Date
July 8, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.015602] ================================================================== [ 34.015669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 34.015721] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.015772] [ 34.015802] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.015888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.015917] Hardware name: linux,dummy-virt (DT) [ 34.015950] Call trace: [ 34.015974] show_stack+0x20/0x38 (C) [ 34.016021] dump_stack_lvl+0x8c/0xd0 [ 34.016069] print_report+0x118/0x5d0 [ 34.016116] kasan_report+0xdc/0x128 [ 34.016166] kasan_check_range+0x100/0x1a8 [ 34.016223] __kasan_check_write+0x20/0x30 [ 34.016269] kasan_atomics_helper+0x126c/0x4858 [ 34.016320] kasan_atomics+0x198/0x2e0 [ 34.016369] kunit_try_run_case+0x170/0x3f0 [ 34.016419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.016477] kthread+0x328/0x630 [ 34.016925] ret_from_fork+0x10/0x20 [ 34.017076] [ 34.017098] Allocated by task 296: [ 34.017130] kasan_save_stack+0x3c/0x68 [ 34.017176] kasan_save_track+0x20/0x40 [ 34.017367] kasan_save_alloc_info+0x40/0x58 [ 34.017426] __kasan_kmalloc+0xd4/0xd8 [ 34.017520] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.017563] kasan_atomics+0xb8/0x2e0 [ 34.017609] kunit_try_run_case+0x170/0x3f0 [ 34.017772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.017862] kthread+0x328/0x630 [ 34.017981] ret_from_fork+0x10/0x20 [ 34.018019] [ 34.018043] The buggy address belongs to the object at fff00000c9a67800 [ 34.018043] which belongs to the cache kmalloc-64 of size 64 [ 34.018103] The buggy address is located 0 bytes to the right of [ 34.018103] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.018170] [ 34.018195] The buggy address belongs to the physical page: [ 34.018245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.018492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.018546] page_type: f5(slab) [ 34.018666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.018720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.018762] page dumped because: kasan: bad access detected [ 34.018837] [ 34.018929] Memory state around the buggy address: [ 34.019035] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.019115] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.019160] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.019216] ^ [ 34.019253] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.019296] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.020073] ================================================================== [ 34.112574] ================================================================== [ 34.113406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 34.114126] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.114663] [ 34.115276] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.116086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.116123] Hardware name: linux,dummy-virt (DT) [ 34.116833] Call trace: [ 34.116932] show_stack+0x20/0x38 (C) [ 34.117463] dump_stack_lvl+0x8c/0xd0 [ 34.118049] print_report+0x118/0x5d0 [ 34.118107] kasan_report+0xdc/0x128 [ 34.118155] kasan_check_range+0x100/0x1a8 [ 34.118202] __kasan_check_write+0x20/0x30 [ 34.118260] kasan_atomics_helper+0x15b4/0x4858 [ 34.118312] kasan_atomics+0x198/0x2e0 [ 34.118360] kunit_try_run_case+0x170/0x3f0 [ 34.120442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.121245] kthread+0x328/0x630 [ 34.121422] ret_from_fork+0x10/0x20 [ 34.121648] [ 34.121735] Allocated by task 296: [ 34.121767] kasan_save_stack+0x3c/0x68 [ 34.121830] kasan_save_track+0x20/0x40 [ 34.122307] kasan_save_alloc_info+0x40/0x58 [ 34.122659] __kasan_kmalloc+0xd4/0xd8 [ 34.122812] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.123011] kasan_atomics+0xb8/0x2e0 [ 34.123922] kunit_try_run_case+0x170/0x3f0 [ 34.124091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.124139] kthread+0x328/0x630 [ 34.124332] ret_from_fork+0x10/0x20 [ 34.124787] [ 34.124815] The buggy address belongs to the object at fff00000c9a67800 [ 34.124815] which belongs to the cache kmalloc-64 of size 64 [ 34.125052] The buggy address is located 0 bytes to the right of [ 34.125052] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.125219] [ 34.125636] The buggy address belongs to the physical page: [ 34.125870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.126170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.126243] page_type: f5(slab) [ 34.126284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.126337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.126979] page dumped because: kasan: bad access detected [ 34.127021] [ 34.127043] Memory state around the buggy address: [ 34.127077] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.127693] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.128059] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.128105] ^ [ 34.128143] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.128189] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.128761] ================================================================== [ 33.858004] ================================================================== [ 33.858191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 33.858494] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.858688] [ 33.858829] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.859239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.859276] Hardware name: linux,dummy-virt (DT) [ 33.859313] Call trace: [ 33.859659] show_stack+0x20/0x38 (C) [ 33.860008] kasan_atomics+0x198/0x2e0 [ 33.862689] The buggy address belongs to the object at fff00000c9a67800 [ 33.862689] which belongs to the cache kmalloc-64 of size 64 [ 33.866582] ================================================================== [ 34.146069] ================================================================== [ 34.146119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 34.146171] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.146238] [ 34.146270] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.146356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.146385] Hardware name: linux,dummy-virt (DT) [ 34.146418] Call trace: [ 34.146442] show_stack+0x20/0x38 (C) [ 34.146490] dump_stack_lvl+0x8c/0xd0 [ 34.146540] print_report+0x118/0x5d0 [ 34.146588] kasan_report+0xdc/0x128 [ 34.146638] __asan_report_load8_noabort+0x20/0x30 [ 34.146688] kasan_atomics_helper+0x3df4/0x4858 [ 34.146737] kasan_atomics+0x198/0x2e0 [ 34.146786] kunit_try_run_case+0x170/0x3f0 [ 34.146837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.146893] kthread+0x328/0x630 [ 34.146938] ret_from_fork+0x10/0x20 [ 34.146987] [ 34.147007] Allocated by task 296: [ 34.147037] kasan_save_stack+0x3c/0x68 [ 34.147081] kasan_save_track+0x20/0x40 [ 34.147122] kasan_save_alloc_info+0x40/0x58 [ 34.147161] __kasan_kmalloc+0xd4/0xd8 [ 34.147200] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.148180] kasan_atomics+0xb8/0x2e0 [ 34.148242] kunit_try_run_case+0x170/0x3f0 [ 34.148282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.148463] kthread+0x328/0x630 [ 34.148606] ret_from_fork+0x10/0x20 [ 34.148647] [ 34.148670] The buggy address belongs to the object at fff00000c9a67800 [ 34.148670] which belongs to the cache kmalloc-64 of size 64 [ 34.148730] The buggy address is located 0 bytes to the right of [ 34.148730] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.148800] [ 34.148821] The buggy address belongs to the physical page: [ 34.148853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.149004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.149068] page_type: f5(slab) [ 34.149106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.149158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.149200] page dumped because: kasan: bad access detected [ 34.149643] [ 34.149675] Memory state around the buggy address: [ 34.149712] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.149759] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.149806] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.149846] ^ [ 34.149880] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.149927] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.149968] ================================================================== [ 34.003955] ================================================================== [ 34.004031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 34.004082] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.004713] [ 34.004748] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.005187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.005251] Hardware name: linux,dummy-virt (DT) [ 34.005307] Call trace: [ 34.005332] show_stack+0x20/0x38 (C) [ 34.005386] dump_stack_lvl+0x8c/0xd0 [ 34.005509] print_report+0x118/0x5d0 [ 34.005689] kasan_report+0xdc/0x128 [ 34.005741] kasan_check_range+0x100/0x1a8 [ 34.005811] __kasan_check_write+0x20/0x30 [ 34.005957] kasan_atomics_helper+0x1190/0x4858 [ 34.006349] kasan_atomics+0x198/0x2e0 [ 34.006402] kunit_try_run_case+0x170/0x3f0 [ 34.006751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.006827] kthread+0x328/0x630 [ 34.006878] ret_from_fork+0x10/0x20 [ 34.006983] [ 34.007003] Allocated by task 296: [ 34.007034] kasan_save_stack+0x3c/0x68 [ 34.007289] kasan_save_track+0x20/0x40 [ 34.007424] kasan_save_alloc_info+0x40/0x58 [ 34.007513] __kasan_kmalloc+0xd4/0xd8 [ 34.007554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.007598] kasan_atomics+0xb8/0x2e0 [ 34.007642] kunit_try_run_case+0x170/0x3f0 [ 34.007793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.007842] kthread+0x328/0x630 [ 34.007876] ret_from_fork+0x10/0x20 [ 34.007966] [ 34.008032] The buggy address belongs to the object at fff00000c9a67800 [ 34.008032] which belongs to the cache kmalloc-64 of size 64 [ 34.008118] The buggy address is located 0 bytes to the right of [ 34.008118] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.008183] [ 34.008217] The buggy address belongs to the physical page: [ 34.008249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.008303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.008349] page_type: f5(slab) [ 34.008389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.008438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.008481] page dumped because: kasan: bad access detected [ 34.008835] [ 34.008863] Memory state around the buggy address: [ 34.008925] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.008972] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.009016] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.009056] ^ [ 34.009431] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.009483] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.009523] ================================================================== [ 33.914081] ================================================================== [ 33.914509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.914599] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.914825] [ 33.914861] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.914948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.914977] Hardware name: linux,dummy-virt (DT) [ 33.915011] Call trace: [ 33.915304] show_stack+0x20/0x38 (C) [ 33.915555] dump_stack_lvl+0x8c/0xd0 [ 33.915887] print_report+0x118/0x5d0 [ 33.916128] kasan_report+0xdc/0x128 [ 33.916568] __asan_report_load4_noabort+0x20/0x30 [ 33.916760] kasan_atomics_helper+0x3e04/0x4858 [ 33.917067] kasan_atomics+0x198/0x2e0 [ 33.917126] kunit_try_run_case+0x170/0x3f0 [ 33.917178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.917430] kthread+0x328/0x630 [ 33.917485] ret_from_fork+0x10/0x20 [ 33.917918] [ 33.917946] Allocated by task 296: [ 33.918134] kasan_save_stack+0x3c/0x68 [ 33.918187] kasan_save_track+0x20/0x40 [ 33.918744] kasan_save_alloc_info+0x40/0x58 [ 33.918797] __kasan_kmalloc+0xd4/0xd8 [ 33.919158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.919484] kasan_atomics+0xb8/0x2e0 [ 33.919763] kunit_try_run_case+0x170/0x3f0 [ 33.920078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.920314] kthread+0x328/0x630 [ 33.920456] ret_from_fork+0x10/0x20 [ 33.920908] [ 33.920974] The buggy address belongs to the object at fff00000c9a67800 [ 33.920974] which belongs to the cache kmalloc-64 of size 64 [ 33.921259] The buggy address is located 0 bytes to the right of [ 33.921259] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.921450] [ 33.921518] The buggy address belongs to the physical page: [ 33.921763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.921822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.921955] page_type: f5(slab) [ 33.922050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.922158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.922202] page dumped because: kasan: bad access detected [ 33.922311] [ 33.922332] Memory state around the buggy address: [ 33.922610] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.922914] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.923057] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.923175] ^ [ 33.923222] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.923266] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.923306] ================================================================== [ 33.951952] ================================================================== [ 33.952164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.952722] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.953029] [ 33.953065] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.953174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.953252] Hardware name: linux,dummy-virt (DT) [ 33.953287] Call trace: [ 33.953314] show_stack+0x20/0x38 (C) [ 33.953367] dump_stack_lvl+0x8c/0xd0 [ 33.953416] print_report+0x118/0x5d0 [ 33.953466] kasan_report+0xdc/0x128 [ 33.953790] __asan_report_store8_noabort+0x20/0x30 [ 33.953884] kasan_atomics_helper+0x3e5c/0x4858 [ 33.954176] kasan_atomics+0x198/0x2e0 [ 33.954243] kunit_try_run_case+0x170/0x3f0 [ 33.954295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.954352] kthread+0x328/0x630 [ 33.954396] ret_from_fork+0x10/0x20 [ 33.954508] [ 33.954612] Allocated by task 296: [ 33.954643] kasan_save_stack+0x3c/0x68 [ 33.954689] kasan_save_track+0x20/0x40 [ 33.954735] kasan_save_alloc_info+0x40/0x58 [ 33.954847] __kasan_kmalloc+0xd4/0xd8 [ 33.954887] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.954985] kasan_atomics+0xb8/0x2e0 [ 33.955078] kunit_try_run_case+0x170/0x3f0 [ 33.955140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.955245] kthread+0x328/0x630 [ 33.955280] ret_from_fork+0x10/0x20 [ 33.955711] [ 33.955735] The buggy address belongs to the object at fff00000c9a67800 [ 33.955735] which belongs to the cache kmalloc-64 of size 64 [ 33.955795] The buggy address is located 0 bytes to the right of [ 33.955795] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.955860] [ 33.955883] The buggy address belongs to the physical page: [ 33.955916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.956406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.956742] page_type: f5(slab) [ 33.956809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.957132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.957250] page dumped because: kasan: bad access detected [ 33.957285] [ 33.957420] Memory state around the buggy address: [ 33.957466] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.957514] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.957558] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.957599] ^ [ 33.957874] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.957948] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.958160] ================================================================== [ 33.959904] ================================================================== [ 33.959970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.960188] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.960450] [ 33.960490] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.960754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.961151] Hardware name: linux,dummy-virt (DT) [ 33.961187] Call trace: [ 33.961225] show_stack+0x20/0x38 (C) [ 33.961279] dump_stack_lvl+0x8c/0xd0 [ 33.961352] print_report+0x118/0x5d0 [ 33.961404] kasan_report+0xdc/0x128 [ 33.961452] kasan_check_range+0x100/0x1a8 [ 33.961500] __kasan_check_write+0x20/0x30 [ 33.961593] kasan_atomics_helper+0xeb8/0x4858 [ 33.961761] kasan_atomics+0x198/0x2e0 [ 33.962171] kunit_try_run_case+0x170/0x3f0 [ 33.962299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.962356] kthread+0x328/0x630 [ 33.962401] ret_from_fork+0x10/0x20 [ 33.962535] [ 33.962633] Allocated by task 296: [ 33.962727] kasan_save_stack+0x3c/0x68 [ 33.962773] kasan_save_track+0x20/0x40 [ 33.962814] kasan_save_alloc_info+0x40/0x58 [ 33.962855] __kasan_kmalloc+0xd4/0xd8 [ 33.962895] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.962979] kasan_atomics+0xb8/0x2e0 [ 33.963052] kunit_try_run_case+0x170/0x3f0 [ 33.963094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.963498] kthread+0x328/0x630 [ 33.963639] ret_from_fork+0x10/0x20 [ 33.964081] [ 33.964106] The buggy address belongs to the object at fff00000c9a67800 [ 33.964106] which belongs to the cache kmalloc-64 of size 64 [ 33.964419] The buggy address is located 0 bytes to the right of [ 33.964419] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.964891] [ 33.964973] The buggy address belongs to the physical page: [ 33.965064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.965132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.965667] page_type: f5(slab) [ 33.965728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.965866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.965909] page dumped because: kasan: bad access detected [ 33.965950] [ 33.965970] Memory state around the buggy address: [ 33.966005] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.966050] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.966119] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.966177] ^ [ 33.966223] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.966267] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.966307] ================================================================== [ 33.903591] ================================================================== [ 33.903844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.903946] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.904055] [ 33.904287] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.904624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.904657] Hardware name: linux,dummy-virt (DT) [ 33.904691] Call trace: [ 33.904716] show_stack+0x20/0x38 (C) [ 33.904768] dump_stack_lvl+0x8c/0xd0 [ 33.904817] print_report+0x118/0x5d0 [ 33.904866] kasan_report+0xdc/0x128 [ 33.904913] kasan_check_range+0x100/0x1a8 [ 33.904962] __kasan_check_write+0x20/0x30 [ 33.905140] kasan_atomics_helper+0xd3c/0x4858 [ 33.905225] kasan_atomics+0x198/0x2e0 [ 33.905719] kunit_try_run_case+0x170/0x3f0 [ 33.905796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.906400] kthread+0x328/0x630 [ 33.906694] ret_from_fork+0x10/0x20 [ 33.906870] [ 33.907277] Allocated by task 296: [ 33.907438] kasan_save_stack+0x3c/0x68 [ 33.907487] kasan_save_track+0x20/0x40 [ 33.907867] kasan_save_alloc_info+0x40/0x58 [ 33.908109] __kasan_kmalloc+0xd4/0xd8 [ 33.908160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.908549] kasan_atomics+0xb8/0x2e0 [ 33.908912] kunit_try_run_case+0x170/0x3f0 [ 33.909005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.909298] kthread+0x328/0x630 [ 33.909548] ret_from_fork+0x10/0x20 [ 33.909705] [ 33.909729] The buggy address belongs to the object at fff00000c9a67800 [ 33.909729] which belongs to the cache kmalloc-64 of size 64 [ 33.909944] The buggy address is located 0 bytes to the right of [ 33.909944] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.910030] [ 33.910216] The buggy address belongs to the physical page: [ 33.910350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.910404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.910455] page_type: f5(slab) [ 33.910494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.910915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.910971] page dumped because: kasan: bad access detected [ 33.911477] [ 33.911569] Memory state around the buggy address: [ 33.911809] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.911975] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.912021] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.912060] ^ [ 33.912096] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.912140] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.912179] ================================================================== [ 34.032455] ================================================================== [ 34.032880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 34.032947] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.033154] [ 34.033186] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.033332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.033404] Hardware name: linux,dummy-virt (DT) [ 34.033437] Call trace: [ 34.033461] show_stack+0x20/0x38 (C) [ 34.033536] dump_stack_lvl+0x8c/0xd0 [ 34.033584] print_report+0x118/0x5d0 [ 34.033635] kasan_report+0xdc/0x128 [ 34.033682] __asan_report_load8_noabort+0x20/0x30 [ 34.034009] kasan_atomics_helper+0x3f04/0x4858 [ 34.034220] kasan_atomics+0x198/0x2e0 [ 34.034272] kunit_try_run_case+0x170/0x3f0 [ 34.034323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.034646] kthread+0x328/0x630 [ 34.034693] ret_from_fork+0x10/0x20 [ 34.034800] [ 34.034851] Allocated by task 296: [ 34.034900] kasan_save_stack+0x3c/0x68 [ 34.034945] kasan_save_track+0x20/0x40 [ 34.034992] kasan_save_alloc_info+0x40/0x58 [ 34.035157] __kasan_kmalloc+0xd4/0xd8 [ 34.035263] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.035314] kasan_atomics+0xb8/0x2e0 [ 34.035464] kunit_try_run_case+0x170/0x3f0 [ 34.035533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.035583] kthread+0x328/0x630 [ 34.035643] ret_from_fork+0x10/0x20 [ 34.035681] [ 34.035745] The buggy address belongs to the object at fff00000c9a67800 [ 34.035745] which belongs to the cache kmalloc-64 of size 64 [ 34.035917] The buggy address is located 0 bytes to the right of [ 34.035917] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.035984] [ 34.036005] The buggy address belongs to the physical page: [ 34.036037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.036092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.036139] page_type: f5(slab) [ 34.036205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.036266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.036308] page dumped because: kasan: bad access detected [ 34.036341] [ 34.036418] Memory state around the buggy address: [ 34.036453] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.036498] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.037155] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.037203] ^ [ 34.037249] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.037295] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.037335] ================================================================== [ 33.848505] ================================================================== [ 33.848569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 33.848896] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.849091] [ 33.849166] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.849654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.849720] Hardware name: linux,dummy-virt (DT) [ 33.849888] Call trace: [ 33.850036] show_stack+0x20/0x38 (C) [ 33.850229] dump_stack_lvl+0x8c/0xd0 [ 33.850280] print_report+0x118/0x5d0 [ 33.850571] kasan_report+0xdc/0x128 [ 33.850664] kasan_check_range+0x100/0x1a8 [ 33.850893] __kasan_check_write+0x20/0x30 [ 33.851056] kasan_atomics_helper+0xb70/0x4858 [ 33.851136] kasan_atomics+0x198/0x2e0 [ 33.851448] kunit_try_run_case+0x170/0x3f0 [ 33.851587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.851645] kthread+0x328/0x630 [ 33.851688] ret_from_fork+0x10/0x20 [ 33.851747] [ 33.851768] Allocated by task 296: [ 33.851799] kasan_save_stack+0x3c/0x68 [ 33.851852] kasan_save_track+0x20/0x40 [ 33.851892] kasan_save_alloc_info+0x40/0x58 [ 33.851933] __kasan_kmalloc+0xd4/0xd8 [ 33.851973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.852049] kasan_atomics+0xb8/0x2e0 [ 33.852365] kunit_try_run_case+0x170/0x3f0 [ 33.852672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.852725] kthread+0x328/0x630 [ 33.852915] ret_from_fork+0x10/0x20 [ 33.852971] [ 33.853047] The buggy address belongs to the object at fff00000c9a67800 [ 33.853047] which belongs to the cache kmalloc-64 of size 64 [ 33.853187] The buggy address is located 0 bytes to the right of [ 33.853187] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.853322] [ 33.853344] The buggy address belongs to the physical page: [ 33.853377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.853431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.853981] page_type: f5(slab) [ 33.854395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.854547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.854774] page dumped because: kasan: bad access detected [ 33.854812] [ 33.855083] Memory state around the buggy address: [ 33.855313] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.855624] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.855732] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.856285] ^ [ 33.856338] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.856385] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.856426] ================================================================== [ 34.038536] ================================================================== [ 34.038622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 34.038674] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.038724] [ 34.038788] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.038937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.038966] Hardware name: linux,dummy-virt (DT) [ 34.038998] Call trace: [ 34.039022] show_stack+0x20/0x38 (C) [ 34.039070] dump_stack_lvl+0x8c/0xd0 [ 34.039568] print_report+0x118/0x5d0 [ 34.039944] kasan_report+0xdc/0x128 [ 34.040000] kasan_check_range+0x100/0x1a8 [ 34.040097] __kasan_check_write+0x20/0x30 [ 34.040230] kasan_atomics_helper+0x1414/0x4858 [ 34.040302] kasan_atomics+0x198/0x2e0 [ 34.040366] kunit_try_run_case+0x170/0x3f0 [ 34.040418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.040474] kthread+0x328/0x630 [ 34.040525] ret_from_fork+0x10/0x20 [ 34.040633] [ 34.040653] Allocated by task 296: [ 34.040684] kasan_save_stack+0x3c/0x68 [ 34.041218] kasan_save_track+0x20/0x40 [ 34.041356] kasan_save_alloc_info+0x40/0x58 [ 34.041422] __kasan_kmalloc+0xd4/0xd8 [ 34.041464] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.041505] kasan_atomics+0xb8/0x2e0 [ 34.041544] kunit_try_run_case+0x170/0x3f0 [ 34.041586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.041634] kthread+0x328/0x630 [ 34.041890] ret_from_fork+0x10/0x20 [ 34.041961] [ 34.042035] The buggy address belongs to the object at fff00000c9a67800 [ 34.042035] which belongs to the cache kmalloc-64 of size 64 [ 34.042096] The buggy address is located 0 bytes to the right of [ 34.042096] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.042195] [ 34.042272] The buggy address belongs to the physical page: [ 34.042305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.042357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.042412] page_type: f5(slab) [ 34.042579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.042820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.042899] page dumped because: kasan: bad access detected [ 34.043573] [ 34.043702] Memory state around the buggy address: [ 34.043737] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.044232] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.044451] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.044957] ^ [ 34.045422] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.045799] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.046402] ================================================================== [ 34.092202] ================================================================== [ 34.093494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 34.094381] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.094798] [ 34.095022] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.095828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.096021] Hardware name: linux,dummy-virt (DT) [ 34.096394] Call trace: [ 34.096839] show_stack+0x20/0x38 (C) [ 34.096934] dump_stack_lvl+0x8c/0xd0 [ 34.096983] print_report+0x118/0x5d0 [ 34.097816] kasan_report+0xdc/0x128 [ 34.098094] kasan_check_range+0x100/0x1a8 [ 34.098143] __kasan_check_write+0x20/0x30 [ 34.098827] kasan_atomics_helper+0x154c/0x4858 [ 34.099125] kasan_atomics+0x198/0x2e0 [ 34.099183] kunit_try_run_case+0x170/0x3f0 [ 34.099245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.099302] kthread+0x328/0x630 [ 34.100346] ret_from_fork+0x10/0x20 [ 34.100412] [ 34.100434] Allocated by task 296: [ 34.100466] kasan_save_stack+0x3c/0x68 [ 34.100512] kasan_save_track+0x20/0x40 [ 34.100561] kasan_save_alloc_info+0x40/0x58 [ 34.102137] __kasan_kmalloc+0xd4/0xd8 [ 34.102934] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.103120] kasan_atomics+0xb8/0x2e0 [ 34.103161] kunit_try_run_case+0x170/0x3f0 [ 34.103204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.104579] kthread+0x328/0x630 [ 34.104723] ret_from_fork+0x10/0x20 [ 34.104928] [ 34.104955] The buggy address belongs to the object at fff00000c9a67800 [ 34.104955] which belongs to the cache kmalloc-64 of size 64 [ 34.105024] The buggy address is located 0 bytes to the right of [ 34.105024] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.105090] [ 34.105738] The buggy address belongs to the physical page: [ 34.105839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.106128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.106793] page_type: f5(slab) [ 34.106882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.106935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.106978] page dumped because: kasan: bad access detected [ 34.107010] [ 34.108066] Memory state around the buggy address: [ 34.108278] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.108986] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.109316] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.109976] ^ [ 34.110107] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.110531] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.110864] ================================================================== [ 33.742587] ================================================================== [ 33.742654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 33.742707] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.742765] [ 33.742955] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.743078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.743117] Hardware name: linux,dummy-virt (DT) [ 33.743151] Call trace: [ 33.743178] show_stack+0x20/0x38 (C) [ 33.743374] dump_stack_lvl+0x8c/0xd0 [ 33.743518] print_report+0x118/0x5d0 [ 33.743575] kasan_report+0xdc/0x128 [ 33.743623] kasan_check_range+0x100/0x1a8 [ 33.743678] __kasan_check_write+0x20/0x30 [ 33.743727] kasan_atomics_helper+0x3ac/0x4858 [ 33.743779] kasan_atomics+0x198/0x2e0 [ 33.743827] kunit_try_run_case+0x170/0x3f0 [ 33.744005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.744106] kthread+0x328/0x630 [ 33.744189] ret_from_fork+0x10/0x20 [ 33.744272] [ 33.744309] Allocated by task 296: [ 33.744558] kasan_save_stack+0x3c/0x68 [ 33.744687] kasan_save_track+0x20/0x40 [ 33.744763] kasan_save_alloc_info+0x40/0x58 [ 33.744831] __kasan_kmalloc+0xd4/0xd8 [ 33.744945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.744988] kasan_atomics+0xb8/0x2e0 [ 33.745051] kunit_try_run_case+0x170/0x3f0 [ 33.745236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.745469] ret_from_fork+0x10/0x20 [ 33.745597] [ 33.745647] The buggy address belongs to the object at fff00000c9a67800 [ 33.745647] which belongs to the cache kmalloc-64 of size 64 [ 33.745727] The buggy address is located 0 bytes to the right of [ 33.745727] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.746315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.746402] page_type: f5(slab) [ 33.746792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.747361] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.747493] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.747563] ^ [ 33.747618] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.747985] ================================================================== [ 33.997780] ================================================================== [ 33.997829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.998121] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.998321] [ 33.998355] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.998686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.998720] Hardware name: linux,dummy-virt (DT) [ 33.998948] Call trace: [ 33.998981] show_stack+0x20/0x38 (C) [ 33.999032] dump_stack_lvl+0x8c/0xd0 [ 33.999092] print_report+0x118/0x5d0 [ 33.999158] kasan_report+0xdc/0x128 [ 33.999217] kasan_check_range+0x100/0x1a8 [ 33.999264] __kasan_check_write+0x20/0x30 [ 33.999313] kasan_atomics_helper+0x1128/0x4858 [ 33.999707] kasan_atomics+0x198/0x2e0 [ 33.999762] kunit_try_run_case+0x170/0x3f0 [ 33.999982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.000123] kthread+0x328/0x630 [ 34.000170] ret_from_fork+0x10/0x20 [ 34.000231] [ 34.000251] Allocated by task 296: [ 34.000282] kasan_save_stack+0x3c/0x68 [ 34.000328] kasan_save_track+0x20/0x40 [ 34.000370] kasan_save_alloc_info+0x40/0x58 [ 34.000410] __kasan_kmalloc+0xd4/0xd8 [ 34.000450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.000492] kasan_atomics+0xb8/0x2e0 [ 34.000581] kunit_try_run_case+0x170/0x3f0 [ 34.001105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.001561] kthread+0x328/0x630 [ 34.001652] ret_from_fork+0x10/0x20 [ 34.001706] [ 34.001730] The buggy address belongs to the object at fff00000c9a67800 [ 34.001730] which belongs to the cache kmalloc-64 of size 64 [ 34.001790] The buggy address is located 0 bytes to the right of [ 34.001790] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.001856] [ 34.002172] The buggy address belongs to the physical page: [ 34.002225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.002316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.002366] page_type: f5(slab) [ 34.002406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.002457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.002691] page dumped because: kasan: bad access detected [ 34.002882] [ 34.002905] Memory state around the buggy address: [ 34.002938] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.003276] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.003380] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.003462] ^ [ 34.003601] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.003664] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.003705] ================================================================== [ 33.978315] ================================================================== [ 33.978363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.978424] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.978575] [ 33.978604] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.978740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.978770] Hardware name: linux,dummy-virt (DT) [ 33.978815] Call trace: [ 33.978840] show_stack+0x20/0x38 (C) [ 33.978888] dump_stack_lvl+0x8c/0xd0 [ 33.979012] print_report+0x118/0x5d0 [ 33.979070] kasan_report+0xdc/0x128 [ 33.979118] kasan_check_range+0x100/0x1a8 [ 33.979172] __kasan_check_write+0x20/0x30 [ 33.979381] kasan_atomics_helper+0xff0/0x4858 [ 33.979547] kasan_atomics+0x198/0x2e0 [ 33.979596] kunit_try_run_case+0x170/0x3f0 [ 33.979704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.979759] kthread+0x328/0x630 [ 33.979804] ret_from_fork+0x10/0x20 [ 33.979851] [ 33.979872] Allocated by task 296: [ 33.979903] kasan_save_stack+0x3c/0x68 [ 33.979947] kasan_save_track+0x20/0x40 [ 33.979988] kasan_save_alloc_info+0x40/0x58 [ 33.980027] __kasan_kmalloc+0xd4/0xd8 [ 33.980068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.980111] kasan_atomics+0xb8/0x2e0 [ 33.980157] kunit_try_run_case+0x170/0x3f0 [ 33.980529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.980978] kthread+0x328/0x630 [ 33.981669] ret_from_fork+0x10/0x20 [ 33.981925] [ 33.981949] The buggy address belongs to the object at fff00000c9a67800 [ 33.981949] which belongs to the cache kmalloc-64 of size 64 [ 33.982029] The buggy address is located 0 bytes to the right of [ 33.982029] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.982096] [ 33.982119] The buggy address belongs to the physical page: [ 33.982149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.982203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.982778] page_type: f5(slab) [ 33.982866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.983173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.983519] page dumped because: kasan: bad access detected [ 33.983558] [ 33.983578] Memory state around the buggy address: [ 33.983614] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.983660] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.983704] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.983744] ^ [ 33.983794] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.983838] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.984171] ================================================================== [ 34.159106] ================================================================== [ 34.159154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 34.159203] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.159274] [ 34.159304] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.159389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.159418] Hardware name: linux,dummy-virt (DT) [ 34.159452] Call trace: [ 34.159544] show_stack+0x20/0x38 (C) [ 34.159638] dump_stack_lvl+0x8c/0xd0 [ 34.159688] print_report+0x118/0x5d0 [ 34.159735] kasan_report+0xdc/0x128 [ 34.159783] kasan_check_range+0x100/0x1a8 [ 34.159829] __kasan_check_write+0x20/0x30 [ 34.159888] kasan_atomics_helper+0x175c/0x4858 [ 34.160048] kasan_atomics+0x198/0x2e0 [ 34.160163] kunit_try_run_case+0x170/0x3f0 [ 34.160225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.160281] kthread+0x328/0x630 [ 34.160444] ret_from_fork+0x10/0x20 [ 34.160519] [ 34.160638] Allocated by task 296: [ 34.160670] kasan_save_stack+0x3c/0x68 [ 34.160716] kasan_save_track+0x20/0x40 [ 34.160757] kasan_save_alloc_info+0x40/0x58 [ 34.160797] __kasan_kmalloc+0xd4/0xd8 [ 34.160847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.160952] kasan_atomics+0xb8/0x2e0 [ 34.161010] kunit_try_run_case+0x170/0x3f0 [ 34.161052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.161099] kthread+0x328/0x630 [ 34.161179] ret_from_fork+0x10/0x20 [ 34.161251] [ 34.161275] The buggy address belongs to the object at fff00000c9a67800 [ 34.161275] which belongs to the cache kmalloc-64 of size 64 [ 34.161335] The buggy address is located 0 bytes to the right of [ 34.161335] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.161418] [ 34.161439] The buggy address belongs to the physical page: [ 34.161472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.161636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.161727] page_type: f5(slab) [ 34.162032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.162083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.162123] page dumped because: kasan: bad access detected [ 34.162158] [ 34.162177] Memory state around the buggy address: [ 34.162220] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.162271] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.162420] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.162461] ^ [ 34.162496] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.162593] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.162760] ================================================================== [ 34.129520] ================================================================== [ 34.129571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 34.130127] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.130564] [ 34.130697] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.130890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.131094] Hardware name: linux,dummy-virt (DT) [ 34.131586] Call trace: [ 34.131617] show_stack+0x20/0x38 (C) [ 34.131793] dump_stack_lvl+0x8c/0xd0 [ 34.131843] print_report+0x118/0x5d0 [ 34.131895] kasan_report+0xdc/0x128 [ 34.131943] __asan_report_load8_noabort+0x20/0x30 [ 34.131992] kasan_atomics_helper+0x3db0/0x4858 [ 34.132088] kasan_atomics+0x198/0x2e0 [ 34.132719] kunit_try_run_case+0x170/0x3f0 [ 34.132775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.133733] kthread+0x328/0x630 [ 34.133864] ret_from_fork+0x10/0x20 [ 34.134267] [ 34.134346] Allocated by task 296: [ 34.134380] kasan_save_stack+0x3c/0x68 [ 34.134735] kasan_save_track+0x20/0x40 [ 34.135032] kasan_save_alloc_info+0x40/0x58 [ 34.135255] __kasan_kmalloc+0xd4/0xd8 [ 34.135712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.135824] kasan_atomics+0xb8/0x2e0 [ 34.136160] kunit_try_run_case+0x170/0x3f0 [ 34.136222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.136502] kthread+0x328/0x630 [ 34.136927] ret_from_fork+0x10/0x20 [ 34.137101] [ 34.137127] The buggy address belongs to the object at fff00000c9a67800 [ 34.137127] which belongs to the cache kmalloc-64 of size 64 [ 34.137189] The buggy address is located 0 bytes to the right of [ 34.137189] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.137266] [ 34.137288] The buggy address belongs to the physical page: [ 34.137321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.137378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.138062] page_type: f5(slab) [ 34.138127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.138178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.138534] page dumped because: kasan: bad access detected [ 34.138571] [ 34.138591] Memory state around the buggy address: [ 34.138625] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.138670] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.138715] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.138756] ^ [ 34.138791] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.138836] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.138876] ================================================================== [ 33.837349] ================================================================== [ 33.837405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.837457] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.837509] [ 33.837543] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.837927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.837989] Hardware name: linux,dummy-virt (DT) [ 33.838027] Call trace: [ 33.838053] show_stack+0x20/0x38 (C) [ 33.838287] dump_stack_lvl+0x8c/0xd0 [ 33.838389] print_report+0x118/0x5d0 [ 33.838459] kasan_report+0xdc/0x128 [ 33.838520] kasan_check_range+0x100/0x1a8 [ 33.838633] __kasan_check_write+0x20/0x30 [ 33.838685] kasan_atomics_helper+0xad4/0x4858 [ 33.838737] kasan_atomics+0x198/0x2e0 [ 33.838791] kunit_try_run_case+0x170/0x3f0 [ 33.839000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.839078] kthread+0x328/0x630 [ 33.839134] ret_from_fork+0x10/0x20 [ 33.839347] [ 33.839432] Allocated by task 296: [ 33.839484] kasan_save_stack+0x3c/0x68 [ 33.839530] kasan_save_track+0x20/0x40 [ 33.839584] kasan_save_alloc_info+0x40/0x58 [ 33.839633] __kasan_kmalloc+0xd4/0xd8 [ 33.839737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.839787] kasan_atomics+0xb8/0x2e0 [ 33.839844] kunit_try_run_case+0x170/0x3f0 [ 33.839903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.840037] kthread+0x328/0x630 [ 33.840084] ret_from_fork+0x10/0x20 [ 33.840133] [ 33.840162] The buggy address belongs to the object at fff00000c9a67800 [ 33.840162] which belongs to the cache kmalloc-64 of size 64 [ 33.840476] The buggy address is located 0 bytes to the right of [ 33.840476] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.840590] [ 33.840689] The buggy address belongs to the physical page: [ 33.840750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.840852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.840902] page_type: f5(slab) [ 33.840942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.840993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.841036] page dumped because: kasan: bad access detected [ 33.841258] [ 33.841286] Memory state around the buggy address: [ 33.841329] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.841459] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.841528] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.841578] ^ [ 33.841796] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.841932] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.842002] ================================================================== [ 33.812291] ================================================================== [ 33.812516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 33.812711] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.812848] [ 33.812907] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.813024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.813267] Hardware name: linux,dummy-virt (DT) [ 33.813340] Call trace: [ 33.813386] show_stack+0x20/0x38 (C) [ 33.813516] dump_stack_lvl+0x8c/0xd0 [ 33.813595] print_report+0x118/0x5d0 [ 33.813722] kasan_report+0xdc/0x128 [ 33.813803] kasan_check_range+0x100/0x1a8 [ 33.813929] __kasan_check_write+0x20/0x30 [ 33.813982] kasan_atomics_helper+0x934/0x4858 [ 33.814036] kasan_atomics+0x198/0x2e0 [ 33.814392] kunit_try_run_case+0x170/0x3f0 [ 33.814456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.814539] kthread+0x328/0x630 [ 33.814702] ret_from_fork+0x10/0x20 [ 33.814969] [ 33.815091] kasan_save_stack+0x3c/0x68 [ 33.815198] kasan_save_track+0x20/0x40 [ 33.815270] kasan_save_alloc_info+0x40/0x58 [ 33.815321] __kasan_kmalloc+0xd4/0xd8 [ 33.815566] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.815646] kasan_atomics+0xb8/0x2e0 [ 33.815713] kunit_try_run_case+0x170/0x3f0 [ 33.815842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.815920] kthread+0x328/0x630 [ 33.816051] ret_from_fork+0x10/0x20 [ 33.816119] [ 33.816166] The buggy address belongs to the object at fff00000c9a67800 [ 33.816166] which belongs to the cache kmalloc-64 of size 64 [ 33.816282] The buggy address is located 0 bytes to the right of [ 33.816282] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.816360] [ 33.816384] The buggy address belongs to the physical page: [ 33.816422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.816507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.816781] page_type: f5(slab) [ 33.816913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.816992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.817074] page dumped because: kasan: bad access detected [ 33.817159] [ 33.817223] Memory state around the buggy address: [ 33.817260] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.817559] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.817643] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.817711] ^ [ 33.817801] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.817888] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.817935] ================================================================== [ 33.991384] ================================================================== [ 33.991471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.991522] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.991857] [ 33.992029] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.992133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.992163] Hardware name: linux,dummy-virt (DT) [ 33.992195] Call trace: [ 33.992233] show_stack+0x20/0x38 (C) [ 33.992283] dump_stack_lvl+0x8c/0xd0 [ 33.992342] print_report+0x118/0x5d0 [ 33.992393] kasan_report+0xdc/0x128 [ 33.992780] kasan_check_range+0x100/0x1a8 [ 33.992839] __kasan_check_write+0x20/0x30 [ 33.993077] kasan_atomics_helper+0x10c0/0x4858 [ 33.993232] kasan_atomics+0x198/0x2e0 [ 33.993639] kunit_try_run_case+0x170/0x3f0 [ 33.993784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.993924] kthread+0x328/0x630 [ 33.994090] ret_from_fork+0x10/0x20 [ 33.994170] [ 33.994270] Allocated by task 296: [ 33.994319] kasan_save_stack+0x3c/0x68 [ 33.994364] kasan_save_track+0x20/0x40 [ 33.994405] kasan_save_alloc_info+0x40/0x58 [ 33.994445] __kasan_kmalloc+0xd4/0xd8 [ 33.994491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.994632] kasan_atomics+0xb8/0x2e0 [ 33.994700] kunit_try_run_case+0x170/0x3f0 [ 33.994779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.994886] kthread+0x328/0x630 [ 33.994922] ret_from_fork+0x10/0x20 [ 33.994960] [ 33.994981] The buggy address belongs to the object at fff00000c9a67800 [ 33.994981] which belongs to the cache kmalloc-64 of size 64 [ 33.995040] The buggy address is located 0 bytes to the right of [ 33.995040] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.995106] [ 33.995128] The buggy address belongs to the physical page: [ 33.995168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.995259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.995308] page_type: f5(slab) [ 33.995381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.995434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.995475] page dumped because: kasan: bad access detected [ 33.995508] [ 33.995842] Memory state around the buggy address: [ 33.996191] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.996253] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.996298] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.997231] ^ [ 33.997345] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.997513] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.997554] ================================================================== [ 34.170308] ================================================================== [ 34.170611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 34.170748] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.170962] [ 34.170995] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.171082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.171109] Hardware name: linux,dummy-virt (DT) [ 34.171143] Call trace: [ 34.171167] show_stack+0x20/0x38 (C) [ 34.171229] dump_stack_lvl+0x8c/0xd0 [ 34.171979] print_report+0x118/0x5d0 [ 34.172383] kasan_report+0xdc/0x128 [ 34.172507] kasan_check_range+0x100/0x1a8 [ 34.172898] __kasan_check_write+0x20/0x30 [ 34.173231] kasan_atomics_helper+0x17ec/0x4858 [ 34.173307] kasan_atomics+0x198/0x2e0 [ 34.173700] kunit_try_run_case+0x170/0x3f0 [ 34.173957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.174017] kthread+0x328/0x630 [ 34.174485] ret_from_fork+0x10/0x20 [ 34.174821] [ 34.174844] Allocated by task 296: [ 34.175081] kasan_save_stack+0x3c/0x68 [ 34.175218] kasan_save_track+0x20/0x40 [ 34.175261] kasan_save_alloc_info+0x40/0x58 [ 34.175302] __kasan_kmalloc+0xd4/0xd8 [ 34.175342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.175385] kasan_atomics+0xb8/0x2e0 [ 34.175963] kunit_try_run_case+0x170/0x3f0 [ 34.176056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.176107] kthread+0x328/0x630 [ 34.176144] ret_from_fork+0x10/0x20 [ 34.176183] [ 34.176319] The buggy address belongs to the object at fff00000c9a67800 [ 34.176319] which belongs to the cache kmalloc-64 of size 64 [ 34.176384] The buggy address is located 0 bytes to the right of [ 34.176384] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.176554] [ 34.176820] The buggy address belongs to the physical page: [ 34.177118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.177192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.177254] page_type: f5(slab) [ 34.177296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.177911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.178392] page dumped because: kasan: bad access detected [ 34.178563] [ 34.178586] Memory state around the buggy address: [ 34.178967] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.179015] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.179060] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.179101] ^ [ 34.179137] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.179754] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.180075] ================================================================== [ 33.831637] ================================================================== [ 33.831746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.831816] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.831930] [ 33.831997] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.832094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.832124] Hardware name: linux,dummy-virt (DT) [ 33.832299] Call trace: [ 33.832391] show_stack+0x20/0x38 (C) [ 33.832463] dump_stack_lvl+0x8c/0xd0 [ 33.832601] print_report+0x118/0x5d0 [ 33.832697] kasan_report+0xdc/0x128 [ 33.832752] kasan_check_range+0x100/0x1a8 [ 33.832835] __kasan_check_write+0x20/0x30 [ 33.832900] kasan_atomics_helper+0xa6c/0x4858 [ 33.832955] kasan_atomics+0x198/0x2e0 [ 33.833016] kunit_try_run_case+0x170/0x3f0 [ 33.833065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.833121] kthread+0x328/0x630 [ 33.833173] ret_from_fork+0x10/0x20 [ 33.833240] [ 33.833262] Allocated by task 296: [ 33.833302] kasan_save_stack+0x3c/0x68 [ 33.833346] kasan_save_track+0x20/0x40 [ 33.833402] kasan_save_alloc_info+0x40/0x58 [ 33.833443] __kasan_kmalloc+0xd4/0xd8 [ 33.833482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.833529] kasan_atomics+0xb8/0x2e0 [ 33.833569] kunit_try_run_case+0x170/0x3f0 [ 33.833609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.833656] kthread+0x328/0x630 [ 33.833903] ret_from_fork+0x10/0x20 [ 33.834124] [ 33.834165] The buggy address belongs to the object at fff00000c9a67800 [ 33.834165] which belongs to the cache kmalloc-64 of size 64 [ 33.834400] The buggy address is located 0 bytes to the right of [ 33.834400] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.834620] [ 33.834661] The buggy address belongs to the physical page: [ 33.834719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.834848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.834929] page_type: f5(slab) [ 33.835006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.835363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.835458] page dumped because: kasan: bad access detected [ 33.835610] [ 33.835661] Memory state around the buggy address: [ 33.835718] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.836031] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.836100] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.836169] ^ [ 33.836227] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.836272] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.836314] ================================================================== [ 33.967826] ================================================================== [ 33.968265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.968389] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.968443] [ 33.968474] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.968569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.968603] Hardware name: linux,dummy-virt (DT) [ 33.968634] Call trace: [ 33.968658] show_stack+0x20/0x38 (C) [ 33.968708] dump_stack_lvl+0x8c/0xd0 [ 33.968758] print_report+0x118/0x5d0 [ 33.968808] kasan_report+0xdc/0x128 [ 33.968856] kasan_check_range+0x100/0x1a8 [ 33.969490] __kasan_check_write+0x20/0x30 [ 33.969594] kasan_atomics_helper+0xf20/0x4858 [ 33.969773] kasan_atomics+0x198/0x2e0 [ 33.969831] kunit_try_run_case+0x170/0x3f0 [ 33.969927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.970068] kthread+0x328/0x630 [ 33.970580] ret_from_fork+0x10/0x20 [ 33.970752] [ 33.970773] Allocated by task 296: [ 33.970883] kasan_save_stack+0x3c/0x68 [ 33.971062] kasan_save_track+0x20/0x40 [ 33.971236] kasan_save_alloc_info+0x40/0x58 [ 33.971347] __kasan_kmalloc+0xd4/0xd8 [ 33.971443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.971532] kasan_atomics+0xb8/0x2e0 [ 33.971571] kunit_try_run_case+0x170/0x3f0 [ 33.971619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.971778] kthread+0x328/0x630 [ 33.971814] ret_from_fork+0x10/0x20 [ 33.971854] [ 33.971875] The buggy address belongs to the object at fff00000c9a67800 [ 33.971875] which belongs to the cache kmalloc-64 of size 64 [ 33.971936] The buggy address is located 0 bytes to the right of [ 33.971936] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.972022] [ 33.972101] The buggy address belongs to the physical page: [ 33.972134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.972225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.972275] page_type: f5(slab) [ 33.972346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.972399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.972441] page dumped because: kasan: bad access detected [ 33.972600] [ 33.972624] Memory state around the buggy address: [ 33.972728] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.973080] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.973137] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.973200] ^ [ 33.973243] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.973286] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.973326] ================================================================== [ 33.974084] ================================================================== [ 33.974380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.974493] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.974545] [ 33.974585] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.974780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.974851] Hardware name: linux,dummy-virt (DT) [ 33.974952] Call trace: [ 33.974989] show_stack+0x20/0x38 (C) [ 33.975037] dump_stack_lvl+0x8c/0xd0 [ 33.975086] print_report+0x118/0x5d0 [ 33.975268] kasan_report+0xdc/0x128 [ 33.975326] kasan_check_range+0x100/0x1a8 [ 33.975425] __kasan_check_write+0x20/0x30 [ 33.975473] kasan_atomics_helper+0xf88/0x4858 [ 33.975564] kasan_atomics+0x198/0x2e0 [ 33.975613] kunit_try_run_case+0x170/0x3f0 [ 33.975735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.975938] kthread+0x328/0x630 [ 33.976007] ret_from_fork+0x10/0x20 [ 33.976055] [ 33.976077] Allocated by task 296: [ 33.976107] kasan_save_stack+0x3c/0x68 [ 33.976150] kasan_save_track+0x20/0x40 [ 33.976191] kasan_save_alloc_info+0x40/0x58 [ 33.976241] __kasan_kmalloc+0xd4/0xd8 [ 33.976282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.976325] kasan_atomics+0xb8/0x2e0 [ 33.976364] kunit_try_run_case+0x170/0x3f0 [ 33.976406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.976454] kthread+0x328/0x630 [ 33.976487] ret_from_fork+0x10/0x20 [ 33.976526] [ 33.976843] The buggy address belongs to the object at fff00000c9a67800 [ 33.976843] which belongs to the cache kmalloc-64 of size 64 [ 33.976929] The buggy address is located 0 bytes to the right of [ 33.976929] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.977041] [ 33.977062] The buggy address belongs to the physical page: [ 33.977095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.977146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.977195] page_type: f5(slab) [ 33.977244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.977295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.977368] page dumped because: kasan: bad access detected [ 33.977405] [ 33.977425] Memory state around the buggy address: [ 33.977458] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.977657] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.977702] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.977742] ^ [ 33.977777] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.977898] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.977973] ================================================================== [ 33.944415] ================================================================== [ 33.944741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.944795] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.944847] [ 33.944879] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.944966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.944996] Hardware name: linux,dummy-virt (DT) [ 33.945030] Call trace: [ 33.945056] show_stack+0x20/0x38 (C) [ 33.945463] dump_stack_lvl+0x8c/0xd0 [ 33.945554] print_report+0x118/0x5d0 [ 33.945605] kasan_report+0xdc/0x128 [ 33.945897] kasan_check_range+0x100/0x1a8 [ 33.946002] __kasan_check_write+0x20/0x30 [ 33.946051] kasan_atomics_helper+0xe44/0x4858 [ 33.946320] kasan_atomics+0x198/0x2e0 [ 33.946378] kunit_try_run_case+0x170/0x3f0 [ 33.946429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.946485] kthread+0x328/0x630 [ 33.946532] ret_from_fork+0x10/0x20 [ 33.946581] [ 33.946623] Allocated by task 296: [ 33.946761] kasan_save_stack+0x3c/0x68 [ 33.946807] kasan_save_track+0x20/0x40 [ 33.946855] kasan_save_alloc_info+0x40/0x58 [ 33.946895] __kasan_kmalloc+0xd4/0xd8 [ 33.946970] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.947130] kasan_atomics+0xb8/0x2e0 [ 33.947171] kunit_try_run_case+0x170/0x3f0 [ 33.947545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.947612] kthread+0x328/0x630 [ 33.947819] ret_from_fork+0x10/0x20 [ 33.947863] [ 33.948183] The buggy address belongs to the object at fff00000c9a67800 [ 33.948183] which belongs to the cache kmalloc-64 of size 64 [ 33.948424] The buggy address is located 0 bytes to the right of [ 33.948424] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.948972] [ 33.949140] The buggy address belongs to the physical page: [ 33.949223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.949373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.949423] page_type: f5(slab) [ 33.949462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.949521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.949669] page dumped because: kasan: bad access detected [ 33.949706] [ 33.949729] Memory state around the buggy address: [ 