_run_case+0x1a5/0x480 [ 25.351623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.351648] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.351675] ? __kthread_parkme+0x82/0x180 [ 25.351697] ? preempt_count_sub+0x50/0x80 [ 25.351721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.351747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.351772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.351796] kthread+0x337/0x6f0 [ 25.351816] ? trace_preempt_on+0x20/0xc0 [ 25.351839] ? __pfx_kthread+0x10/0x10 [ 25.351860] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.351885] ? calculate_sigpending+0x7b/0xa0 [ 25.351911] ? __pfx_kthread+0x10/0x10 [ 25.351932] ret_from_fork+0x116/0x1d0 [ 25.351953] ? __pfx_kthread+0x10/0x10 [ 25.351974] ret_from_fork_asm+0x1a/0x30 [ 25.352006] </TASK> [ 25.352019] [ 25.359520] Allocated by task 294: [ 25.359660] kasan_save_stack+0x45/0x70 [ 25.359802] kasan_save_track+0x18/0x40 [ 25.359932] kasan_save_alloc_info+0x3b/0x50 [ 25.360074] __kasan_kmalloc+0xb7/0xc0 [ 25.360199] __kmalloc_cache_noprof+0x189/0x420 [ 25.360470] kasan_atomics+0x95/0x310 [ 25.360655] kunit_try_run_case+0x1a5/0x480 [ 25.360859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.361102] kthread+0x337/0x6f0 [ 25.361276] ret_from_fork+0x116/0x1d0 [ 25.361459] ret_from_fork_asm+0x1a/0x30 [ 25.361653] [ 25.361742] The buggy address belongs to the object at ffff888100aaa000 [ 25.361742] which belongs to the cache kmalloc-64 of size 64 [ 25.362130] The buggy address is located 0 bytes to the right of [ 25.362130] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.362966] [ 25.363069] The buggy address belongs to the physical page: [ 25.363318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.363559] flags: 0x200000000000000(node=0|zone=2) [ 25.363720] page_type: f5(slab) [ 25.363888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.364483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.364791] page dumped because: kasan: bad access detected [ 25.365030] [ 25.365120] Memory state around the buggy address: [ 25.365350] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.365617] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.365908] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.366238] ^ [ 25.366445] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.366758] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.367107] ================================================================== [ 25.408283] ================================================================== [ 25.408574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 25.409032] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.409335] [ 25.409438] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.409492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.409507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.409531] Call Trace: [ 25.409553] <TASK> [ 25.409573] dump_stack_lvl+0x73/0xb0 [ 25.409603] print_report+0xd1/0x650 [ 25.409626] ? __virt_addr_valid+0x1db/0x2d0 [ 25.409651] ? kasan_atomics_helper+0x164f/0x5450 [ 25.409674] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.409701] ? kasan_atomics_helper+0x164f/0x5450 [ 25.409723] kasan_report+0x141/0x180 [ 25.409746] ? kasan_atomics_helper+0x164f/0x5450 [ 25.409772] kasan_check_range+0x10c/0x1c0 [ 25.409797] __kasan_check_write+0x18/0x20 [ 25.409821] kasan_atomics_helper+0x164f/0x5450 [ 25.409845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.409871] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.409897] ? kasan_atomics+0x152/0x310 [ 25.409924] kasan_atomics+0x1dc/0x310 [ 25.409947] ? __pfx_kasan_atomics+0x10/0x10 [ 25.409970] ? trace_hardirqs_on+0x37/0xe0 [ 25.409995] ? __pfx_read_tsc+0x10/0x10 [ 25.410027] ? ktime_get_ts64+0x86/0x230 [ 25.410053] kunit_try_run_case+0x1a5/0x480 [ 25.410079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.410105] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.410133] ? __kthread_parkme+0x82/0x180 [ 25.410155] ? preempt_count_sub+0x50/0x80 [ 25.410180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.410205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.410241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.410266] kthread+0x337/0x6f0 [ 25.410287] ? trace_preempt_on+0x20/0xc0 [ 25.410310] ? __pfx_kthread+0x10/0x10 [ 25.410331] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.410357] ? calculate_sigpending+0x7b/0xa0 [ 25.410382] ? __pfx_kthread+0x10/0x10 [ 25.410405] ret_from_fork+0x116/0x1d0 [ 25.410426] ? __pfx_kthread+0x10/0x10 [ 25.410448] ret_from_fork_asm+0x1a/0x30 [ 25.410480] </TASK> [ 25.410492] [ 25.417713] Allocated by task 294: [ 25.417896] kasan_save_stack+0x45/0x70 [ 25.418124] kasan_save_track+0x18/0x40 [ 25.418268] kasan_save_alloc_info+0x3b/0x50 [ 25.418411] __kasan_kmalloc+0xb7/0xc0 [ 25.418539] __kmalloc_cache_noprof+0x189/0x420 [ 25.418690] kasan_atomics+0x95/0x310 [ 25.418815] kunit_try_run_case+0x1a5/0x480 [ 25.419004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.419290] kthread+0x337/0x6f0 [ 25.419461] ret_from_fork+0x116/0x1d0 [ 25.419648] ret_from_fork_asm+0x1a/0x30 [ 25.419844] [ 25.419934] The buggy address belongs to the object at ffff888100aaa000 [ 25.419934] which belongs to the cache kmalloc-64 of size 64 [ 25.420881] The buggy address is located 0 bytes to the right of [ 25.420881] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.421420] [ 25.421490] The buggy address belongs to the physical page: [ 25.421712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.422090] flags: 0x200000000000000(node=0|zone=2) [ 25.422315] page_type: f5(slab) [ 25.422476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.422787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.423128] page dumped because: kasan: bad access detected [ 25.423311] [ 25.423382] Memory state around the buggy address: [ 25.423535] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.423749] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.423977] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.424633] ^ [ 25.424854] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.425165] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.425661] ================================================================== [ 25.294272] ================================================================== [ 25.294644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 25.295140] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.295390] [ 25.295501] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.295551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.295568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.295593] Call Trace: [ 25.295616] <TASK> [ 25.295636] dump_stack_lvl+0x73/0xb0 [ 25.295666] print_report+0xd1/0x650 [ 25.295690] ? __virt_addr_valid+0x1db/0x2d0 [ 25.295715] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.295737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.295764] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.295786] kasan_report+0x141/0x180 [ 25.295808] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.295834] kasan_check_range+0x10c/0x1c0 [ 25.295858] __kasan_check_read+0x15/0x20 [ 25.295882] kasan_atomics_helper+0x13b5/0x5450 [ 25.295905] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.295930] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.295956] ? kasan_atomics+0x152/0x310 [ 25.295983] kasan_atomics+0x1dc/0x310 [ 25.296007] ? __pfx_kasan_atomics+0x10/0x10 [ 25.296029] ? trace_hardirqs_on+0x37/0xe0 [ 25.296076] ? __pfx_read_tsc+0x10/0x10 [ 25.296102] ? ktime_get_ts64+0x86/0x230 [ 25.296128] kunit_try_run_case+0x1a5/0x480 [ 25.296165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.296191] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.296234] ? __kthread_parkme+0x82/0x180 [ 25.296256] ? preempt_count_sub+0x50/0x80 [ 25.296281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.296306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.296330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.296355] kthread+0x337/0x6f0 [ 25.296376] ? trace_preempt_on+0x20/0xc0 [ 25.296400] ? __pfx_kthread+0x10/0x10 [ 25.296422] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.296447] ? calculate_sigpending+0x7b/0xa0 [ 25.296472] ? __pfx_kthread+0x10/0x10 [ 25.296495] ret_from_fork+0x116/0x1d0 [ 25.296515] ? __pfx_kthread+0x10/0x10 [ 25.296536] ret_from_fork_asm+0x1a/0x30 [ 25.296569] </TASK> [ 25.296581] [ 25.304030] Allocated by task 294: [ 25.304245] kasan_save_stack+0x45/0x70 [ 25.304451] kasan_save_track+0x18/0x40 [ 25.304664] kasan_save_alloc_info+0x3b/0x50 [ 25.304868] __kasan_kmalloc+0xb7/0xc0 [ 25.305194] __kmalloc_cache_noprof+0x189/0x420 [ 25.305356] kasan_atomics+0x95/0x310 [ 25.305483] kunit_try_run_case+0x1a5/0x480 [ 25.305623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.305790] kthread+0x337/0x6f0 [ 25.305904] ret_from_fork+0x116/0x1d0 [ 25.306055] ret_from_fork_asm+0x1a/0x30 [ 25.306259] [ 25.306350] The buggy address belongs to the object at ffff888100aaa000 [ 25.306350] which belongs to the cache kmalloc-64 of size 64 [ 25.306883] The buggy address is located 0 bytes to the right of [ 25.306883] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.307950] [ 25.308043] The buggy address belongs to the physical page: [ 25.308320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.308656] flags: 0x200000000000000(node=0|zone=2) [ 25.308819] page_type: f5(slab) [ 25.308965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.309660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.309978] page dumped because: kasan: bad access detected [ 25.310274] [ 25.310365] Memory state around the buggy address: [ 25.310572] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.310921] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.311248] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.311530] ^ [ 25.311757] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.312038] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.312276] ================================================================== [ 24.906089] ================================================================== [ 24.906345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 24.906575] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.907238] [ 24.907350] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.907401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.907415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.907439] Call Trace: [ 24.907460] <TASK> [ 24.907479] dump_stack_lvl+0x73/0xb0 [ 24.907509] print_report+0xd1/0x650 [ 24.907532] ? __virt_addr_valid+0x1db/0x2d0 [ 24.907558] ? kasan_atomics_helper+0x992/0x5450 [ 24.907580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.907608] ? kasan_atomics_helper+0x992/0x5450 [ 24.907631] kasan_report+0x141/0x180 [ 24.907653] ? kasan_atomics_helper+0x992/0x5450 [ 24.907680] kasan_check_range+0x10c/0x1c0 [ 24.907704] __kasan_check_write+0x18/0x20 [ 24.907728] kasan_atomics_helper+0x992/0x5450 [ 24.907751] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.907778] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.907804] ? kasan_atomics+0x152/0x310 [ 24.907831] kasan_atomics+0x1dc/0x310 [ 24.907855] ? __pfx_kasan_atomics+0x10/0x10 [ 24.907879] ? trace_hardirqs_on+0x37/0xe0 [ 24.907903] ? __pfx_read_tsc+0x10/0x10 [ 24.907926] ? ktime_get_ts64+0x86/0x230 [ 24.907952] kunit_try_run_case+0x1a5/0x480 [ 24.907978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.908004] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.908032] ? __kthread_parkme+0x82/0x180 [ 24.908053] ? preempt_count_sub+0x50/0x80 [ 24.908079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.908104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.908129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.908154] kthread+0x337/0x6f0 [ 24.908175] ? trace_preempt_on+0x20/0xc0 [ 24.908198] ? __pfx_kthread+0x10/0x10 [ 24.908231] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.908256] ? calculate_sigpending+0x7b/0xa0 [ 24.908282] ? __pfx_kthread+0x10/0x10 [ 24.908304] ret_from_fork+0x116/0x1d0 [ 24.908325] ? __pfx_kthread+0x10/0x10 [ 24.908347] ret_from_fork_asm+0x1a/0x30 [ 24.908378] </TASK> [ 24.908392] [ 24.915820] Allocated by task 294: [ 24.915952] kasan_save_stack+0x45/0x70 [ 24.916095] kasan_save_track+0x18/0x40 [ 24.916274] kasan_save_alloc_info+0x3b/0x50 [ 24.916493] __kasan_kmalloc+0xb7/0xc0 [ 24.916680] __kmalloc_cache_noprof+0x189/0x420 [ 24.916899] kasan_atomics+0x95/0x310 [ 24.917149] kunit_try_run_case+0x1a5/0x480 [ 24.917367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.917622] kthread+0x337/0x6f0 [ 24.917784] ret_from_fork+0x116/0x1d0 [ 24.917974] ret_from_fork_asm+0x1a/0x30 [ 24.918171] [ 24.918248] The buggy address belongs to the object at ffff888100aaa000 [ 24.918248] which belongs to the cache kmalloc-64 of size 64 [ 24.918594] The buggy address is located 0 bytes to the right of [ 24.918594] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.918953] [ 24.919024] The buggy address belongs to the physical page: [ 24.919207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.919460] flags: 0x200000000000000(node=0|zone=2) [ 24.919623] page_type: f5(slab) [ 24.919792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.920141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.920496] page dumped because: kasan: bad access detected [ 24.920766] [ 24.920854] Memory state around the buggy address: [ 24.921075] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.921405] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.921797] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.922068] ^ [ 24.922240] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.922450] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.922658] ================================================================== [ 24.940658] ================================================================== [ 24.940902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 24.941127] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.941358] [ 24.941439] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.941487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.941500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.941523] Call Trace: [ 24.941542] <TASK> [ 24.941560] dump_stack_lvl+0x73/0xb0 [ 24.941588] print_report+0xd1/0x650 [ 24.941611] ? __virt_addr_valid+0x1db/0x2d0 [ 24.941635] ? kasan_atomics_helper+0xac7/0x5450 [ 24.941656] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.941682] ? kasan_atomics_helper+0xac7/0x5450 [ 24.941704] kasan_report+0x141/0x180 [ 24.941726] ? kasan_atomics_helper+0xac7/0x5450 [ 24.941752] kasan_check_range+0x10c/0x1c0 [ 24.941775] __kasan_check_write+0x18/0x20 [ 24.941798] kasan_atomics_helper+0xac7/0x5450 [ 24.941821] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.941848] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.941872] ? kasan_atomics+0x152/0x310 [ 24.941899] kasan_atomics+0x1dc/0x310 [ 24.941922] ? __pfx_kasan_atomics+0x10/0x10 [ 24.942205] ? trace_hardirqs_on+0x37/0xe0 [ 24.942241] ? __pfx_read_tsc+0x10/0x10 [ 24.942265] ? ktime_get_ts64+0x86/0x230 [ 24.942293] kunit_try_run_case+0x1a5/0x480 [ 24.942320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.942347] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.942375] ? __kthread_parkme+0x82/0x180 [ 24.942397] ? preempt_count_sub+0x50/0x80 [ 24.942421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.942446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.942470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.942496] kthread+0x337/0x6f0 [ 24.942517] ? trace_preempt_on+0x20/0xc0 [ 24.942540] ? __pfx_kthread+0x10/0x10 [ 24.942562] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.942586] ? calculate_sigpending+0x7b/0xa0 [ 24.942612] ? __pfx_kthread+0x10/0x10 [ 24.942633] ret_from_fork+0x116/0x1d0 [ 24.942654] ? __pfx_kthread+0x10/0x10 [ 24.942675] ret_from_fork_asm+0x1a/0x30 [ 24.942706] </TASK> [ 24.942719] [ 24.950272] Allocated by task 294: [ 24.950449] kasan_save_stack+0x45/0x70 [ 24.950649] kasan_save_track+0x18/0x40 [ 24.950869] kasan_save_alloc_info+0x3b/0x50 [ 24.951094] __kasan_kmalloc+0xb7/0xc0 [ 24.951293] __kmalloc_cache_noprof+0x189/0x420 [ 24.951542] kasan_atomics+0x95/0x310 [ 24.951677] kunit_try_run_case+0x1a5/0x480 [ 24.951818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.951984] kthread+0x337/0x6f0 [ 24.952097] ret_from_fork+0x116/0x1d0 [ 24.952232] ret_from_fork_asm+0x1a/0x30 [ 24.952365] [ 24.952430] The buggy address belongs to the object at ffff888100aaa000 [ 24.952430] which belongs to the cache kmalloc-64 of size 64 [ 24.952796] The buggy address is located 0 bytes to the right of [ 24.952796] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.953355] [ 24.953534] The buggy address belongs to the physical page: [ 24.953801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.954317] flags: 0x200000000000000(node=0|zone=2) [ 24.954548] page_type: f5(slab) [ 24.954717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.955057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.955320] page dumped because: kasan: bad access detected [ 24.955487] [ 24.955551] Memory state around the buggy address: [ 24.955701] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.955911] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.956422] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.956739] ^ [ 24.956968] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.957272] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.957610] ================================================================== [ 25.593045] ================================================================== [ 25.593345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 25.593576] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.593986] [ 25.594157] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.594208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.594232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.594256] Call Trace: [ 25.594276] <TASK> [ 25.594295] dump_stack_lvl+0x73/0xb0 [ 25.594322] print_report+0xd1/0x650 [ 25.594346] ? __virt_addr_valid+0x1db/0x2d0 [ 25.594370] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.594392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.594419] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.594455] kasan_report+0x141/0x180 [ 25.594478] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.594517] kasan_check_range+0x10c/0x1c0 [ 25.594542] __kasan_check_write+0x18/0x20 [ 25.594565] kasan_atomics_helper+0x1b22/0x5450 [ 25.594598] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.594625] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.594658] ? kasan_atomics+0x152/0x310 [ 25.594685] kasan_atomics+0x1dc/0x310 [ 25.594708] ? __pfx_kasan_atomics+0x10/0x10 [ 25.594741] ? trace_hardirqs_on+0x37/0xe0 [ 25.594764] ? __pfx_read_tsc+0x10/0x10 [ 25.594787] ? ktime_get_ts64+0x86/0x230 [ 25.594812] kunit_try_run_case+0x1a5/0x480 [ 25.594837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.594863] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.594891] ? __kthread_parkme+0x82/0x180 [ 25.594911] ? preempt_count_sub+0x50/0x80 [ 25.594935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.594959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.594984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.595032] kthread+0x337/0x6f0 [ 25.595053] ? trace_preempt_on+0x20/0xc0 [ 25.595086] ? __pfx_kthread+0x10/0x10 [ 25.595108] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.595133] ? calculate_sigpending+0x7b/0xa0 [ 25.595158] ? __pfx_kthread+0x10/0x10 [ 25.595180] ret_from_fork+0x116/0x1d0 [ 25.595200] ? __pfx_kthread+0x10/0x10 [ 25.595237] ret_from_fork_asm+0x1a/0x30 [ 25.595270] </TASK> [ 25.595292] [ 25.602337] Allocated by task 294: [ 25.602509] kasan_save_stack+0x45/0x70 [ 25.602700] kasan_save_track+0x18/0x40 [ 25.602885] kasan_save_alloc_info+0x3b/0x50 [ 25.603171] __kasan_kmalloc+0xb7/0xc0 [ 25.603361] __kmalloc_cache_noprof+0x189/0x420 [ 25.603576] kasan_atomics+0x95/0x310 [ 25.603755] kunit_try_run_case+0x1a5/0x480 [ 25.603955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.604341] kthread+0x337/0x6f0 [ 25.604504] ret_from_fork+0x116/0x1d0 [ 25.604677] ret_from_fork_asm+0x1a/0x30 [ 25.604811] [ 25.604875] The buggy address belongs to the object at ffff888100aaa000 [ 25.604875] which belongs to the cache kmalloc-64 of size 64 [ 25.605672] The buggy address is located 0 bytes to the right of [ 25.605672] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.606263] [ 25.606398] The buggy address belongs to the physical page: [ 25.606669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.606982] flags: 0x200000000000000(node=0|zone=2) [ 25.607338] page_type: f5(slab) [ 25.607522] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.607798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.608020] page dumped because: kasan: bad access detected [ 25.608278] [ 25.608367] Memory state around the buggy address: [ 25.608788] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.609092] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.609423] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.609924] ^ [ 25.610814] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.611146] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.611532] ================================================================== [ 25.665901] ================================================================== [ 25.666356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 25.666639] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.666915] [ 25.667189] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.667260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.667275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.667299] Call Trace: [ 25.667321] <TASK> [ 25.667344] dump_stack_lvl+0x73/0xb0 [ 25.667375] print_report+0xd1/0x650 [ 25.667400] ? __virt_addr_valid+0x1db/0x2d0 [ 25.667426] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.667449] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.667475] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.667498] kasan_report+0x141/0x180 [ 25.667521] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.667547] kasan_check_range+0x10c/0x1c0 [ 25.667571] __kasan_check_write+0x18/0x20 [ 25.667595] kasan_atomics_helper+0x1ce1/0x5450 [ 25.667618] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.667645] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.667670] ? kasan_atomics+0x152/0x310 [ 25.667698] kasan_atomics+0x1dc/0x310 [ 25.667721] ? __pfx_kasan_atomics+0x10/0x10 [ 25.667744] ? trace_hardirqs_on+0x37/0xe0 [ 25.667768] ? __pfx_read_tsc+0x10/0x10 [ 25.667791] ? ktime_get_ts64+0x86/0x230 [ 25.667817] kunit_try_run_case+0x1a5/0x480 [ 25.667845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.667869] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.667897] ? __kthread_parkme+0x82/0x180 [ 25.667919] ? preempt_count_sub+0x50/0x80 [ 25.667944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.667969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.667994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.668018] kthread+0x337/0x6f0 [ 25.668049] ? trace_preempt_on+0x20/0xc0 [ 25.668072] ? __pfx_kthread+0x10/0x10 [ 25.668095] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.668119] ? calculate_sigpending+0x7b/0xa0 [ 25.668144] ? __pfx_kthread+0x10/0x10 [ 25.668167] ret_from_fork+0x116/0x1d0 [ 25.668188] ? __pfx_kthread+0x10/0x10 [ 25.668209] ret_from_fork_asm+0x1a/0x30 [ 25.668254] </TASK> [ 25.668266] [ 25.675264] Allocated by task 294: [ 25.675608] kasan_save_stack+0x45/0x70 [ 25.675808] kasan_save_track+0x18/0x40 [ 25.675992] kasan_save_alloc_info+0x3b/0x50 [ 25.676135] __kasan_kmalloc+0xb7/0xc0 [ 25.676281] __kmalloc_cache_noprof+0x189/0x420 [ 25.676433] kasan_atomics+0x95/0x310 [ 25.676595] kunit_try_run_case+0x1a5/0x480 [ 25.676775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.676977] kthread+0x337/0x6f0 [ 25.677296] ret_from_fork+0x116/0x1d0 [ 25.677490] ret_from_fork_asm+0x1a/0x30 [ 25.677654] [ 25.677737] The buggy address belongs to the object at ffff888100aaa000 [ 25.677737] which belongs to the cache kmalloc-64 of size 64 [ 25.678236] The buggy address is located 0 bytes to the right of [ 25.678236] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.678641] [ 25.678735] The buggy address belongs to the physical page: [ 25.678986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.679317] flags: 0x200000000000000(node=0|zone=2) [ 25.679520] page_type: f5(slab) [ 25.679677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.679942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.680270] page dumped because: kasan: bad access detected [ 25.680443] [ 25.680510] Memory state around the buggy address: [ 25.680661] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.680871] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.681172] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.681449] ^ [ 25.681640] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.681959] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.682490] ================================================================== [ 25.555813] ================================================================== [ 25.556478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 25.557291] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.558054] [ 25.558254] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.558317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.558331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.558367] Call Trace: [ 25.558390] <TASK> [ 25.558412] dump_stack_lvl+0x73/0xb0 [ 25.558443] print_report+0xd1/0x650 [ 25.558468] ? __virt_addr_valid+0x1db/0x2d0 [ 25.558493] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.558515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.558541] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.558573] kasan_report+0x141/0x180 [ 25.558596] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.558622] kasan_check_range+0x10c/0x1c0 [ 25.558645] __kasan_check_write+0x18/0x20 [ 25.558669] kasan_atomics_helper+0x19e3/0x5450 [ 25.558701] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.558727] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.558753] ? kasan_atomics+0x152/0x310 [ 25.558790] kasan_atomics+0x1dc/0x310 [ 25.558814] ? __pfx_kasan_atomics+0x10/0x10 [ 25.558836] ? trace_hardirqs_on+0x37/0xe0 [ 25.558861] ? __pfx_read_tsc+0x10/0x10 [ 25.558883] ? ktime_get_ts64+0x86/0x230 [ 25.558908] kunit_try_run_case+0x1a5/0x480 [ 25.558934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.558959] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.558986] ? __kthread_parkme+0x82/0x180 [ 25.559009] ? preempt_count_sub+0x50/0x80 [ 25.559049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.559074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.559098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.559124] kthread+0x337/0x6f0 [ 25.559143] ? trace_preempt_on+0x20/0xc0 [ 25.559166] ? __pfx_kthread+0x10/0x10 [ 25.559187] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.559212] ? calculate_sigpending+0x7b/0xa0 [ 25.559246] ? __pfx_kthread+0x10/0x10 [ 25.559268] ret_from_fork+0x116/0x1d0 [ 25.559289] ? __pfx_kthread+0x10/0x10 [ 25.559311] ret_from_fork_asm+0x1a/0x30 [ 25.559343] </TASK> [ 25.559356] [ 25.566746] Allocated by task 294: [ 25.566877] kasan_save_stack+0x45/0x70 [ 25.567012] kasan_save_track+0x18/0x40 [ 25.567209] kasan_save_alloc_info+0x3b/0x50 [ 25.567434] __kasan_kmalloc+0xb7/0xc0 [ 25.567615] __kmalloc_cache_noprof+0x189/0x420 [ 25.567832] kasan_atomics+0x95/0x310 [ 25.568142] kunit_try_run_case+0x1a5/0x480 [ 25.568294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.568463] kthread+0x337/0x6f0 [ 25.568640] ret_from_fork+0x116/0x1d0 [ 25.568822] ret_from_fork_asm+0x1a/0x30 [ 25.569053] [ 25.569146] The buggy address belongs to the object at ffff888100aaa000 [ 25.569146] which belongs to the cache kmalloc-64 of size 64 [ 25.569726] The buggy address is located 0 bytes to the right of [ 25.569726] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.570244] [ 25.570314] The buggy address belongs to the physical page: [ 25.570562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.570939] flags: 0x200000000000000(node=0|zone=2) [ 25.571175] page_type: f5(slab) [ 25.571313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.571541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.571760] page dumped because: kasan: bad access detected [ 25.571986] [ 25.572072] Memory state around the buggy address: [ 