33.949767] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.949823] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.949868] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.949908] ^ [ 33.949974] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.950017] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.950057] ================================================================== [ 33.893760] ================================================================== [ 33.893815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.893937] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.893998] [ 33.894230] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.894533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.894700] Hardware name: linux,dummy-virt (DT) [ 33.894848] Call trace: [ 33.895048] show_stack+0x20/0x38 (C) [ 33.895127] dump_stack_lvl+0x8c/0xd0 [ 33.895603] print_report+0x118/0x5d0 [ 33.895800] kasan_report+0xdc/0x128 [ 33.896108] __asan_report_load4_noabort+0x20/0x30 [ 33.896237] kasan_atomics_helper+0x3dd8/0x4858 [ 33.896404] kasan_atomics+0x198/0x2e0 [ 33.896461] kunit_try_run_case+0x170/0x3f0 [ 33.896657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.897014] kthread+0x328/0x630 [ 33.897100] ret_from_fork+0x10/0x20 [ 33.897386] [ 33.897409] Allocated by task 296: [ 33.897489] kasan_save_stack+0x3c/0x68 [ 33.897536] kasan_save_track+0x20/0x40 [ 33.897760] kasan_save_alloc_info+0x40/0x58 [ 33.897817] __kasan_kmalloc+0xd4/0xd8 [ 33.898097] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.898275] kasan_atomics+0xb8/0x2e0 [ 33.898339] kunit_try_run_case+0x170/0x3f0 [ 33.898478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.898528] kthread+0x328/0x630 [ 33.898565] ret_from_fork+0x10/0x20 [ 33.898604] [ 33.898628] The buggy address belongs to the object at fff00000c9a67800 [ 33.898628] which belongs to the cache kmalloc-64 of size 64 [ 33.899284] The buggy address is located 0 bytes to the right of [ 33.899284] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.899602] [ 33.899626] The buggy address belongs to the physical page: [ 33.899660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.900268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.900476] page_type: f5(slab) [ 33.900631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.900930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.900977] page dumped because: kasan: bad access detected [ 33.901011] [ 33.901031] Memory state around the buggy address: [ 33.901065] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.901109] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.901155] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.901195] ^ [ 33.901656] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.901723] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.901778] ================================================================== [ 34.151067] ================================================================== [ 34.151119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 34.151171] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.151239] [ 34.151271] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.151358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.151386] Hardware name: linux,dummy-virt (DT) [ 34.151419] Call trace: [ 34.151444] show_stack+0x20/0x38 (C) [ 34.151493] dump_stack_lvl+0x8c/0xd0 [ 34.151540] print_report+0x118/0x5d0 [ 34.151588] kasan_report+0xdc/0x128 [ 34.151720] kasan_check_range+0x100/0x1a8 [ 34.151793] __kasan_check_write+0x20/0x30 [ 34.151839] kasan_atomics_helper+0x16d0/0x4858 [ 34.151889] kasan_atomics+0x198/0x2e0 [ 34.151937] kunit_try_run_case+0x170/0x3f0 [ 34.152031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.152195] kthread+0x328/0x630 [ 34.152264] ret_from_fork+0x10/0x20 [ 34.152352] [ 34.152372] Allocated by task 296: [ 34.152402] kasan_save_stack+0x3c/0x68 [ 34.152524] kasan_save_track+0x20/0x40 [ 34.152758] kasan_save_alloc_info+0x40/0x58 [ 34.152811] __kasan_kmalloc+0xd4/0xd8 [ 34.152954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.153010] kasan_atomics+0xb8/0x2e0 [ 34.153117] kunit_try_run_case+0x170/0x3f0 [ 34.153189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.153315] kthread+0x328/0x630 [ 34.153351] ret_from_fork+0x10/0x20 [ 34.153390] [ 34.153413] The buggy address belongs to the object at fff00000c9a67800 [ 34.153413] which belongs to the cache kmalloc-64 of size 64 [ 34.153520] The buggy address is located 0 bytes to the right of [ 34.153520] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.153657] [ 34.153681] The buggy address belongs to the physical page: [ 34.153713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.153768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.153817] page_type: f5(slab) [ 34.153855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.153935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.153977] page dumped because: kasan: bad access detected [ 34.154031] [ 34.154127] Memory state around the buggy address: [ 34.154300] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.154473] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.154524] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.154670] ^ [ 34.154760] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.154850] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.154892] ================================================================== [ 33.842478] ================================================================== [ 33.842549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.842604] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.842655] [ 33.842688] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.843075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.843111] Hardware name: linux,dummy-virt (DT) [ 33.843163] Call trace: [ 33.843189] show_stack+0x20/0x38 (C) [ 33.843257] dump_stack_lvl+0x8c/0xd0 [ 33.843448] print_report+0x118/0x5d0 [ 33.843526] kasan_report+0xdc/0x128 [ 33.843674] __asan_report_load4_noabort+0x20/0x30 [ 33.843733] kasan_atomics_helper+0x3dcc/0x4858 [ 33.843785] kasan_atomics+0x198/0x2e0 [ 33.844025] kunit_try_run_case+0x170/0x3f0 [ 33.844164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.844235] kthread+0x328/0x630 [ 33.844279] ret_from_fork+0x10/0x20 [ 33.844337] [ 33.844359] Allocated by task 296: [ 33.844388] kasan_save_stack+0x3c/0x68 [ 33.844431] kasan_save_track+0x20/0x40 [ 33.844472] kasan_save_alloc_info+0x40/0x58 [ 33.844512] __kasan_kmalloc+0xd4/0xd8 [ 33.844561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.844608] kasan_atomics+0xb8/0x2e0 [ 33.844656] kunit_try_run_case+0x170/0x3f0 [ 33.845063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.845190] kthread+0x328/0x630 [ 33.845280] ret_from_fork+0x10/0x20 [ 33.845348] [ 33.845410] The buggy address belongs to the object at fff00000c9a67800 [ 33.845410] which belongs to the cache kmalloc-64 of size 64 [ 33.845607] The buggy address is located 0 bytes to the right of [ 33.845607] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.845696] [ 33.845993] The buggy address belongs to the physical page: [ 33.846052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.846127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.846276] page_type: f5(slab) [ 33.846344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.846440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.846743] page dumped because: kasan: bad access detected [ 33.846878] [ 33.846922] Memory state around the buggy address: [ 33.846971] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.847043] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.847174] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.847257] ^ [ 33.847293] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.847338] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.847639] ================================================================== [ 34.155067] ================================================================== [ 34.155263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 34.155329] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.155381] [ 34.155419] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.155629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.155707] Hardware name: linux,dummy-virt (DT) [ 34.155740] Call trace: [ 34.155763] show_stack+0x20/0x38 (C) [ 34.155813] dump_stack_lvl+0x8c/0xd0 [ 34.155861] print_report+0x118/0x5d0 [ 34.155959] kasan_report+0xdc/0x128 [ 34.156071] __asan_report_load8_noabort+0x20/0x30 [ 34.156124] kasan_atomics_helper+0x3e10/0x4858 [ 34.156174] kasan_atomics+0x198/0x2e0 [ 34.156231] kunit_try_run_case+0x170/0x3f0 [ 34.156282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.156339] kthread+0x328/0x630 [ 34.156392] ret_from_fork+0x10/0x20 [ 34.156442] [ 34.156462] Allocated by task 296: [ 34.156627] kasan_save_stack+0x3c/0x68 [ 34.156726] kasan_save_track+0x20/0x40 [ 34.156770] kasan_save_alloc_info+0x40/0x58 [ 34.156845] __kasan_kmalloc+0xd4/0xd8 [ 34.156969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.157078] kasan_atomics+0xb8/0x2e0 [ 34.157189] kunit_try_run_case+0x170/0x3f0 [ 34.157260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.157307] kthread+0x328/0x630 [ 34.157365] ret_from_fork+0x10/0x20 [ 34.157404] [ 34.157427] The buggy address belongs to the object at fff00000c9a67800 [ 34.157427] which belongs to the cache kmalloc-64 of size 64 [ 34.157519] The buggy address is located 0 bytes to the right of [ 34.157519] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.157587] [ 34.157672] The buggy address belongs to the physical page: [ 34.157750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.157806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.157858] page_type: f5(slab) [ 34.157903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.158055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.158121] page dumped because: kasan: bad access detected [ 34.158155] [ 34.158174] Memory state around the buggy address: [ 34.158216] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.158267] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.158416] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.158458] ^ [ 34.158545] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.158717] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.158843] ================================================================== [ 33.824350] ================================================================== [ 33.824413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.824526] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.824715] [ 33.824875] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.824997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.825108] Hardware name: linux,dummy-virt (DT) [ 33.825169] Call trace: [ 33.825449] show_stack+0x20/0x38 (C) [ 33.825525] dump_stack_lvl+0x8c/0xd0 [ 33.825605] print_report+0x118/0x5d0 [ 33.825894] kasan_report+0xdc/0x128 [ 33.825989] kasan_check_range+0x100/0x1a8 [ 33.826165] __kasan_check_write+0x20/0x30 [ 33.826257] kasan_atomics_helper+0xa04/0x4858 [ 33.826354] kasan_atomics+0x198/0x2e0 [ 33.826477] kunit_try_run_case+0x170/0x3f0 [ 33.826567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.826661] kthread+0x328/0x630 [ 33.826790] ret_from_fork+0x10/0x20 [ 33.826879] [ 33.826983] Allocated by task 296: [ 33.827035] kasan_save_stack+0x3c/0x68 [ 33.827081] kasan_save_track+0x20/0x40 [ 33.827121] kasan_save_alloc_info+0x40/0x58 [ 33.827186] __kasan_kmalloc+0xd4/0xd8 [ 33.827480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.827557] kasan_atomics+0xb8/0x2e0 [ 33.827856] kunit_try_run_case+0x170/0x3f0 [ 33.827931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.828064] kthread+0x328/0x630 [ 33.828148] ret_from_fork+0x10/0x20 [ 33.828283] [ 33.828333] The buggy address belongs to the object at fff00000c9a67800 [ 33.828333] which belongs to the cache kmalloc-64 of size 64 [ 33.828447] The buggy address is located 0 bytes to the right of [ 33.828447] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.828669] [ 33.828697] The buggy address belongs to the physical page: [ 33.828731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.828925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.829005] page_type: f5(slab) [ 33.829128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.829257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.829338] page dumped because: kasan: bad access detected [ 33.829527] [ 33.829548] Memory state around the buggy address: [ 33.829631] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.829695] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.829817] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.829901] ^ [ 33.829939] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.829984] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.830262] ================================================================== [ 34.139108] ================================================================== [ 34.139157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 34.139223] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.140420] [ 34.140534] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.140657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.140751] Hardware name: linux,dummy-virt (DT) [ 34.140785] Call trace: [ 34.140809] show_stack+0x20/0x38 (C) [ 34.140861] dump_stack_lvl+0x8c/0xd0 [ 34.140910] print_report+0x118/0x5d0 [ 34.140958] kasan_report+0xdc/0x128 [ 34.141010] kasan_check_range+0x100/0x1a8 [ 34.141057] __kasan_check_write+0x20/0x30 [ 34.141104] kasan_atomics_helper+0x1644/0x4858 [ 34.141155] kasan_atomics+0x198/0x2e0 [ 34.141204] kunit_try_run_case+0x170/0x3f0 [ 34.141274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.141330] kthread+0x328/0x630 [ 34.141374] ret_from_fork+0x10/0x20 [ 34.141423] [ 34.141444] Allocated by task 296: [ 34.141474] kasan_save_stack+0x3c/0x68 [ 34.141518] kasan_save_track+0x20/0x40 [ 34.141559] kasan_save_alloc_info+0x40/0x58 [ 34.141599] __kasan_kmalloc+0xd4/0xd8 [ 34.141639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.141682] kasan_atomics+0xb8/0x2e0 [ 34.141720] kunit_try_run_case+0x170/0x3f0 [ 34.141763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.141811] kthread+0x328/0x630 [ 34.141845] ret_from_fork+0x10/0x20 [ 34.141883] [ 34.141905] The buggy address belongs to the object at fff00000c9a67800 [ 34.141905] which belongs to the cache kmalloc-64 of size 64 [ 34.141964] The buggy address is located 0 bytes to the right of [ 34.141964] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.142030] [ 34.142051] The buggy address belongs to the physical page: [ 34.142084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.142138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.143437] page_type: f5(slab) [ 34.143525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.143577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.143621] page dumped because: kasan: bad access detected [ 34.143874] [ 34.143901] Memory state around the buggy address: [ 34.144060] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.145534] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.145594] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.145635] ^ [ 34.145672] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.145717] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.145757] ================================================================== [ 34.163011] ================================================================== [ 34.163109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 34.163171] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.163232] [ 34.163262] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.163484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.163515] Hardware name: linux,dummy-virt (DT) [ 34.163548] Call trace: [ 34.163578] show_stack+0x20/0x38 (C) [ 34.163640] dump_stack_lvl+0x8c/0xd0 [ 34.163689] print_report+0x118/0x5d0 [ 34.163737] kasan_report+0xdc/0x128 [ 34.163787] __asan_report_load8_noabort+0x20/0x30 [ 34.164017] kasan_atomics_helper+0x3e20/0x4858 [ 34.164129] kasan_atomics+0x198/0x2e0 [ 34.164287] kunit_try_run_case+0x170/0x3f0 [ 34.164337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.164504] kthread+0x328/0x630 [ 34.164609] ret_from_fork+0x10/0x20 [ 34.164689] [ 34.164710] Allocated by task 296: [ 34.164872] kasan_save_stack+0x3c/0x68 [ 34.164919] kasan_save_track+0x20/0x40 [ 34.164999] kasan_save_alloc_info+0x40/0x58 [ 34.165041] __kasan_kmalloc+0xd4/0xd8 [ 34.165082] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.165124] kasan_atomics+0xb8/0x2e0 [ 34.165256] kunit_try_run_case+0x170/0x3f0 [ 34.165298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.165345] kthread+0x328/0x630 [ 34.165381] ret_from_fork+0x10/0x20 [ 34.165459] [ 34.165551] The buggy address belongs to the object at fff00000c9a67800 [ 34.165551] which belongs to the cache kmalloc-64 of size 64 [ 34.165728] The buggy address is located 0 bytes to the right of [ 34.165728] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.165823] [ 34.165921] The buggy address belongs to the physical page: [ 34.166255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.166402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.166623] page_type: f5(slab) [ 34.166766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.167097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.167144] page dumped because: kasan: bad access detected [ 34.167184] [ 34.167480] Memory state around the buggy address: [ 34.167693] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.168172] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.168850] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.168901] ^ [ 34.168939] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.168982] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.169419] ================================================================== [ 33.805753] ================================================================== [ 33.805894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.805952] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.806023] [ 33.806282] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.806427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.806456] Hardware name: linux,dummy-virt (DT) [ 33.806489] Call trace: [ 33.806530] show_stack+0x20/0x38 (C) [ 33.806584] dump_stack_lvl+0x8c/0xd0 [ 33.806641] print_report+0x118/0x5d0 [ 33.806925] kasan_report+0xdc/0x128 [ 33.807049] __asan_report_load4_noabort+0x20/0x30 [ 33.807104] kasan_atomics_helper+0x42d8/0x4858 [ 33.807156] kasan_atomics+0x198/0x2e0 [ 33.807425] kunit_try_run_case+0x170/0x3f0 [ 33.807537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.807629] kthread+0x328/0x630 [ 33.807677] ret_from_fork+0x10/0x20 [ 33.807746] [ 33.807991] Allocated by task 296: [ 33.808052] kasan_save_stack+0x3c/0x68 [ 33.808113] kasan_save_track+0x20/0x40 [ 33.808203] kasan_save_alloc_info+0x40/0x58 [ 33.808275] __kasan_kmalloc+0xd4/0xd8 [ 33.808383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.808441] kasan_atomics+0xb8/0x2e0 [ 33.808490] kunit_try_run_case+0x170/0x3f0 [ 33.808552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.808691] kthread+0x328/0x630 [ 33.808726] ret_from_fork+0x10/0x20 [ 33.809043] [ 33.809105] The buggy address belongs to the object at fff00000c9a67800 [ 33.809105] which belongs to the cache kmalloc-64 of size 64 [ 33.809263] The buggy address is located 0 bytes to the right of [ 33.809263] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.809416] [ 33.809439] The buggy address belongs to the physical page: [ 33.809578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.809726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.809850] page_type: f5(slab) [ 33.809918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.810045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.810089] page dumped because: kasan: bad access detected [ 33.810330] [ 33.810424] Memory state around the buggy address: [ 33.810459] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.810717] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.810841] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.810902] ^ [ 33.810973] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.811083] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.811143] ================================================================== [ 34.069856] ================================================================== [ 34.069909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 34.069962] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.071565] [ 34.071692] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.071785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.071813] Hardware name: linux,dummy-virt (DT) [ 34.072956] Call trace: [ 34.073077] show_stack+0x20/0x38 (C) [ 34.074116] dump_stack_lvl+0x8c/0xd0 [ 34.074339] print_report+0x118/0x5d0 [ 34.074866] kasan_report+0xdc/0x128 [ 34.075013] kasan_check_range+0x100/0x1a8 [ 34.075199] __kasan_check_write+0x20/0x30 [ 34.075519] kasan_atomics_helper+0x14e4/0x4858 [ 34.075577] kasan_atomics+0x198/0x2e0 [ 34.076204] kunit_try_run_case+0x170/0x3f0 [ 34.076276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.076334] kthread+0x328/0x630 [ 34.076379] ret_from_fork+0x10/0x20 [ 34.077246] [ 34.077875] Allocated by task 296: [ 34.077928] kasan_save_stack+0x3c/0x68 [ 34.078414] kasan_save_track+0x20/0x40 [ 34.079204] kasan_save_alloc_info+0x40/0x58 [ 34.079347] __kasan_kmalloc+0xd4/0xd8 [ 34.079700] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.079805] kasan_atomics+0xb8/0x2e0 [ 34.080034] kunit_try_run_case+0x170/0x3f0 [ 34.080078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.080126] kthread+0x328/0x630 [ 34.080899] ret_from_fork+0x10/0x20 [ 34.081314] [ 34.081781] The buggy address belongs to the object at fff00000c9a67800 [ 34.081781] which belongs to the cache kmalloc-64 of size 64 [ 34.082634] The buggy address is located 0 bytes to the right of [ 34.082634] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.083570] [ 34.083757] The buggy address belongs to the physical page: [ 34.083848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.084044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.084605] page_type: f5(slab) [ 34.085074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.085404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.085481] page dumped because: kasan: bad access detected [ 34.085515] [ 34.085938] Memory state around the buggy address: [ 34.086218] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.086888] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.086939] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.086980] ^ [ 34.087017] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.087712] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.088251] ================================================================== [ 33.748379] ================================================================== [ 33.748431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 33.748647] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.748851] [ 33.748907] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.749075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.749134] Hardware name: linux,dummy-virt (DT) [ 33.749190] Call trace: [ 33.749330] show_stack+0x20/0x38 (C) [ 33.749390] dump_stack_lvl+0x8c/0xd0 [ 33.749524] print_report+0x118/0x5d0 [ 33.749580] kasan_report+0xdc/0x128 [ 33.749687] kasan_check_range+0x100/0x1a8 [ 33.749769] __kasan_check_write+0x20/0x30 [ 33.749970] kasan_atomics_helper+0x414/0x4858 [ 33.750116] kasan_atomics+0x198/0x2e0 [ 33.750186] kunit_try_run_case+0x170/0x3f0 [ 33.750314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.750404] kthread+0x328/0x630 [ 33.750456] ret_from_fork+0x10/0x20 [ 33.750700] [ 33.750754] Allocated by task 296: [ 33.750785] kasan_save_stack+0x3c/0x68 [ 33.750929] kasan_save_track+0x20/0x40 [ 33.751013] kasan_save_alloc_info+0x40/0x58 [ 33.751063] __kasan_kmalloc+0xd4/0xd8 [ 33.751104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.751194] kunit_try_run_case+0x170/0x3f0 [ 33.751246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.751293] kthread+0x328/0x630 [ 33.751344] ret_from_fork+0x10/0x20 [ 33.751390] [ 33.751480] The buggy address is located 0 bytes to the right of [ 33.751480] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.751716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.751765] page_type: f5(slab) [ 33.751806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.752087] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.752163] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.752205] ^ [ 33.752252] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.752294] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.752724] ================================================================== [ 34.048498] ================================================================== [ 34.048621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 34.048937] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.049524] [ 34.050160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.050295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.051170] Hardware name: linux,dummy-virt (DT) [ 34.051502] Call trace: [ 34.051696] show_stack+0x20/0x38 (C) [ 34.051784] dump_stack_lvl+0x8c/0xd0 [ 34.051834] print_report+0x118/0x5d0 [ 34.052725] kasan_report+0xdc/0x128 [ 34.053288] kasan_check_range+0x100/0x1a8 [ 34.053823] __kasan_check_write+0x20/0x30 [ 34.054187] kasan_atomics_helper+0x147c/0x4858 [ 34.054822] kasan_atomics+0x198/0x2e0 [ 34.055335] kunit_try_run_case+0x170/0x3f0 [ 34.055878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.056753] kthread+0x328/0x630 [ 34.056820] ret_from_fork+0x10/0x20 [ 34.057930] [ 34.058044] Allocated by task 296: [ 34.058123] kasan_save_stack+0x3c/0x68 [ 34.058303] kasan_save_track+0x20/0x40 [ 34.058348] kasan_save_alloc_info+0x40/0x58 [ 34.058695] __kasan_kmalloc+0xd4/0xd8 [ 34.059131] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.059407] kasan_atomics+0xb8/0x2e0 [ 34.059848] kunit_try_run_case+0x170/0x3f0 [ 34.060873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.060975] kthread+0x328/0x630 [ 34.061010] ret_from_fork+0x10/0x20 [ 34.061050] [ 34.061587] The buggy address belongs to the object at fff00000c9a67800 [ 34.061587] which belongs to the cache kmalloc-64 of size 64 [ 34.062106] The buggy address is located 0 bytes to the right of [ 34.062106] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.062181] [ 34.062877] The buggy address belongs to the physical page: [ 34.063656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.064109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.064361] page_type: f5(slab) [ 34.064884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.065204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.065261] page dumped because: kasan: bad access detected [ 34.065294] [ 34.066054] Memory state around the buggy address: [ 34.066114] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.066394] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.067022] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.067131] ^ [ 34.067170] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.068039] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.068504] ================================================================== [ 33.759253] ================================================================== [ 33.759322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 33.759376] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.759446] [ 33.759690] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.759796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.759824] Hardware name: linux,dummy-virt (DT) [ 33.759867] Call trace: [ 33.759936] show_stack+0x20/0x38 (C) [ 33.759992] dump_stack_lvl+0x8c/0xd0 [ 33.760042] print_report+0x118/0x5d0 [ 33.760153] kasan_report+0xdc/0x128 [ 33.760218] kasan_check_range+0x100/0x1a8 [ 33.760277] __kasan_check_write+0x20/0x30 [ 33.760345] kasan_atomics_helper+0x4e4/0x4858 [ 33.760414] kasan_atomics+0x198/0x2e0 [ 33.760619] kunit_try_run_case+0x170/0x3f0 [ 33.760808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.760898] kthread+0x328/0x630 [ 33.761041] ret_from_fork+0x10/0x20 [ 33.761121] [ 33.761291] Allocated by task 296: [ 33.761558] kasan_save_track+0x20/0x40 [ 33.762041] kunit_try_run_case+0x170/0x3f0 [ 33.762443] [ 33.762972] The buggy address belongs to the physical page: [ 33.763473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.763701] Memory state around the buggy address: [ 33.764165] ^ [ 33.764392] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.765563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 33.765970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.766063] show_stack+0x20/0x38 (C) [ 33.766222] print_report+0x118/0x5d0 [ 33.766378] __kasan_check_write+0x20/0x30 [ 33.766479] kasan_atomics+0x198/0x2e0 [ 33.766638] kthread+0x328/0x630 [ 33.766793] kasan_save_stack+0x3c/0x68 [ 33.767137] kthread+0x328/0x630 [ 33.767440] The buggy address is located 0 bytes to the right of [ 33.767440] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.769327] ================================================================== [ 34.010112] ================================================================== [ 34.010164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 34.010230] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.010281] [ 34.010310] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.010396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.010425] Hardware name: linux,dummy-virt (DT) [ 34.010458] Call trace: [ 34.010481] show_stack+0x20/0x38 (C) [ 34.010528] dump_stack_lvl+0x8c/0xd0 [ 34.010577] print_report+0x118/0x5d0 [ 34.010624] kasan_report+0xdc/0x128 [ 34.010674] kasan_check_range+0x100/0x1a8 [ 34.010721] __kasan_check_write+0x20/0x30 [ 34.010786] kasan_atomics_helper+0x11f8/0x4858 [ 34.010838] kasan_atomics+0x198/0x2e0 [ 34.010892] kunit_try_run_case+0x170/0x3f0 [ 34.011053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.011109] kthread+0x328/0x630 [ 34.011245] ret_from_fork+0x10/0x20 [ 34.011301] [ 34.011385] Allocated by task 296: [ 34.011488] kasan_save_stack+0x3c/0x68 [ 34.011533] kasan_save_track+0x20/0x40 [ 34.011580] kasan_save_alloc_info+0x40/0x58 [ 34.011665] __kasan_kmalloc+0xd4/0xd8 [ 34.011721] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.011891] kasan_atomics+0xb8/0x2e0 [ 34.011930] kunit_try_run_case+0x170/0x3f0 [ 34.011972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.012020] kthread+0x328/0x630 [ 34.012060] ret_from_fork+0x10/0x20 [ 34.012579] [ 34.012627] The buggy address belongs to the object at fff00000c9a67800 [ 34.012627] which belongs to the cache kmalloc-64 of size 64 [ 34.012692] The buggy address is located 0 bytes to the right of [ 34.012692] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.012758] [ 34.012780] The buggy address belongs to the physical page: [ 34.012814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.012868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.013828] page_type: f5(slab) [ 34.013947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.013997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.014050] page dumped because: kasan: bad access detected [ 34.014184] [ 34.014642] Memory state around the buggy address: [ 