25.572305] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.572643] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.572871] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.573258] ^ [ 25.573477] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.573756] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.574056] ================================================================== [ 24.621997] ================================================================== [ 24.622391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 24.622635] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.622857] [ 24.622941] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.622992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.623004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.623034] Call Trace: [ 24.623048] <TASK> [ 24.623068] dump_stack_lvl+0x73/0xb0 [ 24.623096] print_report+0xd1/0x650 [ 24.623117] ? __virt_addr_valid+0x1db/0x2d0 [ 24.623141] ? kasan_atomics_helper+0x4ba2/0x5450 [ 24.623161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.623187] ? kasan_atomics_helper+0x4ba2/0x5450 [ 24.623207] kasan_report+0x141/0x180 [ 24.623239] ? kasan_atomics_helper+0x4ba2/0x5450 [ 24.623264] __asan_report_store4_noabort+0x1b/0x30 [ 24.623341] kasan_atomics_helper+0x4ba2/0x5450 [ 24.623365] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.623517] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.623544] ? kasan_atomics+0x152/0x310 [ 24.623573] kasan_atomics+0x1dc/0x310 [ 24.623595] ? __pfx_kasan_atomics+0x10/0x10 [ 24.623618] ? trace_hardirqs_on+0x37/0xe0 [ 24.623642] ? __pfx_read_tsc+0x10/0x10 [ 24.623664] ? ktime_get_ts64+0x86/0x230 [ 24.623688] kunit_try_run_case+0x1a5/0x480 [ 24.623712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.623736] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.623762] ? __kthread_parkme+0x82/0x180 [ 24.623784] ? preempt_count_sub+0x50/0x80 [ 24.623808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.623832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.623855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.623878] kthread+0x337/0x6f0 [ 24.623898] ? trace_preempt_on+0x20/0xc0 [ 24.623920] ? __pfx_kthread+0x10/0x10 [ 24.623941] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.623966] ? calculate_sigpending+0x7b/0xa0 [ 24.623990] ? __pfx_kthread+0x10/0x10 [ 24.624011] ret_from_fork+0x116/0x1d0 [ 24.624030] ? __pfx_kthread+0x10/0x10 [ 24.624050] ret_from_fork_asm+0x1a/0x30 [ 24.624081] </TASK> [ 24.624092] [ 24.636047] Allocated by task 294: [ 24.636392] kasan_save_stack+0x45/0x70 [ 24.636542] kasan_save_track+0x18/0x40 [ 24.636671] kasan_save_alloc_info+0x3b/0x50 [ 24.636812] __kasan_kmalloc+0xb7/0xc0 [ 24.636935] __kmalloc_cache_noprof+0x189/0x420 [ 24.637197] kasan_atomics+0x95/0x310 [ 24.637554] kunit_try_run_case+0x1a5/0x480 [ 24.638079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.638572] kthread+0x337/0x6f0 [ 24.638882] ret_from_fork+0x116/0x1d0 [ 24.639287] ret_from_fork_asm+0x1a/0x30 [ 24.639589] [ 24.639659] The buggy address belongs to the object at ffff888100aaa000 [ 24.639659] which belongs to the cache kmalloc-64 of size 64 [ 24.640014] The buggy address is located 0 bytes to the right of [ 24.640014] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.640443] [ 24.640548] The buggy address belongs to the physical page: [ 24.640766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.641028] flags: 0x200000000000000(node=0|zone=2) [ 24.641309] page_type: f5(slab) [ 24.641477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.641803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.642039] page dumped because: kasan: bad access detected [ 24.642360] [ 24.642466] Memory state around the buggy address: [ 24.642690] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.642924] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.643292] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.643587] ^ [ 24.643745] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.643971] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.644404] ================================================================== [ 24.708446] ================================================================== [ 24.708783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 24.709187] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.709500] [ 24.709602] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.709652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.709675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.709699] Call Trace: [ 24.709719] <TASK> [ 24.709739] dump_stack_lvl+0x73/0xb0 [ 24.709779] print_report+0xd1/0x650 [ 24.709802] ? __virt_addr_valid+0x1db/0x2d0 [ 24.709825] ? kasan_atomics_helper+0x4b54/0x5450 [ 24.709847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.709874] ? kasan_atomics_helper+0x4b54/0x5450 [ 24.709895] kasan_report+0x141/0x180 [ 24.709918] ? kasan_atomics_helper+0x4b54/0x5450 [ 24.709945] __asan_report_load4_noabort+0x18/0x20 [ 24.709970] kasan_atomics_helper+0x4b54/0x5450 [ 24.709993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.710019] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.710045] ? kasan_atomics+0x152/0x310 [ 24.710073] kasan_atomics+0x1dc/0x310 [ 24.710096] ? __pfx_kasan_atomics+0x10/0x10 [ 24.710119] ? trace_hardirqs_on+0x37/0xe0 [ 24.710143] ? __pfx_read_tsc+0x10/0x10 [ 24.710166] ? ktime_get_ts64+0x86/0x230 [ 24.710192] kunit_try_run_case+0x1a5/0x480 [ 24.710227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.710262] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.710289] ? __kthread_parkme+0x82/0x180 [ 24.710311] ? preempt_count_sub+0x50/0x80 [ 24.710346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.710371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.710395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.710420] kthread+0x337/0x6f0 [ 24.710441] ? trace_preempt_on+0x20/0xc0 [ 24.710464] ? __pfx_kthread+0x10/0x10 [ 24.710486] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.710510] ? calculate_sigpending+0x7b/0xa0 [ 24.710535] ? __pfx_kthread+0x10/0x10 [ 24.710557] ret_from_fork+0x116/0x1d0 [ 24.710578] ? __pfx_kthread+0x10/0x10 [ 24.710599] ret_from_fork_asm+0x1a/0x30 [ 24.710631] </TASK> [ 24.710643] [ 24.718434] Allocated by task 294: [ 24.718641] kasan_save_stack+0x45/0x70 [ 24.718862] kasan_save_track+0x18/0x40 [ 24.719136] kasan_save_alloc_info+0x3b/0x50 [ 24.719381] __kasan_kmalloc+0xb7/0xc0 [ 24.719550] __kmalloc_cache_noprof+0x189/0x420 [ 24.719779] kasan_atomics+0x95/0x310 [ 24.719928] kunit_try_run_case+0x1a5/0x480 [ 24.720071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.720337] kthread+0x337/0x6f0 [ 24.720529] ret_from_fork+0x116/0x1d0 [ 24.720738] ret_from_fork_asm+0x1a/0x30 [ 24.720921] [ 24.721061] The buggy address belongs to the object at ffff888100aaa000 [ 24.721061] which belongs to the cache kmalloc-64 of size 64 [ 24.721618] The buggy address is located 0 bytes to the right of [ 24.721618] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.722167] [ 24.722305] The buggy address belongs to the physical page: [ 24.722562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.722803] flags: 0x200000000000000(node=0|zone=2) [ 24.722966] page_type: f5(slab) [ 24.723090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.723427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.724190] page dumped because: kasan: bad access detected [ 24.724465] [ 24.724554] Memory state around the buggy address: [ 24.724766] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.724979] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.725506] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.725858] ^ [ 24.726158] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.726384] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.726594] ================================================================== [ 25.902633] ================================================================== [ 25.902884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 25.903122] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.904037] [ 25.904305] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.904361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.904375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.904399] Call Trace: [ 25.905090] <TASK> [ 25.905177] dump_stack_lvl+0x73/0xb0 [ 25.905386] print_report+0xd1/0x650 [ 25.905704] ? __virt_addr_valid+0x1db/0x2d0 [ 25.905741] ? kasan_atomics_helper+0x224c/0x5450 [ 25.905765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.905792] ? kasan_atomics_helper+0x224c/0x5450 [ 25.905814] kasan_report+0x141/0x180 [ 25.905837] ? kasan_atomics_helper+0x224c/0x5450 [ 25.905863] kasan_check_range+0x10c/0x1c0 [ 25.905887] __kasan_check_write+0x18/0x20 [ 25.905911] kasan_atomics_helper+0x224c/0x5450 [ 25.905934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.905959] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.905985] ? kasan_atomics+0x152/0x310 [ 25.906041] kasan_atomics+0x1dc/0x310 [ 25.906065] ? __pfx_kasan_atomics+0x10/0x10 [ 25.906087] ? trace_hardirqs_on+0x37/0xe0 [ 25.906111] ? __pfx_read_tsc+0x10/0x10 [ 25.906134] ? ktime_get_ts64+0x86/0x230 [ 25.906160] kunit_try_run_case+0x1a5/0x480 [ 25.906185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.906211] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.906248] ? __kthread_parkme+0x82/0x180 [ 25.906269] ? preempt_count_sub+0x50/0x80 [ 25.906294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.906319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.906345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.906370] kthread+0x337/0x6f0 [ 25.906390] ? trace_preempt_on+0x20/0xc0 [ 25.906414] ? __pfx_kthread+0x10/0x10 [ 25.906435] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.906460] ? calculate_sigpending+0x7b/0xa0 [ 25.906486] ? __pfx_kthread+0x10/0x10 [ 25.906507] ret_from_fork+0x116/0x1d0 [ 25.906527] ? __pfx_kthread+0x10/0x10 [ 25.906548] ret_from_fork_asm+0x1a/0x30 [ 25.906581] </TASK> [ 25.906593] [ 25.918183] Allocated by task 294: [ 25.918539] kasan_save_stack+0x45/0x70 [ 25.918910] kasan_save_track+0x18/0x40 [ 25.919293] kasan_save_alloc_info+0x3b/0x50 [ 25.919806] __kasan_kmalloc+0xb7/0xc0 [ 25.920230] __kmalloc_cache_noprof+0x189/0x420 [ 25.920698] kasan_atomics+0x95/0x310 [ 25.921056] kunit_try_run_case+0x1a5/0x480 [ 25.921455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.921923] kthread+0x337/0x6f0 [ 25.922295] ret_from_fork+0x116/0x1d0 [ 25.922638] ret_from_fork_asm+0x1a/0x30 [ 25.923000] [ 25.923176] The buggy address belongs to the object at ffff888100aaa000 [ 25.923176] which belongs to the cache kmalloc-64 of size 64 [ 25.923822] The buggy address is located 0 bytes to the right of [ 25.923822] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.924473] [ 25.924638] The buggy address belongs to the physical page: [ 25.925163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.925854] flags: 0x200000000000000(node=0|zone=2) [ 25.926359] page_type: f5(slab) [ 25.926702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.927379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.927757] page dumped because: kasan: bad access detected [ 25.928268] [ 25.928399] Memory state around the buggy address: [ 25.928765] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.928972] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.929389] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.929831] ^ [ 25.929979] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.930198] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.930409] ================================================================== [ 25.499376] ================================================================== [ 25.500198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 25.500853] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.501535] [ 25.501724] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.501788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.501802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.501827] Call Trace: [ 25.501848] <TASK> [ 25.501878] dump_stack_lvl+0x73/0xb0 [ 25.501908] print_report+0xd1/0x650 [ 25.501932] ? __virt_addr_valid+0x1db/0x2d0 [ 25.501968] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.501990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.502036] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.502057] kasan_report+0x141/0x180 [ 25.502080] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.502106] kasan_check_range+0x10c/0x1c0 [ 25.502130] __kasan_check_write+0x18/0x20 [ 25.502153] kasan_atomics_helper+0x18b1/0x5450 [ 25.502176] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.502202] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.502236] ? kasan_atomics+0x152/0x310 [ 25.502263] kasan_atomics+0x1dc/0x310 [ 25.502286] ? __pfx_kasan_atomics+0x10/0x10 [ 25.502309] ? trace_hardirqs_on+0x37/0xe0 [ 25.502332] ? __pfx_read_tsc+0x10/0x10 [ 25.502355] ? ktime_get_ts64+0x86/0x230 [ 25.502381] kunit_try_run_case+0x1a5/0x480 [ 25.502407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.502433] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.502460] ? __kthread_parkme+0x82/0x180 [ 25.502482] ? preempt_count_sub+0x50/0x80 [ 25.502506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.502531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.502555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.502580] kthread+0x337/0x6f0 [ 25.502600] ? trace_preempt_on+0x20/0xc0 [ 25.502623] ? __pfx_kthread+0x10/0x10 [ 25.502645] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.502669] ? calculate_sigpending+0x7b/0xa0 [ 25.502694] ? __pfx_kthread+0x10/0x10 [ 25.502715] ret_from_fork+0x116/0x1d0 [ 25.502735] ? __pfx_kthread+0x10/0x10 [ 25.502757] ret_from_fork_asm+0x1a/0x30 [ 25.502789] </TASK> [ 25.502801] [ 25.515071] Allocated by task 294: [ 25.515433] kasan_save_stack+0x45/0x70 [ 25.515807] kasan_save_track+0x18/0x40 [ 25.516177] kasan_save_alloc_info+0x3b/0x50 [ 25.516491] __kasan_kmalloc+0xb7/0xc0 [ 25.516619] __kmalloc_cache_noprof+0x189/0x420 [ 25.516769] kasan_atomics+0x95/0x310 [ 25.516894] kunit_try_run_case+0x1a5/0x480 [ 25.517123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.517615] kthread+0x337/0x6f0 [ 25.517912] ret_from_fork+0x116/0x1d0 [ 25.518291] ret_from_fork_asm+0x1a/0x30 [ 25.518664] [ 25.518815] The buggy address belongs to the object at ffff888100aaa000 [ 25.518815] which belongs to the cache kmalloc-64 of size 64 [ 25.519889] The buggy address is located 0 bytes to the right of [ 25.519889] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.520706] [ 25.520781] The buggy address belongs to the physical page: [ 25.520951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.521603] flags: 0x200000000000000(node=0|zone=2) [ 25.522044] page_type: f5(slab) [ 25.522353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.523066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.523715] page dumped because: kasan: bad access detected [ 25.523884] [ 25.523950] Memory state around the buggy address: [ 25.524336] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.524961] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.525592] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.525960] ^ [ 25.526380] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.526923] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.527148] ================================================================== [ 25.849261] ================================================================== [ 25.849611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 25.850363] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.850644] [ 25.850752] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.850803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.850817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.850842] Call Trace: [ 25.850864] <TASK> [ 25.850885] dump_stack_lvl+0x73/0xb0 [ 25.850915] print_report+0xd1/0x650 [ 25.850939] ? __virt_addr_valid+0x1db/0x2d0 [ 25.850964] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.850986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.851032] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.851055] kasan_report+0x141/0x180 [ 25.851078] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.851104] __asan_report_load8_noabort+0x18/0x20 [ 25.851129] kasan_atomics_helper+0x4fb2/0x5450 [ 25.851151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.851178] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.851204] ? kasan_atomics+0x152/0x310 [ 25.851244] kasan_atomics+0x1dc/0x310 [ 25.851267] ? __pfx_kasan_atomics+0x10/0x10 [ 25.851290] ? trace_hardirqs_on+0x37/0xe0 [ 25.851314] ? __pfx_read_tsc+0x10/0x10 [ 25.851338] ? ktime_get_ts64+0x86/0x230 [ 25.851364] kunit_try_run_case+0x1a5/0x480 [ 25.851390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.851416] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.851444] ? __kthread_parkme+0x82/0x180 [ 25.851465] ? preempt_count_sub+0x50/0x80 [ 25.851490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.851514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.851539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.851563] kthread+0x337/0x6f0 [ 25.851584] ? trace_preempt_on+0x20/0xc0 [ 25.851607] ? __pfx_kthread+0x10/0x10 [ 25.851629] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.851654] ? calculate_sigpending+0x7b/0xa0 [ 25.851678] ? __pfx_kthread+0x10/0x10 [ 25.851700] ret_from_fork+0x116/0x1d0 [ 25.851720] ? __pfx_kthread+0x10/0x10 [ 25.851741] ret_from_fork_asm+0x1a/0x30 [ 25.851773] </TASK> [ 25.851784] [ 25.858919] Allocated by task 294: [ 25.859095] kasan_save_stack+0x45/0x70 [ 25.859243] kasan_save_track+0x18/0x40 [ 25.859372] kasan_save_alloc_info+0x3b/0x50 [ 25.859515] __kasan_kmalloc+0xb7/0xc0 [ 25.859639] __kmalloc_cache_noprof+0x189/0x420 [ 25.859787] kasan_atomics+0x95/0x310 [ 25.859912] kunit_try_run_case+0x1a5/0x480 [ 25.860176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.860437] kthread+0x337/0x6f0 [ 25.860602] ret_from_fork+0x116/0x1d0 [ 25.860783] ret_from_fork_asm+0x1a/0x30 [ 25.860974] [ 25.861057] The buggy address belongs to the object at ffff888100aaa000 [ 25.861057] which belongs to the cache kmalloc-64 of size 64 [ 25.861817] The buggy address is located 0 bytes to the right of [ 25.861817] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.862361] [ 25.862430] The buggy address belongs to the physical page: [ 25.862597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.862833] flags: 0x200000000000000(node=0|zone=2) [ 25.863115] page_type: f5(slab) [ 25.863291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.863622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.863955] page dumped because: kasan: bad access detected [ 25.864201] [ 25.864301] Memory state around the buggy address: [ 25.864504] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.864760] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.865060] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.865346] ^ [ 25.865542] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.865832] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.866163] ================================================================== [ 24.598410] ================================================================== [ 24.599138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 24.599521] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.599807] [ 24.599932] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.599987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.600063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.600091] Call Trace: [ 24.600106] <TASK> [ 24.600127] dump_stack_lvl+0x73/0xb0 [ 24.600157] print_report+0xd1/0x650 [ 24.600181] ? __virt_addr_valid+0x1db/0x2d0 [ 24.600207] ? kasan_atomics_helper+0x4bbc/0x5450 [ 24.600238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.600264] ? kasan_atomics_helper+0x4bbc/0x5450 [ 24.600285] kasan_report+0x141/0x180 [ 24.600306] ? kasan_atomics_helper+0x4bbc/0x5450 [ 24.600330] __asan_report_load4_noabort+0x18/0x20 [ 24.600355] kasan_atomics_helper+0x4bbc/0x5450 [ 24.600375] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.600437] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.600461] ? kasan_atomics+0x152/0x310 [ 24.600512] kasan_atomics+0x1dc/0x310 [ 24.600533] ? __pfx_kasan_atomics+0x10/0x10 [ 24.600555] ? trace_hardirqs_on+0x37/0xe0 [ 24.600578] ? __pfx_read_tsc+0x10/0x10 [ 24.600600] ? ktime_get_ts64+0x86/0x230 [ 24.600624] kunit_try_run_case+0x1a5/0x480 [ 24.600649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.600673] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.600723] ? __kthread_parkme+0x82/0x180 [ 24.600744] ? preempt_count_sub+0x50/0x80 [ 24.600767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.600801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.600826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.600848] kthread+0x337/0x6f0 [ 24.600868] ? trace_preempt_on+0x20/0xc0 [ 24.600890] ? __pfx_kthread+0x10/0x10 [ 24.600909] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.600932] ? calculate_sigpending+0x7b/0xa0 [ 24.600955] ? __pfx_kthread+0x10/0x10 [ 24.600976] ret_from_fork+0x116/0x1d0 [ 24.600994] ? __pfx_kthread+0x10/0x10 [ 24.601014] ret_from_fork_asm+0x1a/0x30 [ 24.601045] </TASK> [ 24.601057] [ 24.612771] Allocated by task 294: [ 24.612982] kasan_save_stack+0x45/0x70 [ 24.613200] kasan_save_track+0x18/0x40 [ 24.613395] kasan_save_alloc_info+0x3b/0x50 [ 24.613567] __kasan_kmalloc+0xb7/0xc0 [ 24.613686] __kmalloc_cache_noprof+0x189/0x420 [ 24.613830] kasan_atomics+0x95/0x310 [ 24.613953] kunit_try_run_case+0x1a5/0x480 [ 24.614362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.614707] kthread+0x337/0x6f0 [ 24.614868] ret_from_fork+0x116/0x1d0 [ 24.615090] ret_from_fork_asm+0x1a/0x30 [ 24.615287] [ 24.615378] The buggy address belongs to the object at ffff888100aaa000 [ 24.615378] which belongs to the cache kmalloc-64 of size 64 [ 24.616102] The buggy address is located 0 bytes to the right of [ 24.616102] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.616648] [ 24.616723] The buggy address belongs to the physical page: [ 24.616942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.617430] flags: 0x200000000000000(node=0|zone=2) [ 24.617747] page_type: f5(slab) [ 24.617907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.618121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.618678] page dumped because: kasan: bad access detected [ 24.618915] [ 24.618998] Memory state around the buggy address: [ 24.619315] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.619626] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.619981] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.620341] ^ [ 24.620497] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.620809] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.621143] ================================================================== [ 24.645238] ================================================================== [ 24.645541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 24.645824] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.646636] [ 24.646754] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.646807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.646820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.646855] Call Trace: [ 24.646877] <TASK> [ 24.646897] dump_stack_lvl+0x73/0xb0 [ 24.646940] print_report+0xd1/0x650 [ 24.646963] ? __virt_addr_valid+0x1db/0x2d0 [ 24.646986] ? kasan_atomics_helper+0x4b88/0x5450 [ 24.647007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.647051] ? kasan_atomics_helper+0x4b88/0x5450 [ 24.647083] kasan_report+0x141/0x180 [ 24.647105] ? kasan_atomics_helper+0x4b88/0x5450 [ 24.647130] __asan_report_load4_noabort+0x18/0x20 [ 24.647165] kasan_atomics_helper+0x4b88/0x5450 [ 24.647194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.647236] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.647261] ? kasan_atomics+0x152/0x310 [ 24.647287] kasan_atomics+0x1dc/0x310 [ 24.647309] ? __pfx_kasan_atomics+0x10/0x10 [ 24.647331] ? trace_hardirqs_on+0x37/0xe0 [ 24.647354] ? __pfx_read_tsc+0x10/0x10 [ 24.647376] ? ktime_get_ts64+0x86/0x230 [ 24.647410] kunit_try_run_case+0x1a5/0x480 [ 24.647435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.647459] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.647497] ? __kthread_parkme+0x82/0x180 [ 24.647518] ? preempt_count_sub+0x50/0x80 [ 24.647541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.647574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.647598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.647621] kthread+0x337/0x6f0 [ 24.647651] ? trace_preempt_on+0x20/0xc0 [ 24.647674] ? __pfx_kthread+0x10/0x10 [ 24.647694] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.647718] ? calculate_sigpending+0x7b/0xa0 [ 24.647751] ? __pfx_kthread+0x10/0x10 [ 24.647772] ret_from_fork+0x116/0x1d0 [ 24.647791] ? __pfx_kthread+0x10/0x10 [ 24.647812] ret_from_fork_asm+0x1a/0x30 [ 24.647854] </TASK> [ 24.647865] [ 24.656416] Allocated by task 294: [ 24.656616] kasan_save_stack+0x45/0x70 [ 24.656877] kasan_save_track+0x18/0x40 [ 24.657008] kasan_save_alloc_info+0x3b/0x50 [ 24.657175] __kasan_kmalloc+0xb7/0xc0 [ 24.657378] __kmalloc_cache_noprof+0x189/0x420 [ 24.657785] kasan_atomics+0x95/0x310 [ 24.657972] kunit_try_run_case+0x1a5/0x480 [ 24.658238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.658511] kthread+0x337/0x6f0 [ 24.658743] ret_from_fork+0x116/0x1d0 [ 24.658930] ret_from_fork_asm+0x1a/0x30 [ 24.659116] [ 24.659182] The buggy address belongs to the object at ffff888100aaa000 [ 24.659182] which belongs to the cache kmalloc-64 of size 64 [ 24.659670] The buggy address is located 0 bytes to the right of [ 24.659670] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.660466] [ 24.660556] The buggy address belongs to the physical page: [ 24.660792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.661444] flags: 0x200000000000000(node=0|zone=2) [ 24.661695] page_type: f5(slab) [ 24.661816] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.662203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.662748] page dumped because: kasan: bad access detected [ 24.663021] [ 24.663153] Memory state around the buggy address: [ 24.663446] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.663677] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.664237] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.664595] ^ [ 24.664791] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.665127] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.665489] ================================================================== [ 24.869981] ================================================================== [ 24.870349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 24.871153] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.871516] [ 24.871623] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.871675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.871690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.871716] Call Trace: [ 24.871738] <TASK> [ 24.871761] dump_stack_lvl+0x73/0xb0 [ 24.871792] print_report+0xd1/0x650 [ 24.871817] ? __virt_addr_valid+0x1db/0x2d0 [ 24.871843] ? kasan_atomics_helper+0x860/0x5450 [ 24.871865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.871893] ? kasan_atomics_helper+0x860/0x5450 [ 24.871915] kasan_report+0x141/0x180 [ 24.871938] ? kasan_atomics_helper+0x860/0x5450 [ 24.871964] kasan_check_range+0x10c/0x1c0 [ 24.871987] __kasan_check_write+0x18/0x20 [ 24.872011] kasan_atomics_helper+0x860/0x5450 [ 24.872035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.872061] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.872088] ? kasan_atomics+0x152/0x310 [ 24.872115] kasan_atomics+0x1dc/0x310 [ 24.872138] ? __pfx_kasan_atomics+0x10/0x10 [ 24.872161] ? trace_hardirqs_on+0x37/0xe0 [ 24.872185] ? __pfx_read_tsc+0x10/0x10 [ 24.872209] ? ktime_get_ts64+0x86/0x230 [ 24.872248] kunit_try_run_case+0x1a5/0x480 [ 24.872274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.872300] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.872328] ? __kthread_parkme+0x82/0x180 [ 24.872349] ? preempt_count_sub+0x50/0x80 [ 24.872374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.872399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.872424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.872448] kthread+0x337/0x6f0 [ 24.872469] ? trace_preempt_on+0x20/0xc0 [ 24.872492] ? __pfx_kthread+0x10/0x10 [ 24.872514] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.872538] ? calculate_sigpending+0x7b/0xa0 [ 24.872564] ? __pfx_kthread+0x10/0x10 [ 24.872586] ret_from_fork+0x116/0x1d0 [ 24.872606] ? __pfx_kthread+0x10/0x10 [ 24.872627] ret_from_fork_asm+0x1a/0x30 [ 24.872661] </TASK> [ 24.872673] [ 24.880101] Allocated by task 294: [ 24.880308] kasan_save_stack+0x45/0x70 [ 24.880487] kasan_save_track+0x18/0x40 [ 24.880674] kasan_save_alloc_info+0x3b/0x50 [ 24.880853] __kasan_kmalloc+0xb7/0xc0 [ 24.881030] __kmalloc_cache_noprof+0x189/0x420 [ 24.881212] kasan_atomics+0x95/0x310 [ 24.881390] kunit_try_run_case+0x1a5/0x480 [ 24.881566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.881772] kthread+0x337/0x6f0 [ 24.881888] ret_from_fork+0x116/0x1d0 [ 24.882016] ret_from_fork_asm+0x1a/0x30 [ 24.882230] [ 24.882321] The buggy address belongs to the object at ffff888100aaa000 [ 24.882321] which belongs to the cache kmalloc-64 of size 64 [ 24.882862] The buggy address is located 0 bytes to the right of [ 24.882862] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.883365] [ 24.883440] The buggy address belongs to the physical page: [ 24.883610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.883915] flags: 0x200000000000000(node=0|zone=2) [ 24.884193] page_type: f5(slab) [ 24.884523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.884853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.885202] page dumped because: kasan: bad access detected [ 24.885429] [ 24.885494] Memory state around the buggy address: [ 24.885645] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.885856] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.886186] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.886508] ^ [ 24.886732] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.886999] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.887317] ================================================================== [ 25.831536] ================================================================== [ 25.831897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 25.832595] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.833089] [ 25.833209] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.833278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.833292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.833318] Call Trace: [ 25.833340] <TASK> [ 25.833362] dump_stack_lvl+0x73/0xb0 [ 25.833395] print_report+0xd1/0x650 [ 25.833420] ? __virt_addr_valid+0x1db/0x2d0 [ 25.833445] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.833468] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.833495] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.833517] kasan_report+0x141/0x180 [ 25.833541] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.833567] kasan_check_range+0x10c/0x1c0 [ 25.833591] __kasan_check_write+0x18/0x20 [ 25.833615] kasan_atomics_helper+0x20c8/0x5450 [ 25.833639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.833666] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.833692] ? kasan_atomics+0x152/0x310 [ 25.833721] kasan_atomics+0x1dc/0x310 [ 25.833745] ? __pfx_kasan_atomics+0x10/0x10 [ 25.833767] ? trace_hardirqs_on+0x37/0xe0 [ 25.833792] ? __pfx_read_tsc+0x10/0x10 [ 25.833816] ? ktime_get_ts64+0x86/0x230 [ 25.833841] kunit_try_run_case+0x1a5/0x480 [ 25.833868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.833894] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.833921] ? __kthread_parkme+0x82/0x180 [ 25.833943] ? preempt_count_sub+0x50/0x80 [ 25.833968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.833993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.834018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.834043] kthread+0x337/0x6f0 [ 25.834064] ? trace_preempt_on+0x20/0xc0 [ 25.834086] ? __pfx_kthread+0x10/0x10 [ 25.834107] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.834132] ? calculate_sigpending+0x7b/0xa0 [ 25.834157] ? __pfx_kthread+0x10/0x10 [ 25.834180] ret_from_fork+0x116/0x1d0 [ 25.834200] ? __pfx_kthread+0x10/0x10 [ 25.834230] ret_from_fork_asm+0x1a/0x30 [ 25.834262] </TASK> [ 25.834275] [ 25.841567] Allocated by task 294: [ 25.841744] kasan_save_stack+0x45/0x70 [ 25.841897] kasan_save_track+0x18/0x40 [ 25.842033] kasan_save_alloc_info+0x3b/0x50 [ 25.842261] __kasan_kmalloc+0xb7/0xc0 [ 25.842445] __kmalloc_cache_noprof+0x189/0x420 [ 25.842623] kasan_atomics+0x95/0x310 [ 25.842760] kunit_try_run_case+0x1a5/0x480 [ 25.842918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.843364] kthread+0x337/0x6f0 [ 25.843532] ret_from_fork+0x116/0x1d0 [ 25.843723] ret_from_fork_asm+0x1a/0x30 [ 25.843884] [ 25.843951] The buggy address belongs to the object at ffff888100aaa000 [ 25.843951] which belongs to the cache kmalloc-64 of size 64 [ 25.844362] The buggy address is located 0 bytes to the right of [ 25.844362] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.844908] [ 25.845002] The buggy address belongs to the physical page: [ 25.845294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.845603] flags: 0x200000000000000(node=0|zone=2) [ 25.845765] page_type: f5(slab) [ 25.845882] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.846111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.846455] page dumped because: kasan: bad access detected [ 25.846706] [ 25.846884] Memory state around the buggy address: [ 25.847132] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.847437] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.847723] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.847991] ^ [ 25.848200] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.848464] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.848673] ================================================================== [ 25.612661] ================================================================== [ 25.612897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 25.613124] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.614529] [ 25.614883] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.614940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.614956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.614980] Call Trace: [ 25.615001] <TASK> [ 25.615023] dump_stack_lvl+0x73/0xb0 [ 25.615062] print_report+0xd1/0x650 [ 25.615087] ? __virt_addr_valid+0x1db/0x2d0 [ 25.615112] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.615136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.615162] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.615184] kasan_report+0x141/0x180 [ 25.615207] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.615246] kasan_check_range+0x10c/0x1c0 [ 25.615270] __kasan_check_write+0x18/0x20 [ 25.615294] kasan_atomics_helper+0x1c18/0x5450 [ 25.615317] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.615344] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.615369] ? kasan_atomics+0x152/0x310 [ 25.615420] kasan_atomics+0x1dc/0x310 [ 25.615443] ? __pfx_kasan_atomics+0x10/0x10 [ 25.615465] ? trace_hardirqs_on+0x37/0xe0 [ 25.615489] ? __pfx_read_tsc+0x10/0x10 [ 25.615512] ? ktime_get_ts64+0x86/0x230 [ 25.615537] kunit_try_run_case+0x1a5/0x480 [ 25.615563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.615588] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.615615] ? __kthread_parkme+0x82/0x180 [ 25.615637] ? preempt_count_sub+0x50/0x80 [ 25.615660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.615687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.615711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.615735] kthread+0x337/0x6f0 [ 25.615757] ? trace_preempt_on+0x20/0xc0 [ 25.615779] ? __pfx_kthread+0x10/0x10 [ 25.615800] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.615825] ? calculate_sigpending+0x7b/0xa0 [ 25.615851] ? __pfx_kthread+0x10/0x10 [ 25.615873] ret_from_fork+0x116/0x1d0 [ 25.615893] ? __pfx_kthread+0x10/0x10 [ 25.615913] ret_from_fork_asm+0x1a/0x30 [ 25.615946] </TASK> [ 25.615958] [ 25.626843] Allocated by task 294: [ 25.627179] kasan_save_stack+0x45/0x70 [ 25.627396] kasan_save_track+0x18/0x40 [ 25.627560] kasan_save_alloc_info+0x3b/0x50 [ 25.627745] __kasan_kmalloc+0xb7/0xc0 [ 25.627909] __kmalloc_cache_noprof+0x189/0x420 [ 25.628549] kasan_atomics+0x95/0x310 [ 25.628814] kunit_try_run_case+0x1a5/0x480 [ 25.629149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.629579] kthread+0x337/0x6f0 [ 25.629848] ret_from_fork+0x116/0x1d0 [ 25.630216] ret_from_fork_asm+0x1a/0x30 [ 25.630539] [ 25.630755] The buggy address belongs to the object at ffff888100aaa000 [ 25.630755] which belongs to the cache kmalloc-64 of size 64 [ 25.631496] The buggy address is located 0 bytes to the right of [ 25.631496] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.631987] [ 25.632145] The buggy address belongs to the physical page: [ 25.632382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.632691] flags: 0x200000000000000(node=0|zone=2) [ 25.632901] page_type: f5(slab) [ 25.633389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.633910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.634446] page dumped because: kasan: bad access detected [ 25.634865] [ 25.635112] Memory state around the buggy address: [ 25.635448] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.636070] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.636550] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.636846] ^ [ 25.637087] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.637657] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.638163] ================================================================== [ 24.792147] ================================================================== [ 24.792477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 24.793008] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.793546] [ 24.793767] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.793922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.793943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.793967] Call Trace: [ 24.793988] <TASK> [ 24.794008] dump_stack_lvl+0x73/0xb0 [ 24.794037] print_report+0xd1/0x650 [ 24.794061] ? __virt_addr_valid+0x1db/0x2d0 [ 24.794086] ? kasan_atomics_helper+0x5fe/0x5450 [ 24.794108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.794134] ? kasan_atomics_helper+0x5fe/0x5450 [ 24.794156] kasan_report+0x141/0x180 [ 24.794178] ? kasan_atomics_helper+0x5fe/0x5450 [ 24.794204] kasan_check_range+0x10c/0x1c0 [ 24.794241] __kasan_check_write+0x18/0x20 [ 24.794265] kasan_atomics_helper+0x5fe/0x5450 [ 24.794287] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.794313] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.794339] ? kasan_atomics+0x152/0x310 [ 24.794366] kasan_atomics+0x1dc/0x310 [ 24.794389] ? __pfx_kasan_atomics+0x10/0x10 [ 24.794412] ? trace_hardirqs_on+0x37/0xe0 [ 24.794436] ? __pfx_read_tsc+0x10/0x10 [ 24.794459] ? ktime_get_ts64+0x86/0x230 [ 24.794484] kunit_try_run_case+0x1a5/0x480 [ 24.794510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.794536] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.794563] ? __kthread_parkme+0x82/0x180 [ 24.794584] ? preempt_count_sub+0x50/0x80 [ 24.794608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.794633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.794657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.794682] kthread+0x337/0x6f0 [ 24.794703] ? trace_preempt_on+0x20/0xc0 [ 24.794725] ? __pfx_kthread+0x10/0x10 [ 24.794747] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.794772] ? calculate_sigpending+0x7b/0xa0 [ 24.794796] ? __pfx_kthread+0x10/0x10 [ 24.794818] ret_from_fork+0x116/0x1d0 [ 24.794837] ? __pfx_kthread+0x10/0x10 [ 24.794859] ret_from_fork_asm+0x1a/0x30 [ 24.794890] </TASK> [ 24.794902] [ 24.805737] Allocated by task 294: [ 24.805935] kasan_save_stack+0x45/0x70 [ 24.806405] kasan_save_track+0x18/0x40 [ 24.806690] kasan_save_alloc_info+0x3b/0x50 [ 24.806996] __kasan_kmalloc+0xb7/0xc0 [ 24.807410] __kmalloc_cache_noprof+0x189/0x420 [ 24.807740] kasan_atomics+0x95/0x310 [ 24.808020] kunit_try_run_case+0x1a5/0x480 [ 24.808335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.808695] kthread+0x337/0x6f0 [ 24.808858] ret_from_fork+0x116/0x1d0 [ 24.809003] ret_from_fork_asm+0x1a/0x30 [ 24.809281] [ 24.809647] The buggy address belongs to the object at ffff888100aaa000 [ 24.809647] which belongs to the cache kmalloc-64 of size 64 [ 24.810332] The buggy address is located 0 bytes to the right of [ 24.810332] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.810931] [ 24.811043] The buggy address belongs to the physical page: [ 24.811313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.811626] flags: 0x200000000000000(node=0|zone=2) [ 24.811867] page_type: f5(slab) [ 24.812029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.812713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.813082] page dumped because: kasan: bad access detected [ 24.813457] [ 24.813549] Memory state around the buggy address: [ 24.813946] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.814367] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.814780] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.815239] ^ [ 24.815555] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.815959] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.816368] ================================================================== [ 25.385241] ================================================================== [ 25.385912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 25.386646] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.387052] [ 25.387165] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.387228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.387242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.387268] Call Trace: [ 25.387290] <TASK> [ 25.387313] dump_stack_lvl+0x73/0xb0 [ 25.387355] print_report+0xd1/0x650 [ 25.387379] ? __virt_addr_valid+0x1db/0x2d0 [ 25.387404] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.387439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.387467] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.387489] kasan_report+0x141/0x180 [ 25.387512] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.387538] kasan_check_range+0x10c/0x1c0 [ 25.387563] __kasan_check_write+0x18/0x20 [ 25.387587] kasan_atomics_helper+0x15b6/0x5450 [ 25.387611] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.387638] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.387664] ? kasan_atomics+0x152/0x310 [ 25.387692] kasan_atomics+0x1dc/0x310 [ 25.387716] ? __pfx_kasan_atomics+0x10/0x10 [ 25.387739] ? trace_hardirqs_on+0x37/0xe0 [ 25.387764] ? __pfx_read_tsc+0x10/0x10 [ 25.387788] ? ktime_get_ts64+0x86/0x230 [ 25.387814] kunit_try_run_case+0x1a5/0x480 [ 25.387840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.387866] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.387894] ? __kthread_parkme+0x82/0x180 [ 25.387916] ? preempt_count_sub+0x50/0x80 [ 25.387941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.387965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.387991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.388016] kthread+0x337/0x6f0 [ 25.388037] ? trace_preempt_on+0x20/0xc0 [ 25.388060] ? __pfx_kthread+0x10/0x10 [ 25.388082] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.388107] ? calculate_sigpending+0x7b/0xa0 [ 25.388132] ? __pfx_kthread+0x10/0x10 [ 25.388155] ret_from_fork+0x116/0x1d0 [ 25.388175] ? __pfx_kthread+0x10/0x10 [ 25.388196] ret_from_fork_asm+0x1a/0x30 [ 25.388237] </TASK> [ 25.388250] [ 25.399893] Allocated by task 294: [ 25.400145] kasan_save_stack+0x45/0x70 [ 25.400335] kasan_save_track+0x18/0x40 [ 25.400507] kasan_save_alloc_info+0x3b/0x50 [ 25.400650] __kasan_kmalloc+0xb7/0xc0 [ 25.400775] __kmalloc_cache_noprof+0x189/0x420 [ 25.400923] kasan_atomics+0x95/0x310 [ 25.401085] kunit_try_run_case+0x1a5/0x480 [ 25.401304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.401561] kthread+0x337/0x6f0 [ 25.401724] ret_from_fork+0x116/0x1d0 [ 25.401906] ret_from_fork_asm+0x1a/0x30 [ 25.402200] [ 25.402287] The buggy address belongs to the object at ffff888100aaa000 [ 25.402287] which belongs to the cache kmalloc-64 of size 64 [ 25.402633] The buggy address is located 0 bytes to the right of [ 25.402633] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.403375] [ 25.403473] The buggy address belongs to the physical page: [ 25.403690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.404064] flags: 0x200000000000000(node=0|zone=2) [ 25.404240] page_type: f5(slab) [ 25.404414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.404714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.404943] page dumped because: kasan: bad access detected [ 25.405110] [ 25.405198] Memory state around the buggy address: [ 25.405429] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.405941] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.406258] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.406561] ^ [ 25.406711] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.406921] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.407470] ================================================================== [ 25.312857] ================================================================== [ 25.313308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 25.313776] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.314193] [ 25.314291] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.314342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.314355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.314380] Call Trace: [ 25.314402] <TASK> [ 25.314422] dump_stack_lvl+0x73/0xb0 [ 25.314450] print_report+0xd1/0x650 [ 25.314473] ? __virt_addr_valid+0x1db/0x2d0 [ 25.314498] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.314519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.314547] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.314569] kasan_report+0x141/0x180 [ 25.314592] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.314618] __asan_report_load8_noabort+0x18/0x20 [ 25.314644] kasan_atomics_helper+0x4eae/0x5450 [ 25.314667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.314694] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.314733] ? kasan_atomics+0x152/0x310 [ 25.314760] kasan_atomics+0x1dc/0x310 [ 25.314790] ? __pfx_kasan_atomics+0x10/0x10 [ 25.314813] ? trace_hardirqs_on+0x37/0xe0 [ 25.314837] ? __pfx_read_tsc+0x10/0x10 [ 25.314861] ? ktime_get_ts64+0x86/0x230 [ 25.314887] kunit_try_run_case+0x1a5/0x480 [ 25.314913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.314940] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.314967] ? __kthread_parkme+0x82/0x180 [ 25.314989] ? preempt_count_sub+0x50/0x80 [ 25.315014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.315045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.315070] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.315095] kthread+0x337/0x6f0 [ 25.315116] ? trace_preempt_on+0x20/0xc0 [ 25.315139] ? __pfx_kthread+0x10/0x10 [ 25.315160] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.315184] ? calculate_sigpending+0x7b/0xa0 [ 25.315209] ? __pfx_kthread+0x10/0x10 [ 25.315241] ret_from_fork+0x116/0x1d0 [ 25.315262] ? __pfx_kthread+0x10/0x10 [ 25.315284] ret_from_fork_asm+0x1a/0x30 [ 25.315316] </TASK> [ 25.315328] [ 25.322699] Allocated by task 294: [ 25.322882] kasan_save_stack+0x45/0x70 [ 25.323079] kasan_save_track+0x18/0x40 [ 25.323273] kasan_save_alloc_info+0x3b/0x50 [ 25.323419] __kasan_kmalloc+0xb7/0xc0 [ 25.323545] __kmalloc_cache_noprof+0x189/0x420 [ 25.323692] kasan_atomics+0x95/0x310 [ 25.323818] kunit_try_run_case+0x1a5/0x480 [ 25.324016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.324278] kthread+0x337/0x6f0 [ 25.324444] ret_from_fork+0x116/0x1d0 [ 25.324653] ret_from_fork_asm+0x1a/0x30 [ 25.324848] [ 25.324939] The buggy address belongs to the object at ffff888100aaa000 [ 25.324939] which belongs to the cache kmalloc-64 of size 64 [ 25.325594] The buggy address is located 0 bytes to the right of [ 25.325594] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.326033] [ 25.326142] The buggy address belongs to the physical page: [ 25.326417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.326655] flags: 0x200000000000000(node=0|zone=2) [ 25.326817] page_type: f5(slab) [ 25.326966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.327658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.327991] page dumped because: kasan: bad access detected [ 25.328323] [ 25.328436] Memory state around the buggy address: [ 25.328600] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.328925] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.329237] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.329526] ^ [ 25.329737] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.330070] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.330367] ================================================================== [ 25.444934] ================================================================== [ 25.445358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 25.445829] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.446168] [ 25.446284] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.446335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.446350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.446373] Call Trace: [ 25.446393] <TASK> [ 25.446414] dump_stack_lvl+0x73/0xb0 [ 25.446442] print_report+0xd1/0x650 [ 25.446465] ? __virt_addr_valid+0x1db/0x2d0 [ 25.446490] ? kasan_atomics_helper+0x177f/0x5450 [ 25.446511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.446538] ? kasan_atomics_helper+0x177f/0x5450 [ 25.446561] kasan_report+0x141/0x180 [ 25.446584] ? kasan_atomics_helper+0x177f/0x5450 [ 25.446610] kasan_check_range+0x10c/0x1c0 [ 25.446634] __kasan_check_write+0x18/0x20 [ 25.446658] kasan_atomics_helper+0x177f/0x5450 [ 25.446681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.446708] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.446733] ? kasan_atomics+0x152/0x310 [ 25.446762] kasan_atomics+0x1dc/0x310 [ 25.446785] ? __pfx_kasan_atomics+0x10/0x10 [ 25.446808] ? trace_hardirqs_on+0x37/0xe0 [ 25.446832] ? __pfx_read_tsc+0x10/0x10 [ 25.446855] ? ktime_get_ts64+0x86/0x230 [ 25.446881] kunit_try_run_case+0x1a5/0x480 [ 25.446906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.446932] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.446959] ? __kthread_parkme+0x82/0x180 [ 25.446981] ? preempt_count_sub+0x50/0x80 [ 25.447006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.447049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.447074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.447099] kthread+0x337/0x6f0 [ 25.447120] ? trace_preempt_on+0x20/0xc0 [ 25.447144] ? __pfx_kthread+0x10/0x10 [ 25.447165] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.447190] ? calculate_sigpending+0x7b/0xa0 [ 25.447215] ? __pfx_kthread+0x10/0x10 [ 25.447248] ret_from_fork+0x116/0x1d0 [ 25.447269] ? __pfx_kthread+0x10/0x10 [ 25.447290] ret_from_fork_asm+0x1a/0x30 [ 25.447323] </TASK> [ 25.447335] [ 25.457244] Allocated by task 294: [ 25.457607] kasan_save_stack+0x45/0x70 [ 25.458039] kasan_save_track+0x18/0x40 [ 25.458435] kasan_save_alloc_info+0x3b/0x50 [ 25.458859] __kasan_kmalloc+0xb7/0xc0 [ 25.459251] __kmalloc_cache_noprof+0x189/0x420 [ 25.459667] kasan_atomics+0x95/0x310 [ 25.460023] kunit_try_run_case+0x1a5/0x480 [ 25.460425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.460901] kthread+0x337/0x6f0 [ 25.461237] ret_from_fork+0x116/0x1d0 [ 25.461586] ret_from_fork_asm+0x1a/0x30 [ 25.461937] [ 25.462025] The buggy address belongs to the object at ffff888100aaa000 [ 25.462025] which belongs to the cache kmalloc-64 of size 64 [ 25.462738] The buggy address is located 0 bytes to the right of [ 25.462738] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.463342] [ 25.463512] The buggy address belongs to the physical page: [ 25.463995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.464711] flags: 0x200000000000000(node=0|zone=2) [ 25.465179] page_type: f5(slab) [ 25.465497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.465943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.466553] page dumped because: kasan: bad access detected [ 25.467070] [ 25.467142] Memory state around the buggy address: [ 25.467302] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.467925] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.468561] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.468906] ^ [ 25.469210] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.469823] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.470454] ================================================================== [ 25.183637] ================================================================== [ 25.184165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 25.184435] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.184657] [ 25.184740] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.184789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.184803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.184827] Call Trace: [ 25.184847] <TASK> [ 25.184867] dump_stack_lvl+0x73/0xb0 [ 25.184894] print_report+0xd1/0x650 [ 25.184918] ? __virt_addr_valid+0x1db/0x2d0 [ 25.184942] ? kasan_atomics_helper+0x1148/0x5450 [ 25.184964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.184991] ? kasan_atomics_helper+0x1148/0x5450 [ 25.185015] kasan_report+0x141/0x180 [ 25.185048] ? kasan_atomics_helper+0x1148/0x5450 [ 25.185075] kasan_check_range+0x10c/0x1c0 [ 25.185099] __kasan_check_write+0x18/0x20 [ 25.185122] kasan_atomics_helper+0x1148/0x5450 [ 25.185154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.185180] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.185206] ? kasan_atomics+0x152/0x310 [ 25.185251] kasan_atomics+0x1dc/0x310 [ 25.185275] ? __pfx_kasan_atomics+0x10/0x10 [ 25.185297] ? trace_hardirqs_on+0x37/0xe0 [ 25.185322] ? __pfx_read_tsc+0x10/0x10 [ 25.185347] ? ktime_get_ts64+0x86/0x230 [ 25.185383] kunit_try_run_case+0x1a5/0x480 [ 25.185408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.185444] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.185472] ? __kthread_parkme+0x82/0x180 [ 25.185494] ? preempt_count_sub+0x50/0x80 [ 25.185519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.185544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.185568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.185593] kthread+0x337/0x6f0 [ 25.185614] ? trace_preempt_on+0x20/0xc0 [ 25.185637] ? __pfx_kthread+0x10/0x10 [ 25.185659] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.185682] ? calculate_sigpending+0x7b/0xa0 [ 25.185708] ? __pfx_kthread+0x10/0x10 [ 25.185730] ret_from_fork+0x116/0x1d0 [ 25.185751] ? __pfx_kthread+0x10/0x10 [ 25.185772] ret_from_fork_asm+0x1a/0x30 [ 25.185804] </TASK> [ 25.185817] [ 25.195112] Allocated by task 294: [ 25.195255] kasan_save_stack+0x45/0x70 [ 25.195660] kasan_save_track+0x18/0x40 [ 25.195826] kasan_save_alloc_info+0x3b/0x50 [ 25.196026] __kasan_kmalloc+0xb7/0xc0 [ 25.196155] __kmalloc_cache_noprof+0x189/0x420 [ 25.196315] kasan_atomics+0x95/0x310 [ 25.196548] kunit_try_run_case+0x1a5/0x480 [ 25.196772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.197026] kthread+0x337/0x6f0 [ 25.197191] ret_from_fork+0x116/0x1d0 [ 25.197386] ret_from_fork_asm+0x1a/0x30 [ 25.197542] [ 25.197652] The buggy address belongs to the object at ffff888100aaa000 [ 25.197652] which belongs to the cache kmalloc-64 of size 64 [ 25.198232] The buggy address is located 0 bytes to the right of [ 25.198232] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.198642] [ 25.198712] The buggy address belongs to the physical page: [ 25.198941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.199574] flags: 0x200000000000000(node=0|zone=2) [ 25.199954] page_type: f5(slab) [ 25.200179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.200471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.200799] page dumped because: kasan: bad access detected [ 25.201037] [ 25.201116] Memory state around the buggy address: [ 25.201345] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.201647] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.201946] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.202271] ^ [ 25.202476] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.202762] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.203053] ================================================================== [ 25.768854] ================================================================== [ 25.769349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 25.769594] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.770095] [ 