34.014695] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.014742] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.014787] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.014838] ^ [ 34.014976] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.015133] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.015173] ================================================================== [ 33.753536] ================================================================== [ 33.753590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 33.753702] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.753760] [ 33.753791] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.754055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.754098] Hardware name: linux,dummy-virt (DT) [ 33.754199] Call trace: [ 33.754239] show_stack+0x20/0x38 (C) [ 33.754311] dump_stack_lvl+0x8c/0xd0 [ 33.754539] print_report+0x118/0x5d0 [ 33.754611] kasan_report+0xdc/0x128 [ 33.754696] kasan_check_range+0x100/0x1a8 [ 33.754755] __kasan_check_write+0x20/0x30 [ 33.754812] kasan_atomics_helper+0x47c/0x4858 [ 33.754916] kasan_atomics+0x198/0x2e0 [ 33.755186] kunit_try_run_case+0x170/0x3f0 [ 33.755302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.755382] kthread+0x328/0x630 [ 33.755428] ret_from_fork+0x10/0x20 [ 33.755483] [ 33.755543] Allocated by task 296: [ 33.755583] kasan_save_stack+0x3c/0x68 [ 33.755629] kasan_save_track+0x20/0x40 [ 33.755678] kasan_save_alloc_info+0x40/0x58 [ 33.755773] __kasan_kmalloc+0xd4/0xd8 [ 33.755815] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.755857] kasan_atomics+0xb8/0x2e0 [ 33.756109] kunit_try_run_case+0x170/0x3f0 [ 33.756181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.756252] kthread+0x328/0x630 [ 33.756289] ret_from_fork+0x10/0x20 [ 33.756399] [ 33.756424] The buggy address belongs to the object at fff00000c9a67800 [ 33.756424] which belongs to the cache kmalloc-64 of size 64 [ 33.756485] The buggy address is located 0 bytes to the right of [ 33.756485] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.756821] The buggy address belongs to the physical page: [ 33.757081] page_type: f5(slab) [ 33.757121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.757174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.757548] [ 33.757569] Memory state around the buggy address: [ 33.757969] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.758119] ^ [ 33.758263] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.758335] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.758443] ================================================================== [ 34.020815] ================================================================== [ 34.021031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 34.021149] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.021324] [ 34.021390] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.021477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.021512] Hardware name: linux,dummy-virt (DT) [ 34.021648] Call trace: [ 34.021672] show_stack+0x20/0x38 (C) [ 34.021740] dump_stack_lvl+0x8c/0xd0 [ 34.021790] print_report+0x118/0x5d0 [ 34.021843] kasan_report+0xdc/0x128 [ 34.022053] kasan_check_range+0x100/0x1a8 [ 34.022152] __kasan_check_write+0x20/0x30 [ 34.022197] kasan_atomics_helper+0x12d8/0x4858 [ 34.022261] kasan_atomics+0x198/0x2e0 [ 34.022310] kunit_try_run_case+0x170/0x3f0 [ 34.022361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.022423] kthread+0x328/0x630 [ 34.022496] ret_from_fork+0x10/0x20 [ 34.022586] [ 34.022607] Allocated by task 296: [ 34.022639] kasan_save_stack+0x3c/0x68 [ 34.022684] kasan_save_track+0x20/0x40 [ 34.022725] kasan_save_alloc_info+0x40/0x58 [ 34.022765] __kasan_kmalloc+0xd4/0xd8 [ 34.022811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.022978] kasan_atomics+0xb8/0x2e0 [ 34.023045] kunit_try_run_case+0x170/0x3f0 [ 34.023118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.023804] kthread+0x328/0x630 [ 34.024074] ret_from_fork+0x10/0x20 [ 34.024139] [ 34.024163] The buggy address belongs to the object at fff00000c9a67800 [ 34.024163] which belongs to the cache kmalloc-64 of size 64 [ 34.024234] The buggy address is located 0 bytes to the right of [ 34.024234] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.024300] [ 34.024322] The buggy address belongs to the physical page: [ 34.024355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.024409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.024805] page_type: f5(slab) [ 34.025176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.025237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.025279] page dumped because: kasan: bad access detected [ 34.025314] [ 34.025451] Memory state around the buggy address: [ 34.025489] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.025534] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.025748] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.025888] ^ [ 34.026325] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.026422] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.026462] ================================================================== [ 33.926375] ================================================================== [ 33.926430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.926983] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.927522] [ 33.927561] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.927786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.928343] Hardware name: linux,dummy-virt (DT) [ 33.928466] Call trace: [ 33.928667] show_stack+0x20/0x38 (C) [ 33.929001] dump_stack_lvl+0x8c/0xd0 [ 33.929252] print_report+0x118/0x5d0 [ 33.929469] kasan_report+0xdc/0x128 [ 33.929652] kasan_check_range+0x100/0x1a8 [ 33.929754] __kasan_check_read+0x20/0x30 [ 33.930098] kasan_atomics_helper+0xdd4/0x4858 [ 33.930234] kasan_atomics+0x198/0x2e0 [ 33.930559] kunit_try_run_case+0x170/0x3f0 [ 33.930612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.930669] kthread+0x328/0x630 [ 33.931306] ret_from_fork+0x10/0x20 [ 33.931463] [ 33.931487] Allocated by task 296: [ 33.931519] kasan_save_stack+0x3c/0x68 [ 33.931712] kasan_save_track+0x20/0x40 [ 33.931758] kasan_save_alloc_info+0x40/0x58 [ 33.931805] __kasan_kmalloc+0xd4/0xd8 [ 33.931845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.932291] kasan_atomics+0xb8/0x2e0 [ 33.932570] kunit_try_run_case+0x170/0x3f0 [ 33.933034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.933255] kthread+0x328/0x630 [ 33.933304] ret_from_fork+0x10/0x20 [ 33.933390] [ 33.933436] The buggy address belongs to the object at fff00000c9a67800 [ 33.933436] which belongs to the cache kmalloc-64 of size 64 [ 33.933763] The buggy address is located 0 bytes to the right of [ 33.933763] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.934236] [ 33.934265] The buggy address belongs to the physical page: [ 33.934562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.934621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.934985] page_type: f5(slab) [ 33.935363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.935658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.935775] page dumped because: kasan: bad access detected [ 33.935816] [ 33.936002] Memory state around the buggy address: [ 33.936314] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.936507] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.936629] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.936816] ^ [ 33.936955] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.937033] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.937075] ================================================================== [ 34.026886] ================================================================== [ 34.026936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 34.026987] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.027038] [ 34.027070] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.027155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.027184] Hardware name: linux,dummy-virt (DT) [ 34.027241] Call trace: [ 34.027266] show_stack+0x20/0x38 (C) [ 34.027315] dump_stack_lvl+0x8c/0xd0 [ 34.027364] print_report+0x118/0x5d0 [ 34.027824] kasan_report+0xdc/0x128 [ 34.027946] kasan_check_range+0x100/0x1a8 [ 34.027992] __kasan_check_write+0x20/0x30 [ 34.028038] kasan_atomics_helper+0x1384/0x4858 [ 34.028089] kasan_atomics+0x198/0x2e0 [ 34.028521] kunit_try_run_case+0x170/0x3f0 [ 34.028702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.028759] kthread+0x328/0x630 [ 34.029159] ret_from_fork+0x10/0x20 [ 34.029247] [ 34.029268] Allocated by task 296: [ 34.029299] kasan_save_stack+0x3c/0x68 [ 34.029344] kasan_save_track+0x20/0x40 [ 34.029453] kasan_save_alloc_info+0x40/0x58 [ 34.029607] __kasan_kmalloc+0xd4/0xd8 [ 34.029648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.029690] kasan_atomics+0xb8/0x2e0 [ 34.029731] kunit_try_run_case+0x170/0x3f0 [ 34.029777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.029827] kthread+0x328/0x630 [ 34.029861] ret_from_fork+0x10/0x20 [ 34.029901] [ 34.029925] The buggy address belongs to the object at fff00000c9a67800 [ 34.029925] which belongs to the cache kmalloc-64 of size 64 [ 34.029984] The buggy address is located 0 bytes to the right of [ 34.029984] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.030090] [ 34.030159] The buggy address belongs to the physical page: [ 34.030191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.030254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.030303] page_type: f5(slab) [ 34.030341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.030678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.030972] page dumped because: kasan: bad access detected [ 34.031011] [ 34.031034] Memory state around the buggy address: [ 34.031066] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.031169] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.031463] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.031566] ^ [ 34.031882] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.031937] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.032099] ================================================================== [ 33.818849] ================================================================== [ 33.819200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.819339] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.819402] [ 33.819484] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.819573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.819610] Hardware name: linux,dummy-virt (DT) [ 33.819644] Call trace: [ 33.819669] show_stack+0x20/0x38 (C) [ 33.819719] dump_stack_lvl+0x8c/0xd0 [ 33.819768] print_report+0x118/0x5d0 [ 33.819816] kasan_report+0xdc/0x128 [ 33.819864] kasan_check_range+0x100/0x1a8 [ 33.819910] __kasan_check_write+0x20/0x30 [ 33.819957] kasan_atomics_helper+0x99c/0x4858 [ 33.820008] kasan_atomics+0x198/0x2e0 [ 33.820054] kunit_try_run_case+0x170/0x3f0 [ 33.820104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.820158] kthread+0x328/0x630 [ 33.820201] ret_from_fork+0x10/0x20 [ 33.820260] [ 33.820283] Allocated by task 296: [ 33.820311] kasan_save_stack+0x3c/0x68 [ 33.820355] kasan_save_track+0x20/0x40 [ 33.820405] kasan_save_alloc_info+0x40/0x58 [ 33.820445] __kasan_kmalloc+0xd4/0xd8 [ 33.820490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.820533] kasan_atomics+0xb8/0x2e0 [ 33.820973] kunit_try_run_case+0x170/0x3f0 [ 33.821019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.821096] kthread+0x328/0x630 [ 33.821133] ret_from_fork+0x10/0x20 [ 33.821429] [ 33.821485] The buggy address belongs to the object at fff00000c9a67800 [ 33.821485] which belongs to the cache kmalloc-64 of size 64 [ 33.821627] The buggy address is located 0 bytes to the right of [ 33.821627] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.821725] [ 33.821969] The buggy address belongs to the physical page: [ 33.822031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.822107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.822262] page_type: f5(slab) [ 33.822317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.822370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.822657] page dumped because: kasan: bad access detected [ 33.822734] [ 33.822782] Memory state around the buggy address: [ 33.822891] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.823129] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.823217] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.823330] ^ [ 33.823386] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.823441] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.823703] ================================================================== [ 33.985065] ================================================================== [ 33.985134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.985191] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.985406] [ 33.985445] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.985604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.985713] Hardware name: linux,dummy-virt (DT) [ 33.985753] Call trace: [ 33.985806] show_stack+0x20/0x38 (C) [ 33.985856] dump_stack_lvl+0x8c/0xd0 [ 33.985949] print_report+0x118/0x5d0 [ 33.986057] kasan_report+0xdc/0x128 [ 33.986165] kasan_check_range+0x100/0x1a8 [ 33.986228] __kasan_check_write+0x20/0x30 [ 33.986417] kasan_atomics_helper+0x1058/0x4858 [ 33.986522] kasan_atomics+0x198/0x2e0 [ 33.986647] kunit_try_run_case+0x170/0x3f0 [ 33.986703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.986906] kthread+0x328/0x630 [ 33.986957] ret_from_fork+0x10/0x20 [ 33.987005] [ 33.987025] Allocated by task 296: [ 33.987054] kasan_save_stack+0x3c/0x68 [ 33.987103] kasan_save_track+0x20/0x40 [ 33.987229] kasan_save_alloc_info+0x40/0x58 [ 33.987269] __kasan_kmalloc+0xd4/0xd8 [ 33.987310] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.987376] kasan_atomics+0xb8/0x2e0 [ 33.987417] kunit_try_run_case+0x170/0x3f0 [ 33.987834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.988095] kthread+0x328/0x630 [ 33.988139] ret_from_fork+0x10/0x20 [ 33.988178] [ 33.988200] The buggy address belongs to the object at fff00000c9a67800 [ 33.988200] which belongs to the cache kmalloc-64 of size 64 [ 33.988712] The buggy address is located 0 bytes to the right of [ 33.988712] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.989217] [ 33.989246] The buggy address belongs to the physical page: [ 33.989280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.989334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.989384] page_type: f5(slab) [ 33.989424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.989477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.989675] page dumped because: kasan: bad access detected [ 33.989835] [ 33.989880] Memory state around the buggy address: [ 33.989916] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.989962] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.990160] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.990291] ^ [ 33.990501] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.990557] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.990631] ================================================================== [ 33.937967] ================================================================== [ 33.938019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.938082] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.938337] [ 33.938372] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.938462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.938492] Hardware name: linux,dummy-virt (DT) [ 33.938533] Call trace: [ 33.938632] show_stack+0x20/0x38 (C) [ 33.938790] dump_stack_lvl+0x8c/0xd0 [ 33.938840] print_report+0x118/0x5d0 [ 33.939007] kasan_report+0xdc/0x128 [ 33.939056] __asan_report_load8_noabort+0x20/0x30 [ 33.939110] kasan_atomics_helper+0x3f58/0x4858 [ 33.939162] kasan_atomics+0x198/0x2e0 [ 33.939704] kunit_try_run_case+0x170/0x3f0 [ 33.939901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.939992] kthread+0x328/0x630 [ 33.940156] ret_from_fork+0x10/0x20 [ 33.940511] [ 33.940537] Allocated by task 296: [ 33.940569] kasan_save_stack+0x3c/0x68 [ 33.940624] kasan_save_track+0x20/0x40 [ 33.941027] kasan_save_alloc_info+0x40/0x58 [ 33.941074] __kasan_kmalloc+0xd4/0xd8 [ 33.941113] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.941155] kasan_atomics+0xb8/0x2e0 [ 33.941493] kunit_try_run_case+0x170/0x3f0 [ 33.941811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.941891] kthread+0x328/0x630 [ 33.941928] ret_from_fork+0x10/0x20 [ 33.941966] [ 33.941988] The buggy address belongs to the object at fff00000c9a67800 [ 33.941988] which belongs to the cache kmalloc-64 of size 64 [ 33.942218] The buggy address is located 0 bytes to the right of [ 33.942218] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.942748] [ 33.942776] The buggy address belongs to the physical page: [ 33.942843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.942927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.942978] page_type: f5(slab) [ 33.943174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.943509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.943558] page dumped because: kasan: bad access detected [ 33.943605] [ 33.943625] Memory state around the buggy address: [ 33.943688] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.943738] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.943783] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.943825] ^ [ 33.943860] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.943937] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.943995] ==================================================================
[ 27.479957] ================================================================== [ 27.480210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 27.480566] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.480938] [ 27.481056] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.481111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.481125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.481150] Call Trace: [ 27.481169] <TASK> [ 27.481199] dump_stack_lvl+0x73/0xb0 [ 27.481230] print_report+0xd1/0x610 [ 27.481264] ? __virt_addr_valid+0x1db/0x2d0 [ 27.481290] ? kasan_atomics_helper+0x224c/0x5450 [ 27.481321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.481351] ? kasan_atomics_helper+0x224c/0x5450 [ 27.481381] kasan_report+0x141/0x180 [ 27.481406] ? kasan_atomics_helper+0x224c/0x5450 [ 27.481440] kasan_check_range+0x10c/0x1c0 [ 27.481467] __kasan_check_write+0x18/0x20 [ 27.481495] kasan_atomics_helper+0x224c/0x5450 [ 27.481526] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.481557] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.481585] ? kasan_atomics+0x152/0x310 [ 27.481614] kasan_atomics+0x1dc/0x310 [ 27.481641] ? __pfx_kasan_atomics+0x10/0x10 [ 27.481669] ? __pfx_read_tsc+0x10/0x10 [ 27.481695] ? ktime_get_ts64+0x86/0x230 [ 27.481723] kunit_try_run_case+0x1a5/0x480 [ 27.481747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.481770] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.481794] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.481825] ? __kthread_parkme+0x82/0x180 [ 27.481847] ? preempt_count_sub+0x50/0x80 [ 27.481873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.481897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.481936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.481964] kthread+0x337/0x6f0 [ 27.481987] ? trace_preempt_on+0x20/0xc0 [ 27.482014] ? __pfx_kthread+0x10/0x10 [ 27.482038] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.482068] ? calculate_sigpending+0x7b/0xa0 [ 27.482097] ? __pfx_kthread+0x10/0x10 [ 27.482122] ret_from_fork+0x116/0x1d0 [ 27.482144] ? __pfx_kthread+0x10/0x10 [ 27.482167] ret_from_fork_asm+0x1a/0x30 [ 27.482203] </TASK> [ 27.482215] [ 27.489234] Allocated by task 313: [ 27.489372] kasan_save_stack+0x45/0x70 [ 27.489510] kasan_save_track+0x18/0x40 [ 27.489686] kasan_save_alloc_info+0x3b/0x50 [ 27.489887] __kasan_kmalloc+0xb7/0xc0 [ 27.490065] __kmalloc_cache_noprof+0x189/0x420 [ 27.490292] kasan_atomics+0x95/0x310 [ 27.490466] kunit_try_run_case+0x1a5/0x480 [ 27.490609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.490785] kthread+0x337/0x6f0 [ 27.490902] ret_from_fork+0x116/0x1d0 [ 27.491097] ret_from_fork_asm+0x1a/0x30 [ 27.491299] [ 27.491392] The buggy address belongs to the object at ffff8881059cb500 [ 27.491392] which belongs to the cache kmalloc-64 of size 64 [ 27.492064] The buggy address is located 0 bytes to the right of [ 27.492064] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.492599] [ 27.492667] The buggy address belongs to the physical page: [ 27.492874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.493230] flags: 0x200000000000000(node=0|zone=2) [ 27.493481] page_type: f5(slab) [ 27.493631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.493857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.494404] page dumped because: kasan: bad access detected [ 27.494643] [ 27.494721] Memory state around the buggy address: [ 27.494914] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.495125] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.495348] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.495558] ^ [ 27.495949] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.496267] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.496573] ================================================================== [ 26.458946] ================================================================== [ 26.459264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 26.459536] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.459759] [ 26.459987] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.460043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.460057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.460081] Call Trace: [ 26.460102] <TASK> [ 26.460123] dump_stack_lvl+0x73/0xb0 [ 26.460155] print_report+0xd1/0x610 [ 26.460180] ? __virt_addr_valid+0x1db/0x2d0 [ 26.460207] ? kasan_atomics_helper+0xe78/0x5450 [ 26.460251] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.460282] ? kasan_atomics_helper+0xe78/0x5450 [ 26.460313] kasan_report+0x141/0x180 [ 26.460338] ? kasan_atomics_helper+0xe78/0x5450 [ 26.460373] kasan_check_range+0x10c/0x1c0 [ 26.460401] __kasan_check_write+0x18/0x20 [ 26.460429] kasan_atomics_helper+0xe78/0x5450 [ 26.460461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.460492] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.460520] ? kasan_atomics+0x152/0x310 [ 26.460551] kasan_atomics+0x1dc/0x310 [ 26.460577] ? __pfx_kasan_atomics+0x10/0x10 [ 26.460605] ? __pfx_read_tsc+0x10/0x10 [ 26.460633] ? ktime_get_ts64+0x86/0x230 [ 26.460662] kunit_try_run_case+0x1a5/0x480 [ 26.460686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.460708] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.460732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.460776] ? __kthread_parkme+0x82/0x180 [ 26.460799] ? preempt_count_sub+0x50/0x80 [ 26.460864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.460892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.460921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.460950] kthread+0x337/0x6f0 [ 26.460974] ? trace_preempt_on+0x20/0xc0 [ 26.461001] ? __pfx_kthread+0x10/0x10 [ 26.461025] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.461054] ? calculate_sigpending+0x7b/0xa0 [ 26.461083] ? __pfx_kthread+0x10/0x10 [ 26.461108] ret_from_fork+0x116/0x1d0 [ 26.461129] ? __pfx_kthread+0x10/0x10 [ 26.461153] ret_from_fork_asm+0x1a/0x30 [ 26.461189] </TASK> [ 26.461209] [ 26.476023] Allocated by task 313: [ 26.476335] kasan_save_stack+0x45/0x70 [ 26.476493] kasan_save_track+0x18/0x40 [ 26.476626] kasan_save_alloc_info+0x3b/0x50 [ 26.476875] __kasan_kmalloc+0xb7/0xc0 [ 26.477267] __kmalloc_cache_noprof+0x189/0x420 [ 26.477863] kasan_atomics+0x95/0x310 [ 26.478218] kunit_try_run_case+0x1a5/0x480 [ 26.478607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.479189] kthread+0x337/0x6f0 [ 26.479523] ret_from_fork+0x116/0x1d0 [ 26.479934] ret_from_fork_asm+0x1a/0x30 [ 26.480079] [ 26.480147] The buggy address belongs to the object at ffff8881059cb500 [ 26.480147] which belongs to the cache kmalloc-64 of size 64 [ 26.480511] The buggy address is located 0 bytes to the right of [ 26.480511] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.480885] [ 26.481028] The buggy address belongs to the physical page: [ 26.481351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.481659] flags: 0x200000000000000(node=0|zone=2) [ 26.481872] page_type: f5(slab) [ 26.481992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.482366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.482777] page dumped because: kasan: bad access detected [ 26.483031] [ 26.483097] Memory state around the buggy address: [ 26.483379] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.484209] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.484624] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.485142] ^ [ 26.485477] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.485945] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.486279] ================================================================== [ 26.144753] ================================================================== [ 26.145042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 26.145350] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.145616] [ 26.145710] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.145761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.145776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.145801] Call Trace: [ 26.145823] <TASK> [ 26.145845] dump_stack_lvl+0x73/0xb0 [ 26.145877] print_report+0xd1/0x610 [ 26.145901] ? __virt_addr_valid+0x1db/0x2d0 [ 26.145926] ? kasan_atomics_helper+0x697/0x5450 [ 26.145955] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.145984] ? kasan_atomics_helper+0x697/0x5450 [ 26.146019] kasan_report+0x141/0x180 [ 26.146044] ? kasan_atomics_helper+0x697/0x5450 [ 26.146078] kasan_check_range+0x10c/0x1c0 [ 26.146104] __kasan_check_write+0x18/0x20 [ 26.146131] kasan_atomics_helper+0x697/0x5450 [ 26.146161] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.146192] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.146219] ? kasan_atomics+0x152/0x310 [ 26.146376] kasan_atomics+0x1dc/0x310 [ 26.146411] ? __pfx_kasan_atomics+0x10/0x10 [ 26.146482] ? __pfx_read_tsc+0x10/0x10 [ 26.146513] ? ktime_get_ts64+0x86/0x230 [ 26.146542] kunit_try_run_case+0x1a5/0x480 [ 26.146565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.146587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.146612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.146642] ? __kthread_parkme+0x82/0x180 [ 26.146665] ? preempt_count_sub+0x50/0x80 [ 26.146692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.146715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.147629] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.147676] kthread+0x337/0x6f0 [ 26.147703] ? trace_preempt_on+0x20/0xc0 [ 26.147733] ? __pfx_kthread+0x10/0x10 [ 26.148304] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.148335] ? calculate_sigpending+0x7b/0xa0 [ 26.148365] ? __pfx_kthread+0x10/0x10 [ 26.148390] ret_from_fork+0x116/0x1d0 [ 26.148412] ? __pfx_kthread+0x10/0x10 [ 26.148437] ret_from_fork_asm+0x1a/0x30 [ 26.148474] </TASK> [ 26.148487] [ 26.163165] Allocated by task 313: [ 26.163590] kasan_save_stack+0x45/0x70 [ 26.163922] kasan_save_track+0x18/0x40 [ 26.164323] kasan_save_alloc_info+0x3b/0x50 [ 26.164575] __kasan_kmalloc+0xb7/0xc0 [ 26.165009] __kmalloc_cache_noprof+0x189/0x420 [ 26.165383] kasan_atomics+0x95/0x310 [ 26.165528] kunit_try_run_case+0x1a5/0x480 [ 26.165671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.166358] kthread+0x337/0x6f0 [ 26.166714] ret_from_fork+0x116/0x1d0 [ 26.167167] ret_from_fork_asm+0x1a/0x30 [ 26.167557] [ 26.167714] The buggy address belongs to the object at ffff8881059cb500 [ 26.167714] which belongs to the cache kmalloc-64 of size 64 [ 26.168647] The buggy address is located 0 bytes to the right of [ 26.168647] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.169595] [ 26.169774] The buggy address belongs to the physical page: [ 26.170387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.171311] flags: 0x200000000000000(node=0|zone=2) [ 26.171672] page_type: f5(slab) [ 26.171933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.172703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.173432] page dumped because: kasan: bad access detected [ 26.173611] [ 26.173680] Memory state around the buggy address: [ 26.174076] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.174703] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.175442] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.176070] ^ [ 26.176250] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.176464] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.176670] ================================================================== [ 26.588298] ================================================================== [ 26.589157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 26.589433] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.589655] [ 26.589742] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.589797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.589837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.589861] Call Trace: [ 26.589882] <TASK> [ 26.589905] dump_stack_lvl+0x73/0xb0 [ 26.589939] print_report+0xd1/0x610 [ 26.590094] ? __virt_addr_valid+0x1db/0x2d0 [ 26.590122] ? kasan_atomics_helper+0x4a1c/0x5450 [ 26.590153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.590182] ? kasan_atomics_helper+0x4a1c/0x5450 [ 26.590212] kasan_report+0x141/0x180 [ 26.590246] ? kasan_atomics_helper+0x4a1c/0x5450 [ 26.590281] __asan_report_load4_noabort+0x18/0x20 [ 26.590309] kasan_atomics_helper+0x4a1c/0x5450 [ 26.590340] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.590371] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.590399] ? kasan_atomics+0x152/0x310 [ 26.590495] kasan_atomics+0x1dc/0x310 [ 26.590539] ? __pfx_kasan_atomics+0x10/0x10 [ 26.590566] ? __pfx_read_tsc+0x10/0x10 [ 26.590594] ? ktime_get_ts64+0x86/0x230 [ 26.590621] kunit_try_run_case+0x1a5/0x480 [ 26.590645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.590667] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.590691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.590722] ? __kthread_parkme+0x82/0x180 [ 26.590753] ? preempt_count_sub+0x50/0x80 [ 26.590780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.590805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.590834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.590863] kthread+0x337/0x6f0 [ 26.590886] ? trace_preempt_on+0x20/0xc0 [ 26.590913] ? __pfx_kthread+0x10/0x10 [ 26.590937] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.590966] ? calculate_sigpending+0x7b/0xa0 [ 26.590995] ? __pfx_kthread+0x10/0x10 [ 26.591019] ret_from_fork+0x116/0x1d0 [ 26.591040] ? __pfx_kthread+0x10/0x10 [ 26.591063] ret_from_fork_asm+0x1a/0x30 [ 26.591099] </TASK> [ 26.591112] [ 26.605943] Allocated by task 313: [ 26.606189] kasan_save_stack+0x45/0x70 [ 26.606602] kasan_save_track+0x18/0x40 [ 26.606932] kasan_save_alloc_info+0x3b/0x50 [ 26.607414] __kasan_kmalloc+0xb7/0xc0 [ 26.607581] __kmalloc_cache_noprof+0x189/0x420 [ 26.608187] kasan_atomics+0x95/0x310 [ 26.608486] kunit_try_run_case+0x1a5/0x480 [ 26.608825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.608999] kthread+0x337/0x6f0 [ 26.609118] ret_from_fork+0x116/0x1d0 [ 26.609258] ret_from_fork_asm+0x1a/0x30 [ 26.609397] [ 26.609465] The buggy address belongs to the object at ffff8881059cb500 [ 26.609465] which belongs to the cache kmalloc-64 of size 64 [ 26.609810] The buggy address is located 0 bytes to the right of [ 26.609810] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.610164] [ 26.610232] The buggy address belongs to the physical page: [ 26.610747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.611507] flags: 0x200000000000000(node=0|zone=2) [ 26.612090] page_type: f5(slab) [ 26.612418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.613228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.614041] page dumped because: kasan: bad access detected [ 26.614533] [ 26.614702] Memory state around the buggy address: [ 26.615252] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.615950] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.616575] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.617226] ^ [ 26.617662] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.618412] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.618844] ================================================================== [ 26.195718] ================================================================== [ 26.196180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 26.196604] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.197015] [ 26.197157] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.197217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.197231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.197265] Call Trace: [ 26.197303] <TASK> [ 26.197323] dump_stack_lvl+0x73/0xb0 [ 26.197370] print_report+0xd1/0x610 [ 26.197407] ? __virt_addr_valid+0x1db/0x2d0 [ 26.197447] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.197490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.197520] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.197551] kasan_report+0x141/0x180 [ 26.197576] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.197610] kasan_check_range+0x10c/0x1c0 [ 26.197637] __kasan_check_write+0x18/0x20 [ 26.197664] kasan_atomics_helper+0x7c7/0x5450 [ 26.197696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.197727] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.197755] ? kasan_atomics+0x152/0x310 [ 26.197784] kasan_atomics+0x1dc/0x310 [ 26.197811] ? __pfx_kasan_atomics+0x10/0x10 [ 26.197848] ? __pfx_read_tsc+0x10/0x10 [ 26.197874] ? ktime_get_ts64+0x86/0x230 [ 26.197902] kunit_try_run_case+0x1a5/0x480 [ 26.197926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.197948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.197972] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.198054] ? __kthread_parkme+0x82/0x180 [ 26.198080] ? preempt_count_sub+0x50/0x80 [ 26.198105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.198129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.198178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.198220] kthread+0x337/0x6f0 [ 26.198255] ? trace_preempt_on+0x20/0xc0 [ 26.198297] ? __pfx_kthread+0x10/0x10 [ 26.198335] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.198365] ? calculate_sigpending+0x7b/0xa0 [ 26.198407] ? __pfx_kthread+0x10/0x10 [ 26.198432] ret_from_fork+0x116/0x1d0 [ 26.198454] ? __pfx_kthread+0x10/0x10 [ 26.198479] ret_from_fork_asm+0x1a/0x30 [ 26.198516] </TASK> [ 26.198530] [ 26.207807] Allocated by task 313: [ 26.208024] kasan_save_stack+0x45/0x70 [ 26.208268] kasan_save_track+0x18/0x40 [ 26.208417] kasan_save_alloc_info+0x3b/0x50 [ 26.208560] __kasan_kmalloc+0xb7/0xc0 [ 26.208685] __kmalloc_cache_noprof+0x189/0x420 [ 26.208891] kasan_atomics+0x95/0x310 [ 26.209101] kunit_try_run_case+0x1a5/0x480 [ 26.209325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.209785] kthread+0x337/0x6f0 [ 26.209984] ret_from_fork+0x116/0x1d0 [ 26.210157] ret_from_fork_asm+0x1a/0x30 [ 26.210351] [ 26.210471] The buggy address belongs to the object at ffff8881059cb500 [ 26.210471] which belongs to the cache kmalloc-64 of size 64 [ 26.211174] The buggy address is located 0 bytes to the right of [ 26.211174] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.211610] [ 26.211683] The buggy address belongs to the physical page: [ 26.211912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.212307] flags: 0x200000000000000(node=0|zone=2) [ 26.212695] page_type: f5(slab) [ 26.213116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.213370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.213590] page dumped because: kasan: bad access detected [ 26.213983] [ 26.214079] Memory state around the buggy address: [ 26.214320] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.214671] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.214951] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.215273] ^ [ 26.215500] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.215906] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.216193] ================================================================== [ 26.046099] ================================================================== [ 26.046465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 26.046880] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.047360] [ 26.047477] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.047530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.047544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.047568] Call Trace: [ 26.047591] <TASK> [ 26.047612] dump_stack_lvl+0x73/0xb0 [ 26.047646] print_report+0xd1/0x610 [ 26.047670] ? __virt_addr_valid+0x1db/0x2d0 [ 26.047697] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.047728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.047767] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.047798] kasan_report+0x141/0x180 [ 26.047823] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.047857] __asan_report_store4_noabort+0x1b/0x30 [ 26.047886] kasan_atomics_helper+0x4b3a/0x5450 [ 26.047917] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.047948] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.047977] ? kasan_atomics+0x152/0x310 [ 26.048007] kasan_atomics+0x1dc/0x310 [ 26.048033] ? __pfx_kasan_atomics+0x10/0x10 [ 26.048062] ? __pfx_read_tsc+0x10/0x10 [ 26.048087] ? ktime_get_ts64+0x86/0x230 [ 26.048116] kunit_try_run_case+0x1a5/0x480 [ 26.048140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.048165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.048190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.048221] ? __kthread_parkme+0x82/0x180 [ 26.048255] ? preempt_count_sub+0x50/0x80 [ 26.048282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.048307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.048336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.048364] kthread+0x337/0x6f0 [ 26.048388] ? trace_preempt_on+0x20/0xc0 [ 26.048415] ? __pfx_kthread+0x10/0x10 [ 26.048440] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.048468] ? calculate_sigpending+0x7b/0xa0 [ 26.048505] ? __pfx_kthread+0x10/0x10 [ 26.048530] ret_from_fork+0x116/0x1d0 [ 26.048552] ? __pfx_kthread+0x10/0x10 [ 26.048576] ret_from_fork_asm+0x1a/0x30 [ 26.048616] </TASK> [ 26.048630] [ 26.062363] Allocated by task 313: [ 26.062510] kasan_save_stack+0x45/0x70 [ 26.062660] kasan_save_track+0x18/0x40 [ 26.062790] kasan_save_alloc_info+0x3b/0x50 [ 26.063425] __kasan_kmalloc+0xb7/0xc0 [ 26.063846] __kmalloc_cache_noprof+0x189/0x420 [ 26.064254] kasan_atomics+0x95/0x310 [ 26.065567] kunit_try_run_case+0x1a5/0x480 [ 26.065998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.066585] kthread+0x337/0x6f0 [ 26.066928] ret_from_fork+0x116/0x1d0 [ 26.067376] ret_from_fork_asm+0x1a/0x30 [ 26.067830] [ 26.067991] The buggy address belongs to the object at ffff8881059cb500 [ 26.067991] which belongs to the cache kmalloc-64 of size 64 [ 26.068360] The buggy address is located 0 bytes to the right of [ 26.068360] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.068724] [ 26.069288] The buggy address belongs to the physical page: [ 26.069845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.070534] flags: 0x200000000000000(node=0|zone=2) [ 26.071078] page_type: f5(slab) [ 26.071282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.071906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.072305] page dumped because: kasan: bad access detected [ 26.072476] [ 26.072542] Memory state around the buggy address: [ 26.072695] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.073391] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.074144] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.074748] ^ [ 26.075251] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.076446] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.077170] ================================================================== [ 26.301477] ================================================================== [ 26.301941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 26.302301] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.302638] [ 26.302868] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.302960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.302975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.302999] Call Trace: [ 26.303018] <TASK> [ 26.303039] dump_stack_lvl+0x73/0xb0 [ 26.303101] print_report+0xd1/0x610 [ 26.303126] ? __virt_addr_valid+0x1db/0x2d0 [ 26.303152] ? kasan_atomics_helper+0xac7/0x5450 [ 26.303181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.303252] ? kasan_atomics_helper+0xac7/0x5450 [ 26.303284] kasan_report+0x141/0x180 [ 26.303309] ? kasan_atomics_helper+0xac7/0x5450 [ 26.303344] kasan_check_range+0x10c/0x1c0 [ 26.303399] __kasan_check_write+0x18/0x20 [ 26.303428] kasan_atomics_helper+0xac7/0x5450 [ 26.303459] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.303490] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.303518] ? kasan_atomics+0x152/0x310 [ 26.303548] kasan_atomics+0x1dc/0x310 [ 26.303575] ? __pfx_kasan_atomics+0x10/0x10 [ 26.303603] ? __pfx_read_tsc+0x10/0x10 [ 26.303629] ? ktime_get_ts64+0x86/0x230 [ 26.303657] kunit_try_run_case+0x1a5/0x480 [ 26.303682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.303704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.303727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.303872] ? __kthread_parkme+0x82/0x180 [ 26.303895] ? preempt_count_sub+0x50/0x80 [ 26.303921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.303945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.303974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.304003] kthread+0x337/0x6f0 [ 26.304026] ? trace_preempt_on+0x20/0xc0 [ 26.304053] ? __pfx_kthread+0x10/0x10 [ 26.304077] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.304106] ? calculate_sigpending+0x7b/0xa0 [ 26.304134] ? __pfx_kthread+0x10/0x10 [ 26.304160] ret_from_fork+0x116/0x1d0 [ 26.304181] ? __pfx_kthread+0x10/0x10 [ 26.304206] ret_from_fork_asm+0x1a/0x30 [ 26.304252] </TASK> [ 26.304264] [ 26.313172] Allocated by task 313: [ 26.313384] kasan_save_stack+0x45/0x70 [ 26.313562] kasan_save_track+0x18/0x40 [ 26.313729] kasan_save_alloc_info+0x3b/0x50 [ 26.313883] __kasan_kmalloc+0xb7/0xc0 [ 26.314045] __kmalloc_cache_noprof+0x189/0x420 [ 26.314385] kasan_atomics+0x95/0x310 [ 26.314582] kunit_try_run_case+0x1a5/0x480 [ 26.314887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.315167] kthread+0x337/0x6f0 [ 26.315363] ret_from_fork+0x116/0x1d0 [ 26.315556] ret_from_fork_asm+0x1a/0x30 [ 26.315818] [ 26.315900] The buggy address belongs to the object at ffff8881059cb500 [ 26.315900] which belongs to the cache kmalloc-64 of size 64 [ 26.316321] The buggy address is located 0 bytes to the right of [ 26.316321] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.317205] [ 26.317325] The buggy address belongs to the physical page: [ 26.317568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.318010] flags: 0x200000000000000(node=0|zone=2) [ 26.318294] page_type: f5(slab) [ 26.318484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.318941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.319234] page dumped because: kasan: bad access detected [ 26.319523] [ 26.319598] Memory state around the buggy address: [ 26.319964] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.320207] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.320536] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.320866] ^ [ 26.321090] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.321402] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.321673] ================================================================== [ 26.364358] ================================================================== [ 26.364698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 26.365111] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.365474] [ 26.365612] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.365666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.365680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.365704] Call Trace: [ 26.365724] <TASK> [ 26.365871] dump_stack_lvl+0x73/0xb0 [ 26.365912] print_report+0xd1/0x610 [ 26.365936] ? __virt_addr_valid+0x1db/0x2d0 [ 26.365965] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.365995] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.366025] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.366055] kasan_report+0x141/0x180 [ 26.366112] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.366147] __asan_report_load4_noabort+0x18/0x20 [ 26.366176] kasan_atomics_helper+0x4a84/0x5450 [ 26.366207] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.366247] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.366277] ? kasan_atomics+0x152/0x310 [ 26.366306] kasan_atomics+0x1dc/0x310 [ 26.366361] ? __pfx_kasan_atomics+0x10/0x10 [ 26.366414] ? __pfx_read_tsc+0x10/0x10 [ 26.366441] ? ktime_get_ts64+0x86/0x230 [ 26.366470] kunit_try_run_case+0x1a5/0x480 [ 26.366494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.366517] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.366541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.366573] ? __kthread_parkme+0x82/0x180 [ 26.366595] ? preempt_count_sub+0x50/0x80 [ 26.366621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.366645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.366673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.366703] kthread+0x337/0x6f0 [ 26.366726] ? trace_preempt_on+0x20/0xc0 [ 26.366821] ? __pfx_kthread+0x10/0x10 [ 26.366861] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.366890] ? calculate_sigpending+0x7b/0xa0 [ 26.366919] ? __pfx_kthread+0x10/0x10 [ 26.366944] ret_from_fork+0x116/0x1d0 [ 26.366966] ? __pfx_kthread+0x10/0x10 [ 26.366991] ret_from_fork_asm+0x1a/0x30 [ 26.367027] </TASK> [ 26.367040] [ 26.379514] Allocated by task 313: [ 26.379668] kasan_save_stack+0x45/0x70 [ 26.379841] kasan_save_track+0x18/0x40 [ 26.380029] kasan_save_alloc_info+0x3b/0x50 [ 26.380234] __kasan_kmalloc+0xb7/0xc0 [ 26.380430] __kmalloc_cache_noprof+0x189/0x420 [ 26.381997] kasan_atomics+0x95/0x310 [ 26.382579] kunit_try_run_case+0x1a5/0x480 [ 26.383466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.384079] kthread+0x337/0x6f0 [ 26.384520] ret_from_fork+0x116/0x1d0 [ 26.385122] ret_from_fork_asm+0x1a/0x30 [ 26.385729] [ 26.386016] The buggy address belongs to the object at ffff8881059cb500 [ 26.386016] which belongs to the cache kmalloc-64 of size 64 [ 26.387066] The buggy address is located 0 bytes to the right of [ 26.387066] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.388340] [ 26.388493] The buggy address belongs to the physical page: [ 26.388669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.388921] flags: 0x200000000000000(node=0|zone=2) [ 26.389500] page_type: f5(slab) [ 26.389889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.390727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.391448] page dumped because: kasan: bad access detected [ 26.391828] [ 26.392056] Memory state around the buggy address: [ 26.392532] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.392748] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.393503] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.394208] ^ [ 26.394555] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.395205] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.395672] ================================================================== [ 25.920164] ================================================================== [ 25.920833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 25.921363] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 25.921596] [ 25.921684] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.921737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.921802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.921827] Call Trace: [ 25.921844] <TASK> [ 25.921864] dump_stack_lvl+0x73/0xb0 [ 25.921897] print_report+0xd1/0x610 [ 25.921921] ? __virt_addr_valid+0x1db/0x2d0 [ 25.921946] ? kasan_atomics_helper+0x4b88/0x5450 [ 25.921990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.922020] ? kasan_atomics_helper+0x4b88/0x5450 [ 25.922055] kasan_report+0x141/0x180 [ 25.922080] ? kasan_atomics_helper+0x4b88/0x5450 [ 25.922116] __asan_report_load4_noabort+0x18/0x20 [ 25.922144] kasan_atomics_helper+0x4b88/0x5450 [ 25.922175] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.922207] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.922248] ? kasan_atomics+0x152/0x310 [ 25.922278] kasan_atomics+0x1dc/0x310 [ 25.922305] ? __pfx_kasan_atomics+0x10/0x10 [ 25.922333] ? __pfx_read_tsc+0x10/0x10 [ 25.922360] ? ktime_get_ts64+0x86/0x230 [ 25.922388] kunit_try_run_case+0x1a5/0x480 [ 25.922412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.922434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.922457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.922488] ? __kthread_parkme+0x82/0x180 [ 25.922511] ? preempt_count_sub+0x50/0x80 [ 25.922537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.922561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.922589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.922617] kthread+0x337/0x6f0 [ 25.922641] ? trace_preempt_on+0x20/0xc0 [ 25.922667] ? __pfx_kthread+0x10/0x10 [ 25.922691] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.922719] ? calculate_sigpending+0x7b/0xa0 [ 25.922748] ? __pfx_kthread+0x10/0x10 [ 25.922786] ret_from_fork+0x116/0x1d0 [ 25.922806] ? __pfx_kthread+0x10/0x10 [ 25.922865] ret_from_fork_asm+0x1a/0x30 [ 25.922902] </TASK> [ 25.922916] [ 25.936146] Allocated by task 313: [ 25.936655] kasan_save_stack+0x45/0x70 [ 25.937408] kasan_save_track+0x18/0x40 [ 25.937788] kasan_save_alloc_info+0x3b/0x50 [ 25.938258] __kasan_kmalloc+0xb7/0xc0 [ 25.938599] __kmalloc_cache_noprof+0x189/0x420 [ 25.939112] kasan_atomics+0x95/0x310 [ 25.939435] kunit_try_run_case+0x1a5/0x480 [ 25.939579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.939940] kthread+0x337/0x6f0 [ 25.940322] ret_from_fork+0x116/0x1d0 [ 25.940665] ret_from_fork_asm+0x1a/0x30 [ 25.941109] [ 25.941283] The buggy address belongs to the object at ffff8881059cb500 [ 25.941283] which belongs to the cache kmalloc-64 of size 64 [ 25.942488] The buggy address is located 0 bytes to the right of [ 25.942488] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 25.943419] [ 25.943584] The buggy address belongs to the physical page: [ 25.944154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 25.944500] flags: 0x200000000000000(node=0|zone=2) [ 25.945000] page_type: f5(slab) [ 25.945359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.946118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.946359] page dumped because: kasan: bad access detected [ 25.946527] [ 25.946593] Memory state around the buggy address: [ 25.946746] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.947436] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.948387] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.949137] ^ [ 25.949648] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.950383] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.951096] ================================================================== [ 26.726103] ================================================================== [ 26.726669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 26.727192] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.727601] [ 26.727956] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.728013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.728027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.728052] Call Trace: [ 26.728072] <TASK> [ 26.728094] dump_stack_lvl+0x73/0xb0 [ 26.728125] print_report+0xd1/0x610 [ 26.728149] ? __virt_addr_valid+0x1db/0x2d0 [ 26.728177] ? kasan_atomics_helper+0x12e6/0x5450 [ 26.728207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.728249] ? kasan_atomics_helper+0x12e6/0x5450 [ 26.728279] kasan_report+0x141/0x180 [ 26.728303] ? kasan_atomics_helper+0x12e6/0x5450 [ 26.728338] kasan_check_range+0x10c/0x1c0 [ 26.728365] __kasan_check_write+0x18/0x20 [ 26.728393] kasan_atomics_helper+0x12e6/0x5450 [ 26.728427] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.728457] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.728485] ? kasan_atomics+0x152/0x310 [ 26.728514] kasan_atomics+0x1dc/0x310 [ 26.728540] ? __pfx_kasan_atomics+0x10/0x10 [ 26.728567] ? __pfx_read_tsc+0x10/0x10 [ 26.728594] ? ktime_get_ts64+0x86/0x230 [ 26.728621] kunit_try_run_case+0x1a5/0x480 [ 26.728646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.728700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.728725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.728824] ? __kthread_parkme+0x82/0x180 [ 26.728850] ? preempt_count_sub+0x50/0x80 [ 26.728876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.728900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.728930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.728959] kthread+0x337/0x6f0 [ 26.728982] ? trace_preempt_on+0x20/0xc0 [ 26.729009] ? __pfx_kthread+0x10/0x10 [ 26.729032] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.729061] ? calculate_sigpending+0x7b/0xa0 [ 26.729090] ? __pfx_kthread+0x10/0x10 [ 26.729115] ret_from_fork+0x116/0x1d0 [ 26.729137] ? __pfx_kthread+0x10/0x10 [ 26.729161] ret_from_fork_asm+0x1a/0x30 [ 26.729201] </TASK> [ 26.729214] [ 26.741150] Allocated by task 313: [ 26.741504] kasan_save_stack+0x45/0x70 [ 26.741699] kasan_save_track+0x18/0x40 [ 26.742279] kasan_save_alloc_info+0x3b/0x50 [ 26.742586] __kasan_kmalloc+0xb7/0xc0 [ 26.743059] __kmalloc_cache_noprof+0x189/0x420 [ 26.743293] kasan_atomics+0x95/0x310 [ 26.743463] kunit_try_run_case+0x1a5/0x480 [ 26.743650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.744316] kthread+0x337/0x6f0 [ 26.744653] ret_from_fork+0x116/0x1d0 [ 26.744979] ret_from_fork_asm+0x1a/0x30 [ 26.745168] [ 26.745277] The buggy address belongs to the object at ffff8881059cb500 [ 26.745277] which belongs to the cache kmalloc-64 of size 64 [ 26.746215] The buggy address is located 0 bytes to the right of [ 26.746215] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.746707] [ 26.747273] The buggy address belongs to the physical page: [ 26.747726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.748313] flags: 0x200000000000000(node=0|zone=2) [ 26.748545] page_type: f5(slab) [ 26.748705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.749491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.750201] page dumped because: kasan: bad access detected [ 26.750669] [ 26.750900] Memory state around the buggy address: [ 26.751374] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.752012] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.752779] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.753081] ^ [ 26.753305] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.753598] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.754131] ================================================================== [ 27.007708] ================================================================== [ 27.008095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 27.008943] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.009423] [ 27.009654] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.009710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.009724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.009748] Call Trace: [ 27.009768] <TASK> [ 27.009855] dump_stack_lvl+0x73/0xb0 [ 27.009891] print_report+0xd1/0x610 [ 27.009916] ? __virt_addr_valid+0x1db/0x2d0 [ 27.009944] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.009974] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.010005] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.010036] kasan_report+0x141/0x180 [ 27.010060] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.010094] kasan_check_range+0x10c/0x1c0 [ 27.010122] __kasan_check_write+0x18/0x20 [ 27.010150] kasan_atomics_helper+0x18b1/0x5450 [ 27.010184] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.010217] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.010259] ? kasan_atomics+0x152/0x310 [ 27.010290] kasan_atomics+0x1dc/0x310 [ 27.010316] ? __pfx_kasan_atomics+0x10/0x10 [ 27.010344] ? __pfx_read_tsc+0x10/0x10 [ 27.010369] ? ktime_get_ts64+0x86/0x230 [ 27.010397] kunit_try_run_case+0x1a5/0x480 [ 27.010421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.010443] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.010466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.010497] ? __kthread_parkme+0x82/0x180 [ 27.010520] ? preempt_count_sub+0x50/0x80 [ 27.010546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.010570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.010598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.010626] kthread+0x337/0x6f0 [ 27.010649] ? trace_preempt_on+0x20/0xc0 [ 27.010675] ? __pfx_kthread+0x10/0x10 [ 27.010699] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.010727] ? calculate_sigpending+0x7b/0xa0 [ 27.010772] ? __pfx_kthread+0x10/0x10 [ 27.010798] ret_from_fork+0x116/0x1d0 [ 27.010829] ? __pfx_kthread+0x10/0x10 [ 27.010854] ret_from_fork_asm+0x1a/0x30 [ 27.010889] </TASK> [ 27.010903] [ 27.021826] Allocated by task 313: [ 27.022081] kasan_save_stack+0x45/0x70 [ 27.022257] kasan_save_track+0x18/0x40 [ 27.022429] kasan_save_alloc_info+0x3b/0x50 [ 27.022619] __kasan_kmalloc+0xb7/0xc0 [ 27.022783] __kmalloc_cache_noprof+0x189/0x420 [ 27.023335] kasan_atomics+0x95/0x310 [ 27.023510] kunit_try_run_case+0x1a5/0x480 [ 27.023693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.024063] kthread+0x337/0x6f0 [ 27.024370] ret_from_fork+0x116/0x1d0 [ 27.024524] ret_from_fork_asm+0x1a/0x30 [ 27.024728] [ 27.024822] The buggy address belongs to the object at ffff8881059cb500 [ 27.024822] which belongs to the cache kmalloc-64 of size 64 [ 27.025603] The buggy address is located 0 bytes to the right of [ 27.025603] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.026409] [ 27.026491] The buggy address belongs to the physical page: [ 27.026717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.027054] flags: 0x200000000000000(node=0|zone=2) [ 27.027533] page_type: f5(slab) [ 27.027753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.028104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.028442] page dumped because: kasan: bad access detected [ 27.028671] [ 27.028749] Memory state around the buggy address: [ 27.029303] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.029576] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.030115] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.030605] ^ [ 27.030775] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.031374] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.031628] ================================================================== [ 27.056910] ================================================================== [ 27.057279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 27.057715] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.058024] [ 27.058113] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.058164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.058178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.058407] Call Trace: [ 27.058438] <TASK> [ 27.058471] dump_stack_lvl+0x73/0xb0 [ 27.058507] print_report+0xd1/0x610 [ 27.058533] ? __virt_addr_valid+0x1db/0x2d0 [ 27.058559] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.058589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.058619] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.058649] kasan_report+0x141/0x180 [ 27.058674] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.058709] kasan_check_range+0x10c/0x1c0 [ 27.058736] __kasan_check_write+0x18/0x20 [ 27.058994] kasan_atomics_helper+0x19e3/0x5450 [ 27.059043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.059076] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.059288] ? kasan_atomics+0x152/0x310 [ 27.059335] kasan_atomics+0x1dc/0x310 [ 27.059365] ? __pfx_kasan_atomics+0x10/0x10 [ 27.059395] ? __pfx_read_tsc+0x10/0x10 [ 27.059423] ? ktime_get_ts64+0x86/0x230 [ 27.059452] kunit_try_run_case+0x1a5/0x480 [ 27.059478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.059501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.059525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.059556] ? __kthread_parkme+0x82/0x180 [ 27.059578] ? preempt_count_sub+0x50/0x80 [ 27.059604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.059628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.059656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.059685] kthread+0x337/0x6f0 [ 27.059707] ? trace_preempt_on+0x20/0xc0 [ 27.059734] ? __pfx_kthread+0x10/0x10 [ 27.059829] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.059860] ? calculate_sigpending+0x7b/0xa0 [ 27.059891] ? __pfx_kthread+0x10/0x10 [ 27.059915] ret_from_fork+0x116/0x1d0 [ 27.059938] ? __pfx_kthread+0x10/0x10 [ 27.059962] ret_from_fork_asm+0x1a/0x30 [ 27.059998] </TASK> [ 27.060011] [ 27.071746] Allocated by task 313: [ 27.072526] kasan_save_stack+0x45/0x70 [ 27.072873] kasan_save_track+0x18/0x40 [ 27.073280] kasan_save_alloc_info+0x3b/0x50 [ 27.073616] __kasan_kmalloc+0xb7/0xc0 [ 27.074126] __kmalloc_cache_noprof+0x189/0x420 [ 27.074372] kasan_atomics+0x95/0x310 [ 27.074554] kunit_try_run_case+0x1a5/0x480 [ 27.074746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.075415] kthread+0x337/0x6f0 [ 27.075587] ret_from_fork+0x116/0x1d0 [ 27.075802] ret_from_fork_asm+0x1a/0x30 [ 27.076002] [ 27.076093] The buggy address belongs to the object at ffff8881059cb500 [ 27.076093] which belongs to the cache kmalloc-64 of size 64 [ 27.076577] The buggy address is located 0 bytes to the right of [ 27.076577] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.077627] [ 27.077715] The buggy address belongs to the physical page: [ 27.078002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.078441] flags: 0x200000000000000(node=0|zone=2) [ 27.078657] page_type: f5(slab) [ 27.078888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.079247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.079550] page dumped because: kasan: bad access detected [ 27.079768] [ 27.079834] Memory state around the buggy address: [ 