25.770205] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.770264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.770278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.770303] Call Trace: [ 25.770323] <TASK> [ 25.770342] dump_stack_lvl+0x73/0xb0 [ 25.770372] print_report+0xd1/0x650 [ 25.770395] ? __virt_addr_valid+0x1db/0x2d0 [ 25.770421] ? kasan_atomics_helper+0x4f71/0x5450 [ 25.770443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.770470] ? kasan_atomics_helper+0x4f71/0x5450 [ 25.770492] kasan_report+0x141/0x180 [ 25.770515] ? kasan_atomics_helper+0x4f71/0x5450 [ 25.770541] __asan_report_load8_noabort+0x18/0x20 [ 25.770566] kasan_atomics_helper+0x4f71/0x5450 [ 25.770589] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.770615] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.770641] ? kasan_atomics+0x152/0x310 [ 25.770668] kasan_atomics+0x1dc/0x310 [ 25.770691] ? __pfx_kasan_atomics+0x10/0x10 [ 25.770714] ? trace_hardirqs_on+0x37/0xe0 [ 25.770737] ? __pfx_read_tsc+0x10/0x10 [ 25.770759] ? ktime_get_ts64+0x86/0x230 [ 25.770785] kunit_try_run_case+0x1a5/0x480 [ 25.770809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.770834] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.770862] ? __kthread_parkme+0x82/0x180 [ 25.770883] ? preempt_count_sub+0x50/0x80 [ 25.770907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.770932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.770957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.770981] kthread+0x337/0x6f0 [ 25.771002] ? trace_preempt_on+0x20/0xc0 [ 25.771024] ? __pfx_kthread+0x10/0x10 [ 25.771051] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.771076] ? calculate_sigpending+0x7b/0xa0 [ 25.771100] ? __pfx_kthread+0x10/0x10 [ 25.771122] ret_from_fork+0x116/0x1d0 [ 25.771142] ? __pfx_kthread+0x10/0x10 [ 25.771163] ret_from_fork_asm+0x1a/0x30 [ 25.771194] </TASK> [ 25.771207] [ 25.778949] Allocated by task 294: [ 25.779268] kasan_save_stack+0x45/0x70 [ 25.779448] kasan_save_track+0x18/0x40 [ 25.779616] kasan_save_alloc_info+0x3b/0x50 [ 25.779794] __kasan_kmalloc+0xb7/0xc0 [ 25.779947] __kmalloc_cache_noprof+0x189/0x420 [ 25.780094] kasan_atomics+0x95/0x310 [ 25.780391] kunit_try_run_case+0x1a5/0x480 [ 25.780596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.780843] kthread+0x337/0x6f0 [ 25.781049] ret_from_fork+0x116/0x1d0 [ 25.781205] ret_from_fork_asm+0x1a/0x30 [ 25.781379] [ 25.781473] The buggy address belongs to the object at ffff888100aaa000 [ 25.781473] which belongs to the cache kmalloc-64 of size 64 [ 25.781909] The buggy address is located 0 bytes to the right of [ 25.781909] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.782395] [ 25.782493] The buggy address belongs to the physical page: [ 25.782705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.783014] flags: 0x200000000000000(node=0|zone=2) [ 25.783262] page_type: f5(slab) [ 25.783383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.783608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.783859] page dumped because: kasan: bad access detected [ 25.784103] [ 25.784191] Memory state around the buggy address: [ 25.784470] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.784775] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.784985] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.785437] ^ [ 25.785618] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.785828] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.786183] ================================================================== [ 25.116073] ================================================================== [ 25.116495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 25.116763] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.117080] [ 25.117163] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.117214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.117239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.117262] Call Trace: [ 25.117282] <TASK> [ 25.117303] dump_stack_lvl+0x73/0xb0 [ 25.117332] print_report+0xd1/0x650 [ 25.117354] ? __virt_addr_valid+0x1db/0x2d0 [ 25.117377] ? kasan_atomics_helper+0x4a36/0x5450 [ 25.117399] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.117426] ? kasan_atomics_helper+0x4a36/0x5450 [ 25.117447] kasan_report+0x141/0x180 [ 25.117470] ? kasan_atomics_helper+0x4a36/0x5450 [ 25.117496] __asan_report_load4_noabort+0x18/0x20 [ 25.117521] kasan_atomics_helper+0x4a36/0x5450 [ 25.117544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.117570] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.117595] ? kasan_atomics+0x152/0x310 [ 25.117637] kasan_atomics+0x1dc/0x310 [ 25.117661] ? __pfx_kasan_atomics+0x10/0x10 [ 25.117684] ? trace_hardirqs_on+0x37/0xe0 [ 25.117708] ? __pfx_read_tsc+0x10/0x10 [ 25.117732] ? ktime_get_ts64+0x86/0x230 [ 25.117757] kunit_try_run_case+0x1a5/0x480 [ 25.117784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.117809] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.117837] ? __kthread_parkme+0x82/0x180 [ 25.117858] ? preempt_count_sub+0x50/0x80 [ 25.117884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.117908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.117933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.117958] kthread+0x337/0x6f0 [ 25.117979] ? trace_preempt_on+0x20/0xc0 [ 25.118002] ? __pfx_kthread+0x10/0x10 [ 25.118025] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.118050] ? calculate_sigpending+0x7b/0xa0 [ 25.118075] ? __pfx_kthread+0x10/0x10 [ 25.118097] ret_from_fork+0x116/0x1d0 [ 25.118117] ? __pfx_kthread+0x10/0x10 [ 25.118139] ret_from_fork_asm+0x1a/0x30 [ 25.118171] </TASK> [ 25.118183] [ 25.127312] Allocated by task 294: [ 25.127469] kasan_save_stack+0x45/0x70 [ 25.127624] kasan_save_track+0x18/0x40 [ 25.127750] kasan_save_alloc_info+0x3b/0x50 [ 25.127890] __kasan_kmalloc+0xb7/0xc0 [ 25.128014] __kmalloc_cache_noprof+0x189/0x420 [ 25.128161] kasan_atomics+0x95/0x310 [ 25.128468] kunit_try_run_case+0x1a5/0x480 [ 25.128994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.129455] kthread+0x337/0x6f0 [ 25.129808] ret_from_fork+0x116/0x1d0 [ 25.130252] ret_from_fork_asm+0x1a/0x30 [ 25.130641] [ 25.130795] The buggy address belongs to the object at ffff888100aaa000 [ 25.130795] which belongs to the cache kmalloc-64 of size 64 [ 25.131936] The buggy address is located 0 bytes to the right of [ 25.131936] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.133190] [ 25.133361] The buggy address belongs to the physical page: [ 25.133857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.134657] flags: 0x200000000000000(node=0|zone=2) [ 25.135154] page_type: f5(slab) [ 25.135316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.135543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.135757] page dumped because: kasan: bad access detected [ 25.135918] [ 25.135979] Memory state around the buggy address: [ 25.136585] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.137383] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.138015] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.138651] ^ [ 25.139052] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.139491] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.139697] ================================================================== [ 25.700662] ================================================================== [ 25.701118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 25.701475] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.701809] [ 25.701912] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.701959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.701973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.701996] Call Trace: [ 25.702022] <TASK> [ 25.702039] dump_stack_lvl+0x73/0xb0 [ 25.702066] print_report+0xd1/0x650 [ 25.702089] ? __virt_addr_valid+0x1db/0x2d0 [ 25.702114] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.702136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.702163] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.702184] kasan_report+0x141/0x180 [ 25.702207] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.702244] kasan_check_range+0x10c/0x1c0 [ 25.702268] __kasan_check_write+0x18/0x20 [ 25.702293] kasan_atomics_helper+0x1e12/0x5450 [ 25.702316] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.702342] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.702368] ? kasan_atomics+0x152/0x310 [ 25.702395] kasan_atomics+0x1dc/0x310 [ 25.702418] ? __pfx_kasan_atomics+0x10/0x10 [ 25.702441] ? trace_hardirqs_on+0x37/0xe0 [ 25.702465] ? __pfx_read_tsc+0x10/0x10 [ 25.702487] ? ktime_get_ts64+0x86/0x230 [ 25.702512] kunit_try_run_case+0x1a5/0x480 [ 25.702538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.702564] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.702591] ? __kthread_parkme+0x82/0x180 [ 25.702613] ? preempt_count_sub+0x50/0x80 [ 25.702636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.702662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.702686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.702710] kthread+0x337/0x6f0 [ 25.702732] ? trace_preempt_on+0x20/0xc0 [ 25.702756] ? __pfx_kthread+0x10/0x10 [ 25.702778] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.702803] ? calculate_sigpending+0x7b/0xa0 [ 25.702828] ? __pfx_kthread+0x10/0x10 [ 25.702849] ret_from_fork+0x116/0x1d0 [ 25.702870] ? __pfx_kthread+0x10/0x10 [ 25.702891] ret_from_fork_asm+0x1a/0x30 [ 25.702922] </TASK> [ 25.702934] [ 25.712921] Allocated by task 294: [ 25.713164] kasan_save_stack+0x45/0x70 [ 25.713359] kasan_save_track+0x18/0x40 [ 25.713529] kasan_save_alloc_info+0x3b/0x50 [ 25.713703] __kasan_kmalloc+0xb7/0xc0 [ 25.713856] __kmalloc_cache_noprof+0x189/0x420 [ 25.714493] kasan_atomics+0x95/0x310 [ 25.714819] kunit_try_run_case+0x1a5/0x480 [ 25.715395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.715643] kthread+0x337/0x6f0 [ 25.715787] ret_from_fork+0x116/0x1d0 [ 25.715947] ret_from_fork_asm+0x1a/0x30 [ 25.716350] [ 25.716576] The buggy address belongs to the object at ffff888100aaa000 [ 25.716576] which belongs to the cache kmalloc-64 of size 64 [ 25.717284] The buggy address is located 0 bytes to the right of [ 25.717284] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.717775] [ 25.717859] The buggy address belongs to the physical page: [ 25.718347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.718886] flags: 0x200000000000000(node=0|zone=2) [ 25.719306] page_type: f5(slab) [ 25.719583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.720205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.720523] page dumped because: kasan: bad access detected [ 25.720739] [ 25.720817] Memory state around the buggy address: [ 25.721003] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.721301] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.721576] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.721866] ^ [ 25.722463] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.722924] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.723460] ================================================================== [ 25.574579] ================================================================== [ 25.574952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 25.575427] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.575846] [ 25.575931] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.575979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.575993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.576026] Call Trace: [ 25.576046] <TASK> [ 25.576065] dump_stack_lvl+0x73/0xb0 [ 25.576095] print_report+0xd1/0x650 [ 25.576119] ? __virt_addr_valid+0x1db/0x2d0 [ 25.576143] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.576165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.576192] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.576213] kasan_report+0x141/0x180 [ 25.576248] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.576274] kasan_check_range+0x10c/0x1c0 [ 25.576298] __kasan_check_write+0x18/0x20 [ 25.576321] kasan_atomics_helper+0x1a7f/0x5450 [ 25.576345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.576371] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.576396] ? kasan_atomics+0x152/0x310 [ 25.576423] kasan_atomics+0x1dc/0x310 [ 25.576446] ? __pfx_kasan_atomics+0x10/0x10 [ 25.576469] ? trace_hardirqs_on+0x37/0xe0 [ 25.576502] ? __pfx_read_tsc+0x10/0x10 [ 25.576525] ? ktime_get_ts64+0x86/0x230 [ 25.576550] kunit_try_run_case+0x1a5/0x480 [ 25.576589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.576614] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.576641] ? __kthread_parkme+0x82/0x180 [ 25.576672] ? preempt_count_sub+0x50/0x80 [ 25.576696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.576720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.576757] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.576782] kthread+0x337/0x6f0 [ 25.576802] ? trace_preempt_on+0x20/0xc0 [ 25.576834] ? __pfx_kthread+0x10/0x10 [ 25.576856] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.576881] ? calculate_sigpending+0x7b/0xa0 [ 25.576917] ? __pfx_kthread+0x10/0x10 [ 25.576940] ret_from_fork+0x116/0x1d0 [ 25.576961] ? __pfx_kthread+0x10/0x10 [ 25.576990] ret_from_fork_asm+0x1a/0x30 [ 25.577023] </TASK> [ 25.577036] [ 25.584651] Allocated by task 294: [ 25.584843] kasan_save_stack+0x45/0x70 [ 25.585047] kasan_save_track+0x18/0x40 [ 25.585228] kasan_save_alloc_info+0x3b/0x50 [ 25.585440] __kasan_kmalloc+0xb7/0xc0 [ 25.585611] __kmalloc_cache_noprof+0x189/0x420 [ 25.585825] kasan_atomics+0x95/0x310 [ 25.585953] kunit_try_run_case+0x1a5/0x480 [ 25.586312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.586540] kthread+0x337/0x6f0 [ 25.586724] ret_from_fork+0x116/0x1d0 [ 25.586894] ret_from_fork_asm+0x1a/0x30 [ 25.587037] [ 25.587104] The buggy address belongs to the object at ffff888100aaa000 [ 25.587104] which belongs to the cache kmalloc-64 of size 64 [ 25.587463] The buggy address is located 0 bytes to the right of [ 25.587463] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.587821] [ 25.587889] The buggy address belongs to the physical page: [ 25.588056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.588771] flags: 0x200000000000000(node=0|zone=2) [ 25.589003] page_type: f5(slab) [ 25.589295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.589632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.589962] page dumped because: kasan: bad access detected [ 25.590233] [ 25.590330] Memory state around the buggy address: [ 25.590522] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.590735] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.590946] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.591548] ^ [ 25.591774] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.592194] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.592424] ================================================================== [ 24.817677] ================================================================== [ 24.818139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 24.818619] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.818934] [ 24.819047] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.819102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.819116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.819320] Call Trace: [ 24.819348] <TASK> [ 24.819371] dump_stack_lvl+0x73/0xb0 [ 24.819405] print_report+0xd1/0x650 [ 24.819431] ? __virt_addr_valid+0x1db/0x2d0 [ 24.819457] ? kasan_atomics_helper+0x697/0x5450 [ 24.819479] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.819506] ? kasan_atomics_helper+0x697/0x5450 [ 24.819528] kasan_report+0x141/0x180 [ 24.819552] ? kasan_atomics_helper+0x697/0x5450 [ 24.819577] kasan_check_range+0x10c/0x1c0 [ 24.819601] __kasan_check_write+0x18/0x20 [ 24.819624] kasan_atomics_helper+0x697/0x5450 [ 24.819647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.819674] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.819700] ? kasan_atomics+0x152/0x310 [ 24.819726] kasan_atomics+0x1dc/0x310 [ 24.819750] ? __pfx_kasan_atomics+0x10/0x10 [ 24.819772] ? trace_hardirqs_on+0x37/0xe0 [ 24.819797] ? __pfx_read_tsc+0x10/0x10 [ 24.819820] ? ktime_get_ts64+0x86/0x230 [ 24.819846] kunit_try_run_case+0x1a5/0x480 [ 24.819873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.819898] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.819926] ? __kthread_parkme+0x82/0x180 [ 24.819950] ? preempt_count_sub+0x50/0x80 [ 24.819974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.819999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.820033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.820058] kthread+0x337/0x6f0 [ 24.820079] ? trace_preempt_on+0x20/0xc0 [ 24.820102] ? __pfx_kthread+0x10/0x10 [ 24.820123] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.820147] ? calculate_sigpending+0x7b/0xa0 [ 24.820172] ? __pfx_kthread+0x10/0x10 [ 24.820194] ret_from_fork+0x116/0x1d0 [ 24.820216] ? __pfx_kthread+0x10/0x10 [ 24.820249] ret_from_fork_asm+0x1a/0x30 [ 24.820283] </TASK> [ 24.820296] [ 24.827232] Allocated by task 294: [ 24.827359] kasan_save_stack+0x45/0x70 [ 24.827558] kasan_save_track+0x18/0x40 [ 24.827706] kasan_save_alloc_info+0x3b/0x50 [ 24.827846] __kasan_kmalloc+0xb7/0xc0 [ 24.827966] __kmalloc_cache_noprof+0x189/0x420 [ 24.828175] kasan_atomics+0x95/0x310 [ 24.828363] kunit_try_run_case+0x1a5/0x480 [ 24.828536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.828699] kthread+0x337/0x6f0 [ 24.828812] ret_from_fork+0x116/0x1d0 [ 24.828984] ret_from_fork_asm+0x1a/0x30 [ 24.829187] [ 24.829287] The buggy address belongs to the object at ffff888100aaa000 [ 24.829287] which belongs to the cache kmalloc-64 of size 64 [ 24.829815] The buggy address is located 0 bytes to the right of [ 24.829815] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.830331] [ 24.830401] The buggy address belongs to the physical page: [ 24.830650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.830893] flags: 0x200000000000000(node=0|zone=2) [ 24.831056] page_type: f5(slab) [ 24.831172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.831402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.831621] page dumped because: kasan: bad access detected [ 24.831862] [ 24.831949] Memory state around the buggy address: [ 24.832167] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.832510] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.832992] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.833362] ^ [ 24.833512] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.833723] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.833932] ================================================================== [ 25.367745] ================================================================== [ 25.368118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 25.368468] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.368782] [ 25.368894] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.368956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.368970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.368994] Call Trace: [ 25.369027] <TASK> [ 25.369049] dump_stack_lvl+0x73/0xb0 [ 25.369078] print_report+0xd1/0x650 [ 25.369102] ? __virt_addr_valid+0x1db/0x2d0 [ 25.369127] ? kasan_atomics_helper+0x151d/0x5450 [ 25.369150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.369178] ? kasan_atomics_helper+0x151d/0x5450 [ 25.369200] kasan_report+0x141/0x180 [ 25.369233] ? kasan_atomics_helper+0x151d/0x5450 [ 25.369260] kasan_check_range+0x10c/0x1c0 [ 25.369284] __kasan_check_write+0x18/0x20 [ 25.369308] kasan_atomics_helper+0x151d/0x5450 [ 25.369331] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.369358] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.369384] ? kasan_atomics+0x152/0x310 [ 25.369411] kasan_atomics+0x1dc/0x310 [ 25.369434] ? __pfx_kasan_atomics+0x10/0x10 [ 25.369457] ? trace_hardirqs_on+0x37/0xe0 [ 25.369482] ? __pfx_read_tsc+0x10/0x10 [ 25.369506] ? ktime_get_ts64+0x86/0x230 [ 25.369531] kunit_try_run_case+0x1a5/0x480 [ 25.369557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.369583] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.369609] ? __kthread_parkme+0x82/0x180 [ 25.369631] ? preempt_count_sub+0x50/0x80 [ 25.369656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.369681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.369705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.369729] kthread+0x337/0x6f0 [ 25.369750] ? trace_preempt_on+0x20/0xc0 [ 25.369773] ? __pfx_kthread+0x10/0x10 [ 25.369795] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.369820] ? calculate_sigpending+0x7b/0xa0 [ 25.369845] ? __pfx_kthread+0x10/0x10 [ 25.369867] ret_from_fork+0x116/0x1d0 [ 25.369887] ? __pfx_kthread+0x10/0x10 [ 25.369908] ret_from_fork_asm+0x1a/0x30 [ 25.369940] </TASK> [ 25.369952] [ 25.377535] Allocated by task 294: [ 25.377701] kasan_save_stack+0x45/0x70 [ 25.377899] kasan_save_track+0x18/0x40 [ 25.378143] kasan_save_alloc_info+0x3b/0x50 [ 25.378303] __kasan_kmalloc+0xb7/0xc0 [ 25.378433] __kmalloc_cache_noprof+0x189/0x420 [ 25.378583] kasan_atomics+0x95/0x310 [ 25.378710] kunit_try_run_case+0x1a5/0x480 [ 25.378855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.379138] kthread+0x337/0x6f0 [ 25.379316] ret_from_fork+0x116/0x1d0 [ 25.379498] ret_from_fork_asm+0x1a/0x30 [ 25.379690] [ 25.379783] The buggy address belongs to the object at ffff888100aaa000 [ 25.379783] which belongs to the cache kmalloc-64 of size 64 [ 25.380162] The buggy address is located 0 bytes to the right of [ 25.380162] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.380631] [ 25.380727] The buggy address belongs to the physical page: [ 25.380979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.381354] flags: 0x200000000000000(node=0|zone=2) [ 25.381628] page_type: f5(slab) [ 25.381834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.382173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.382408] page dumped because: kasan: bad access detected [ 25.382572] [ 25.382637] Memory state around the buggy address: [ 25.382787] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.383250] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.383595] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.383904] ^ [ 25.384109] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.384330] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.384539] ================================================================== [ 24.687865] ================================================================== [ 24.688387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 24.688775] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.689248] [ 24.689406] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.689458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.689472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.689497] Call Trace: [ 24.689562] <TASK> [ 24.689600] dump_stack_lvl+0x73/0xb0 [ 24.689688] print_report+0xd1/0x650 [ 24.689725] ? __virt_addr_valid+0x1db/0x2d0 [ 24.689751] ? kasan_atomics_helper+0x3df/0x5450 [ 24.689773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.689801] ? kasan_atomics_helper+0x3df/0x5450 [ 24.689822] kasan_report+0x141/0x180 [ 24.689845] ? kasan_atomics_helper+0x3df/0x5450 [ 24.689871] kasan_check_range+0x10c/0x1c0 [ 24.689895] __kasan_check_read+0x15/0x20 [ 24.689919] kasan_atomics_helper+0x3df/0x5450 [ 24.689941] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.689968] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.689995] ? kasan_atomics+0x152/0x310 [ 24.690035] kasan_atomics+0x1dc/0x310 [ 24.690058] ? __pfx_kasan_atomics+0x10/0x10 [ 24.690081] ? trace_hardirqs_on+0x37/0xe0 [ 24.690105] ? __pfx_read_tsc+0x10/0x10 [ 24.690128] ? ktime_get_ts64+0x86/0x230 [ 24.690153] kunit_try_run_case+0x1a5/0x480 [ 24.690179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.690204] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.690244] ? __kthread_parkme+0x82/0x180 [ 24.690265] ? preempt_count_sub+0x50/0x80 [ 24.690289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.690314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.690339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.690364] kthread+0x337/0x6f0 [ 24.690385] ? trace_preempt_on+0x20/0xc0 [ 24.690408] ? __pfx_kthread+0x10/0x10 [ 24.690430] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.690454] ? calculate_sigpending+0x7b/0xa0 [ 24.690479] ? __pfx_kthread+0x10/0x10 [ 24.690502] ret_from_fork+0x116/0x1d0 [ 24.690522] ? __pfx_kthread+0x10/0x10 [ 24.690543] ret_from_fork_asm+0x1a/0x30 [ 24.690575] </TASK> [ 24.690588] [ 24.700198] Allocated by task 294: [ 24.700379] kasan_save_stack+0x45/0x70 [ 24.700588] kasan_save_track+0x18/0x40 [ 24.700764] kasan_save_alloc_info+0x3b/0x50 [ 24.700911] __kasan_kmalloc+0xb7/0xc0 [ 24.701051] __kmalloc_cache_noprof+0x189/0x420 [ 24.701293] kasan_atomics+0x95/0x310 [ 24.701489] kunit_try_run_case+0x1a5/0x480 [ 24.701642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.701830] kthread+0x337/0x6f0 [ 24.702050] ret_from_fork+0x116/0x1d0 [ 24.702247] ret_from_fork_asm+0x1a/0x30 [ 24.702465] [ 24.702535] The buggy address belongs to the object at ffff888100aaa000 [ 24.702535] which belongs to the cache kmalloc-64 of size 64 [ 24.703042] The buggy address is located 0 bytes to the right of [ 24.703042] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.703576] [ 24.703662] The buggy address belongs to the physical page: [ 24.703897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.704276] flags: 0x200000000000000(node=0|zone=2) [ 24.704490] page_type: f5(slab) [ 24.704644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.704947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.705288] page dumped because: kasan: bad access detected [ 24.705456] [ 24.705519] Memory state around the buggy address: [ 24.705725] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.706047] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.706530] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.706770] ^ [ 24.706945] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.707502] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.707863] ================================================================== [ 25.527728] ================================================================== [ 25.528419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 25.529161] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.529947] [ 25.530190] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.530376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.530399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.530425] Call Trace: [ 25.530526] <TASK> [ 25.530553] dump_stack_lvl+0x73/0xb0 [ 25.530702] print_report+0xd1/0x650 [ 25.530737] ? __virt_addr_valid+0x1db/0x2d0 [ 25.530762] ? kasan_atomics_helper+0x194a/0x5450 [ 25.530860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.530887] ? kasan_atomics_helper+0x194a/0x5450 [ 25.530922] kasan_report+0x141/0x180 [ 25.530945] ? kasan_atomics_helper+0x194a/0x5450 [ 25.530978] kasan_check_range+0x10c/0x1c0 [ 25.531002] __kasan_check_write+0x18/0x20 [ 25.531037] kasan_atomics_helper+0x194a/0x5450 [ 25.531061] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.531086] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.531112] ? kasan_atomics+0x152/0x310 [ 25.531140] kasan_atomics+0x1dc/0x310 [ 25.531163] ? __pfx_kasan_atomics+0x10/0x10 [ 25.531186] ? trace_hardirqs_on+0x37/0xe0 [ 25.531209] ? __pfx_read_tsc+0x10/0x10 [ 25.531243] ? ktime_get_ts64+0x86/0x230 [ 25.531270] kunit_try_run_case+0x1a5/0x480 [ 25.531295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.531320] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.531349] ? __kthread_parkme+0x82/0x180 [ 25.531371] ? preempt_count_sub+0x50/0x80 [ 25.531396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.531421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.531446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.531471] kthread+0x337/0x6f0 [ 25.531492] ? trace_preempt_on+0x20/0xc0 [ 25.531514] ? __pfx_kthread+0x10/0x10 [ 25.531536] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.531560] ? calculate_sigpending+0x7b/0xa0 [ 25.531585] ? __pfx_kthread+0x10/0x10 [ 25.531607] ret_from_fork+0x116/0x1d0 [ 25.531627] ? __pfx_kthread+0x10/0x10 [ 25.531648] ret_from_fork_asm+0x1a/0x30 [ 25.531680] </TASK> [ 25.531693] [ 25.543894] Allocated by task 294: [ 25.544172] kasan_save_stack+0x45/0x70 [ 25.544464] kasan_save_track+0x18/0x40 [ 25.544598] kasan_save_alloc_info+0x3b/0x50 [ 25.544740] __kasan_kmalloc+0xb7/0xc0 [ 25.544867] __kmalloc_cache_noprof+0x189/0x420 [ 25.545037] kasan_atomics+0x95/0x310 [ 25.545393] kunit_try_run_case+0x1a5/0x480 [ 25.545784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.546277] kthread+0x337/0x6f0 [ 25.546598] ret_from_fork+0x116/0x1d0 [ 25.546939] ret_from_fork_asm+0x1a/0x30 [ 25.547349] [ 25.547504] The buggy address belongs to the object at ffff888100aaa000 [ 25.547504] which belongs to the cache kmalloc-64 of size 64 [ 25.548566] The buggy address is located 0 bytes to the right of [ 25.548566] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.549143] [ 25.549216] The buggy address belongs to the physical page: [ 25.549398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.549636] flags: 0x200000000000000(node=0|zone=2) [ 25.549798] page_type: f5(slab) [ 25.549916] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.550192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.550610] page dumped because: kasan: bad access detected [ 25.551275] [ 25.551433] Memory state around the buggy address: [ 25.551878] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.552570] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.553203] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.553826] ^ [ 25.554138] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.554684] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.554892] ================================================================== [ 24.834449] ================================================================== [ 24.834813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 24.835354] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.835696] [ 24.835811] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.835861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.835873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.835898] Call Trace: [ 24.835920] <TASK> [ 24.835940] dump_stack_lvl+0x73/0xb0 [ 24.835972] print_report+0xd1/0x650 [ 24.835997] ? __virt_addr_valid+0x1db/0x2d0 [ 24.836030] ? kasan_atomics_helper+0x72f/0x5450 [ 24.836051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.836078] ? kasan_atomics_helper+0x72f/0x5450 [ 24.836101] kasan_report+0x141/0x180 [ 24.836123] ? kasan_atomics_helper+0x72f/0x5450 [ 24.836149] kasan_check_range+0x10c/0x1c0 [ 24.836173] __kasan_check_write+0x18/0x20 [ 24.836198] kasan_atomics_helper+0x72f/0x5450 [ 24.836233] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.836260] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.836286] ? kasan_atomics+0x152/0x310 [ 24.836313] kasan_atomics+0x1dc/0x310 [ 24.836336] ? __pfx_kasan_atomics+0x10/0x10 [ 24.836359] ? trace_hardirqs_on+0x37/0xe0 [ 24.836382] ? __pfx_read_tsc+0x10/0x10 [ 24.836405] ? ktime_get_ts64+0x86/0x230 [ 24.836431] kunit_try_run_case+0x1a5/0x480 [ 24.836458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.836483] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.836510] ? __kthread_parkme+0x82/0x180 [ 24.836532] ? preempt_count_sub+0x50/0x80 [ 24.836556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.836581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.836605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.836630] kthread+0x337/0x6f0 [ 24.836651] ? trace_preempt_on+0x20/0xc0 [ 24.836673] ? __pfx_kthread+0x10/0x10 [ 24.836695] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.836719] ? calculate_sigpending+0x7b/0xa0 [ 24.836743] ? __pfx_kthread+0x10/0x10 [ 24.836765] ret_from_fork+0x116/0x1d0 [ 24.836785] ? __pfx_kthread+0x10/0x10 [ 24.836806] ret_from_fork_asm+0x1a/0x30 [ 24.836838] </TASK> [ 24.836851] [ 24.844408] Allocated by task 294: [ 24.844552] kasan_save_stack+0x45/0x70 [ 24.844746] kasan_save_track+0x18/0x40 [ 24.844909] kasan_save_alloc_info+0x3b/0x50 [ 24.845123] __kasan_kmalloc+0xb7/0xc0 [ 24.845260] __kmalloc_cache_noprof+0x189/0x420 [ 24.845412] kasan_atomics+0x95/0x310 [ 24.845595] kunit_try_run_case+0x1a5/0x480 [ 24.845792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.846059] kthread+0x337/0x6f0 [ 24.846178] ret_from_fork+0x116/0x1d0 [ 24.846316] ret_from_fork_asm+0x1a/0x30 [ 24.846487] [ 24.846577] The buggy address belongs to the object at ffff888100aaa000 [ 24.846577] which belongs to the cache kmalloc-64 of size 64 [ 24.847135] The buggy address is located 0 bytes to the right of [ 24.847135] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.847519] [ 24.847589] The buggy address belongs to the physical page: [ 24.847760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.847997] flags: 0x200000000000000(node=0|zone=2) [ 24.848241] page_type: f5(slab) [ 24.848406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.848752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.849152] page dumped because: kasan: bad access detected [ 24.849361] [ 24.849425] Memory state around the buggy address: [ 24.849575] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.849786] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.850027] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.850352] ^ [ 24.850575] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.850900] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.851522] ================================================================== [ 24.888053] ================================================================== [ 24.888377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 24.888642] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.889478] [ 24.889612] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.889665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.889679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.889704] Call Trace: [ 24.889726] <TASK> [ 24.889748] dump_stack_lvl+0x73/0xb0 [ 24.889792] print_report+0xd1/0x650 [ 24.889818] ? __virt_addr_valid+0x1db/0x2d0 [ 24.889844] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.889866] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.889893] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.889916] kasan_report+0x141/0x180 [ 24.889939] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.889965] kasan_check_range+0x10c/0x1c0 [ 24.889990] __kasan_check_write+0x18/0x20 [ 24.890014] kasan_atomics_helper+0x8f9/0x5450 [ 24.890051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.890079] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.890105] ? kasan_atomics+0x152/0x310 [ 24.890132] kasan_atomics+0x1dc/0x310 [ 24.890156] ? __pfx_kasan_atomics+0x10/0x10 [ 24.890178] ? trace_hardirqs_on+0x37/0xe0 [ 24.890203] ? __pfx_read_tsc+0x10/0x10 [ 24.890239] ? ktime_get_ts64+0x86/0x230 [ 24.890265] kunit_try_run_case+0x1a5/0x480 [ 24.890291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.890317] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.890345] ? __kthread_parkme+0x82/0x180 [ 24.890367] ? preempt_count_sub+0x50/0x80 [ 24.890392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.890417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.890442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.890467] kthread+0x337/0x6f0 [ 24.890488] ? trace_preempt_on+0x20/0xc0 [ 24.890512] ? __pfx_kthread+0x10/0x10 [ 24.890533] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.890557] ? calculate_sigpending+0x7b/0xa0 [ 24.890582] ? __pfx_kthread+0x10/0x10 [ 24.890604] ret_from_fork+0x116/0x1d0 [ 24.890624] ? __pfx_kthread+0x10/0x10 [ 24.890646] ret_from_fork_asm+0x1a/0x30 [ 24.890677] </TASK> [ 24.890690] [ 24.898316] Allocated by task 294: [ 24.898472] kasan_save_stack+0x45/0x70 [ 24.898608] kasan_save_track+0x18/0x40 [ 24.898737] kasan_save_alloc_info+0x3b/0x50 [ 24.898881] __kasan_kmalloc+0xb7/0xc0 [ 24.899089] __kmalloc_cache_noprof+0x189/0x420 [ 24.899319] kasan_atomics+0x95/0x310 [ 24.899503] kunit_try_run_case+0x1a5/0x480 [ 24.899706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.899920] kthread+0x337/0x6f0 [ 24.900106] ret_from_fork+0x116/0x1d0 [ 24.900279] ret_from_fork_asm+0x1a/0x30 [ 24.900440] [ 24.900537] The buggy address belongs to the object at ffff888100aaa000 [ 24.900537] which belongs to the cache kmalloc-64 of size 64 [ 24.900939] The buggy address is located 0 bytes to the right of [ 24.900939] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.901575] [ 24.901671] The buggy address belongs to the physical page: [ 24.901872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.902257] flags: 0x200000000000000(node=0|zone=2) [ 24.902442] page_type: f5(slab) [ 24.902603] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.902835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.903071] page dumped because: kasan: bad access detected [ 24.903296] [ 24.903363] Memory state around the buggy address: [ 24.903515] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.903737] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.904168] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.904493] ^ [ 24.904714] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.905026] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.905390] ================================================================== [ 24.993451] ================================================================== [ 24.993694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 24.994291] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.994616] [ 24.994725] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.994776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.994790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.994813] Call Trace: [ 24.994833] <TASK> [ 24.994852] dump_stack_lvl+0x73/0xb0 [ 24.994881] print_report+0xd1/0x650 [ 24.994904] ? __virt_addr_valid+0x1db/0x2d0 [ 24.994929] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.994951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.994978] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.995000] kasan_report+0x141/0x180 [ 24.995022] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.995055] __asan_report_load4_noabort+0x18/0x20 [ 24.995080] kasan_atomics_helper+0x4a84/0x5450 [ 24.995103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.995129] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.995155] ? kasan_atomics+0x152/0x310 [ 24.995182] kasan_atomics+0x1dc/0x310 [ 24.995205] ? __pfx_kasan_atomics+0x10/0x10 [ 24.995238] ? trace_hardirqs_on+0x37/0xe0 [ 24.995263] ? __pfx_read_tsc+0x10/0x10 [ 24.995287] ? ktime_get_ts64+0x86/0x230 [ 24.995313] kunit_try_run_case+0x1a5/0x480 [ 24.995339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.995364] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.995391] ? __kthread_parkme+0x82/0x180 [ 24.995413] ? preempt_count_sub+0x50/0x80 [ 24.995437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.995462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.995487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.995511] kthread+0x337/0x6f0 [ 24.995531] ? trace_preempt_on+0x20/0xc0 [ 24.995555] ? __pfx_kthread+0x10/0x10 [ 24.995586] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.995611] ? calculate_sigpending+0x7b/0xa0 [ 24.995637] ? __pfx_kthread+0x10/0x10 [ 24.995659] ret_from_fork+0x116/0x1d0 [ 24.995679] ? __pfx_kthread+0x10/0x10 [ 24.995701] ret_from_fork_asm+0x1a/0x30 [ 24.995733] </TASK> [ 24.995745] [ 25.003209] Allocated by task 294: [ 25.003410] kasan_save_stack+0x45/0x70 [ 25.003614] kasan_save_track+0x18/0x40 [ 25.003807] kasan_save_alloc_info+0x3b/0x50 [ 25.004026] __kasan_kmalloc+0xb7/0xc0 [ 25.004250] __kmalloc_cache_noprof+0x189/0x420 [ 25.004479] kasan_atomics+0x95/0x310 [ 25.004672] kunit_try_run_case+0x1a5/0x480 [ 25.004831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.005001] kthread+0x337/0x6f0 [ 25.005139] ret_from_fork+0x116/0x1d0 [ 25.005276] ret_from_fork_asm+0x1a/0x30 [ 25.005413] [ 25.005507] The buggy address belongs to the object at ffff888100aaa000 [ 25.005507] which belongs to the cache kmalloc-64 of size 64 [ 25.006070] The buggy address is located 0 bytes to the right of [ 25.006070] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.006588] [ 25.006660] The buggy address belongs to the physical page: [ 25.006911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.007214] flags: 0x200000000000000(node=0|zone=2) [ 25.007385] page_type: f5(slab) [ 25.007501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.007727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.008079] page dumped because: kasan: bad access detected [ 25.008341] [ 25.008431] Memory state around the buggy address: [ 25.008657] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.008971] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.009322] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.009640] ^ [ 25.009866] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.010133] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.010353] ================================================================== [ 25.276013] ================================================================== [ 25.276321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 25.276690] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.277095] [ 25.277198] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.277269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.277284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.277329] Call Trace: [ 25.277351] <TASK> [ 25.277370] dump_stack_lvl+0x73/0xb0 [ 25.277411] print_report+0xd1/0x650 [ 25.277435] ? __virt_addr_valid+0x1db/0x2d0 [ 25.277460] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.277481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.277508] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.277539] kasan_report+0x141/0x180 [ 25.277562] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.277589] __asan_report_load4_noabort+0x18/0x20 [ 25.277623] kasan_atomics_helper+0x49ce/0x5450 [ 25.277647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.277673] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.277708] ? kasan_atomics+0x152/0x310 [ 25.277735] kasan_atomics+0x1dc/0x310 [ 25.277768] ? __pfx_kasan_atomics+0x10/0x10 [ 25.277791] ? trace_hardirqs_on+0x37/0xe0 [ 25.277816] ? __pfx_read_tsc+0x10/0x10 [ 25.277839] ? ktime_get_ts64+0x86/0x230 [ 25.277864] kunit_try_run_case+0x1a5/0x480 [ 25.277890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.277916] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.277944] ? __kthread_parkme+0x82/0x180 [ 25.277966] ? preempt_count_sub+0x50/0x80 [ 25.277991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.278016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.278041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.278066] kthread+0x337/0x6f0 [ 25.278087] ? trace_preempt_on+0x20/0xc0 [ 25.278110] ? __pfx_kthread+0x10/0x10 [ 25.278132] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.278156] ? calculate_sigpending+0x7b/0xa0 [ 25.278181] ? __pfx_kthread+0x10/0x10 [ 25.278203] ret_from_fork+0x116/0x1d0 [ 25.278232] ? __pfx_kthread+0x10/0x10 [ 25.278253] ret_from_fork_asm+0x1a/0x30 [ 25.278286] </TASK> [ 25.278298] [ 25.285652] Allocated by task 294: [ 25.285783] kasan_save_stack+0x45/0x70 [ 25.285925] kasan_save_track+0x18/0x40 [ 25.286054] kasan_save_alloc_info+0x3b/0x50 [ 25.286197] __kasan_kmalloc+0xb7/0xc0 [ 25.286451] __kmalloc_cache_noprof+0x189/0x420 [ 25.286667] kasan_atomics+0x95/0x310 [ 25.286871] kunit_try_run_case+0x1a5/0x480 [ 25.287146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.287389] kthread+0x337/0x6f0 [ 25.287506] ret_from_fork+0x116/0x1d0 [ 25.287633] ret_from_fork_asm+0x1a/0x30 [ 25.287766] [ 25.287831] The buggy address belongs to the object at ffff888100aaa000 [ 25.287831] which belongs to the cache kmalloc-64 of size 64 [ 25.288176] The buggy address is located 0 bytes to the right of [ 25.288176] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.289324] [ 25.289419] The buggy address belongs to the physical page: [ 25.289701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.290075] flags: 0x200000000000000(node=0|zone=2) [ 25.290323] page_type: f5(slab) [ 25.290505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.290882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.291121] page dumped because: kasan: bad access detected [ 25.291493] [ 25.291583] Memory state around the buggy address: [ 25.291825] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.292080] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.292482] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.292788] ^ [ 25.292975] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.293315] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.293618] ================================================================== [ 25.725052] ================================================================== [ 25.725461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 25.726161] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.726477] [ 25.726580] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.726634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.726649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.726674] Call Trace: [ 25.726697] <TASK> [ 25.726719] dump_stack_lvl+0x73/0xb0 [ 25.726751] print_report+0xd1/0x650 [ 25.726775] ? __virt_addr_valid+0x1db/0x2d0 [ 25.726800] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.726822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.726849] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.726872] kasan_report+0x141/0x180 [ 25.726894] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.726921] kasan_check_range+0x10c/0x1c0 [ 25.726945] __kasan_check_write+0x18/0x20 [ 25.726968] kasan_atomics_helper+0x1eaa/0x5450 [ 25.726991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.727208] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.727260] ? kasan_atomics+0x152/0x310 [ 25.727289] kasan_atomics+0x1dc/0x310 [ 25.727314] ? __pfx_kasan_atomics+0x10/0x10 [ 25.727337] ? trace_hardirqs_on+0x37/0xe0 [ 25.727399] ? __pfx_read_tsc+0x10/0x10 [ 25.727424] ? ktime_get_ts64+0x86/0x230 [ 25.727450] kunit_try_run_case+0x1a5/0x480 [ 25.727475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.727500] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.727528] ? __kthread_parkme+0x82/0x180 [ 25.727549] ? preempt_count_sub+0x50/0x80 [ 25.727575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.727599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.727624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.727648] kthread+0x337/0x6f0 [ 25.727669] ? trace_preempt_on+0x20/0xc0 [ 25.727692] ? __pfx_kthread+0x10/0x10 [ 25.727712] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.727737] ? calculate_sigpending+0x7b/0xa0 [ 25.727763] ? __pfx_kthread+0x10/0x10 [ 25.727784] ret_from_fork+0x116/0x1d0 [ 25.727805] ? __pfx_kthread+0x10/0x10 [ 25.727825] ret_from_fork_asm+0x1a/0x30 [ 25.727858] </TASK> [ 25.727870] [ 25.738370] Allocated by task 294: [ 25.738825] kasan_save_stack+0x45/0x70 [ 25.739159] kasan_save_track+0x18/0x40 [ 25.739492] kasan_save_alloc_info+0x3b/0x50 [ 25.739690] __kasan_kmalloc+0xb7/0xc0 [ 25.739857] __kmalloc_cache_noprof+0x189/0x420 [ 25.740239] kasan_atomics+0x95/0x310 [ 25.740537] kunit_try_run_case+0x1a5/0x480 [ 25.740848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.741353] kthread+0x337/0x6f0 [ 25.741510] ret_from_fork+0x116/0x1d0 [ 25.741671] ret_from_fork_asm+0x1a/0x30 [ 25.741846] [ 25.741931] The buggy address belongs to the object at ffff888100aaa000 [ 25.741931] which belongs to the cache kmalloc-64 of size 64 [ 25.742949] The buggy address is located 0 bytes to the right of [ 25.742949] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.743901] [ 25.744135] The buggy address belongs to the physical page: [ 25.744551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.745075] flags: 0x200000000000000(node=0|zone=2) [ 25.745310] page_type: f5(slab) [ 25.745469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.745770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.746323] page dumped because: kasan: bad access detected [ 25.746672] [ 25.746887] Memory state around the buggy address: [ 25.747311] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.747781] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.748257] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.748557] ^ [ 25.748746] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.749268] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.749705] ================================================================== [ 25.011692] ================================================================== [ 25.012107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 25.012465] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.012814] [ 25.012923] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.012974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.012987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.013032] Call Trace: [ 25.013054] <TASK> [ 25.013074] dump_stack_lvl+0x73/0xb0 [ 25.013104] print_report+0xd1/0x650 [ 25.013128] ? __virt_addr_valid+0x1db/0x2d0 [ 25.013153] ? kasan_atomics_helper+0xd47/0x5450 [ 25.013175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.013202] ? kasan_atomics_helper+0xd47/0x5450 [ 25.013234] kasan_report+0x141/0x180 [ 25.013256] ? kasan_atomics_helper+0xd47/0x5450 [ 25.013281] kasan_check_range+0x10c/0x1c0 [ 25.013306] __kasan_check_write+0x18/0x20 [ 25.013329] kasan_atomics_helper+0xd47/0x5450 [ 25.013352] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.013378] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.013404] ? kasan_atomics+0x152/0x310 [ 25.013431] kasan_atomics+0x1dc/0x310 [ 25.013454] ? __pfx_kasan_atomics+0x10/0x10 [ 25.013477] ? trace_hardirqs_on+0x37/0xe0 [ 25.013502] ? __pfx_read_tsc+0x10/0x10 [ 25.013524] ? ktime_get_ts64+0x86/0x230 [ 25.013550] kunit_try_run_case+0x1a5/0x480 [ 25.013575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.013600] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.013628] ? __kthread_parkme+0x82/0x180 [ 25.013650] ? preempt_count_sub+0x50/0x80 [ 25.013674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.013699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.013723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.013748] kthread+0x337/0x6f0 [ 25.013770] ? trace_preempt_on+0x20/0xc0 [ 25.013792] ? __pfx_kthread+0x10/0x10 [ 25.013814] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.013838] ? calculate_sigpending+0x7b/0xa0 [ 25.013863] ? __pfx_kthread+0x10/0x10 [ 25.013885] ret_from_fork+0x116/0x1d0 [ 25.013905] ? __pfx_kthread+0x10/0x10 [ 25.013926] ret_from_fork_asm+0x1a/0x30 [ 25.013958] </TASK> [ 25.013970] [ 25.020878] Allocated by task 294: [ 25.021029] kasan_save_stack+0x45/0x70 [ 25.021233] kasan_save_track+0x18/0x40 [ 25.021412] kasan_save_alloc_info+0x3b/0x50 [ 25.021618] __kasan_kmalloc+0xb7/0xc0 [ 25.021796] __kmalloc_cache_noprof+0x189/0x420 [ 25.022023] kasan_atomics+0x95/0x310 [ 25.022202] kunit_try_run_case+0x1a5/0x480 [ 25.022410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.022656] kthread+0x337/0x6f0 [ 25.022820] ret_from_fork+0x116/0x1d0 [ 25.022999] ret_from_fork_asm+0x1a/0x30 [ 25.023207] [ 25.023307] The buggy address belongs to the object at ffff888100aaa000 [ 25.023307] which belongs to the cache kmalloc-64 of size 64 [ 25.023668] The buggy address is located 0 bytes to the right of [ 25.023668] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.024038] [ 25.024134] The buggy address belongs to the physical page: [ 25.024391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.024752] flags: 0x200000000000000(node=0|zone=2) [ 25.024985] page_type: f5(slab) [ 25.025176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.025532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.025863] page dumped because: kasan: bad access detected [ 25.026101] [ 25.026165] Memory state around the buggy address: [ 25.026352] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.026662] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.026940] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.027241] ^ [ 25.027461] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.027735] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.028023] ================================================================== [ 24.727362] ================================================================== [ 24.727713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 24.728434] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.728827] [ 24.728975] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.729030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.729056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.729083] Call Trace: [ 24.729133] <TASK> [ 24.729155] dump_stack_lvl+0x73/0xb0 [ 24.729185] print_report+0xd1/0x650 [ 24.729230] ? __virt_addr_valid+0x1db/0x2d0 [ 24.729255] ? kasan_atomics_helper+0x4a0/0x5450 [ 24.729277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.729304] ? kasan_atomics_helper+0x4a0/0x5450 [ 24.729326] kasan_report+0x141/0x180 [ 24.729348] ? kasan_atomics_helper+0x4a0/0x5450 [ 24.729374] kasan_check_range+0x10c/0x1c0 [ 24.729398] __kasan_check_write+0x18/0x20 [ 24.729421] kasan_atomics_helper+0x4a0/0x5450 [ 24.729444] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.729470] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.729510] ? kasan_atomics+0x152/0x310 [ 24.729538] kasan_atomics+0x1dc/0x310 [ 24.729562] ? __pfx_kasan_atomics+0x10/0x10 [ 24.729584] ? trace_hardirqs_on+0x37/0xe0 [ 24.729608] ? __pfx_read_tsc+0x10/0x10 [ 24.729631] ? ktime_get_ts64+0x86/0x230 [ 24.729657] kunit_try_run_case+0x1a5/0x480 [ 24.729684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.729710] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.729737] ? __kthread_parkme+0x82/0x180 [ 24.729758] ? preempt_count_sub+0x50/0x80 [ 24.729782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.729808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.729833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.729858] kthread+0x337/0x6f0 [ 24.729879] ? trace_preempt_on+0x20/0xc0 [ 24.729901] ? __pfx_kthread+0x10/0x10 [ 24.729922] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.729947] ? calculate_sigpending+0x7b/0xa0 [ 24.729972] ? __pfx_kthread+0x10/0x10 [ 24.729994] ret_from_fork+0x116/0x1d0 [ 24.730051] ? __pfx_kthread+0x10/0x10 [ 24.730073] ret_from_fork_asm+0x1a/0x30 [ 24.730134] </TASK> [ 24.730146] [ 24.737758] Allocated by task 294: [ 24.737888] kasan_save_stack+0x45/0x70 [ 24.738054] kasan_save_track+0x18/0x40 [ 24.738258] kasan_save_alloc_info+0x3b/0x50 [ 24.738546] __kasan_kmalloc+0xb7/0xc0 [ 24.738779] __kmalloc_cache_noprof+0x189/0x420 [ 24.739000] kasan_atomics+0x95/0x310 [ 24.739237] kunit_try_run_case+0x1a5/0x480 [ 24.739486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.739725] kthread+0x337/0x6f0 [ 24.739844] ret_from_fork+0x116/0x1d0 [ 24.739999] ret_from_fork_asm+0x1a/0x30 [ 24.740190] [ 24.740322] The buggy address belongs to the object at ffff888100aaa000 [ 24.740322] which belongs to the cache kmalloc-64 of size 64 [ 24.741014] The buggy address is located 0 bytes to the right of [ 24.741014] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.741448] [ 24.741528] The buggy address belongs to the physical page: [ 24.741785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.742296] flags: 0x200000000000000(node=0|zone=2) [ 24.742623] page_type: f5(slab) [ 24.742780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.743056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.743442] page dumped because: kasan: bad access detected [ 24.743757] [ 24.743862] Memory state around the buggy address: [ 24.744015] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.744353] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.744706] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.744917] ^ [ 24.745359] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.745662] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.745873] ================================================================== [ 24.852246] ================================================================== [ 24.852551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 24.853014] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.853320] [ 24.853432] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.853482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.853496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.853520] Call Trace: [ 24.853541] <TASK> [ 24.853560] dump_stack_lvl+0x73/0xb0 [ 24.853588] print_report+0xd1/0x650 [ 24.853611] ? __virt_addr_valid+0x1db/0x2d0 [ 24.853636] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.853658] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.853684] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.853706] kasan_report+0x141/0x180 [ 24.853728] ? kasan_atomics_helper+0x7c7/0x5450 [ 24.853753] kasan_check_range+0x10c/0x1c0 [ 24.853778] __kasan_check_write+0x18/0x20 [ 24.853801] kasan_atomics_helper+0x7c7/0x5450 [ 24.853824] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.853850] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.853876] ? kasan_atomics+0x152/0x310 [ 24.853903] kasan_atomics+0x1dc/0x310 [ 24.853926] ? __pfx_kasan_atomics+0x10/0x10 [ 24.853949] ? trace_hardirqs_on+0x37/0xe0 [ 24.853972] ? __pfx_read_tsc+0x10/0x10 [ 24.853995] ? ktime_get_ts64+0x86/0x230 [ 24.854029] kunit_try_run_case+0x1a5/0x480 [ 24.854055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.854080] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.854107] ? __kthread_parkme+0x82/0x180 [ 24.854128] ? preempt_count_sub+0x50/0x80 [ 24.854153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.854177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.854202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.854236] kthread+0x337/0x6f0 [ 24.854257] ? trace_preempt_on+0x20/0xc0 [ 24.854279] ? __pfx_kthread+0x10/0x10 [ 24.854301] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.854326] ? calculate_sigpending+0x7b/0xa0 [ 24.854350] ? __pfx_kthread+0x10/0x10 [ 24.854372] ret_from_fork+0x116/0x1d0 [ 24.854392] ? __pfx_kthread+0x10/0x10 [ 24.854413] ret_from_fork_asm+0x1a/0x30 [ 24.854446] </TASK> [ 24.854459] [ 24.861210] Allocated by task 294: [ 24.861398] kasan_save_stack+0x45/0x70 [ 24.861593] kasan_save_track+0x18/0x40 [ 24.861782] kasan_save_alloc_info+0x3b/0x50 [ 24.861995] __kasan_kmalloc+0xb7/0xc0 [ 24.862183] __kmalloc_cache_noprof+0x189/0x420 [ 24.862385] kasan_atomics+0x95/0x310 [ 24.862552] kunit_try_run_case+0x1a5/0x480 [ 24.862719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.862930] kthread+0x337/0x6f0 [ 24.863143] ret_from_fork+0x116/0x1d0 [ 24.863343] ret_from_fork_asm+0x1a/0x30 [ 24.863511] [ 24.863600] The buggy address belongs to the object at ffff888100aaa000 [ 24.863600] which belongs to the cache kmalloc-64 of size 64 [ 24.863961] The buggy address is located 0 bytes to the right of [ 24.863961] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.864834] [ 24.864909] The buggy address belongs to the physical page: [ 24.865154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.865479] flags: 0x200000000000000(node=0|zone=2) [ 24.865710] page_type: f5(slab) [ 24.865860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.866213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.866481] page dumped because: kasan: bad access detected [ 24.866650] [ 24.866713] Memory state around the buggy address: [ 24.866863] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.867115] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.867705] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.868014] ^ [ 24.868240] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.868563] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.868804] ================================================================== [ 24.958377] ================================================================== [ 24.958733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 24.959067] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.959381] [ 24.959497] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.959548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.959562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.959586] Call Trace: [ 24.959610] <TASK> [ 24.959630] dump_stack_lvl+0x73/0xb0 [ 24.959661] print_report+0xd1/0x650 [ 24.959684] ? __virt_addr_valid+0x1db/0x2d0 [ 24.959708] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.959730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.959757] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.959778] kasan_report+0x141/0x180 [ 24.959802] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.959827] kasan_check_range+0x10c/0x1c0 [ 24.959850] __kasan_check_write+0x18/0x20 [ 24.959875] kasan_atomics_helper+0xb6a/0x5450 [ 24.959897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.959923] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.959950] ? kasan_atomics+0x152/0x310 [ 24.959977] kasan_atomics+0x1dc/0x310 [ 24.960000] ? __pfx_kasan_atomics+0x10/0x10 [ 24.960023] ? trace_hardirqs_on+0x37/0xe0 [ 24.960047] ? __pfx_read_tsc+0x10/0x10 [ 24.960071] ? ktime_get_ts64+0x86/0x230 [ 24.960096] kunit_try_run_case+0x1a5/0x480 [ 24.960121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.960147] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.960174] ? __kthread_parkme+0x82/0x180 [ 24.960196] ? preempt_count_sub+0x50/0x80 [ 24.960231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.960257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.960283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.960308] kthread+0x337/0x6f0 [ 24.960330] ? trace_preempt_on+0x20/0xc0 [ 24.960354] ? __pfx_kthread+0x10/0x10 [ 24.960374] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.960399] ? calculate_sigpending+0x7b/0xa0 [ 24.960425] ? __pfx_kthread+0x10/0x10 [ 24.960447] ret_from_fork+0x116/0x1d0 [ 24.960467] ? __pfx_kthread+0x10/0x10 [ 24.960489] ret_from_fork_asm+0x1a/0x30 [ 24.960521] </TASK> [ 24.960532] [ 24.967854] Allocated by task 294: [ 24.968042] kasan_save_stack+0x45/0x70 [ 24.968246] kasan_save_track+0x18/0x40 [ 24.968382] kasan_save_alloc_info+0x3b/0x50 [ 24.968525] __kasan_kmalloc+0xb7/0xc0 [ 24.968650] __kmalloc_cache_noprof+0x189/0x420 [ 24.968798] kasan_atomics+0x95/0x310 [ 24.968924] kunit_try_run_case+0x1a5/0x480 [ 24.969064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.969261] kthread+0x337/0x6f0 [ 24.969432] ret_from_fork+0x116/0x1d0 [ 24.969616] ret_from_fork_asm+0x1a/0x30 [ 24.969809] [ 24.969905] The buggy address belongs to the object at ffff888100aaa000 [ 24.969905] which belongs to the cache kmalloc-64 of size 64 [ 24.970596] The buggy address is located 0 bytes to the right of [ 24.970596] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.970959] [ 24.971037] The buggy address belongs to the physical page: [ 24.971552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.971908] flags: 0x200000000000000(node=0|zone=2) [ 24.972146] page_type: f5(slab) [ 24.972319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.972612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.972850] page dumped because: kasan: bad access detected [ 24.973017] [ 24.973081] Memory state around the buggy address: [ 24.973242] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.973454] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.973972] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.974488] ^ [ 24.974713] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.975039] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.975377] ================================================================== [ 25.751388] ================================================================== [ 25.751717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 25.752296] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.752824] [ 25.752932] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.752986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.753000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.753025] Call Trace: [ 25.753047] <TASK> [ 25.753069] dump_stack_lvl+0x73/0xb0 [ 25.753101] print_report+0xd1/0x650 [ 25.753125] ? __virt_addr_valid+0x1db/0x2d0 [ 25.753150] ? kasan_atomics_helper+0x1f43/0x5450 [ 25.753172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.753200] ? kasan_atomics_helper+0x1f43/0x5450 [ 25.753238] kasan_report+0x141/0x180 [ 25.753262] ? kasan_atomics_helper+0x1f43/0x5450 [ 25.753288] kasan_check_range+0x10c/0x1c0 [ 25.753312] __kasan_check_write+0x18/0x20 [ 25.753336] kasan_atomics_helper+0x1f43/0x5450 [ 25.753360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.753387] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.753413] ? kasan_atomics+0x152/0x310 [ 25.753442] kasan_atomics+0x1dc/0x310 [ 25.753464] ? __pfx_kasan_atomics+0x10/0x10 [ 25.753486] ? trace_hardirqs_on+0x37/0xe0 [ 25.753511] ? __pfx_read_tsc+0x10/0x10 [ 25.753534] ? ktime_get_ts64+0x86/0x230 [ 25.753560] kunit_try_run_case+0x1a5/0x480 [ 25.753586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.753611] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.753639] ? __kthread_parkme+0x82/0x180 [ 25.753661] ? preempt_count_sub+0x50/0x80 [ 25.753685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.753710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.753734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.753759] kthread+0x337/0x6f0 [ 25.753780] ? trace_preempt_on+0x20/0xc0 [ 25.753802] ? __pfx_kthread+0x10/0x10 [ 25.753824] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.753848] ? calculate_sigpending+0x7b/0xa0 [ 25.753873] ? __pfx_kthread+0x10/0x10 [ 25.753895] ret_from_fork+0x116/0x1d0 [ 25.753914] ? __pfx_kthread+0x10/0x10 [ 25.753935] ret_from_fork_asm+0x1a/0x30 [ 25.753968] </TASK> [ 25.753981] [ 25.760999] Allocated by task 294: [ 25.761131] kasan_save_stack+0x45/0x70 [ 25.761281] kasan_save_track+0x18/0x40 [ 25.761469] kasan_save_alloc_info+0x3b/0x50 [ 25.761672] __kasan_kmalloc+0xb7/0xc0 [ 25.761850] __kmalloc_cache_noprof+0x189/0x420 [ 25.762145] kasan_atomics+0x95/0x310 [ 25.762339] kunit_try_run_case+0x1a5/0x480 [ 25.762489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.762659] kthread+0x337/0x6f0 [ 25.762774] ret_from_fork+0x116/0x1d0 [ 25.762950] ret_from_fork_asm+0x1a/0x30 [ 25.763303] [ 25.763407] The buggy address belongs to the object at ffff888100aaa000 [ 25.763407] which belongs to the cache kmalloc-64 of size 64 [ 25.763912] The buggy address is located 0 bytes to the right of [ 25.763912] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.764371] [ 25.764443] The buggy address belongs to the physical page: [ 25.764611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.764894] flags: 0x200000000000000(node=0|zone=2) [ 25.765122] page_type: f5(slab) [ 25.765297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.765639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.765967] page dumped because: kasan: bad access detected [ 25.766210] [ 25.766285] Memory state around the buggy address: [ 25.766435] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.766645] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.766888] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.767462] ^ [ 25.767690] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.768005] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.768335] ================================================================== [ 25.787169] ================================================================== [ 25.787538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 25.788397] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.788638] [ 25.788728] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.788789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.788803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.788828] Call Trace: [ 25.788850] <TASK> [ 25.788873] dump_stack_lvl+0x73/0xb0 [ 25.788905] print_report+0xd1/0x650 [ 25.788929] ? __virt_addr_valid+0x1db/0x2d0 [ 25.788955] ? kasan_atomics_helper+0x2006/0x5450 [ 25.788977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.789003] ? kasan_atomics_helper+0x2006/0x5450 [ 25.789026] kasan_report+0x141/0x180 [ 25.789048] ? kasan_atomics_helper+0x2006/0x5450 [ 25.789075] kasan_check_range+0x10c/0x1c0 [ 25.789099] __kasan_check_write+0x18/0x20 [ 25.789123] kasan_atomics_helper+0x2006/0x5450 [ 25.789146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.789172] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.789198] ? kasan_atomics+0x152/0x310 [ 25.789245] kasan_atomics+0x1dc/0x310 [ 25.789269] ? __pfx_kasan_atomics+0x10/0x10 [ 25.789292] ? trace_hardirqs_on+0x37/0xe0 [ 25.789316] ? __pfx_read_tsc+0x10/0x10 [ 25.789340] ? ktime_get_ts64+0x86/0x230 [ 25.789366] kunit_try_run_case+0x1a5/0x480 [ 25.789392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.789417] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.789444] ? __kthread_parkme+0x82/0x180 [ 25.789465] ? preempt_count_sub+0x50/0x80 [ 25.789489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.789514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.789538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.789563] kthread+0x337/0x6f0 [ 25.789584] ? trace_preempt_on+0x20/0xc0 [ 25.789607] ? __pfx_kthread+0x10/0x10 [ 25.789628] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.789652] ? calculate_sigpending+0x7b/0xa0 [ 25.789678] ? __pfx_kthread+0x10/0x10 [ 25.789699] ret_from_fork+0x116/0x1d0 [ 25.789719] ? __pfx_kthread+0x10/0x10 [ 25.789740] ret_from_fork_asm+0x1a/0x30 [ 25.789773] </TASK> [ 25.789785] [ 25.797185] Allocated by task 294: [ 25.797375] kasan_save_stack+0x45/0x70 [ 25.797555] kasan_save_track+0x18/0x40 [ 25.797713] kasan_save_alloc_info+0x3b/0x50 [ 25.797856] __kasan_kmalloc+0xb7/0xc0 [ 25.797981] __kmalloc_cache_noprof+0x189/0x420 [ 25.798130] kasan_atomics+0x95/0x310 [ 25.798288] kunit_try_run_case+0x1a5/0x480 [ 25.798489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.799038] kthread+0x337/0x6f0 [ 25.799187] ret_from_fork+0x116/0x1d0 [ 25.799320] ret_from_fork_asm+0x1a/0x30 [ 25.799448] [ 25.799513] The buggy address belongs to the object at ffff888100aaa000 [ 25.799513] which belongs to the cache kmalloc-64 of size 64 [ 25.799872] The buggy address is located 0 bytes to the right of [ 25.799872] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.800811] [ 25.800904] The buggy address belongs to the physical page: [ 25.801123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.801417] flags: 0x200000000000000(node=0|zone=2) [ 25.801632] page_type: f5(slab) [ 25.801781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.802086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.802395] page dumped because: kasan: bad access detected [ 25.802628] [ 25.802707] Memory state around the buggy address: [ 25.802892] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.803255] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.803531] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.803785] ^ [ 25.803982] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.804251] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.804447] ================================================================== [ 24.666977] ================================================================== [ 24.667323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 24.667692] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.668146] [ 24.668352] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.668414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.668429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.668458] Call Trace: [ 24.668482] <TASK> [ 24.668504] dump_stack_lvl+0x73/0xb0 [ 24.668571] print_report+0xd1/0x650 [ 24.668596] ? __virt_addr_valid+0x1db/0x2d0 [ 24.668662] ? kasan_atomics_helper+0x4b6e/0x5450 [ 24.668684] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.668722] ? kasan_atomics_helper+0x4b6e/0x5450 [ 24.668746] kasan_report+0x141/0x180 [ 24.668769] ? kasan_atomics_helper+0x4b6e/0x5450 [ 24.668796] __asan_report_store4_noabort+0x1b/0x30 [ 24.668822] kasan_atomics_helper+0x4b6e/0x5450 [ 24.668845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.668871] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.668897] ? kasan_atomics+0x152/0x310 [ 24.668924] kasan_atomics+0x1dc/0x310 [ 24.668947] ? __pfx_kasan_atomics+0x10/0x10 [ 24.668970] ? trace_hardirqs_on+0x37/0xe0 [ 24.668994] ? __pfx_read_tsc+0x10/0x10 [ 24.669026] ? ktime_get_ts64+0x86/0x230 [ 24.669052] kunit_try_run_case+0x1a5/0x480 [ 24.669078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.669103] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.669130] ? __kthread_parkme+0x82/0x180 [ 24.669152] ? preempt_count_sub+0x50/0x80 [ 24.669177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.669201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.669237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.669262] kthread+0x337/0x6f0 [ 24.669283] ? trace_preempt_on+0x20/0xc0 [ 24.669306] ? __pfx_kthread+0x10/0x10 [ 24.669327] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.669352] ? calculate_sigpending+0x7b/0xa0 [ 24.669377] ? __pfx_kthread+0x10/0x10 [ 24.669399] ret_from_fork+0x116/0x1d0 [ 24.669419] ? __pfx_kthread+0x10/0x10 [ 24.669440] ret_from_fork_asm+0x1a/0x30 [ 24.669473] </TASK> [ 24.669486] [ 24.678289] Allocated by task 294: [ 24.678528] kasan_save_stack+0x45/0x70 [ 24.678735] kasan_save_track+0x18/0x40 [ 24.678988] kasan_save_alloc_info+0x3b/0x50 [ 24.679190] __kasan_kmalloc+0xb7/0xc0 [ 24.679331] __kmalloc_cache_noprof+0x189/0x420 [ 24.679483] kasan_atomics+0x95/0x310 [ 24.679647] kunit_try_run_case+0x1a5/0x480 [ 24.679837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.680157] kthread+0x337/0x6f0 [ 24.680460] ret_from_fork+0x116/0x1d0 [ 24.680799] ret_from_fork_asm+0x1a/0x30 [ 24.680949] [ 24.681149] The buggy address belongs to the object at ffff888100aaa000 [ 24.681149] which belongs to the cache kmalloc-64 of size 64 [ 24.681600] The buggy address is located 0 bytes to the right of [ 24.681600] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.682152] [ 24.682328] The buggy address belongs to the physical page: [ 24.682672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.683004] flags: 0x200000000000000(node=0|zone=2) [ 24.683297] page_type: f5(slab) [ 24.683423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.683693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.684029] page dumped because: kasan: bad access detected [ 24.684559] [ 24.684706] Memory state around the buggy address: [ 24.684912] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.685249] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.685692] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.685945] ^ [ 24.686347] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.686728] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.687081] ================================================================== [ 25.140674] ================================================================== [ 25.141428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 25.141816] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.142191] [ 25.142363] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.142417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.142431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.142456] Call Trace: [ 25.142479] <TASK> [ 25.142502] dump_stack_lvl+0x73/0xb0 [ 25.142534] print_report+0xd1/0x650 [ 25.142558] ? __virt_addr_valid+0x1db/0x2d0 [ 25.142584] ? kasan_atomics_helper+0x1079/0x5450 [ 25.142619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.142649] ? kasan_atomics_helper+0x1079/0x5450 [ 25.142672] kasan_report+0x141/0x180 [ 25.142707] ? kasan_atomics_helper+0x1079/0x5450 [ 25.142735] kasan_check_range+0x10c/0x1c0 [ 25.142759] __kasan_check_write+0x18/0x20 [ 25.142782] kasan_atomics_helper+0x1079/0x5450 [ 25.142805] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.142834] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.142861] ? kasan_atomics+0x152/0x310 [ 25.142888] kasan_atomics+0x1dc/0x310 [ 25.142912] ? __pfx_kasan_atomics+0x10/0x10 [ 25.142936] ? trace_hardirqs_on+0x37/0xe0 [ 25.142960] ? __pfx_read_tsc+0x10/0x10 [ 25.142985] ? ktime_get_ts64+0x86/0x230 [ 25.143013] kunit_try_run_case+0x1a5/0x480 [ 25.143060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.143086] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.143114] ? __kthread_parkme+0x82/0x180 [ 25.143136] ? preempt_count_sub+0x50/0x80 [ 25.143161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.143186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.143211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.143247] kthread+0x337/0x6f0 [ 25.143268] ? trace_preempt_on+0x20/0xc0 [ 25.143291] ? __pfx_kthread+0x10/0x10 [ 25.143313] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.143338] ? calculate_sigpending+0x7b/0xa0 [ 25.143363] ? __pfx_kthread+0x10/0x10 [ 25.143384] ret_from_fork+0x116/0x1d0 [ 25.143405] ? __pfx_kthread+0x10/0x10 [ 25.143426] ret_from_fork_asm+0x1a/0x30 [ 25.143458] </TASK> [ 25.143471] [ 25.152209] Allocated by task 294: [ 25.152597] kasan_save_stack+0x45/0x70 [ 25.152915] kasan_save_track+0x18/0x40 [ 25.153247] kasan_save_alloc_info+0x3b/0x50 [ 25.153438] __kasan_kmalloc+0xb7/0xc0 [ 25.153609] __kmalloc_cache_noprof+0x189/0x420 [ 25.153805] kasan_atomics+0x95/0x310 [ 25.153965] kunit_try_run_case+0x1a5/0x480 [ 25.154415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.154856] kthread+0x337/0x6f0 [ 25.155390] ret_from_fork+0x116/0x1d0 [ 25.155600] ret_from_fork_asm+0x1a/0x30 [ 25.155779] [ 25.155863] The buggy address belongs to the object at ffff888100aaa000 [ 25.155863] which belongs to the cache kmalloc-64 of size 64 [ 25.156688] The buggy address is located 0 bytes to the right of [ 25.156688] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.157529] [ 25.157722] The buggy address belongs to the physical page: [ 25.158343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.158986] flags: 0x200000000000000(node=0|zone=2) [ 25.159393] page_type: f5(slab) [ 25.159696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.160559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.160998] page dumped because: kasan: bad access detected [ 25.161448] [ 25.161691] Memory state around the buggy address: [ 25.162140] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.162648] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.163437] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.164175] ^ [ 25.164493] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.165109] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.165633] ================================================================== [ 25.257528] ================================================================== [ 25.258107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 25.258481] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.258785] [ 25.258872] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.258926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.258940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.258963] Call Trace: [ 25.258984] <TASK> [ 25.259005] dump_stack_lvl+0x73/0xb0 [ 25.259051] print_report+0xd1/0x650 [ 25.259075] ? __virt_addr_valid+0x1db/0x2d0 [ 25.259099] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.259121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.259148] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.259171] kasan_report+0x141/0x180 [ 25.259194] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.259230] kasan_check_range+0x10c/0x1c0 [ 25.259254] __kasan_check_write+0x18/0x20 [ 25.259279] kasan_atomics_helper+0x12e6/0x5450 [ 25.259302] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.259328] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.259355] ? kasan_atomics+0x152/0x310 [ 25.259382] kasan_atomics+0x1dc/0x310 [ 25.259405] ? __pfx_kasan_atomics+0x10/0x10 [ 25.259428] ? trace_hardirqs_on+0x37/0xe0 [ 25.259452] ? __pfx_read_tsc+0x10/0x10 [ 25.259475] ? ktime_get_ts64+0x86/0x230 [ 25.259501] kunit_try_run_case+0x1a5/0x480 [ 25.259526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.259551] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.259579] ? __kthread_parkme+0x82/0x180 [ 25.259600] ? preempt_count_sub+0x50/0x80 [ 25.259625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.259650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.259674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.259699] kthread+0x337/0x6f0 [ 25.259720] ? trace_preempt_on+0x20/0xc0 [ 25.259743] ? __pfx_kthread+0x10/0x10 [ 25.259764] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.259789] ? calculate_sigpending+0x7b/0xa0 [ 25.259814] ? __pfx_kthread+0x10/0x10 [ 25.259837] ret_from_fork+0x116/0x1d0 [ 25.259857] ? __pfx_kthread+0x10/0x10 [ 25.259878] ret_from_fork_asm+0x1a/0x30 [ 25.259911] </TASK> [ 25.259923] [ 25.267709] Allocated by task 294: [ 25.267897] kasan_save_stack+0x45/0x70 [ 25.268135] kasan_save_track+0x18/0x40 [ 25.268326] kasan_save_alloc_info+0x3b/0x50 [ 25.268528] __kasan_kmalloc+0xb7/0xc0 [ 25.268715] __kmalloc_cache_noprof+0x189/0x420 [ 25.268918] kasan_atomics+0x95/0x310 [ 25.269137] kunit_try_run_case+0x1a5/0x480 [ 25.269347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.269540] kthread+0x337/0x6f0 [ 25.269658] ret_from_fork+0x116/0x1d0 [ 25.269785] ret_from_fork_asm+0x1a/0x30 [ 25.269919] [ 25.269985] The buggy address belongs to the object at ffff888100aaa000 [ 25.269985] which belongs to the cache kmalloc-64 of size 64 [ 25.270559] The buggy address is located 0 bytes to the right of [ 25.270559] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.271322] [ 25.271425] The buggy address belongs to the physical page: [ 25.271666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.272017] flags: 0x200000000000000(node=0|zone=2) [ 25.272212] page_type: f5(slab) [ 25.272343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.272567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.272909] page dumped because: kasan: bad access detected [ 25.273382] [ 25.273462] Memory state around the buggy address: [ 25.273655] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.273961] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.274317] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.274570] ^ [ 25.274807] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.275118] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.275334] ================================================================== [ 25.866967] ================================================================== [ 25.867347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 25.867672] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.867948] [ 25.868032] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.868081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.868094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.868118] Call Trace: [ 25.868138] <TASK> [ 25.868158] dump_stack_lvl+0x73/0xb0 [ 25.868186] print_report+0xd1/0x650 [ 25.868209] ? __virt_addr_valid+0x1db/0x2d0 [ 25.868247] ? kasan_atomics_helper+0x218a/0x5450 [ 25.868269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.868295] ? kasan_atomics_helper+0x218a/0x5450 [ 25.868317] kasan_report+0x141/0x180 [ 25.868341] ? kasan_atomics_helper+0x218a/0x5450 [ 25.868367] kasan_check_range+0x10c/0x1c0 [ 25.868391] __kasan_check_write+0x18/0x20 [ 25.868416] kasan_atomics_helper+0x218a/0x5450 [ 25.868439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.868465] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.868491] ? kasan_atomics+0x152/0x310 [ 25.868518] kasan_atomics+0x1dc/0x310 [ 25.868541] ? __pfx_kasan_atomics+0x10/0x10 [ 25.868564] ? trace_hardirqs_on+0x37/0xe0 [ 25.868588] ? __pfx_read_tsc+0x10/0x10 [ 25.868612] ? ktime_get_ts64+0x86/0x230 [ 25.868638] kunit_try_run_case+0x1a5/0x480 [ 25.868664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.868689] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.868717] ? __kthread_parkme+0x82/0x180 [ 25.868739] ? preempt_count_sub+0x50/0x80 [ 25.868764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.868789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.868813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.868838] kthread+0x337/0x6f0 [ 25.868859] ? trace_preempt_on+0x20/0xc0 [ 25.868882] ? __pfx_kthread+0x10/0x10 [ 25.868904] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.868929] ? calculate_sigpending+0x7b/0xa0 [ 25.868954] ? __pfx_kthread+0x10/0x10 [ 25.868977] ret_from_fork+0x116/0x1d0 [ 25.868996] ? __pfx_kthread+0x10/0x10 [ 25.869017] ret_from_fork_asm+0x1a/0x30 [ 25.869059] </TASK> [ 25.869071] [ 25.876403] Allocated by task 294: [ 25.876544] kasan_save_stack+0x45/0x70 [ 25.876747] kasan_save_track+0x18/0x40 [ 25.876911] kasan_save_alloc_info+0x3b/0x50 [ 25.877129] __kasan_kmalloc+0xb7/0xc0 [ 25.877296] __kmalloc_cache_noprof+0x189/0x420 [ 25.877481] kasan_atomics+0x95/0x310 [ 25.877636] kunit_try_run_case+0x1a5/0x480 [ 25.877823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.878046] kthread+0x337/0x6f0 [ 25.878174] ret_from_fork+0x116/0x1d0 [ 25.878313] ret_from_fork_asm+0x1a/0x30 [ 25.878450] [ 25.878515] The buggy address belongs to the object at ffff888100aaa000 [ 25.878515] which belongs to the cache kmalloc-64 of size 64 [ 25.878860] The buggy address is located 0 bytes to the right of [ 25.878860] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.879508] [ 25.879606] The buggy address belongs to the physical page: [ 25.879859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.880204] flags: 0x200000000000000(node=0|zone=2) [ 25.880442] page_type: f5(slab) [ 25.880561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.880786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.881007] page dumped because: kasan: bad access detected [ 25.881175] [ 25.881249] Memory state around the buggy address: [ 25.881482] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.881799] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.882197] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.882522] ^ [ 25.882756] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.883131] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.883455] ================================================================== [ 25.884243] ================================================================== [ 25.884563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 25.884851] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.885201] [ 25.885327] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.885378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.885391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.885418] Call Trace: [ 25.885440] <TASK> [ 25.885461] dump_stack_lvl+0x73/0xb0 [ 25.885490] print_report+0xd1/0x650 [ 25.885513] ? __virt_addr_valid+0x1db/0x2d0 [ 25.885538] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.885560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.885587] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.885609] kasan_report+0x141/0x180 [ 25.885632] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.885658] __asan_report_load8_noabort+0x18/0x20 [ 25.885683] kasan_atomics_helper+0x4fa5/0x5450 [ 25.885706] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.885732] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.885758] ? kasan_atomics+0x152/0x310 [ 25.885785] kasan_atomics+0x1dc/0x310 [ 25.885809] ? __pfx_kasan_atomics+0x10/0x10 [ 25.885831] ? trace_hardirqs_on+0x37/0xe0 [ 25.885855] ? __pfx_read_tsc+0x10/0x10 [ 25.885878] ? ktime_get_ts64+0x86/0x230 [ 25.885904] kunit_try_run_case+0x1a5/0x480 [ 25.885930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.885956] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.885984] ? __kthread_parkme+0x82/0x180 [ 25.886006] ? preempt_count_sub+0x50/0x80 [ 25.886030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.886055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.886080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.886104] kthread+0x337/0x6f0 [ 25.886125] ? trace_preempt_on+0x20/0xc0 [ 25.886147] ? __pfx_kthread+0x10/0x10 [ 25.886169] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.886194] ? calculate_sigpending+0x7b/0xa0 [ 25.886230] ? __pfx_kthread+0x10/0x10 [ 25.886256] ret_from_fork+0x116/0x1d0 [ 25.886278] ? __pfx_kthread+0x10/0x10 [ 25.886298] ret_from_fork_asm+0x1a/0x30 [ 25.886331] </TASK> [ 25.886343] [ 25.893460] Allocated by task 294: [ 25.893591] kasan_save_stack+0x45/0x70 [ 25.893730] kasan_save_track+0x18/0x40 [ 25.893869] kasan_save_alloc_info+0x3b/0x50 [ 25.894120] __kasan_kmalloc+0xb7/0xc0 [ 25.894314] __kmalloc_cache_noprof+0x189/0x420 [ 25.894533] kasan_atomics+0x95/0x310 [ 25.894723] kunit_try_run_case+0x1a5/0x480 [ 25.894907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.895260] kthread+0x337/0x6f0 [ 25.895396] ret_from_fork+0x116/0x1d0 [ 25.895524] ret_from_fork_asm+0x1a/0x30 [ 25.895657] [ 25.895723] The buggy address belongs to the object at ffff888100aaa000 [ 25.895723] which belongs to the cache kmalloc-64 of size 64 [ 25.896195] The buggy address is located 0 bytes to the right of [ 25.896195] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.896759] [ 25.896856] The buggy address belongs to the physical page: [ 25.897204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.897509] flags: 0x200000000000000(node=0|zone=2) [ 25.897671] page_type: f5(slab) [ 25.897796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.898026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.898381] page dumped because: kasan: bad access detected [ 25.898637] [ 25.898725] Memory state around the buggy address: [ 25.898951] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.899439] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.899695] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.899984] ^ [ 25.900237] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.900504] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.900763] ================================================================== [ 25.239385] ================================================================== [ 25.239977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 25.240703] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.241105] [ 25.241191] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.241250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.241275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.241300] Call Trace: [ 25.241321] <TASK> [ 25.241349] dump_stack_lvl+0x73/0xb0 [ 25.241380] print_report+0xd1/0x650 [ 25.241403] ? __virt_addr_valid+0x1db/0x2d0 [ 25.241427] ? kasan_atomics_helper+0x49e8/0x5450 [ 25.241448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.241475] ? kasan_atomics_helper+0x49e8/0x5450 [ 25.241496] kasan_report+0x141/0x180 [ 25.241519] ? kasan_atomics_helper+0x49e8/0x5450 [ 25.241545] __asan_report_load4_noabort+0x18/0x20 [ 25.241570] kasan_atomics_helper+0x49e8/0x5450 [ 25.241593] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.241619] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.241644] ? kasan_atomics+0x152/0x310 [ 25.241671] kasan_atomics+0x1dc/0x310 [ 25.241696] ? __pfx_kasan_atomics+0x10/0x10 [ 25.241718] ? trace_hardirqs_on+0x37/0xe0 [ 25.241743] ? __pfx_read_tsc+0x10/0x10 [ 25.241765] ? ktime_get_ts64+0x86/0x230 [ 25.241790] kunit_try_run_case+0x1a5/0x480 [ 25.241816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.241841] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.241868] ? __kthread_parkme+0x82/0x180 [ 25.241889] ? preempt_count_sub+0x50/0x80 [ 25.241915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.241939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.241964] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.241989] kthread+0x337/0x6f0 [ 25.242009] ? trace_preempt_on+0x20/0xc0 [ 25.242043] ? __pfx_kthread+0x10/0x10 [ 25.242074] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.242099] ? calculate_sigpending+0x7b/0xa0 [ 25.242124] ? __pfx_kthread+0x10/0x10 [ 25.242164] ret_from_fork+0x116/0x1d0 [ 25.242185] ? __pfx_kthread+0x10/0x10 [ 25.242206] ret_from_fork_asm+0x1a/0x30 [ 25.242255] </TASK> [ 25.242267] [ 25.249345] Allocated by task 294: [ 25.249513] kasan_save_stack+0x45/0x70 [ 25.249671] kasan_save_track+0x18/0x40 [ 25.249848] kasan_save_alloc_info+0x3b/0x50 [ 25.250046] __kasan_kmalloc+0xb7/0xc0 [ 25.250243] __kmalloc_cache_noprof+0x189/0x420 [ 25.250463] kasan_atomics+0x95/0x310 [ 25.250664] kunit_try_run_case+0x1a5/0x480 [ 25.250828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.250999] kthread+0x337/0x6f0 [ 25.251179] ret_from_fork+0x116/0x1d0 [ 25.251373] ret_from_fork_asm+0x1a/0x30 [ 25.251595] [ 25.251685] The buggy address belongs to the object at ffff888100aaa000 [ 25.251685] which belongs to the cache kmalloc-64 of size 64 [ 25.252230] The buggy address is located 0 bytes to the right of [ 25.252230] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.252671] [ 25.252764] The buggy address belongs to the physical page: [ 25.253044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.253370] flags: 0x200000000000000(node=0|zone=2) [ 25.253622] page_type: f5(slab) [ 25.253788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.254198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.254514] page dumped because: kasan: bad access detected [ 25.254763] [ 25.254862] Memory state around the buggy address: [ 25.255130] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.255435] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.255655] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.255865] ^ [ 25.256013] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.256327] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.256779] ================================================================== [ 24.746544] ================================================================== [ 24.747216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 24.747595] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.747822] [ 24.747906] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.747954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.747969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.747992] Call Trace: [ 24.748012] <TASK> [ 24.748040] dump_stack_lvl+0x73/0xb0 [ 24.748070] print_report+0xd1/0x650 [ 24.748129] ? __virt_addr_valid+0x1db/0x2d0 [ 24.748154] ? kasan_atomics_helper+0x4b3a/0x5450 [ 24.748188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.748215] ? kasan_atomics_helper+0x4b3a/0x5450 [ 24.748247] kasan_report+0x141/0x180 [ 24.748270] ? kasan_atomics_helper+0x4b3a/0x5450 [ 24.748296] __asan_report_store4_noabort+0x1b/0x30 [ 24.748321] kasan_atomics_helper+0x4b3a/0x5450 [ 24.748345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.748372] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.748425] ? kasan_atomics+0x152/0x310 [ 24.748454] kasan_atomics+0x1dc/0x310 [ 24.748477] ? __pfx_kasan_atomics+0x10/0x10 [ 24.748511] ? trace_hardirqs_on+0x37/0xe0 [ 24.748535] ? __pfx_read_tsc+0x10/0x10 [ 24.748558] ? ktime_get_ts64+0x86/0x230 [ 24.748583] kunit_try_run_case+0x1a5/0x480 [ 24.748610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.748635] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.748662] ? __kthread_parkme+0x82/0x180 [ 24.748684] ? preempt_count_sub+0x50/0x80 [ 24.748708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.748733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.748758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.748783] kthread+0x337/0x6f0 [ 24.748804] ? trace_preempt_on+0x20/0xc0 [ 24.748857] ? __pfx_kthread+0x10/0x10 [ 24.748878] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.748925] ? calculate_sigpending+0x7b/0xa0 [ 24.748951] ? __pfx_kthread+0x10/0x10 [ 24.748973] ret_from_fork+0x116/0x1d0 [ 24.748994] ? __pfx_kthread+0x10/0x10 [ 24.749015] ret_from_fork_asm+0x1a/0x30 [ 24.749047] </TASK> [ 24.749059] [ 24.758631] Allocated by task 294: [ 24.758940] kasan_save_stack+0x45/0x70 [ 24.759188] kasan_save_track+0x18/0x40 [ 24.759355] kasan_save_alloc_info+0x3b/0x50 [ 24.759570] __kasan_kmalloc+0xb7/0xc0 [ 24.759734] __kmalloc_cache_noprof+0x189/0x420 [ 24.759950] kasan_atomics+0x95/0x310 [ 24.760537] kunit_try_run_case+0x1a5/0x480 [ 24.760754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.761134] kthread+0x337/0x6f0 [ 24.761321] ret_from_fork+0x116/0x1d0 [ 24.761490] ret_from_fork_asm+0x1a/0x30 [ 24.761688] [ 24.761760] The buggy address belongs to the object at ffff888100aaa000 [ 24.761760] which belongs to the cache kmalloc-64 of size 64 [ 24.762657] The buggy address is located 0 bytes to the right of [ 24.762657] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.763491] [ 24.763587] The buggy address belongs to the physical page: [ 24.763910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.764436] flags: 0x200000000000000(node=0|zone=2) [ 24.764682] page_type: f5(slab) [ 24.764843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.765406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.765742] page dumped because: kasan: bad access detected [ 24.765974] [ 24.766053] Memory state around the buggy address: [ 24.766279] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.766584] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.766890] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.767227] ^ [ 24.767438] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.767751] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.768055] ================================================================== [ 25.166202] ================================================================== [ 25.166498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 25.166817] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.167171] [ 25.167306] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.167357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.167381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.167406] Call Trace: [ 25.167428] <TASK> [ 25.167468] dump_stack_lvl+0x73/0xb0 [ 25.167498] print_report+0xd1/0x650 [ 25.167523] ? __virt_addr_valid+0x1db/0x2d0 [ 25.167559] ? kasan_atomics_helper+0x4a1c/0x5450 [ 25.167581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.167608] ? kasan_atomics_helper+0x4a1c/0x5450 [ 25.167629] kasan_report+0x141/0x180 [ 25.167653] ? kasan_atomics_helper+0x4a1c/0x5450 [ 25.167680] __asan_report_load4_noabort+0x18/0x20 [ 25.167714] kasan_atomics_helper+0x4a1c/0x5450 [ 25.167737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.167765] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.167802] ? kasan_atomics+0x152/0x310 [ 25.167829] kasan_atomics+0x1dc/0x310 [ 25.167852] ? __pfx_kasan_atomics+0x10/0x10 [ 25.167875] ? trace_hardirqs_on+0x37/0xe0 [ 25.167899] ? __pfx_read_tsc+0x10/0x10 [ 25.167923] ? ktime_get_ts64+0x86/0x230 [ 25.167949] kunit_try_run_case+0x1a5/0x480 [ 25.167974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.168008] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.168036] ? __kthread_parkme+0x82/0x180 [ 25.168058] ? preempt_count_sub+0x50/0x80 [ 25.168093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.168128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.168154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.168178] kthread+0x337/0x6f0 [ 25.168199] ? trace_preempt_on+0x20/0xc0 [ 25.168232] ? __pfx_kthread+0x10/0x10 [ 25.168253] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.168279] ? calculate_sigpending+0x7b/0xa0 [ 25.168305] ? __pfx_kthread+0x10/0x10 [ 25.168327] ret_from_fork+0x116/0x1d0 [ 25.168348] ? __pfx_kthread+0x10/0x10 [ 25.168369] ret_from_fork_asm+0x1a/0x30 [ 25.168401] </TASK> [ 25.168415] [ 25.175750] Allocated by task 294: [ 25.175884] kasan_save_stack+0x45/0x70 [ 25.176143] kasan_save_track+0x18/0x40 [ 25.176383] kasan_save_alloc_info+0x3b/0x50 [ 25.176569] __kasan_kmalloc+0xb7/0xc0 [ 25.176738] __kmalloc_cache_noprof+0x189/0x420 [ 25.176924] kasan_atomics+0x95/0x310 [ 25.177124] kunit_try_run_case+0x1a5/0x480 [ 25.177373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.177580] kthread+0x337/0x6f0 [ 25.177745] ret_from_fork+0x116/0x1d0 [ 25.177893] ret_from_fork_asm+0x1a/0x30 [ 25.178075] [ 25.178147] The buggy address belongs to the object at ffff888100aaa000 [ 25.178147] which belongs to the cache kmalloc-64 of size 64 [ 25.178741] The buggy address is located 0 bytes to the right of [ 25.178741] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.179284] [ 25.179403] The buggy address belongs to the physical page: [ 25.179643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.179992] flags: 0x200000000000000(node=0|zone=2) [ 25.180211] page_type: f5(slab) [ 25.180406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.180694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.181003] page dumped because: kasan: bad access detected [ 25.181172] [ 25.181247] Memory state around the buggy address: [ 25.181397] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.181606] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.181874] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.182277] ^ [ 25.182522] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.182800] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.183007] ================================================================== [ 25.683242] ================================================================== [ 25.683593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 25.684146] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.684488] [ 25.684600] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.684652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.684667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.684692] Call Trace: [ 25.684714] <TASK> [ 25.684736] dump_stack_lvl+0x73/0xb0 [ 25.684766] print_report+0xd1/0x650 [ 25.684790] ? __virt_addr_valid+0x1db/0x2d0 [ 25.684814] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.684836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.684863] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.684886] kasan_report+0x141/0x180 [ 25.684908] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.684935] kasan_check_range+0x10c/0x1c0 [ 25.684959] __kasan_check_write+0x18/0x20 [ 25.684983] kasan_atomics_helper+0x1d7a/0x5450 [ 25.685006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.685032] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.685058] ? kasan_atomics+0x152/0x310 [ 25.685086] kasan_atomics+0x1dc/0x310 [ 25.685109] ? __pfx_kasan_atomics+0x10/0x10 [ 25.685135] ? trace_hardirqs_on+0x37/0xe0 [ 25.685159] ? __pfx_read_tsc+0x10/0x10 [ 25.685182] ? ktime_get_ts64+0x86/0x230 [ 25.685208] kunit_try_run_case+0x1a5/0x480 [ 25.685245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.685270] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.685297] ? __kthread_parkme+0x82/0x180 [ 25.685319] ? preempt_count_sub+0x50/0x80 [ 25.685344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.685369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.685394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.685418] kthread+0x337/0x6f0 [ 25.685440] ? trace_preempt_on+0x20/0xc0 [ 25.685462] ? __pfx_kthread+0x10/0x10 [ 25.685484] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.685509] ? calculate_sigpending+0x7b/0xa0 [ 25.685534] ? __pfx_kthread+0x10/0x10 [ 25.685556] ret_from_fork+0x116/0x1d0 [ 25.685577] ? __pfx_kthread+0x10/0x10 [ 25.685598] ret_from_fork_asm+0x1a/0x30 [ 25.685630] </TASK> [ 25.685642] [ 25.693050] Allocated by task 294: [ 25.693189] kasan_save_stack+0x45/0x70 [ 25.693337] kasan_save_track+0x18/0x40 [ 25.693464] kasan_save_alloc_info+0x3b/0x50 [ 25.693651] __kasan_kmalloc+0xb7/0xc0 [ 25.693831] __kmalloc_cache_noprof+0x189/0x420 [ 25.694044] kasan_atomics+0x95/0x310 [ 25.694240] kunit_try_run_case+0x1a5/0x480 [ 25.694440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.694645] kthread+0x337/0x6f0 [ 25.694760] ret_from_fork+0x116/0x1d0 [ 25.694966] ret_from_fork_asm+0x1a/0x30 [ 25.695363] [ 25.695454] The buggy address belongs to the object at ffff888100aaa000 [ 25.695454] which belongs to the cache kmalloc-64 of size 64 [ 25.695912] The buggy address is located 0 bytes to the right of [ 25.695912] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.696342] [ 25.696412] The buggy address belongs to the physical page: [ 25.696580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.696813] flags: 0x200000000000000(node=0|zone=2) [ 25.696972] page_type: f5(slab) [ 25.697088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.697379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.697714] page dumped because: kasan: bad access detected [ 25.698170] [ 25.698267] Memory state around the buggy address: [ 25.698485] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.698709] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.698918] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.699128] ^ [ 25.699285] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.699494] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.699699] ================================================================== [ 25.221283] ================================================================== [ 25.221864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 25.222250] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.222606] [ 25.222696] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.222749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.222763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.222789] Call Trace: [ 25.222811] <TASK> [ 25.222835] dump_stack_lvl+0x73/0xb0 [ 25.222865] print_report+0xd1/0x650 [ 25.222889] ? __virt_addr_valid+0x1db/0x2d0 [ 25.222915] ? kasan_atomics_helper+0x1217/0x5450 [ 25.222937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.222964] ? kasan_atomics_helper+0x1217/0x5450 [ 25.222985] kasan_report+0x141/0x180 [ 25.223008] ? kasan_atomics_helper+0x1217/0x5450 [ 25.223042] kasan_check_range+0x10c/0x1c0 [ 25.223066] __kasan_check_write+0x18/0x20 [ 25.223090] kasan_atomics_helper+0x1217/0x5450 [ 25.223121] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.223148] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.223174] ? kasan_atomics+0x152/0x310 [ 25.223201] kasan_atomics+0x1dc/0x310 [ 25.223235] ? __pfx_kasan_atomics+0x10/0x10 [ 25.223258] ? trace_hardirqs_on+0x37/0xe0 [ 25.223282] ? __pfx_read_tsc+0x10/0x10 [ 25.223305] ? ktime_get_ts64+0x86/0x230 [ 25.223331] kunit_try_run_case+0x1a5/0x480 [ 25.223358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.223383] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.223410] ? __kthread_parkme+0x82/0x180 [ 25.223432] ? preempt_count_sub+0x50/0x80 [ 25.223467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.223493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.223518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.223563] kthread+0x337/0x6f0 [ 25.223584] ? trace_preempt_on+0x20/0xc0 [ 25.223607] ? __pfx_kthread+0x10/0x10 [ 25.223639] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.223664] ? calculate_sigpending+0x7b/0xa0 [ 25.223698] ? __pfx_kthread+0x10/0x10 [ 25.223719] ret_from_fork+0x116/0x1d0 [ 25.223740] ? __pfx_kthread+0x10/0x10 [ 25.223772] ret_from_fork_asm+0x1a/0x30 [ 25.223805] </TASK> [ 25.223817] [ 25.231844] Allocated by task 294: [ 25.232042] kasan_save_stack+0x45/0x70 [ 25.232239] kasan_save_track+0x18/0x40 [ 25.232428] kasan_save_alloc_info+0x3b/0x50 [ 25.232634] __kasan_kmalloc+0xb7/0xc0 [ 25.232798] __kmalloc_cache_noprof+0x189/0x420 [ 25.233003] kasan_atomics+0x95/0x310 [ 25.233189] kunit_try_run_case+0x1a5/0x480 [ 25.233379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.233550] kthread+0x337/0x6f0 [ 25.233664] ret_from_fork+0x116/0x1d0 [ 25.233790] ret_from_fork_asm+0x1a/0x30 [ 25.233923] [ 25.233989] The buggy address belongs to the object at ffff888100aaa000 [ 25.233989] which belongs to the cache kmalloc-64 of size 64 [ 25.234345] The buggy address is located 0 bytes to the right of [ 25.234345] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.234758] [ 25.234875] The buggy address belongs to the physical page: [ 25.235282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.235635] flags: 0x200000000000000(node=0|zone=2) [ 25.235867] page_type: f5(slab) [ 25.236027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.236372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.236701] page dumped because: kasan: bad access detected [ 25.236947] [ 25.237046] Memory state around the buggy address: [ 25.237279] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.237596] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.237908] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.238233] ^ [ 25.238424] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.238636] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.238842] ================================================================== [ 25.203520] ================================================================== [ 25.203926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 25.204385] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.204698] [ 25.204806] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.204854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.204878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.204901] Call Trace: [ 25.204919] <TASK> [ 25.204949] dump_stack_lvl+0x73/0xb0 [ 25.204978] print_report+0xd1/0x650 [ 25.205000] ? __virt_addr_valid+0x1db/0x2d0 [ 25.205039] ? kasan_atomics_helper+0x4a02/0x5450 [ 25.205062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.205089] ? kasan_atomics_helper+0x4a02/0x5450 [ 25.205121] kasan_report+0x141/0x180 [ 25.205144] ? kasan_atomics_helper+0x4a02/0x5450 [ 25.205182] __asan_report_load4_noabort+0x18/0x20 [ 25.205208] kasan_atomics_helper+0x4a02/0x5450 [ 25.205241] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.205268] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.205305] ? kasan_atomics+0x152/0x310 [ 25.205332] kasan_atomics+0x1dc/0x310 [ 25.205356] ? __pfx_kasan_atomics+0x10/0x10 [ 25.205390] ? trace_hardirqs_on+0x37/0xe0 [ 25.205415] ? __pfx_read_tsc+0x10/0x10 [ 25.205439] ? ktime_get_ts64+0x86/0x230 [ 25.205473] kunit_try_run_case+0x1a5/0x480 [ 25.205500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.205525] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.205563] ? __kthread_parkme+0x82/0x180 [ 25.205585] ? preempt_count_sub+0x50/0x80 [ 25.205610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.205634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.205668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.205693] kthread+0x337/0x6f0 [ 25.205715] ? trace_preempt_on+0x20/0xc0 [ 25.205749] ? __pfx_kthread+0x10/0x10 [ 25.205771] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.205796] ? calculate_sigpending+0x7b/0xa0 [ 25.205821] ? __pfx_kthread+0x10/0x10 [ 25.205843] ret_from_fork+0x116/0x1d0 [ 25.205863] ? __pfx_kthread+0x10/0x10 [ 25.205885] ret_from_fork_asm+0x1a/0x30 [ 25.205917] </TASK> [ 25.205929] [ 25.213103] Allocated by task 294: [ 25.213264] kasan_save_stack+0x45/0x70 [ 25.213484] kasan_save_track+0x18/0x40 [ 25.213614] kasan_save_alloc_info+0x3b/0x50 [ 25.213756] __kasan_kmalloc+0xb7/0xc0 [ 25.213881] __kmalloc_cache_noprof+0x189/0x420 [ 25.214040] kasan_atomics+0x95/0x310 [ 25.214233] kunit_try_run_case+0x1a5/0x480 [ 25.214439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.214689] kthread+0x337/0x6f0 [ 25.215019] ret_from_fork+0x116/0x1d0 [ 25.215217] ret_from_fork_asm+0x1a/0x30 [ 25.215457] [ 25.215563] The buggy address belongs to the object at ffff888100aaa000 [ 25.215563] which belongs to the cache kmalloc-64 of size 64 [ 25.216186] The buggy address is located 0 bytes to the right of [ 25.216186] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.216560] [ 25.216628] The buggy address belongs to the physical page: [ 25.216798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.217142] flags: 0x200000000000000(node=0|zone=2) [ 25.217386] page_type: f5(slab) [ 25.217598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.217932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.218331] page dumped because: kasan: bad access detected [ 25.218508] [ 25.218572] Memory state around the buggy address: [ 25.218722] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.218933] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.219149] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.219366] ^ [ 25.219538] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.219993] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.220454] ================================================================== [ 25.805006] ================================================================== [ 25.805335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 25.805679] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.805998] [ 25.806101] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.806148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.806161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.806184] Call Trace: [ 25.806201] <TASK> [ 25.806230] dump_stack_lvl+0x73/0xb0 [ 25.806257] print_report+0xd1/0x650 [ 25.806279] ? __virt_addr_valid+0x1db/0x2d0 [ 25.806303] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.806324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.806351] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.806373] kasan_report+0x141/0x180 [ 25.806395] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.806421] __asan_report_load8_noabort+0x18/0x20 [ 25.806447] kasan_atomics_helper+0x4f98/0x5450 [ 25.806470] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.806497] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.806522] ? kasan_atomics+0x152/0x310 [ 25.806548] kasan_atomics+0x1dc/0x310 [ 25.806572] ? __pfx_kasan_atomics+0x10/0x10 [ 25.806594] ? trace_hardirqs_on+0x37/0xe0 [ 25.806617] ? __pfx_read_tsc+0x10/0x10 [ 25.806640] ? ktime_get_ts64+0x86/0x230 [ 25.806664] kunit_try_run_case+0x1a5/0x480 [ 25.806690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.806715] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.806743] ? __kthread_parkme+0x82/0x180 [ 25.806764] ? preempt_count_sub+0x50/0x80 [ 25.806788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.806812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.806835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.806859] kthread+0x337/0x6f0 [ 25.806879] ? trace_preempt_on+0x20/0xc0 [ 25.806902] ? __pfx_kthread+0x10/0x10 [ 25.806923] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.806947] ? calculate_sigpending+0x7b/0xa0 [ 25.806971] ? __pfx_kthread+0x10/0x10 [ 25.806993] ret_from_fork+0x116/0x1d0 [ 25.807013] ? __pfx_kthread+0x10/0x10 [ 25.807043] ret_from_fork_asm+0x1a/0x30 [ 25.807073] </TASK> [ 25.807085] [ 25.818697] Allocated by task 294: [ 25.818870] kasan_save_stack+0x45/0x70 [ 25.819440] kasan_save_track+0x18/0x40 [ 25.819708] kasan_save_alloc_info+0x3b/0x50 [ 25.819999] __kasan_kmalloc+0xb7/0xc0 [ 25.820396] __kmalloc_cache_noprof+0x189/0x420 [ 25.820663] kasan_atomics+0x95/0x310 [ 25.820944] kunit_try_run_case+0x1a5/0x480 [ 25.821379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.821725] kthread+0x337/0x6f0 [ 25.821995] ret_from_fork+0x116/0x1d0 [ 25.822160] ret_from_fork_asm+0x1a/0x30 [ 25.822352] [ 25.822437] The buggy address belongs to the object at ffff888100aaa000 [ 25.822437] which belongs to the cache kmalloc-64 of size 64 [ 25.822900] The buggy address is located 0 bytes to the right of [ 25.822900] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.823849] [ 25.823952] The buggy address belongs to the physical page: [ 25.824417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.824978] flags: 0x200000000000000(node=0|zone=2) [ 25.825341] page_type: f5(slab) [ 25.825500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.825787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.826281] page dumped because: kasan: bad access detected [ 25.826744] [ 25.826846] Memory state around the buggy address: [ 25.827249] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.827667] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.827964] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.828608] ^ [ 25.828945] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.829539] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.829954] ================================================================== [ 25.639913] ================================================================== [ 25.640312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 25.640557] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.641155] [ 25.641365] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.641423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.641438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.641463] Call Trace: [ 25.641487] <TASK> [ 25.641509] dump_stack_lvl+0x73/0xb0 [ 25.641541] print_report+0xd1/0x650 [ 25.641564] ? __virt_addr_valid+0x1db/0x2d0 [ 25.641589] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.641611] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.641638] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.641660] kasan_report+0x141/0x180 [ 25.641682] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.641708] __asan_report_load8_noabort+0x18/0x20 [ 25.641734] kasan_atomics_helper+0x4f30/0x5450 [ 25.641756] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.641782] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.641808] ? kasan_atomics+0x152/0x310 [ 25.641836] kasan_atomics+0x1dc/0x310 [ 25.641860] ? __pfx_kasan_atomics+0x10/0x10 [ 25.641882] ? trace_hardirqs_on+0x37/0xe0 [ 25.641906] ? __pfx_read_tsc+0x10/0x10 [ 25.641929] ? ktime_get_ts64+0x86/0x230 [ 25.641954] kunit_try_run_case+0x1a5/0x480 [ 25.641980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.642006] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.642033] ? __kthread_parkme+0x82/0x180 [ 25.642054] ? preempt_count_sub+0x50/0x80 [ 25.642079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.642103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.642127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.642152] kthread+0x337/0x6f0 [ 25.642173] ? trace_preempt_on+0x20/0xc0 [ 25.642195] ? __pfx_kthread+0x10/0x10 [ 25.642215] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.642251] ? calculate_sigpending+0x7b/0xa0 [ 25.642276] ? __pfx_kthread+0x10/0x10 [ 25.642297] ret_from_fork+0x116/0x1d0 [ 25.642317] ? __pfx_kthread+0x10/0x10 [ 25.642340] ret_from_fork_asm+0x1a/0x30 [ 25.642373] </TASK> [ 25.642386] [ 25.653403] Allocated by task 294: [ 25.653731] kasan_save_stack+0x45/0x70 [ 25.654091] kasan_save_track+0x18/0x40 [ 25.654434] kasan_save_alloc_info+0x3b/0x50 [ 25.654581] __kasan_kmalloc+0xb7/0xc0 [ 25.654705] __kmalloc_cache_noprof+0x189/0x420 [ 25.654854] kasan_atomics+0x95/0x310 [ 25.654978] kunit_try_run_case+0x1a5/0x480 [ 25.655375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.655832] kthread+0x337/0x6f0 [ 25.656136] ret_from_fork+0x116/0x1d0 [ 25.656475] ret_from_fork_asm+0x1a/0x30 [ 25.656819] [ 25.656967] The buggy address belongs to the object at ffff888100aaa000 [ 25.656967] which belongs to the cache kmalloc-64 of size 64 [ 25.658184] The buggy address is located 0 bytes to the right of [ 25.658184] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.659317] [ 25.659478] The buggy address belongs to the physical page: [ 25.659710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.659946] flags: 0x200000000000000(node=0|zone=2) [ 25.660306] page_type: f5(slab) [ 25.660599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.661301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.662012] page dumped because: kasan: bad access detected [ 25.662497] [ 25.662653] Memory state around the buggy address: [ 25.663078] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.663379] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.663590] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.663795] ^ [ 25.663943] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.664194] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.664561] ================================================================== [ 25.028944] ================================================================== [ 25.029318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 25.029617] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.029937] [ 25.030068] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.030122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.030136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.030161] Call Trace: [ 25.030184] <TASK> [ 25.030205] dump_stack_lvl+0x73/0xb0 [ 25.030245] print_report+0xd1/0x650 [ 25.030269] ? __virt_addr_valid+0x1db/0x2d0 [ 25.030295] ? kasan_atomics_helper+0xde0/0x5450 [ 25.030316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.030344] ? kasan_atomics_helper+0xde0/0x5450 [ 25.030366] kasan_report+0x141/0x180 [ 25.030389] ? kasan_atomics_helper+0xde0/0x5450 [ 25.030415] kasan_check_range+0x10c/0x1c0 [ 25.030440] __kasan_check_write+0x18/0x20 [ 25.030464] kasan_atomics_helper+0xde0/0x5450 [ 25.030487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.030514] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.030540] ? kasan_atomics+0x152/0x310 [ 25.030568] kasan_atomics+0x1dc/0x310 [ 25.030591] ? __pfx_kasan_atomics+0x10/0x10 [ 25.030614] ? trace_hardirqs_on+0x37/0xe0 [ 25.030638] ? __pfx_read_tsc+0x10/0x10 [ 25.030662] ? ktime_get_ts64+0x86/0x230 [ 25.030687] kunit_try_run_case+0x1a5/0x480 [ 25.030714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.030739] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.030768] ? __kthread_parkme+0x82/0x180 [ 25.030790] ? preempt_count_sub+0x50/0x80 [ 25.030813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.030838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.030863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.030889] kthread+0x337/0x6f0 [ 25.030909] ? trace_preempt_on+0x20/0xc0 [ 25.030932] ? __pfx_kthread+0x10/0x10 [ 25.030953] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.030978] ? calculate_sigpending+0x7b/0xa0 [ 25.031030] ? __pfx_kthread+0x10/0x10 [ 25.031054] ret_from_fork+0x116/0x1d0 [ 25.031074] ? __pfx_kthread+0x10/0x10 [ 25.031095] ret_from_fork_asm+0x1a/0x30 [ 25.031127] </TASK> [ 25.031140] [ 25.037709] Allocated by task 294: [ 25.037833] kasan_save_stack+0x45/0x70 [ 25.037969] kasan_save_track+0x18/0x40 [ 25.038135] kasan_save_alloc_info+0x3b/0x50 [ 25.038354] __kasan_kmalloc+0xb7/0xc0 [ 25.038539] __kmalloc_cache_noprof+0x189/0x420 [ 25.038751] kasan_atomics+0x95/0x310 [ 25.038931] kunit_try_run_case+0x1a5/0x480 [ 25.039168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.039431] kthread+0x337/0x6f0 [ 25.039603] ret_from_fork+0x116/0x1d0 [ 25.039786] ret_from_fork_asm+0x1a/0x30 [ 25.039983] [ 25.040101] The buggy address belongs to the object at ffff888100aaa000 [ 25.040101] which belongs to the cache kmalloc-64 of size 64 [ 25.040637] The buggy address is located 0 bytes to the right of [ 25.040637] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.041203] [ 25.041305] The buggy address belongs to the physical page: [ 25.041472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.041828] flags: 0x200000000000000(node=0|zone=2) [ 25.042056] page_type: f5(slab) [ 25.042236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.042524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.042811] page dumped because: kasan: bad access detected [ 25.043059] [ 25.043131] Memory state around the buggy address: [ 25.043321] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.043604] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.043879] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.044112] ^ [ 25.044269] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.044475] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.044674] ================================================================== [ 24.976361] ================================================================== [ 24.976729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 24.977167] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.977469] [ 24.977565] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.977617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.977632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.977656] Call Trace: [ 24.977679] <TASK> [ 24.977701] dump_stack_lvl+0x73/0xb0 [ 24.977729] print_report+0xd1/0x650 [ 24.977754] ? __virt_addr_valid+0x1db/0x2d0 [ 24.977779] ? kasan_atomics_helper+0xc70/0x5450 [ 24.977801] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.977828] ? kasan_atomics_helper+0xc70/0x5450 [ 24.977850] kasan_report+0x141/0x180 [ 24.977874] ? kasan_atomics_helper+0xc70/0x5450 [ 24.977900] kasan_check_range+0x10c/0x1c0 [ 24.977924] __kasan_check_write+0x18/0x20 [ 24.977948] kasan_atomics_helper+0xc70/0x5450 [ 24.977971] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.977997] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.978023] ? kasan_atomics+0x152/0x310 [ 24.978050] kasan_atomics+0x1dc/0x310 [ 24.978074] ? __pfx_kasan_atomics+0x10/0x10 [ 24.978096] ? trace_hardirqs_on+0x37/0xe0 [ 24.978121] ? __pfx_read_tsc+0x10/0x10 [ 24.978143] ? ktime_get_ts64+0x86/0x230 [ 24.978170] kunit_try_run_case+0x1a5/0x480 [ 24.978196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.978232] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.978259] ? __kthread_parkme+0x82/0x180 [ 24.978281] ? preempt_count_sub+0x50/0x80 [ 24.978306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.978330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.978355] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.978380] kthread+0x337/0x6f0 [ 24.978402] ? trace_preempt_on+0x20/0xc0 [ 24.978425] ? __pfx_kthread+0x10/0x10 [ 24.978446] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.978470] ? calculate_sigpending+0x7b/0xa0 [ 24.978496] ? __pfx_kthread+0x10/0x10 [ 24.978518] ret_from_fork+0x116/0x1d0 [ 24.978538] ? __pfx_kthread+0x10/0x10 [ 24.978560] ret_from_fork_asm+0x1a/0x30 [ 24.978592] </TASK> [ 24.978606] [ 24.985666] Allocated by task 294: [ 24.985848] kasan_save_stack+0x45/0x70 [ 24.986039] kasan_save_track+0x18/0x40 [ 24.986234] kasan_save_alloc_info+0x3b/0x50 [ 24.986438] __kasan_kmalloc+0xb7/0xc0 [ 24.986619] __kmalloc_cache_noprof+0x189/0x420 [ 24.986834] kasan_atomics+0x95/0x310 [ 24.987017] kunit_try_run_case+0x1a5/0x480 [ 24.987227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.987400] kthread+0x337/0x6f0 [ 24.987515] ret_from_fork+0x116/0x1d0 [ 24.987642] ret_from_fork_asm+0x1a/0x30 [ 24.987776] [ 24.987842] The buggy address belongs to the object at ffff888100aaa000 [ 24.987842] which belongs to the cache kmalloc-64 of size 64 [ 24.988303] The buggy address is located 0 bytes to the right of [ 24.988303] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.988931] [ 24.989021] The buggy address belongs to the physical page: [ 24.989288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.989645] flags: 0x200000000000000(node=0|zone=2) [ 24.989882] page_type: f5(slab) [ 24.990051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.990359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.990582] page dumped because: kasan: bad access detected [ 24.990746] [ 24.990809] Memory state around the buggy address: [ 24.990961] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.991177] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.991502] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.992187] ^ [ 24.992363] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.992575] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.992783] ================================================================== [ 25.331191] ================================================================== [ 25.331599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 25.331888] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.332346] [ 25.332435] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.332488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.332502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.332527] Call Trace: [ 25.332549] <TASK> [ 25.332571] dump_stack_lvl+0x73/0xb0 [ 25.332600] print_report+0xd1/0x650 [ 25.332624] ? __virt_addr_valid+0x1db/0x2d0 [ 25.332649] ? kasan_atomics_helper+0x1467/0x5450 [ 25.332671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.332710] ? kasan_atomics_helper+0x1467/0x5450 [ 25.332744] kasan_report+0x141/0x180 [ 25.332768] ? kasan_atomics_helper+0x1467/0x5450 [ 25.332794] kasan_check_range+0x10c/0x1c0 [ 25.332830] __kasan_check_write+0x18/0x20 [ 25.332854] kasan_atomics_helper+0x1467/0x5450 [ 25.332876] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.332903] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.332930] ? kasan_atomics+0x152/0x310 [ 25.332957] kasan_atomics+0x1dc/0x310 [ 25.332981] ? __pfx_kasan_atomics+0x10/0x10 [ 25.333004] ? trace_hardirqs_on+0x37/0xe0 [ 25.333028] ? __pfx_read_tsc+0x10/0x10 [ 25.333052] ? ktime_get_ts64+0x86/0x230 [ 25.333079] kunit_try_run_case+0x1a5/0x480 [ 25.333106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.333131] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.333159] ? __kthread_parkme+0x82/0x180 [ 25.333182] ? preempt_count_sub+0x50/0x80 [ 25.333206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.333241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.333266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.333291] kthread+0x337/0x6f0 [ 25.333312] ? trace_preempt_on+0x20/0xc0 [ 25.333335] ? __pfx_kthread+0x10/0x10 [ 25.333356] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.333382] ? calculate_sigpending+0x7b/0xa0 [ 25.333407] ? __pfx_kthread+0x10/0x10 [ 25.333430] ret_from_fork+0x116/0x1d0 [ 25.333449] ? __pfx_kthread+0x10/0x10 [ 25.333471] ret_from_fork_asm+0x1a/0x30 [ 25.333504] </TASK> [ 25.333517] [ 25.341469] Allocated by task 294: [ 25.341677] kasan_save_stack+0x45/0x70 [ 25.341915] kasan_save_track+0x18/0x40 [ 25.342142] kasan_save_alloc_info+0x3b/0x50 [ 25.342315] __kasan_kmalloc+0xb7/0xc0 [ 25.342458] __kmalloc_cache_noprof+0x189/0x420 [ 25.342693] kasan_atomics+0x95/0x310 [ 25.342876] kunit_try_run_case+0x1a5/0x480 [ 25.343030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.343293] kthread+0x337/0x6f0 [ 25.343431] ret_from_fork+0x116/0x1d0 [ 25.343636] ret_from_fork_asm+0x1a/0x30 [ 25.343773] [ 25.343838] The buggy address belongs to the object at ffff888100aaa000 [ 25.343838] which belongs to the cache kmalloc-64 of size 64 [ 25.344577] The buggy address is located 0 bytes to the right of [ 25.344577] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.345177] [ 25.345289] The buggy address belongs to the physical page: [ 25.345527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.345867] flags: 0x200000000000000(node=0|zone=2) [ 25.346081] page_type: f5(slab) [ 25.346263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.346581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.346883] page dumped because: kasan: bad access detected [ 25.347135] [ 25.347234] Memory state around the buggy address: [ 25.347443] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.347755] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.348097] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.348375] ^ [ 25.348527] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.348738] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.348998] ================================================================== [ 25.930943] ================================================================== [ 25.931438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 25.932110] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.932715] [ 25.932887] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.932939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.932953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.932978] Call Trace: [ 25.933000] <TASK> [ 25.933023] dump_stack_lvl+0x73/0xb0 [ 25.933053] print_report+0xd1/0x650 [ 25.933077] ? __virt_addr_valid+0x1db/0x2d0 [ 25.933104] ? kasan_atomics_helper+0x5115/0x5450 [ 25.933126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.933152] ? kasan_atomics_helper+0x5115/0x5450 [ 25.933174] kasan_report+0x141/0x180 [ 25.933197] ? kasan_atomics_helper+0x5115/0x5450 [ 25.933235] __asan_report_load8_noabort+0x18/0x20 [ 25.933260] kasan_atomics_helper+0x5115/0x5450 [ 25.933283] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.933308] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.933335] ? kasan_atomics+0x152/0x310 [ 25.933363] kasan_atomics+0x1dc/0x310 [ 25.933386] ? __pfx_kasan_atomics+0x10/0x10 [ 25.933408] ? trace_hardirqs_on+0x37/0xe0 [ 25.933432] ? __pfx_read_tsc+0x10/0x10 [ 25.933456] ? ktime_get_ts64+0x86/0x230 [ 25.933482] kunit_try_run_case+0x1a5/0x480 [ 25.933508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.933534] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.933561] ? __kthread_parkme+0x82/0x180 [ 25.933583] ? preempt_count_sub+0x50/0x80 [ 25.933607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.933632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.933656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.933681] kthread+0x337/0x6f0 [ 25.933702] ? trace_preempt_on+0x20/0xc0 [ 25.933725] ? __pfx_kthread+0x10/0x10 [ 25.933746] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.933771] ? calculate_sigpending+0x7b/0xa0 [ 25.933796] ? __pfx_kthread+0x10/0x10 [ 25.933818] ret_from_fork+0x116/0x1d0 [ 25.933837] ? __pfx_kthread+0x10/0x10 [ 25.933858] ret_from_fork_asm+0x1a/0x30 [ 25.933890] </TASK> [ 25.933902] [ 25.944675] Allocated by task 294: [ 25.944808] kasan_save_stack+0x45/0x70 [ 25.944947] kasan_save_track+0x18/0x40 [ 25.945207] kasan_save_alloc_info+0x3b/0x50 [ 25.945593] __kasan_kmalloc+0xb7/0xc0 [ 25.945928] __kmalloc_cache_noprof+0x189/0x420 [ 25.946435] kasan_atomics+0x95/0x310 [ 25.946832] kunit_try_run_case+0x1a5/0x480 [ 25.947249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.947712] kthread+0x337/0x6f0 [ 25.947889] ret_from_fork+0x116/0x1d0 [ 25.948018] ret_from_fork_asm+0x1a/0x30 [ 25.948372] [ 25.948525] The buggy address belongs to the object at ffff888100aaa000 [ 25.948525] which belongs to the cache kmalloc-64 of size 64 [ 25.949564] The buggy address is located 0 bytes to the right of [ 25.949564] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.949974] [ 25.950069] The buggy address belongs to the physical page: [ 25.950552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.951259] flags: 0x200000000000000(node=0|zone=2) [ 25.951693] page_type: f5(slab) [ 25.951992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.952679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.952939] page dumped because: kasan: bad access detected [ 25.953332] [ 25.953486] Memory state around the buggy address: [ 25.953910] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.954513] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.954935] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.955188] ^ [ 25.955353] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.955569] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.955778] ================================================================== [ 24.923443] ================================================================== [ 24.923812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 24.924297] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 24.924629] [ 24.924738] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.924791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.924804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.924830] Call Trace: [ 24.924852] <TASK> [ 24.924874] dump_stack_lvl+0x73/0xb0 [ 24.924903] print_report+0xd1/0x650 [ 24.924927] ? __virt_addr_valid+0x1db/0x2d0 [ 24.924953] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.924974] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.925001] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.925034] kasan_report+0x141/0x180 [ 24.925057] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.925083] kasan_check_range+0x10c/0x1c0 [ 24.925108] __kasan_check_write+0x18/0x20 [ 24.925132] kasan_atomics_helper+0xa2b/0x5450 [ 24.925155] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.925182] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.925208] ? kasan_atomics+0x152/0x310 [ 24.925247] kasan_atomics+0x1dc/0x310 [ 24.925271] ? __pfx_kasan_atomics+0x10/0x10 [ 24.925297] ? trace_hardirqs_on+0x37/0xe0 [ 24.925322] ? __pfx_read_tsc+0x10/0x10 [ 24.925347] ? ktime_get_ts64+0x86/0x230 [ 24.925372] kunit_try_run_case+0x1a5/0x480 [ 24.925400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.925426] ? queued_spin_lock_slowpath+0x116/0xb40 [ 24.925453] ? __kthread_parkme+0x82/0x180 [ 24.925475] ? preempt_count_sub+0x50/0x80 [ 24.925501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.925527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.925552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.925577] kthread+0x337/0x6f0 [ 24.925598] ? trace_preempt_on+0x20/0xc0 [ 24.925621] ? __pfx_kthread+0x10/0x10 [ 24.925643] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.925668] ? calculate_sigpending+0x7b/0xa0 [ 24.925693] ? __pfx_kthread+0x10/0x10 [ 24.925715] ret_from_fork+0x116/0x1d0 [ 24.925736] ? __pfx_kthread+0x10/0x10 [ 24.925757] ret_from_fork_asm+0x1a/0x30 [ 24.925790] </TASK> [ 24.925803] [ 24.933016] Allocated by task 294: [ 24.933208] kasan_save_stack+0x45/0x70 [ 24.933422] kasan_save_track+0x18/0x40 [ 24.933614] kasan_save_alloc_info+0x3b/0x50 [ 24.933821] __kasan_kmalloc+0xb7/0xc0 [ 24.933987] __kmalloc_cache_noprof+0x189/0x420 [ 24.934189] kasan_atomics+0x95/0x310 [ 24.934337] kunit_try_run_case+0x1a5/0x480 [ 24.934480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.934652] kthread+0x337/0x6f0 [ 24.934771] ret_from_fork+0x116/0x1d0 [ 24.934903] ret_from_fork_asm+0x1a/0x30 [ 24.935040] [ 24.935107] The buggy address belongs to the object at ffff888100aaa000 [ 24.935107] which belongs to the cache kmalloc-64 of size 64 [ 24.935467] The buggy address is located 0 bytes to the right of [ 24.935467] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 24.935833] [ 24.935901] The buggy address belongs to the physical page: [ 24.936070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 24.936431] flags: 0x200000000000000(node=0|zone=2) [ 24.936666] page_type: f5(slab) [ 24.936833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.937382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.937722] page dumped because: kasan: bad access detected [ 24.937976] [ 24.938114] Memory state around the buggy address: [ 24.938349] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.938671] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.938882] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.939294] ^ [ 24.939524] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.939813] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.940086] ================================================================== [ 25.426297] ================================================================== [ 25.426534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 25.426990] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294 [ 25.427342] [ 25.427452] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 25.427502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.427516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.427539] Call Trace: [ 25.427558] <TASK> [ 25.427579] dump_stack_lvl+0x73/0xb0 [ 25.427607] print_report+0xd1/0x650 [ 25.427630] ? __virt_addr_valid+0x1db/0x2d0 [ 25.427655] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.427677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.427705] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.427727] kasan_report+0x141/0x180 [ 25.427750] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.427776] kasan_check_range+0x10c/0x1c0 [ 25.427800] __kasan_check_write+0x18/0x20 [ 25.427825] kasan_atomics_helper+0x16e7/0x5450 [ 25.427849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.427877] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.427902] ? kasan_atomics+0x152/0x310 [ 25.427930] kasan_atomics+0x1dc/0x310 [ 25.427953] ? __pfx_kasan_atomics+0x10/0x10 [ 25.427976] ? trace_hardirqs_on+0x37/0xe0 [ 25.428000] ? __pfx_read_tsc+0x10/0x10 [ 25.428023] ? ktime_get_ts64+0x86/0x230 [ 25.428049] kunit_try_run_case+0x1a5/0x480 [ 25.428074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.428100] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.428127] ? __kthread_parkme+0x82/0x180 [ 25.428159] ? preempt_count_sub+0x50/0x80 [ 25.428184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.428209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.428244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.428269] kthread+0x337/0x6f0 [ 25.428290] ? trace_preempt_on+0x20/0xc0 [ 25.428313] ? __pfx_kthread+0x10/0x10 [ 25.428334] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.428359] ? calculate_sigpending+0x7b/0xa0 [ 25.428384] ? __pfx_kthread+0x10/0x10 [ 25.428407] ret_from_fork+0x116/0x1d0 [ 25.428428] ? __pfx_kthread+0x10/0x10 [ 25.428450] ret_from_fork_asm+0x1a/0x30 [ 25.428482] </TASK> [ 25.428495] [ 25.436022] Allocated by task 294: [ 25.436207] kasan_save_stack+0x45/0x70 [ 25.436419] kasan_save_track+0x18/0x40 [ 25.436608] kasan_save_alloc_info+0x3b/0x50 [ 25.436823] __kasan_kmalloc+0xb7/0xc0 [ 25.437008] __kmalloc_cache_noprof+0x189/0x420 [ 25.437283] kasan_atomics+0x95/0x310 [ 25.437450] kunit_try_run_case+0x1a5/0x480 [ 25.437626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.437847] kthread+0x337/0x6f0 [ 25.437980] ret_from_fork+0x116/0x1d0 [ 25.438252] ret_from_fork_asm+0x1a/0x30 [ 25.438433] [ 25.438526] The buggy address belongs to the object at ffff888100aaa000 [ 25.438526] which belongs to the cache kmalloc-64 of size 64 [ 25.438989] The buggy address is located 0 bytes to the right of [ 25.438989] allocated 48-byte region [ffff888100aaa000, ffff888100aaa030) [ 25.439551] [ 25.439623] The buggy address belongs to the physical page: [ 25.439792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa [ 25.440029] flags: 0x200000000000000(node=0|zone=2) [ 25.440199] page_type: f5(slab) [ 25.440375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.440713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.441049] page dumped because: kasan: bad access detected [ 25.441351] [ 25.441417] Memory state around the buggy address: [ 25.441566] ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.441775] ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.442235] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.442555] ^ [ 25.442774] ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.443160] ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.443444] ==================================================================