27.080076] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.080496] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.081069] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.081394] ^ [ 27.081610] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.082289] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.082533] ================================================================== [ 25.974255] ================================================================== [ 25.974590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 25.975150] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 25.975651] [ 25.975808] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.975872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.975886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.975910] Call Trace: [ 25.975931] <TASK> [ 25.975952] dump_stack_lvl+0x73/0xb0 [ 25.975984] print_report+0xd1/0x610 [ 25.976008] ? __virt_addr_valid+0x1db/0x2d0 [ 25.976034] ? kasan_atomics_helper+0x3df/0x5450 [ 25.976064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.976095] ? kasan_atomics_helper+0x3df/0x5450 [ 25.976125] kasan_report+0x141/0x180 [ 25.976150] ? kasan_atomics_helper+0x3df/0x5450 [ 25.976185] kasan_check_range+0x10c/0x1c0 [ 25.976213] __kasan_check_read+0x15/0x20 [ 25.976255] kasan_atomics_helper+0x3df/0x5450 [ 25.976286] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.976317] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.976346] ? kasan_atomics+0x152/0x310 [ 25.976375] kasan_atomics+0x1dc/0x310 [ 25.976402] ? __pfx_kasan_atomics+0x10/0x10 [ 25.976429] ? __pfx_read_tsc+0x10/0x10 [ 25.976456] ? ktime_get_ts64+0x86/0x230 [ 25.976484] kunit_try_run_case+0x1a5/0x480 [ 25.976508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.976531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.976556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.976587] ? __kthread_parkme+0x82/0x180 [ 25.976610] ? preempt_count_sub+0x50/0x80 [ 25.976637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.976661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.976689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.976718] kthread+0x337/0x6f0 [ 25.976741] ? trace_preempt_on+0x20/0xc0 [ 25.976807] ? __pfx_kthread+0x10/0x10 [ 25.976839] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.976868] ? calculate_sigpending+0x7b/0xa0 [ 25.976898] ? __pfx_kthread+0x10/0x10 [ 25.976924] ret_from_fork+0x116/0x1d0 [ 25.976945] ? __pfx_kthread+0x10/0x10 [ 25.976970] ret_from_fork_asm+0x1a/0x30 [ 25.977006] </TASK> [ 25.977019] [ 25.984620] Allocated by task 313: [ 25.984814] kasan_save_stack+0x45/0x70 [ 25.985060] kasan_save_track+0x18/0x40 [ 25.985247] kasan_save_alloc_info+0x3b/0x50 [ 25.985438] __kasan_kmalloc+0xb7/0xc0 [ 25.985618] __kmalloc_cache_noprof+0x189/0x420 [ 25.985802] kasan_atomics+0x95/0x310 [ 25.986050] kunit_try_run_case+0x1a5/0x480 [ 25.986227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.986430] kthread+0x337/0x6f0 [ 25.986600] ret_from_fork+0x116/0x1d0 [ 25.986777] ret_from_fork_asm+0x1a/0x30 [ 25.987032] [ 25.987117] The buggy address belongs to the object at ffff8881059cb500 [ 25.987117] which belongs to the cache kmalloc-64 of size 64 [ 25.987563] The buggy address is located 0 bytes to the right of [ 25.987563] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 25.988306] [ 25.988407] The buggy address belongs to the physical page: [ 25.988656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 25.989086] flags: 0x200000000000000(node=0|zone=2) [ 25.989335] page_type: f5(slab) [ 25.989504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.989877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.990101] page dumped because: kasan: bad access detected [ 25.990615] [ 25.990733] Memory state around the buggy address: [ 25.991249] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.991574] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.992634] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.993591] ^ [ 25.994067] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.994427] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.994727] ================================================================== [ 26.938865] ================================================================== [ 26.939091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 26.939455] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.939770] [ 26.939908] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.940541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.940563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.940588] Call Trace: [ 26.940608] <TASK> [ 26.940628] dump_stack_lvl+0x73/0xb0 [ 26.940660] print_report+0xd1/0x610 [ 26.940685] ? __virt_addr_valid+0x1db/0x2d0 [ 26.940711] ? kasan_atomics_helper+0x16e7/0x5450 [ 26.940741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.941442] ? kasan_atomics_helper+0x16e7/0x5450 [ 26.941477] kasan_report+0x141/0x180 [ 26.941504] ? kasan_atomics_helper+0x16e7/0x5450 [ 26.941540] kasan_check_range+0x10c/0x1c0 [ 26.941567] __kasan_check_write+0x18/0x20 [ 26.941595] kasan_atomics_helper+0x16e7/0x5450 [ 26.941626] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.941658] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.941687] ? kasan_atomics+0x152/0x310 [ 26.941716] kasan_atomics+0x1dc/0x310 [ 26.941742] ? __pfx_kasan_atomics+0x10/0x10 [ 26.941786] ? __pfx_read_tsc+0x10/0x10 [ 26.941812] ? ktime_get_ts64+0x86/0x230 [ 26.941854] kunit_try_run_case+0x1a5/0x480 [ 26.941879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.941901] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.941925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.941956] ? __kthread_parkme+0x82/0x180 [ 26.941978] ? preempt_count_sub+0x50/0x80 [ 26.942004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.942028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.942057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.942085] kthread+0x337/0x6f0 [ 26.942109] ? trace_preempt_on+0x20/0xc0 [ 26.942135] ? __pfx_kthread+0x10/0x10 [ 26.942159] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.942188] ? calculate_sigpending+0x7b/0xa0 [ 26.942217] ? __pfx_kthread+0x10/0x10 [ 26.942253] ret_from_fork+0x116/0x1d0 [ 26.942275] ? __pfx_kthread+0x10/0x10 [ 26.942299] ret_from_fork_asm+0x1a/0x30 [ 26.942335] </TASK> [ 26.942348] [ 26.953498] Allocated by task 313: [ 26.954066] kasan_save_stack+0x45/0x70 [ 26.954367] kasan_save_track+0x18/0x40 [ 26.954567] kasan_save_alloc_info+0x3b/0x50 [ 26.954770] __kasan_kmalloc+0xb7/0xc0 [ 26.955210] __kmalloc_cache_noprof+0x189/0x420 [ 26.955407] kasan_atomics+0x95/0x310 [ 26.955746] kunit_try_run_case+0x1a5/0x480 [ 26.956106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.956361] kthread+0x337/0x6f0 [ 26.956651] ret_from_fork+0x116/0x1d0 [ 26.956994] ret_from_fork_asm+0x1a/0x30 [ 26.957330] [ 26.957424] The buggy address belongs to the object at ffff8881059cb500 [ 26.957424] which belongs to the cache kmalloc-64 of size 64 [ 26.958287] The buggy address is located 0 bytes to the right of [ 26.958287] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.959219] [ 26.959329] The buggy address belongs to the physical page: [ 26.959769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.960292] flags: 0x200000000000000(node=0|zone=2) [ 26.960628] page_type: f5(slab) [ 26.961012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.961366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.961740] page dumped because: kasan: bad access detected [ 26.962258] [ 26.962347] Memory state around the buggy address: [ 26.962697] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.963206] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.963650] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.964139] ^ [ 26.964381] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.964644] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.964939] ================================================================== [ 27.361825] ================================================================== [ 27.362456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 27.363011] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.363422] [ 27.363602] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.363658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.363672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.363697] Call Trace: [ 27.363717] <TASK> [ 27.363738] dump_stack_lvl+0x73/0xb0 [ 27.363771] print_report+0xd1/0x610 [ 27.363835] ? __virt_addr_valid+0x1db/0x2d0 [ 27.363862] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.363904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.363935] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.364008] kasan_report+0x141/0x180 [ 27.364033] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.364080] __asan_report_load8_noabort+0x18/0x20 [ 27.364109] kasan_atomics_helper+0x4f98/0x5450 [ 27.364141] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.364173] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.364233] ? kasan_atomics+0x152/0x310 [ 27.364308] kasan_atomics+0x1dc/0x310 [ 27.364335] ? __pfx_kasan_atomics+0x10/0x10 [ 27.364363] ? __pfx_read_tsc+0x10/0x10 [ 27.364390] ? ktime_get_ts64+0x86/0x230 [ 27.364420] kunit_try_run_case+0x1a5/0x480 [ 27.364445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.364467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.364491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.364522] ? __kthread_parkme+0x82/0x180 [ 27.364545] ? preempt_count_sub+0x50/0x80 [ 27.364571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.364595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.364623] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.364652] kthread+0x337/0x6f0 [ 27.364674] ? trace_preempt_on+0x20/0xc0 [ 27.364701] ? __pfx_kthread+0x10/0x10 [ 27.364725] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.364754] ? calculate_sigpending+0x7b/0xa0 [ 27.364782] ? __pfx_kthread+0x10/0x10 [ 27.364807] ret_from_fork+0x116/0x1d0 [ 27.364837] ? __pfx_kthread+0x10/0x10 [ 27.364862] ret_from_fork_asm+0x1a/0x30 [ 27.364897] </TASK> [ 27.364909] [ 27.373313] Allocated by task 313: [ 27.373749] kasan_save_stack+0x45/0x70 [ 27.374038] kasan_save_track+0x18/0x40 [ 27.374249] kasan_save_alloc_info+0x3b/0x50 [ 27.374462] __kasan_kmalloc+0xb7/0xc0 [ 27.374596] __kmalloc_cache_noprof+0x189/0x420 [ 27.374748] kasan_atomics+0x95/0x310 [ 27.375046] kunit_try_run_case+0x1a5/0x480 [ 27.375405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.375646] kthread+0x337/0x6f0 [ 27.375782] ret_from_fork+0x116/0x1d0 [ 27.376121] ret_from_fork_asm+0x1a/0x30 [ 27.376350] [ 27.376421] The buggy address belongs to the object at ffff8881059cb500 [ 27.376421] which belongs to the cache kmalloc-64 of size 64 [ 27.376895] The buggy address is located 0 bytes to the right of [ 27.376895] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.377641] [ 27.377783] The buggy address belongs to the physical page: [ 27.378018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.378316] flags: 0x200000000000000(node=0|zone=2) [ 27.378668] page_type: f5(slab) [ 27.378835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.379193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.379530] page dumped because: kasan: bad access detected [ 27.379764] [ 27.379872] Memory state around the buggy address: [ 27.380175] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.380454] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.380813] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.381114] ^ [ 27.381345] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.381639] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.382041] ================================================================== [ 26.702152] ================================================================== [ 26.702482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 26.703011] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.703756] [ 26.704018] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.704078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.704093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.704125] Call Trace: [ 26.704145] <TASK> [ 26.704165] dump_stack_lvl+0x73/0xb0 [ 26.704200] print_report+0xd1/0x610 [ 26.704224] ? __virt_addr_valid+0x1db/0x2d0 [ 26.704260] ? kasan_atomics_helper+0x49e8/0x5450 [ 26.704289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.704319] ? kasan_atomics_helper+0x49e8/0x5450 [ 26.704350] kasan_report+0x141/0x180 [ 26.704374] ? kasan_atomics_helper+0x49e8/0x5450 [ 26.704409] __asan_report_load4_noabort+0x18/0x20 [ 26.704437] kasan_atomics_helper+0x49e8/0x5450 [ 26.704468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.704499] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.704527] ? kasan_atomics+0x152/0x310 [ 26.704557] kasan_atomics+0x1dc/0x310 [ 26.704584] ? __pfx_kasan_atomics+0x10/0x10 [ 26.704612] ? __pfx_read_tsc+0x10/0x10 [ 26.704638] ? ktime_get_ts64+0x86/0x230 [ 26.704667] kunit_try_run_case+0x1a5/0x480 [ 26.704691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.704713] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.704736] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.704813] ? __kthread_parkme+0x82/0x180 [ 26.704850] ? preempt_count_sub+0x50/0x80 [ 26.704876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.704900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.704929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.704957] kthread+0x337/0x6f0 [ 26.704980] ? trace_preempt_on+0x20/0xc0 [ 26.705008] ? __pfx_kthread+0x10/0x10 [ 26.705032] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.705061] ? calculate_sigpending+0x7b/0xa0 [ 26.705089] ? __pfx_kthread+0x10/0x10 [ 26.705114] ret_from_fork+0x116/0x1d0 [ 26.705135] ? __pfx_kthread+0x10/0x10 [ 26.705160] ret_from_fork_asm+0x1a/0x30 [ 26.705201] </TASK> [ 26.705214] [ 26.715265] Allocated by task 313: [ 26.715411] kasan_save_stack+0x45/0x70 [ 26.715558] kasan_save_track+0x18/0x40 [ 26.715954] kasan_save_alloc_info+0x3b/0x50 [ 26.716405] __kasan_kmalloc+0xb7/0xc0 [ 26.716569] __kmalloc_cache_noprof+0x189/0x420 [ 26.716766] kasan_atomics+0x95/0x310 [ 26.716895] kunit_try_run_case+0x1a5/0x480 [ 26.717030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.717412] kthread+0x337/0x6f0 [ 26.717583] ret_from_fork+0x116/0x1d0 [ 26.717769] ret_from_fork_asm+0x1a/0x30 [ 26.718075] [ 26.718140] The buggy address belongs to the object at ffff8881059cb500 [ 26.718140] which belongs to the cache kmalloc-64 of size 64 [ 26.718485] The buggy address is located 0 bytes to the right of [ 26.718485] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.719455] [ 26.719581] The buggy address belongs to the physical page: [ 26.720270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.720611] flags: 0x200000000000000(node=0|zone=2) [ 26.720798] page_type: f5(slab) [ 26.720972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.721284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.721585] page dumped because: kasan: bad access detected [ 26.721803] [ 26.721874] Memory state around the buggy address: [ 26.722074] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.723425] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.723776] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.724077] ^ [ 26.724376] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.724841] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.725383] ================================================================== [ 26.619306] ================================================================== [ 26.619627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 26.619914] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.620343] [ 26.620586] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.620639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.620653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.620676] Call Trace: [ 26.620698] <TASK> [ 26.620719] dump_stack_lvl+0x73/0xb0 [ 26.620759] print_report+0xd1/0x610 [ 26.620805] ? __virt_addr_valid+0x1db/0x2d0 [ 26.620854] ? kasan_atomics_helper+0x1148/0x5450 [ 26.620885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.620915] ? kasan_atomics_helper+0x1148/0x5450 [ 26.620945] kasan_report+0x141/0x180 [ 26.620969] ? kasan_atomics_helper+0x1148/0x5450 [ 26.621004] kasan_check_range+0x10c/0x1c0 [ 26.621031] __kasan_check_write+0x18/0x20 [ 26.621059] kasan_atomics_helper+0x1148/0x5450 [ 26.621090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.621121] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.621148] ? kasan_atomics+0x152/0x310 [ 26.621178] kasan_atomics+0x1dc/0x310 [ 26.621209] ? __pfx_kasan_atomics+0x10/0x10 [ 26.621248] ? __pfx_read_tsc+0x10/0x10 [ 26.621284] ? ktime_get_ts64+0x86/0x230 [ 26.621313] kunit_try_run_case+0x1a5/0x480 [ 26.621336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.621369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.621393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.621423] ? __kthread_parkme+0x82/0x180 [ 26.621446] ? preempt_count_sub+0x50/0x80 [ 26.621471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.621495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.621523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.621551] kthread+0x337/0x6f0 [ 26.621574] ? trace_preempt_on+0x20/0xc0 [ 26.621610] ? __pfx_kthread+0x10/0x10 [ 26.621634] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.621662] ? calculate_sigpending+0x7b/0xa0 [ 26.621703] ? __pfx_kthread+0x10/0x10 [ 26.621728] ret_from_fork+0x116/0x1d0 [ 26.621761] ? __pfx_kthread+0x10/0x10 [ 26.621786] ret_from_fork_asm+0x1a/0x30 [ 26.621823] </TASK> [ 26.621835] [ 26.635465] Allocated by task 313: [ 26.635633] kasan_save_stack+0x45/0x70 [ 26.635799] kasan_save_track+0x18/0x40 [ 26.635932] kasan_save_alloc_info+0x3b/0x50 [ 26.636082] __kasan_kmalloc+0xb7/0xc0 [ 26.636215] __kmalloc_cache_noprof+0x189/0x420 [ 26.636382] kasan_atomics+0x95/0x310 [ 26.636513] kunit_try_run_case+0x1a5/0x480 [ 26.636653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.636827] kthread+0x337/0x6f0 [ 26.636948] ret_from_fork+0x116/0x1d0 [ 26.637076] ret_from_fork_asm+0x1a/0x30 [ 26.637224] [ 26.639019] The buggy address belongs to the object at ffff8881059cb500 [ 26.639019] which belongs to the cache kmalloc-64 of size 64 [ 26.641253] The buggy address is located 0 bytes to the right of [ 26.641253] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.642582] [ 26.642929] The buggy address belongs to the physical page: [ 26.643192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.643547] flags: 0x200000000000000(node=0|zone=2) [ 26.643874] page_type: f5(slab) [ 26.644050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.644370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.644674] page dumped because: kasan: bad access detected [ 26.644993] [ 26.645095] Memory state around the buggy address: [ 26.645337] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.645613] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.645988] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.646324] ^ [ 26.646521] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.647057] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.647403] ================================================================== [ 26.841107] ================================================================== [ 26.841459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 26.842076] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.842426] [ 26.842541] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.842595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.842609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.842634] Call Trace: [ 26.842654] <TASK> [ 26.842673] dump_stack_lvl+0x73/0xb0 [ 26.842705] print_report+0xd1/0x610 [ 26.842729] ? __virt_addr_valid+0x1db/0x2d0 [ 26.842860] ? kasan_atomics_helper+0x50d4/0x5450 [ 26.842910] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.842941] ? kasan_atomics_helper+0x50d4/0x5450 [ 26.842972] kasan_report+0x141/0x180 [ 26.842997] ? kasan_atomics_helper+0x50d4/0x5450 [ 26.843032] __asan_report_store8_noabort+0x1b/0x30 [ 26.843062] kasan_atomics_helper+0x50d4/0x5450 [ 26.843093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.843126] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.843154] ? kasan_atomics+0x152/0x310 [ 26.843184] kasan_atomics+0x1dc/0x310 [ 26.843210] ? __pfx_kasan_atomics+0x10/0x10 [ 26.843246] ? __pfx_read_tsc+0x10/0x10 [ 26.843274] ? ktime_get_ts64+0x86/0x230 [ 26.843303] kunit_try_run_case+0x1a5/0x480 [ 26.843329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.843354] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.843379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.843410] ? __kthread_parkme+0x82/0x180 [ 26.843434] ? preempt_count_sub+0x50/0x80 [ 26.843459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.843483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.843511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.843540] kthread+0x337/0x6f0 [ 26.843563] ? trace_preempt_on+0x20/0xc0 [ 26.843590] ? __pfx_kthread+0x10/0x10 [ 26.843616] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.843644] ? calculate_sigpending+0x7b/0xa0 [ 26.843675] ? __pfx_kthread+0x10/0x10 [ 26.843701] ret_from_fork+0x116/0x1d0 [ 26.843723] ? __pfx_kthread+0x10/0x10 [ 26.843810] ret_from_fork_asm+0x1a/0x30 [ 26.843862] </TASK> [ 26.843876] [ 26.851855] Allocated by task 313: [ 26.852050] kasan_save_stack+0x45/0x70 [ 26.852201] kasan_save_track+0x18/0x40 [ 26.852424] kasan_save_alloc_info+0x3b/0x50 [ 26.852642] __kasan_kmalloc+0xb7/0xc0 [ 26.853139] __kmalloc_cache_noprof+0x189/0x420 [ 26.853393] kasan_atomics+0x95/0x310 [ 26.853562] kunit_try_run_case+0x1a5/0x480 [ 26.853717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.854028] kthread+0x337/0x6f0 [ 26.854202] ret_from_fork+0x116/0x1d0 [ 26.854396] ret_from_fork_asm+0x1a/0x30 [ 26.854595] [ 26.854687] The buggy address belongs to the object at ffff8881059cb500 [ 26.854687] which belongs to the cache kmalloc-64 of size 64 [ 26.855223] The buggy address is located 0 bytes to the right of [ 26.855223] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.855623] [ 26.855715] The buggy address belongs to the physical page: [ 26.856032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.856396] flags: 0x200000000000000(node=0|zone=2) [ 26.856630] page_type: f5(slab) [ 26.856854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.857199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.857519] page dumped because: kasan: bad access detected [ 26.857725] [ 26.858108] Memory state around the buggy address: [ 26.858339] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.858563] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.858964] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.859270] ^ [ 26.859475] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.859832] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.860115] ================================================================== [ 26.018721] ================================================================== [ 26.019212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 26.019578] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.020119] [ 26.020213] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.020280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.020293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.020318] Call Trace: [ 26.020340] <TASK> [ 26.020361] dump_stack_lvl+0x73/0xb0 [ 26.020394] print_report+0xd1/0x610 [ 26.020419] ? __virt_addr_valid+0x1db/0x2d0 [ 26.020445] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.020475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.020507] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.020538] kasan_report+0x141/0x180 [ 26.020562] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.020597] kasan_check_range+0x10c/0x1c0 [ 26.020624] __kasan_check_write+0x18/0x20 [ 26.020652] kasan_atomics_helper+0x4a0/0x5450 [ 26.020683] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.020739] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.020773] ? kasan_atomics+0x152/0x310 [ 26.020803] kasan_atomics+0x1dc/0x310 [ 26.020906] ? __pfx_kasan_atomics+0x10/0x10 [ 26.020942] ? __pfx_read_tsc+0x10/0x10 [ 26.020970] ? ktime_get_ts64+0x86/0x230 [ 26.021000] kunit_try_run_case+0x1a5/0x480 [ 26.021025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.021048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.021073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.021128] ? __kthread_parkme+0x82/0x180 [ 26.021153] ? preempt_count_sub+0x50/0x80 [ 26.021179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.021211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.021250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.021298] kthread+0x337/0x6f0 [ 26.021323] ? trace_preempt_on+0x20/0xc0 [ 26.021350] ? __pfx_kthread+0x10/0x10 [ 26.021376] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.021405] ? calculate_sigpending+0x7b/0xa0 [ 26.021434] ? __pfx_kthread+0x10/0x10 [ 26.021460] ret_from_fork+0x116/0x1d0 [ 26.021482] ? __pfx_kthread+0x10/0x10 [ 26.021506] ret_from_fork_asm+0x1a/0x30 [ 26.021542] </TASK> [ 26.021557] [ 26.031195] Allocated by task 313: [ 26.031378] kasan_save_stack+0x45/0x70 [ 26.031567] kasan_save_track+0x18/0x40 [ 26.031738] kasan_save_alloc_info+0x3b/0x50 [ 26.032051] __kasan_kmalloc+0xb7/0xc0 [ 26.032222] __kmalloc_cache_noprof+0x189/0x420 [ 26.032433] kasan_atomics+0x95/0x310 [ 26.032596] kunit_try_run_case+0x1a5/0x480 [ 26.032845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.033073] kthread+0x337/0x6f0 [ 26.033235] ret_from_fork+0x116/0x1d0 [ 26.033415] ret_from_fork_asm+0x1a/0x30 [ 26.033593] [ 26.033676] The buggy address belongs to the object at ffff8881059cb500 [ 26.033676] which belongs to the cache kmalloc-64 of size 64 [ 26.034654] The buggy address is located 0 bytes to the right of [ 26.034654] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.035777] [ 26.035886] The buggy address belongs to the physical page: [ 26.036068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.036324] flags: 0x200000000000000(node=0|zone=2) [ 26.036492] page_type: f5(slab) [ 26.036735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.038449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.039577] page dumped because: kasan: bad access detected [ 26.040292] [ 26.040629] Memory state around the buggy address: [ 26.041447] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.042390] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.042626] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.043470] ^ [ 26.044225] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.044657] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.045041] ================================================================== [ 26.259555] ================================================================== [ 26.260029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 26.260340] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.260592] [ 26.260702] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.260774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.260788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.260826] Call Trace: [ 26.260861] <TASK> [ 26.260882] dump_stack_lvl+0x73/0xb0 [ 26.260940] print_report+0xd1/0x610 [ 26.261015] ? __virt_addr_valid+0x1db/0x2d0 [ 26.261047] ? kasan_atomics_helper+0x992/0x5450 [ 26.261077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.261107] ? kasan_atomics_helper+0x992/0x5450 [ 26.261137] kasan_report+0x141/0x180 [ 26.261162] ? kasan_atomics_helper+0x992/0x5450 [ 26.261203] kasan_check_range+0x10c/0x1c0 [ 26.261231] __kasan_check_write+0x18/0x20 [ 26.261271] kasan_atomics_helper+0x992/0x5450 [ 26.261303] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.261334] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.261363] ? kasan_atomics+0x152/0x310 [ 26.261392] kasan_atomics+0x1dc/0x310 [ 26.261419] ? __pfx_kasan_atomics+0x10/0x10 [ 26.261446] ? __pfx_read_tsc+0x10/0x10 [ 26.261474] ? ktime_get_ts64+0x86/0x230 [ 26.261503] kunit_try_run_case+0x1a5/0x480 [ 26.261527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.261551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.261598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.261629] ? __kthread_parkme+0x82/0x180 [ 26.261652] ? preempt_count_sub+0x50/0x80 [ 26.261696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.261720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.261749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.261787] kthread+0x337/0x6f0 [ 26.261810] ? trace_preempt_on+0x20/0xc0 [ 26.261904] ? __pfx_kthread+0x10/0x10 [ 26.261929] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.261958] ? calculate_sigpending+0x7b/0xa0 [ 26.261988] ? __pfx_kthread+0x10/0x10 [ 26.262032] ret_from_fork+0x116/0x1d0 [ 26.262055] ? __pfx_kthread+0x10/0x10 [ 26.262079] ret_from_fork_asm+0x1a/0x30 [ 26.262115] </TASK> [ 26.262128] [ 26.270960] Allocated by task 313: [ 26.271508] kasan_save_stack+0x45/0x70 [ 26.271724] kasan_save_track+0x18/0x40 [ 26.272007] kasan_save_alloc_info+0x3b/0x50 [ 26.272160] __kasan_kmalloc+0xb7/0xc0 [ 26.272298] __kmalloc_cache_noprof+0x189/0x420 [ 26.272452] kasan_atomics+0x95/0x310 [ 26.272642] kunit_try_run_case+0x1a5/0x480 [ 26.272875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.273161] kthread+0x337/0x6f0 [ 26.273431] ret_from_fork+0x116/0x1d0 [ 26.273668] ret_from_fork_asm+0x1a/0x30 [ 26.274073] [ 26.274170] The buggy address belongs to the object at ffff8881059cb500 [ 26.274170] which belongs to the cache kmalloc-64 of size 64 [ 26.274671] The buggy address is located 0 bytes to the right of [ 26.274671] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.275609] [ 26.275717] The buggy address belongs to the physical page: [ 26.275984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.276448] flags: 0x200000000000000(node=0|zone=2) [ 26.276611] page_type: f5(slab) [ 26.276725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.277062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.277572] page dumped because: kasan: bad access detected [ 26.277880] [ 26.277968] Memory state around the buggy address: [ 26.278197] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.278525] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.278820] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.279017] ^ [ 26.279161] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.279487] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.279957] ================================================================== [ 27.289403] ================================================================== [ 27.289739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 27.290076] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.290414] [ 27.290521] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.290568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.290581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.290604] Call Trace: [ 27.290621] <TASK> [ 27.290639] dump_stack_lvl+0x73/0xb0 [ 27.290667] print_report+0xd1/0x610 [ 27.290690] ? __virt_addr_valid+0x1db/0x2d0 [ 27.290714] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.290744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.290773] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.290803] kasan_report+0x141/0x180 [ 27.290827] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.290861] kasan_check_range+0x10c/0x1c0 [ 27.290887] __kasan_check_write+0x18/0x20 [ 27.290915] kasan_atomics_helper+0x1f43/0x5450 [ 27.290945] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.290974] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.291001] ? kasan_atomics+0x152/0x310 [ 27.291029] kasan_atomics+0x1dc/0x310 [ 27.291054] ? __pfx_kasan_atomics+0x10/0x10 [ 27.291081] ? __pfx_read_tsc+0x10/0x10 [ 27.291106] ? ktime_get_ts64+0x86/0x230 [ 27.291133] kunit_try_run_case+0x1a5/0x480 [ 27.291155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.291176] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.291199] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.291229] ? __kthread_parkme+0x82/0x180 [ 27.291260] ? preempt_count_sub+0x50/0x80 [ 27.291284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.291307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.291335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.291363] kthread+0x337/0x6f0 [ 27.291401] ? trace_preempt_on+0x20/0xc0 [ 27.291429] ? __pfx_kthread+0x10/0x10 [ 27.291470] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.291499] ? calculate_sigpending+0x7b/0xa0 [ 27.291527] ? __pfx_kthread+0x10/0x10 [ 27.291552] ret_from_fork+0x116/0x1d0 [ 27.291573] ? __pfx_kthread+0x10/0x10 [ 27.291596] ret_from_fork_asm+0x1a/0x30 [ 27.291632] </TASK> [ 27.291644] [ 27.299962] Allocated by task 313: [ 27.300136] kasan_save_stack+0x45/0x70 [ 27.300321] kasan_save_track+0x18/0x40 [ 27.300526] kasan_save_alloc_info+0x3b/0x50 [ 27.300665] __kasan_kmalloc+0xb7/0xc0 [ 27.300786] __kmalloc_cache_noprof+0x189/0x420 [ 27.300933] kasan_atomics+0x95/0x310 [ 27.301059] kunit_try_run_case+0x1a5/0x480 [ 27.301189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.301367] kthread+0x337/0x6f0 [ 27.301479] ret_from_fork+0x116/0x1d0 [ 27.301599] ret_from_fork_asm+0x1a/0x30 [ 27.301893] [ 27.302016] The buggy address belongs to the object at ffff8881059cb500 [ 27.302016] which belongs to the cache kmalloc-64 of size 64 [ 27.302556] The buggy address is located 0 bytes to the right of [ 27.302556] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.303570] [ 27.303648] The buggy address belongs to the physical page: [ 27.303810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.304258] flags: 0x200000000000000(node=0|zone=2) [ 27.304411] page_type: f5(slab) [ 27.304524] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.304741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.305382] page dumped because: kasan: bad access detected [ 27.305908] [ 27.306009] Memory state around the buggy address: [ 27.306253] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.306612] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.307014] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.307224] ^ [ 27.307675] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.308047] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.308402] ================================================================== [ 26.822397] ================================================================== [ 26.822702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 26.823286] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.823568] [ 26.823682] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.823734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.823821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.823861] Call Trace: [ 26.823882] <TASK> [ 26.823901] dump_stack_lvl+0x73/0xb0 [ 26.823933] print_report+0xd1/0x610 [ 26.823958] ? __virt_addr_valid+0x1db/0x2d0 [ 26.823983] ? kasan_atomics_helper+0x1467/0x5450 [ 26.824013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.824044] ? kasan_atomics_helper+0x1467/0x5450 [ 26.824074] kasan_report+0x141/0x180 [ 26.824098] ? kasan_atomics_helper+0x1467/0x5450 [ 26.824133] kasan_check_range+0x10c/0x1c0 [ 26.824160] __kasan_check_write+0x18/0x20 [ 26.824189] kasan_atomics_helper+0x1467/0x5450 [ 26.824222] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.824263] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.824291] ? kasan_atomics+0x152/0x310 [ 26.824321] kasan_atomics+0x1dc/0x310 [ 26.824348] ? __pfx_kasan_atomics+0x10/0x10 [ 26.824376] ? __pfx_read_tsc+0x10/0x10 [ 26.824404] ? ktime_get_ts64+0x86/0x230 [ 26.824432] kunit_try_run_case+0x1a5/0x480 [ 26.824456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.824479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.824502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.824534] ? __kthread_parkme+0x82/0x180 [ 26.824555] ? preempt_count_sub+0x50/0x80 [ 26.824582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.824605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.824632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.824661] kthread+0x337/0x6f0 [ 26.824683] ? trace_preempt_on+0x20/0xc0 [ 26.824710] ? __pfx_kthread+0x10/0x10 [ 26.824733] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.824825] ? calculate_sigpending+0x7b/0xa0 [ 26.824871] ? __pfx_kthread+0x10/0x10 [ 26.824897] ret_from_fork+0x116/0x1d0 [ 26.824918] ? __pfx_kthread+0x10/0x10 [ 26.824942] ret_from_fork_asm+0x1a/0x30 [ 26.824978] </TASK> [ 26.824991] [ 26.832704] Allocated by task 313: [ 26.833088] kasan_save_stack+0x45/0x70 [ 26.833312] kasan_save_track+0x18/0x40 [ 26.833500] kasan_save_alloc_info+0x3b/0x50 [ 26.833705] __kasan_kmalloc+0xb7/0xc0 [ 26.833992] __kmalloc_cache_noprof+0x189/0x420 [ 26.834218] kasan_atomics+0x95/0x310 [ 26.834417] kunit_try_run_case+0x1a5/0x480 [ 26.834616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.834951] kthread+0x337/0x6f0 [ 26.835127] ret_from_fork+0x116/0x1d0 [ 26.835277] ret_from_fork_asm+0x1a/0x30 [ 26.835416] [ 26.835484] The buggy address belongs to the object at ffff8881059cb500 [ 26.835484] which belongs to the cache kmalloc-64 of size 64 [ 26.835840] The buggy address is located 0 bytes to the right of [ 26.835840] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.836387] [ 26.836485] The buggy address belongs to the physical page: [ 26.836740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.837096] flags: 0x200000000000000(node=0|zone=2) [ 26.837409] page_type: f5(slab) [ 26.837538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.837854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.838190] page dumped because: kasan: bad access detected [ 26.838451] [ 26.838540] Memory state around the buggy address: [ 26.838983] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.839335] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.839582] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.839973] ^ [ 26.840185] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.840448] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.840655] ================================================================== [ 26.344157] ================================================================== [ 26.344443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 26.344917] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.345222] [ 26.345366] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.345420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.345434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.345491] Call Trace: [ 26.345513] <TASK> [ 26.345536] dump_stack_lvl+0x73/0xb0 [ 26.345568] print_report+0xd1/0x610 [ 26.345593] ? __virt_addr_valid+0x1db/0x2d0 [ 26.345619] ? kasan_atomics_helper+0xc70/0x5450 [ 26.345681] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.345712] ? kasan_atomics_helper+0xc70/0x5450 [ 26.345838] kasan_report+0x141/0x180 [ 26.345886] ? kasan_atomics_helper+0xc70/0x5450 [ 26.345952] kasan_check_range+0x10c/0x1c0 [ 26.345980] __kasan_check_write+0x18/0x20 [ 26.346009] kasan_atomics_helper+0xc70/0x5450 [ 26.346040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.346070] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.346099] ? kasan_atomics+0x152/0x310 [ 26.346128] kasan_atomics+0x1dc/0x310 [ 26.346154] ? __pfx_kasan_atomics+0x10/0x10 [ 26.346182] ? __pfx_read_tsc+0x10/0x10 [ 26.346209] ? ktime_get_ts64+0x86/0x230 [ 26.346248] kunit_try_run_case+0x1a5/0x480 [ 26.346273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.346295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.346319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.346350] ? __kthread_parkme+0x82/0x180 [ 26.346373] ? preempt_count_sub+0x50/0x80 [ 26.346399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.346423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.346451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.346480] kthread+0x337/0x6f0 [ 26.346503] ? trace_preempt_on+0x20/0xc0 [ 26.346529] ? __pfx_kthread+0x10/0x10 [ 26.346554] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.346582] ? calculate_sigpending+0x7b/0xa0 [ 26.346611] ? __pfx_kthread+0x10/0x10 [ 26.346635] ret_from_fork+0x116/0x1d0 [ 26.346657] ? __pfx_kthread+0x10/0x10 [ 26.346682] ret_from_fork_asm+0x1a/0x30 [ 26.346718] </TASK> [ 26.346732] [ 26.354904] Allocated by task 313: [ 26.355115] kasan_save_stack+0x45/0x70 [ 26.355342] kasan_save_track+0x18/0x40 [ 26.355535] kasan_save_alloc_info+0x3b/0x50 [ 26.356010] __kasan_kmalloc+0xb7/0xc0 [ 26.356248] __kmalloc_cache_noprof+0x189/0x420 [ 26.356491] kasan_atomics+0x95/0x310 [ 26.356684] kunit_try_run_case+0x1a5/0x480 [ 26.357034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.357299] kthread+0x337/0x6f0 [ 26.357420] ret_from_fork+0x116/0x1d0 [ 26.357564] ret_from_fork_asm+0x1a/0x30 [ 26.357969] [ 26.358101] The buggy address belongs to the object at ffff8881059cb500 [ 26.358101] which belongs to the cache kmalloc-64 of size 64 [ 26.358608] The buggy address is located 0 bytes to the right of [ 26.358608] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.359267] [ 26.359371] The buggy address belongs to the physical page: [ 26.359623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.360100] flags: 0x200000000000000(node=0|zone=2) [ 26.360350] page_type: f5(slab) [ 26.360512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.361114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.361435] page dumped because: kasan: bad access detected [ 26.361695] [ 26.361794] Memory state around the buggy address: [ 26.361954] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.362292] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.362607] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.362920] ^ [ 26.363126] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.363520] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.363788] ================================================================== [ 27.107116] ================================================================== [ 27.107949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 27.108216] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.108462] [ 27.108551] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.108621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.108638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.108674] Call Trace: [ 27.108696] <TASK> [ 27.108721] dump_stack_lvl+0x73/0xb0 [ 27.108754] print_report+0xd1/0x610 [ 27.108790] ? __virt_addr_valid+0x1db/0x2d0 [ 27.108817] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.108851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.108885] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.108918] kasan_report+0x141/0x180 [ 27.108944] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.108981] kasan_check_range+0x10c/0x1c0 [ 27.109011] __kasan_check_write+0x18/0x20 [ 27.109040] kasan_atomics_helper+0x1b22/0x5450 [ 27.109074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.109107] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.109140] ? kasan_atomics+0x152/0x310 [ 27.109172] kasan_atomics+0x1dc/0x310 [ 27.109206] ? __pfx_kasan_atomics+0x10/0x10 [ 27.109246] ? __pfx_read_tsc+0x10/0x10 [ 27.109274] ? ktime_get_ts64+0x86/0x230 [ 27.109305] kunit_try_run_case+0x1a5/0x480 [ 27.109331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.109356] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.109383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.109417] ? __kthread_parkme+0x82/0x180 [ 27.109441] ? preempt_count_sub+0x50/0x80 [ 27.109469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.109497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.109529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.109564] kthread+0x337/0x6f0 [ 27.109587] ? trace_preempt_on+0x20/0xc0 [ 27.109616] ? __pfx_kthread+0x10/0x10 [ 27.109642] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.109672] ? calculate_sigpending+0x7b/0xa0 [ 27.109705] ? __pfx_kthread+0x10/0x10 [ 27.109732] ret_from_fork+0x116/0x1d0 [ 27.109755] ? __pfx_kthread+0x10/0x10 [ 27.109780] ret_from_fork_asm+0x1a/0x30 [ 27.109818] </TASK> [ 27.109831] [ 27.127648] Allocated by task 313: [ 27.127799] kasan_save_stack+0x45/0x70 [ 27.128256] kasan_save_track+0x18/0x40 [ 27.128629] kasan_save_alloc_info+0x3b/0x50 [ 27.129145] __kasan_kmalloc+0xb7/0xc0 [ 27.129549] __kmalloc_cache_noprof+0x189/0x420 [ 27.130054] kasan_atomics+0x95/0x310 [ 27.130489] kunit_try_run_case+0x1a5/0x480 [ 27.130889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.131488] kthread+0x337/0x6f0 [ 27.131728] ret_from_fork+0x116/0x1d0 [ 27.132051] ret_from_fork_asm+0x1a/0x30 [ 27.132523] [ 27.132717] The buggy address belongs to the object at ffff8881059cb500 [ 27.132717] which belongs to the cache kmalloc-64 of size 64 [ 27.133566] The buggy address is located 0 bytes to the right of [ 27.133566] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.134724] [ 27.134911] The buggy address belongs to the physical page: [ 27.135328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.135573] flags: 0x200000000000000(node=0|zone=2) [ 27.135735] page_type: f5(slab) [ 27.136148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.136505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.137538] page dumped because: kasan: bad access detected [ 27.137920] [ 27.138113] Memory state around the buggy address: [ 27.138290] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.139066] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.139784] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.140255] ^ [ 27.140408] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.140613] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.140961] ================================================================== [ 26.396227] ================================================================== [ 26.396868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 26.397666] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.398457] [ 26.398628] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.398703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.398717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.398742] Call Trace: [ 26.398775] <TASK> [ 26.398813] dump_stack_lvl+0x73/0xb0 [ 26.398854] print_report+0xd1/0x610 [ 26.398878] ? __virt_addr_valid+0x1db/0x2d0 [ 26.398905] ? kasan_atomics_helper+0xd47/0x5450 [ 26.398935] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.398965] ? kasan_atomics_helper+0xd47/0x5450 [ 26.398995] kasan_report+0x141/0x180 [ 26.399019] ? kasan_atomics_helper+0xd47/0x5450 [ 26.399054] kasan_check_range+0x10c/0x1c0 [ 26.399081] __kasan_check_write+0x18/0x20 [ 26.399109] kasan_atomics_helper+0xd47/0x5450 [ 26.399140] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.399171] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.399200] ? kasan_atomics+0x152/0x310 [ 26.399230] kasan_atomics+0x1dc/0x310 [ 26.399266] ? __pfx_kasan_atomics+0x10/0x10 [ 26.399293] ? __pfx_read_tsc+0x10/0x10 [ 26.399321] ? ktime_get_ts64+0x86/0x230 [ 26.399349] kunit_try_run_case+0x1a5/0x480 [ 26.399374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.399396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.399420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.399450] ? __kthread_parkme+0x82/0x180 [ 26.399473] ? preempt_count_sub+0x50/0x80 [ 26.399499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.399522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.399551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.399579] kthread+0x337/0x6f0 [ 26.399602] ? trace_preempt_on+0x20/0xc0 [ 26.399628] ? __pfx_kthread+0x10/0x10 [ 26.399652] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.399680] ? calculate_sigpending+0x7b/0xa0 [ 26.399710] ? __pfx_kthread+0x10/0x10 [ 26.399735] ret_from_fork+0x116/0x1d0 [ 26.399756] ? __pfx_kthread+0x10/0x10 [ 26.399780] ret_from_fork_asm+0x1a/0x30 [ 26.399860] </TASK> [ 26.399876] [ 26.413274] Allocated by task 313: [ 26.413557] kasan_save_stack+0x45/0x70 [ 26.413710] kasan_save_track+0x18/0x40 [ 26.414064] kasan_save_alloc_info+0x3b/0x50 [ 26.414604] __kasan_kmalloc+0xb7/0xc0 [ 26.415058] __kmalloc_cache_noprof+0x189/0x420 [ 26.415510] kasan_atomics+0x95/0x310 [ 26.415913] kunit_try_run_case+0x1a5/0x480 [ 26.416101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.416291] kthread+0x337/0x6f0 [ 26.416411] ret_from_fork+0x116/0x1d0 [ 26.416540] ret_from_fork_asm+0x1a/0x30 [ 26.416678] [ 26.416745] The buggy address belongs to the object at ffff8881059cb500 [ 26.416745] which belongs to the cache kmalloc-64 of size 64 [ 26.417971] The buggy address is located 0 bytes to the right of [ 26.417971] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.419389] [ 26.419579] The buggy address belongs to the physical page: [ 26.420112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.420801] flags: 0x200000000000000(node=0|zone=2) [ 26.421396] page_type: f5(slab) [ 26.421812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.422146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.422386] page dumped because: kasan: bad access detected [ 26.422554] [ 26.422619] Memory state around the buggy address: [ 26.422838] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.423531] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.424360] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.425206] ^ [ 26.425636] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.426394] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.427127] ================================================================== [ 25.888698] ================================================================== [ 25.889635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 25.890574] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 25.891259] [ 25.891437] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.891491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.891503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.891526] Call Trace: [ 25.891542] <TASK> [ 25.891562] dump_stack_lvl+0x73/0xb0 [ 25.891594] print_report+0xd1/0x610 [ 25.891618] ? __virt_addr_valid+0x1db/0x2d0 [ 25.891643] ? kasan_atomics_helper+0x4ba2/0x5450 [ 25.891672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.891700] ? kasan_atomics_helper+0x4ba2/0x5450 [ 25.891729] kasan_report+0x141/0x180 [ 25.891763] ? kasan_atomics_helper+0x4ba2/0x5450 [ 25.891797] __asan_report_store4_noabort+0x1b/0x30 [ 25.891863] kasan_atomics_helper+0x4ba2/0x5450 [ 25.891909] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.891938] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.891966] ? kasan_atomics+0x152/0x310 [ 25.891994] kasan_atomics+0x1dc/0x310 [ 25.892019] ? __pfx_kasan_atomics+0x10/0x10 [ 25.892046] ? __pfx_read_tsc+0x10/0x10 [ 25.892072] ? ktime_get_ts64+0x86/0x230 [ 25.892099] kunit_try_run_case+0x1a5/0x480 [ 25.892122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.892143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.892166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.892195] ? __kthread_parkme+0x82/0x180 [ 25.892217] ? preempt_count_sub+0x50/0x80 [ 25.892304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.892329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.892356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.892384] kthread+0x337/0x6f0 [ 25.892405] ? trace_preempt_on+0x20/0xc0 [ 25.892430] ? __pfx_kthread+0x10/0x10 [ 25.892453] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.892481] ? calculate_sigpending+0x7b/0xa0 [ 25.892509] ? __pfx_kthread+0x10/0x10 [ 25.892532] ret_from_fork+0x116/0x1d0 [ 25.892552] ? __pfx_kthread+0x10/0x10 [ 25.892575] ret_from_fork_asm+0x1a/0x30 [ 25.892610] </TASK> [ 25.892621] [ 25.905283] Allocated by task 313: [ 25.905443] kasan_save_stack+0x45/0x70 [ 25.906014] kasan_save_track+0x18/0x40 [ 25.906381] kasan_save_alloc_info+0x3b/0x50 [ 25.906751] __kasan_kmalloc+0xb7/0xc0 [ 25.907147] __kmalloc_cache_noprof+0x189/0x420 [ 25.907657] kasan_atomics+0x95/0x310 [ 25.907870] kunit_try_run_case+0x1a5/0x480 [ 25.908308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.908689] kthread+0x337/0x6f0 [ 25.908848] ret_from_fork+0x116/0x1d0 [ 25.909282] ret_from_fork_asm+0x1a/0x30 [ 25.909681] [ 25.909843] The buggy address belongs to the object at ffff8881059cb500 [ 25.909843] which belongs to the cache kmalloc-64 of size 64 [ 25.910991] The buggy address is located 0 bytes to the right of [ 25.910991] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 25.911562] [ 25.911633] The buggy address belongs to the physical page: [ 25.911826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 25.912601] flags: 0x200000000000000(node=0|zone=2) [ 25.913097] page_type: f5(slab) [ 25.913459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.914381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.915281] page dumped because: kasan: bad access detected [ 25.915547] [ 25.915612] Memory state around the buggy address: [ 25.915827] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.916449] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.917180] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.917953] ^ [ 25.918376] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.918630] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.919208] ================================================================== [ 27.336908] ================================================================== [ 27.337235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 27.337747] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.338281] [ 27.338628] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.338795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.338811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.338848] Call Trace: [ 27.338869] <TASK> [ 27.338892] dump_stack_lvl+0x73/0xb0 [ 27.338927] print_report+0xd1/0x610 [ 27.338951] ? __virt_addr_valid+0x1db/0x2d0 [ 27.338977] ? kasan_atomics_helper+0x2006/0x5450 [ 27.339007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.339036] ? kasan_atomics_helper+0x2006/0x5450 [ 27.339068] kasan_report+0x141/0x180 [ 27.339092] ? kasan_atomics_helper+0x2006/0x5450 [ 27.339128] kasan_check_range+0x10c/0x1c0 [ 27.339154] __kasan_check_write+0x18/0x20 [ 27.339182] kasan_atomics_helper+0x2006/0x5450 [ 27.339213] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.339255] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.339284] ? kasan_atomics+0x152/0x310 [ 27.339314] kasan_atomics+0x1dc/0x310 [ 27.339340] ? __pfx_kasan_atomics+0x10/0x10 [ 27.339367] ? __pfx_read_tsc+0x10/0x10 [ 27.339395] ? ktime_get_ts64+0x86/0x230 [ 27.339424] kunit_try_run_case+0x1a5/0x480 [ 27.339449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.339471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.339494] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.339525] ? __kthread_parkme+0x82/0x180 [ 27.339547] ? preempt_count_sub+0x50/0x80 [ 27.339572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.339596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.339624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.339651] kthread+0x337/0x6f0 [ 27.339674] ? trace_preempt_on+0x20/0xc0 [ 27.339700] ? __pfx_kthread+0x10/0x10 [ 27.339724] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.339753] ? calculate_sigpending+0x7b/0xa0 [ 27.339785] ? __pfx_kthread+0x10/0x10 [ 27.339810] ret_from_fork+0x116/0x1d0 [ 27.339843] ? __pfx_kthread+0x10/0x10 [ 27.339867] ret_from_fork_asm+0x1a/0x30 [ 27.339905] </TASK> [ 27.339917] [ 27.352317] Allocated by task 313: [ 27.352700] kasan_save_stack+0x45/0x70 [ 27.352898] kasan_save_track+0x18/0x40 [ 27.353326] kasan_save_alloc_info+0x3b/0x50 [ 27.353582] __kasan_kmalloc+0xb7/0xc0 [ 27.353712] __kmalloc_cache_noprof+0x189/0x420 [ 27.353894] kasan_atomics+0x95/0x310 [ 27.354288] kunit_try_run_case+0x1a5/0x480 [ 27.354688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.355232] kthread+0x337/0x6f0 [ 27.355589] ret_from_fork+0x116/0x1d0 [ 27.355952] ret_from_fork_asm+0x1a/0x30 [ 27.356088] [ 27.356154] The buggy address belongs to the object at ffff8881059cb500 [ 27.356154] which belongs to the cache kmalloc-64 of size 64 [ 27.356503] The buggy address is located 0 bytes to the right of [ 27.356503] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.356885] [ 27.356964] The buggy address belongs to the physical page: [ 27.357210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.357510] flags: 0x200000000000000(node=0|zone=2) [ 27.357682] page_type: f5(slab) [ 27.357844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.358365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.358635] page dumped because: kasan: bad access detected [ 27.358797] [ 27.358860] Memory state around the buggy address: [ 27.359006] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.359332] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.359755] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.360346] ^ [ 27.360561] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.360948] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.361163] ================================================================== [ 25.995619] ================================================================== [ 25.996307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 25.996861] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 25.997458] [ 25.997697] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.997759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.997774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.997905] Call Trace: [ 25.997928] <TASK> [ 25.997951] dump_stack_lvl+0x73/0xb0 [ 25.997985] print_report+0xd1/0x610 [ 25.998010] ? __virt_addr_valid+0x1db/0x2d0 [ 25.998037] ? kasan_atomics_helper+0x4b54/0x5450 [ 25.998067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.998098] ? kasan_atomics_helper+0x4b54/0x5450 [ 25.998129] kasan_report+0x141/0x180 [ 25.998154] ? kasan_atomics_helper+0x4b54/0x5450 [ 25.998189] __asan_report_load4_noabort+0x18/0x20 [ 25.998217] kasan_atomics_helper+0x4b54/0x5450 [ 25.998318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.998351] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.998381] ? kasan_atomics+0x152/0x310 [ 25.998412] kasan_atomics+0x1dc/0x310 [ 25.998438] ? __pfx_kasan_atomics+0x10/0x10 [ 25.998466] ? __pfx_read_tsc+0x10/0x10 [ 25.998494] ? ktime_get_ts64+0x86/0x230 [ 25.998522] kunit_try_run_case+0x1a5/0x480 [ 25.998547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.998570] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.998595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.998627] ? __kthread_parkme+0x82/0x180 [ 25.998651] ? preempt_count_sub+0x50/0x80 [ 25.998677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.998701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.998730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.998797] kthread+0x337/0x6f0 [ 25.998823] ? trace_preempt_on+0x20/0xc0 [ 25.998851] ? __pfx_kthread+0x10/0x10 [ 25.998877] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.998906] ? calculate_sigpending+0x7b/0xa0 [ 25.998935] ? __pfx_kthread+0x10/0x10 [ 25.998960] ret_from_fork+0x116/0x1d0 [ 25.998982] ? __pfx_kthread+0x10/0x10 [ 25.999006] ret_from_fork_asm+0x1a/0x30 [ 25.999042] </TASK> [ 25.999056] [ 26.010297] Allocated by task 313: [ 26.010483] kasan_save_stack+0x45/0x70 [ 26.010651] kasan_save_track+0x18/0x40 [ 26.010839] kasan_save_alloc_info+0x3b/0x50 [ 26.011107] __kasan_kmalloc+0xb7/0xc0 [ 26.011265] __kmalloc_cache_noprof+0x189/0x420 [ 26.011492] kasan_atomics+0x95/0x310 [ 26.011673] kunit_try_run_case+0x1a5/0x480 [ 26.011854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.012320] kthread+0x337/0x6f0 [ 26.012459] ret_from_fork+0x116/0x1d0 [ 26.012646] ret_from_fork_asm+0x1a/0x30 [ 26.012992] [ 26.013077] The buggy address belongs to the object at ffff8881059cb500 [ 26.013077] which belongs to the cache kmalloc-64 of size 64 [ 26.013581] The buggy address is located 0 bytes to the right of [ 26.013581] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.014159] [ 26.014292] The buggy address belongs to the physical page: [ 26.014505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.014902] flags: 0x200000000000000(node=0|zone=2) [ 26.015094] page_type: f5(slab) [ 26.015272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.015578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.015862] page dumped because: kasan: bad access detected [ 26.016028] [ 26.016114] Memory state around the buggy address: [ 26.016429] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.016693] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.016904] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.017111] ^ [ 26.017437] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.017763] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.018078] ================================================================== [ 27.142067] ================================================================== [ 27.142852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 27.143588] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.144363] [ 27.144606] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.144674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.144688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.144712] Call Trace: [ 27.144734] <TASK> [ 27.144756] dump_stack_lvl+0x73/0xb0 [ 27.144808] print_report+0xd1/0x610 [ 27.144833] ? __virt_addr_valid+0x1db/0x2d0 [ 27.144870] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.144901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.144952] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.144983] kasan_report+0x141/0x180 [ 27.145006] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.145041] kasan_check_range+0x10c/0x1c0 [ 27.145068] __kasan_check_write+0x18/0x20 [ 27.145095] kasan_atomics_helper+0x1c18/0x5450 [ 27.145127] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.145158] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.145186] ? kasan_atomics+0x152/0x310 [ 27.145222] kasan_atomics+0x1dc/0x310 [ 27.145258] ? __pfx_kasan_atomics+0x10/0x10 [ 27.145285] ? __pfx_read_tsc+0x10/0x10 [ 27.145311] ? ktime_get_ts64+0x86/0x230 [ 27.145340] kunit_try_run_case+0x1a5/0x480 [ 27.145363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.145385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.145409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.145440] ? __kthread_parkme+0x82/0x180 [ 27.145462] ? preempt_count_sub+0x50/0x80 [ 27.145487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.145511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.145539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.145568] kthread+0x337/0x6f0 [ 27.145590] ? trace_preempt_on+0x20/0xc0 [ 27.145617] ? __pfx_kthread+0x10/0x10 [ 27.145640] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.145668] ? calculate_sigpending+0x7b/0xa0 [ 27.145698] ? __pfx_kthread+0x10/0x10 [ 27.145723] ret_from_fork+0x116/0x1d0 [ 27.145743] ? __pfx_kthread+0x10/0x10 [ 27.145792] ret_from_fork_asm+0x1a/0x30 [ 27.145839] </TASK> [ 27.145852] [ 27.163344] Allocated by task 313: [ 27.164081] kasan_save_stack+0x45/0x70 [ 27.164721] kasan_save_track+0x18/0x40 [ 27.165512] kasan_save_alloc_info+0x3b/0x50 [ 27.165979] __kasan_kmalloc+0xb7/0xc0 [ 27.166380] __kmalloc_cache_noprof+0x189/0x420 [ 27.166932] kasan_atomics+0x95/0x310 [ 27.167215] kunit_try_run_case+0x1a5/0x480 [ 27.167375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.167949] kthread+0x337/0x6f0 [ 27.168323] ret_from_fork+0x116/0x1d0 [ 27.168654] ret_from_fork_asm+0x1a/0x30 [ 27.168933] [ 27.169163] The buggy address belongs to the object at ffff8881059cb500 [ 27.169163] which belongs to the cache kmalloc-64 of size 64 [ 27.170083] The buggy address is located 0 bytes to the right of [ 27.170083] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.170998] [ 27.171138] The buggy address belongs to the physical page: [ 27.171510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.172086] flags: 0x200000000000000(node=0|zone=2) [ 27.172354] page_type: f5(slab) [ 27.172684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.173136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.173382] page dumped because: kasan: bad access detected [ 27.173554] [ 27.173621] Memory state around the buggy address: [ 27.173957] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.174426] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.174860] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.175161] ^ [ 27.175332] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.175955] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.176533] ================================================================== [ 25.860419] ================================================================== [ 25.861022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 25.861378] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 25.861686] [ 25.861799] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.861858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.861872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.861896] Call Trace: [ 25.861911] <TASK> [ 25.861933] dump_stack_lvl+0x73/0xb0 [ 25.862174] print_report+0xd1/0x610 [ 25.862202] ? __virt_addr_valid+0x1db/0x2d0 [ 25.862230] ? kasan_atomics_helper+0x4bbc/0x5450 [ 25.862279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.862308] ? kasan_atomics_helper+0x4bbc/0x5450 [ 25.862337] kasan_report+0x141/0x180 [ 25.862360] ? kasan_atomics_helper+0x4bbc/0x5450 [ 25.862394] __asan_report_load4_noabort+0x18/0x20 [ 25.862421] kasan_atomics_helper+0x4bbc/0x5450 [ 25.862451] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.862480] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.862509] ? kasan_atomics+0x152/0x310 [ 25.862537] kasan_atomics+0x1dc/0x310 [ 25.862562] ? __pfx_kasan_atomics+0x10/0x10 [ 25.862589] ? __pfx_read_tsc+0x10/0x10 [ 25.862615] ? ktime_get_ts64+0x86/0x230 [ 25.862644] kunit_try_run_case+0x1a5/0x480 [ 25.862669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.862690] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.862713] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.862743] ? __kthread_parkme+0x82/0x180 [ 25.862765] ? preempt_count_sub+0x50/0x80 [ 25.862790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.862812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.862903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.862936] kthread+0x337/0x6f0 [ 25.862958] ? trace_preempt_on+0x20/0xc0 [ 25.862986] ? __pfx_kthread+0x10/0x10 [ 25.863008] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.863035] ? calculate_sigpending+0x7b/0xa0 [ 25.863064] ? __pfx_kthread+0x10/0x10 [ 25.863088] ret_from_fork+0x116/0x1d0 [ 25.863109] ? __pfx_kthread+0x10/0x10 [ 25.863132] ret_from_fork_asm+0x1a/0x30 [ 25.863168] </TASK> [ 25.863180] [ 25.871642] Allocated by task 313: [ 25.871791] kasan_save_stack+0x45/0x70 [ 25.871943] kasan_save_track+0x18/0x40 [ 25.872073] kasan_save_alloc_info+0x3b/0x50 [ 25.872217] __kasan_kmalloc+0xb7/0xc0 [ 25.872704] __kmalloc_cache_noprof+0x189/0x420 [ 25.873366] kasan_atomics+0x95/0x310 [ 25.873693] kunit_try_run_case+0x1a5/0x480 [ 25.874041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.874789] kthread+0x337/0x6f0 [ 25.875205] ret_from_fork+0x116/0x1d0 [ 25.875661] ret_from_fork_asm+0x1a/0x30 [ 25.876220] [ 25.876391] The buggy address belongs to the object at ffff8881059cb500 [ 25.876391] which belongs to the cache kmalloc-64 of size 64 [ 25.877920] The buggy address is located 0 bytes to the right of [ 25.877920] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 25.879502] [ 25.879665] The buggy address belongs to the physical page: [ 25.880315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 25.881341] flags: 0x200000000000000(node=0|zone=2) [ 25.881930] page_type: f5(slab) [ 25.882333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.883089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.883738] page dumped because: kasan: bad access detected [ 25.884208] [ 25.884371] Memory state around the buggy address: [ 25.884559] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.884849] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.885470] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.886174] ^ [ 25.886604] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.886888] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.887590] ================================================================== [ 27.227333] ================================================================== [ 27.228075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 27.228771] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.229522] [ 27.229745] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.229800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.229832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.229857] Call Trace: [ 27.229878] <TASK> [ 27.229900] dump_stack_lvl+0x73/0xb0 [ 27.229932] print_report+0xd1/0x610 [ 27.229956] ? __virt_addr_valid+0x1db/0x2d0 [ 27.229981] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.230011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.230041] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.230071] kasan_report+0x141/0x180 [ 27.230095] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.230130] kasan_check_range+0x10c/0x1c0 [ 27.230157] __kasan_check_write+0x18/0x20 [ 27.230184] kasan_atomics_helper+0x1d7a/0x5450 [ 27.230216] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.230257] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.230286] ? kasan_atomics+0x152/0x310 [ 27.230315] kasan_atomics+0x1dc/0x310 [ 27.230342] ? __pfx_kasan_atomics+0x10/0x10 [ 27.230368] ? __pfx_read_tsc+0x10/0x10 [ 27.230395] ? ktime_get_ts64+0x86/0x230 [ 27.230447] kunit_try_run_case+0x1a5/0x480 [ 27.230493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.230516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.230539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.230570] ? __kthread_parkme+0x82/0x180 [ 27.230592] ? preempt_count_sub+0x50/0x80 [ 27.230617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.230641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.230669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.230697] kthread+0x337/0x6f0 [ 27.230719] ? trace_preempt_on+0x20/0xc0 [ 27.230762] ? __pfx_kthread+0x10/0x10 [ 27.230787] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.230830] ? calculate_sigpending+0x7b/0xa0 [ 27.230860] ? __pfx_kthread+0x10/0x10 [ 27.230885] ret_from_fork+0x116/0x1d0 [ 27.230907] ? __pfx_kthread+0x10/0x10 [ 27.230931] ret_from_fork_asm+0x1a/0x30 [ 27.230966] </TASK> [ 27.230980] [ 27.243999] Allocated by task 313: [ 27.244136] kasan_save_stack+0x45/0x70 [ 27.244301] kasan_save_track+0x18/0x40 [ 27.244480] kasan_save_alloc_info+0x3b/0x50 [ 27.244654] __kasan_kmalloc+0xb7/0xc0 [ 27.244833] __kmalloc_cache_noprof+0x189/0x420 [ 27.245027] kasan_atomics+0x95/0x310 [ 27.245200] kunit_try_run_case+0x1a5/0x480 [ 27.245375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.245552] kthread+0x337/0x6f0 [ 27.245685] ret_from_fork+0x116/0x1d0 [ 27.245887] ret_from_fork_asm+0x1a/0x30 [ 27.246135] [ 27.246216] The buggy address belongs to the object at ffff8881059cb500 [ 27.246216] which belongs to the cache kmalloc-64 of size 64 [ 27.246574] The buggy address is located 0 bytes to the right of [ 27.246574] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.247431] [ 27.247626] The buggy address belongs to the physical page: [ 27.247914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.248255] flags: 0x200000000000000(node=0|zone=2) [ 27.248435] page_type: f5(slab) [ 27.248554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.248780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.249502] page dumped because: kasan: bad access detected [ 27.249982] [ 27.250101] Memory state around the buggy address: [ 27.250295] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.250505] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.250734] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.251049] ^ [ 27.251287] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.251609] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.251886] ================================================================== [ 27.383349] ================================================================== [ 27.383663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 27.384364] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.384697] [ 27.384844] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.384937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.384952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.384977] Call Trace: [ 27.385000] <TASK> [ 27.385033] dump_stack_lvl+0x73/0xb0 [ 27.385066] print_report+0xd1/0x610 [ 27.385091] ? __virt_addr_valid+0x1db/0x2d0 [ 27.385117] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.385147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.385177] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.385256] kasan_report+0x141/0x180 [ 27.385281] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.385316] kasan_check_range+0x10c/0x1c0 [ 27.385342] __kasan_check_write+0x18/0x20 [ 27.385370] kasan_atomics_helper+0x20c8/0x5450 [ 27.385401] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.385432] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.385462] ? kasan_atomics+0x152/0x310 [ 27.385492] kasan_atomics+0x1dc/0x310 [ 27.385518] ? __pfx_kasan_atomics+0x10/0x10 [ 27.385545] ? __pfx_read_tsc+0x10/0x10 [ 27.385572] ? ktime_get_ts64+0x86/0x230 [ 27.385601] kunit_try_run_case+0x1a5/0x480 [ 27.385626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.385648] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.385672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.385704] ? __kthread_parkme+0x82/0x180 [ 27.385727] ? preempt_count_sub+0x50/0x80 [ 27.385753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.385776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.385806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.385845] kthread+0x337/0x6f0 [ 27.385869] ? trace_preempt_on+0x20/0xc0 [ 27.385895] ? __pfx_kthread+0x10/0x10 [ 27.385919] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.385948] ? calculate_sigpending+0x7b/0xa0 [ 27.385977] ? __pfx_kthread+0x10/0x10 [ 27.386003] ret_from_fork+0x116/0x1d0 [ 27.386025] ? __pfx_kthread+0x10/0x10 [ 27.386048] ret_from_fork_asm+0x1a/0x30 [ 27.386083] </TASK> [ 27.386096] [ 27.393949] Allocated by task 313: [ 27.394085] kasan_save_stack+0x45/0x70 [ 27.394221] kasan_save_track+0x18/0x40 [ 27.394358] kasan_save_alloc_info+0x3b/0x50 [ 27.394496] __kasan_kmalloc+0xb7/0xc0 [ 27.394616] __kmalloc_cache_noprof+0x189/0x420 [ 27.394816] kasan_atomics+0x95/0x310 [ 27.395059] kunit_try_run_case+0x1a5/0x480 [ 27.395303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.395551] kthread+0x337/0x6f0 [ 27.395718] ret_from_fork+0x116/0x1d0 [ 27.395977] ret_from_fork_asm+0x1a/0x30 [ 27.396211] [ 27.396312] The buggy address belongs to the object at ffff8881059cb500 [ 27.396312] which belongs to the cache kmalloc-64 of size 64 [ 27.396862] The buggy address is located 0 bytes to the right of [ 27.396862] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.397466] [ 27.397556] The buggy address belongs to the physical page: [ 27.397831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.398179] flags: 0x200000000000000(node=0|zone=2) [ 27.398453] page_type: f5(slab) [ 27.398660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.398986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.399629] page dumped because: kasan: bad access detected [ 27.399915] [ 27.400004] Memory state around the buggy address: [ 27.400221] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.400546] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.400947] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.401344] ^ [ 27.401620] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.401935] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.402136] ================================================================== [ 27.083528] ================================================================== [ 27.084001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 27.084296] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.084627] [ 27.084739] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.084804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.084819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.084844] Call Trace: [ 27.084864] <TASK> [ 27.084886] dump_stack_lvl+0x73/0xb0 [ 27.084917] print_report+0xd1/0x610 [ 27.084942] ? __virt_addr_valid+0x1db/0x2d0 [ 27.084967] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.084997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.085072] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.085107] kasan_report+0x141/0x180 [ 27.085132] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.085167] kasan_check_range+0x10c/0x1c0 [ 27.085199] __kasan_check_write+0x18/0x20 [ 27.085227] kasan_atomics_helper+0x1a7f/0x5450 [ 27.085269] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.085299] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.085328] ? kasan_atomics+0x152/0x310 [ 27.085357] kasan_atomics+0x1dc/0x310 [ 27.085384] ? __pfx_kasan_atomics+0x10/0x10 [ 27.085411] ? __pfx_read_tsc+0x10/0x10 [ 27.085437] ? ktime_get_ts64+0x86/0x230 [ 27.085465] kunit_try_run_case+0x1a5/0x480 [ 27.085489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.085511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.085534] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.085566] ? __kthread_parkme+0x82/0x180 [ 27.085589] ? preempt_count_sub+0x50/0x80 [ 27.085614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.085638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.085667] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.085695] kthread+0x337/0x6f0 [ 27.085718] ? trace_preempt_on+0x20/0xc0 [ 27.085784] ? __pfx_kthread+0x10/0x10 [ 27.085812] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.085852] ? calculate_sigpending+0x7b/0xa0 [ 27.085881] ? __pfx_kthread+0x10/0x10 [ 27.085907] ret_from_fork+0x116/0x1d0 [ 27.085929] ? __pfx_kthread+0x10/0x10 [ 27.085953] ret_from_fork_asm+0x1a/0x30 [ 27.085989] </TASK> [ 27.086001] [ 27.094649] Allocated by task 313: [ 27.094800] kasan_save_stack+0x45/0x70 [ 27.094952] kasan_save_track+0x18/0x40 [ 27.095087] kasan_save_alloc_info+0x3b/0x50 [ 27.095274] __kasan_kmalloc+0xb7/0xc0 [ 27.095435] __kmalloc_cache_noprof+0x189/0x420 [ 27.095675] kasan_atomics+0x95/0x310 [ 27.095883] kunit_try_run_case+0x1a5/0x480 [ 27.096027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.096548] kthread+0x337/0x6f0 [ 27.096789] ret_from_fork+0x116/0x1d0 [ 27.097265] ret_from_fork_asm+0x1a/0x30 [ 27.097632] [ 27.097837] The buggy address belongs to the object at ffff8881059cb500 [ 27.097837] which belongs to the cache kmalloc-64 of size 64 [ 27.098272] The buggy address is located 0 bytes to the right of [ 27.098272] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.099308] [ 27.099508] The buggy address belongs to the physical page: [ 27.100192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.100933] flags: 0x200000000000000(node=0|zone=2) [ 27.101490] page_type: f5(slab) [ 27.101829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.102461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.103022] page dumped because: kasan: bad access detected [ 27.103495] [ 27.103562] Memory state around the buggy address: [ 27.103720] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.103942] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.104156] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.104765] ^ [ 27.105220] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.105611] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.106173] ================================================================== [ 26.778653] ================================================================== [ 26.779006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 26.779456] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.779981] [ 26.780070] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.780121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.780135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.780171] Call Trace: [ 26.780193] <TASK> [ 26.780212] dump_stack_lvl+0x73/0xb0 [ 26.780266] print_report+0xd1/0x610 [ 26.780290] ? __virt_addr_valid+0x1db/0x2d0 [ 26.780319] ? kasan_atomics_helper+0x13b5/0x5450 [ 26.780358] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.780389] ? kasan_atomics_helper+0x13b5/0x5450 [ 26.780419] kasan_report+0x141/0x180 [ 26.780453] ? kasan_atomics_helper+0x13b5/0x5450 [ 26.780488] kasan_check_range+0x10c/0x1c0 [ 26.780524] __kasan_check_read+0x15/0x20 [ 26.780551] kasan_atomics_helper+0x13b5/0x5450 [ 26.780583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.780624] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.780653] ? kasan_atomics+0x152/0x310 [ 26.780691] kasan_atomics+0x1dc/0x310 [ 26.780717] ? __pfx_kasan_atomics+0x10/0x10 [ 26.780744] ? __pfx_read_tsc+0x10/0x10 [ 26.780798] ? ktime_get_ts64+0x86/0x230 [ 26.780826] kunit_try_run_case+0x1a5/0x480 [ 26.780860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.780882] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.780907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.780938] ? __kthread_parkme+0x82/0x180 [ 26.780960] ? preempt_count_sub+0x50/0x80 [ 26.780986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.781010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.781038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.781067] kthread+0x337/0x6f0 [ 26.781090] ? trace_preempt_on+0x20/0xc0 [ 26.781116] ? __pfx_kthread+0x10/0x10 [ 26.781140] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.781168] ? calculate_sigpending+0x7b/0xa0 [ 26.781200] ? __pfx_kthread+0x10/0x10 [ 26.781226] ret_from_fork+0x116/0x1d0 [ 26.781256] ? __pfx_kthread+0x10/0x10 [ 26.781279] ret_from_fork_asm+0x1a/0x30 [ 26.781316] </TASK> [ 26.781329] [ 26.792616] Allocated by task 313: [ 26.792968] kasan_save_stack+0x45/0x70 [ 26.793581] kasan_save_track+0x18/0x40 [ 26.794001] kasan_save_alloc_info+0x3b/0x50 [ 26.794166] __kasan_kmalloc+0xb7/0xc0 [ 26.794308] __kmalloc_cache_noprof+0x189/0x420 [ 26.794463] kasan_atomics+0x95/0x310 [ 26.794594] kunit_try_run_case+0x1a5/0x480 [ 26.794734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.795235] kthread+0x337/0x6f0 [ 26.796002] ret_from_fork+0x116/0x1d0 [ 26.796407] ret_from_fork_asm+0x1a/0x30 [ 26.796777] [ 26.796994] The buggy address belongs to the object at ffff8881059cb500 [ 26.796994] which belongs to the cache kmalloc-64 of size 64 [ 26.798116] The buggy address is located 0 bytes to the right of [ 26.798116] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.799298] [ 26.799458] The buggy address belongs to the physical page: [ 26.799980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.800517] flags: 0x200000000000000(node=0|zone=2) [ 26.801106] page_type: f5(slab) [ 26.801330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.801561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.801794] page dumped because: kasan: bad access detected [ 26.801960] [ 26.802024] Memory state around the buggy address: [ 26.802174] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.802427] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.802710] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.802926] ^ [ 26.803120] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.803464] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.803738] ================================================================== [ 26.078028] ================================================================== [ 26.078647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 26.079268] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.079497] [ 26.079585] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.079638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.079652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.079675] Call Trace: [ 26.079699] <TASK> [ 26.079722] dump_stack_lvl+0x73/0xb0 [ 26.079799] print_report+0xd1/0x610 [ 26.079839] ? __virt_addr_valid+0x1db/0x2d0 [ 26.079866] ? kasan_atomics_helper+0x565/0x5450 [ 26.079896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.079926] ? kasan_atomics_helper+0x565/0x5450 [ 26.079957] kasan_report+0x141/0x180 [ 26.079981] ? kasan_atomics_helper+0x565/0x5450 [ 26.080015] kasan_check_range+0x10c/0x1c0 [ 26.080042] __kasan_check_write+0x18/0x20 [ 26.080071] kasan_atomics_helper+0x565/0x5450 [ 26.080101] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.080132] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.080162] ? kasan_atomics+0x152/0x310 [ 26.080191] kasan_atomics+0x1dc/0x310 [ 26.080217] ? __pfx_kasan_atomics+0x10/0x10 [ 26.080255] ? __pfx_read_tsc+0x10/0x10 [ 26.080281] ? ktime_get_ts64+0x86/0x230 [ 26.080310] kunit_try_run_case+0x1a5/0x480 [ 26.080334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.080357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.080381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.080412] ? __kthread_parkme+0x82/0x180 [ 26.080435] ? preempt_count_sub+0x50/0x80 [ 26.080461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.080485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.080514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.080543] kthread+0x337/0x6f0 [ 26.080565] ? trace_preempt_on+0x20/0xc0 [ 26.080592] ? __pfx_kthread+0x10/0x10 [ 26.080616] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.080645] ? calculate_sigpending+0x7b/0xa0 [ 26.080674] ? __pfx_kthread+0x10/0x10 [ 26.080699] ret_from_fork+0x116/0x1d0 [ 26.080720] ? __pfx_kthread+0x10/0x10 [ 26.080746] ret_from_fork_asm+0x1a/0x30 [ 26.080822] </TASK> [ 26.080835] [ 26.090689] Allocated by task 313: [ 26.090885] kasan_save_stack+0x45/0x70 [ 26.091256] kasan_save_track+0x18/0x40 [ 26.091598] kasan_save_alloc_info+0x3b/0x50 [ 26.091821] __kasan_kmalloc+0xb7/0xc0 [ 26.092515] __kmalloc_cache_noprof+0x189/0x420 [ 26.092721] kasan_atomics+0x95/0x310 [ 26.092906] kunit_try_run_case+0x1a5/0x480 [ 26.093086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.093578] kthread+0x337/0x6f0 [ 26.093742] ret_from_fork+0x116/0x1d0 [ 26.093873] ret_from_fork_asm+0x1a/0x30 [ 26.094009] [ 26.094078] The buggy address belongs to the object at ffff8881059cb500 [ 26.094078] which belongs to the cache kmalloc-64 of size 64 [ 26.095545] The buggy address is located 0 bytes to the right of [ 26.095545] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.097071] [ 26.097174] The buggy address belongs to the physical page: [ 26.097380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.097633] flags: 0x200000000000000(node=0|zone=2) [ 26.097823] page_type: f5(slab) [ 26.097970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.098271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.098558] page dumped because: kasan: bad access detected [ 26.098772] [ 26.098854] Memory state around the buggy address: [ 26.099059] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.100020] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.100258] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.101324] ^ [ 26.102043] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.103234] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.104546] ================================================================== [ 26.510202] ================================================================== [ 26.510675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 26.511086] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.511426] [ 26.511642] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.511694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.511708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.511732] Call Trace: [ 26.511752] <TASK> [ 26.511772] dump_stack_lvl+0x73/0xb0 [ 26.511803] print_report+0xd1/0x610 [ 26.511828] ? __virt_addr_valid+0x1db/0x2d0 [ 26.511853] ? kasan_atomics_helper+0xfa9/0x5450 [ 26.511884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.511913] ? kasan_atomics_helper+0xfa9/0x5450 [ 26.511944] kasan_report+0x141/0x180 [ 26.511969] ? kasan_atomics_helper+0xfa9/0x5450 [ 26.512004] kasan_check_range+0x10c/0x1c0 [ 26.512031] __kasan_check_write+0x18/0x20 [ 26.512068] kasan_atomics_helper+0xfa9/0x5450 [ 26.512113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.512152] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.512192] ? kasan_atomics+0x152/0x310 [ 26.512221] kasan_atomics+0x1dc/0x310 [ 26.512256] ? __pfx_kasan_atomics+0x10/0x10 [ 26.512284] ? __pfx_read_tsc+0x10/0x10 [ 26.512310] ? ktime_get_ts64+0x86/0x230 [ 26.512339] kunit_try_run_case+0x1a5/0x480 [ 26.512363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.512386] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.512410] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.512441] ? __kthread_parkme+0x82/0x180 [ 26.512465] ? preempt_count_sub+0x50/0x80 [ 26.512490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.512515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.512551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.512580] kthread+0x337/0x6f0 [ 26.512613] ? trace_preempt_on+0x20/0xc0 [ 26.512640] ? __pfx_kthread+0x10/0x10 [ 26.512664] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.512693] ? calculate_sigpending+0x7b/0xa0 [ 26.512722] ? __pfx_kthread+0x10/0x10 [ 26.512746] ret_from_fork+0x116/0x1d0 [ 26.512779] ? __pfx_kthread+0x10/0x10 [ 26.512803] ret_from_fork_asm+0x1a/0x30 [ 26.512849] </TASK> [ 26.512862] [ 26.521012] Allocated by task 313: [ 26.521142] kasan_save_stack+0x45/0x70 [ 26.521305] kasan_save_track+0x18/0x40 [ 26.521435] kasan_save_alloc_info+0x3b/0x50 [ 26.521579] __kasan_kmalloc+0xb7/0xc0 [ 26.521707] __kmalloc_cache_noprof+0x189/0x420 [ 26.521972] kasan_atomics+0x95/0x310 [ 26.522410] kunit_try_run_case+0x1a5/0x480 [ 26.522614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.522893] kthread+0x337/0x6f0 [ 26.523062] ret_from_fork+0x116/0x1d0 [ 26.523260] ret_from_fork_asm+0x1a/0x30 [ 26.523671] [ 26.523819] The buggy address belongs to the object at ffff8881059cb500 [ 26.523819] which belongs to the cache kmalloc-64 of size 64 [ 26.524400] The buggy address is located 0 bytes to the right of [ 26.524400] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.524769] [ 26.524842] The buggy address belongs to the physical page: [ 26.525231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.527443] flags: 0x200000000000000(node=0|zone=2) [ 26.528141] page_type: f5(slab) [ 26.528598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.529570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.530386] page dumped because: kasan: bad access detected [ 26.531133] [ 26.531448] Memory state around the buggy address: [ 26.531624] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.532277] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.533212] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.533915] ^ [ 26.534405] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.534624] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.534840] ================================================================== [ 27.497964] ================================================================== [ 27.498225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 27.498538] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.499017] [ 27.499133] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.499184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.499198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.499224] Call Trace: [ 27.499255] <TASK> [ 27.499275] dump_stack_lvl+0x73/0xb0 [ 27.499305] print_report+0xd1/0x610 [ 27.499330] ? __virt_addr_valid+0x1db/0x2d0 [ 27.499355] ? kasan_atomics_helper+0x5115/0x5450 [ 27.499385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.499416] ? kasan_atomics_helper+0x5115/0x5450 [ 27.499446] kasan_report+0x141/0x180 [ 27.499471] ? kasan_atomics_helper+0x5115/0x5450 [ 27.499506] __asan_report_load8_noabort+0x18/0x20 [ 27.499535] kasan_atomics_helper+0x5115/0x5450 [ 27.499566] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.499598] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.499626] ? kasan_atomics+0x152/0x310 [ 27.499656] kasan_atomics+0x1dc/0x310 [ 27.499682] ? __pfx_kasan_atomics+0x10/0x10 [ 27.499712] ? __pfx_read_tsc+0x10/0x10 [ 27.499740] ? ktime_get_ts64+0x86/0x230 [ 27.499768] kunit_try_run_case+0x1a5/0x480 [ 27.499792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.499815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.499847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.499878] ? __kthread_parkme+0x82/0x180 [ 27.499901] ? preempt_count_sub+0x50/0x80 [ 27.499927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.499951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.499980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.500010] kthread+0x337/0x6f0 [ 27.500034] ? trace_preempt_on+0x20/0xc0 [ 27.500070] ? __pfx_kthread+0x10/0x10 [ 27.500094] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.500123] ? calculate_sigpending+0x7b/0xa0 [ 27.500152] ? __pfx_kthread+0x10/0x10 [ 27.500177] ret_from_fork+0x116/0x1d0 [ 27.500199] ? __pfx_kthread+0x10/0x10 [ 27.500223] ret_from_fork_asm+0x1a/0x30 [ 27.500267] </TASK> [ 27.500279] [ 27.507291] Allocated by task 313: [ 27.507423] kasan_save_stack+0x45/0x70 [ 27.507564] kasan_save_track+0x18/0x40 [ 27.507697] kasan_save_alloc_info+0x3b/0x50 [ 27.507931] __kasan_kmalloc+0xb7/0xc0 [ 27.508116] __kmalloc_cache_noprof+0x189/0x420 [ 27.508348] kasan_atomics+0x95/0x310 [ 27.508528] kunit_try_run_case+0x1a5/0x480 [ 27.508730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.509210] kthread+0x337/0x6f0 [ 27.509387] ret_from_fork+0x116/0x1d0 [ 27.509542] ret_from_fork_asm+0x1a/0x30 [ 27.509678] [ 27.509766] The buggy address belongs to the object at ffff8881059cb500 [ 27.509766] which belongs to the cache kmalloc-64 of size 64 [ 27.510389] The buggy address is located 0 bytes to the right of [ 27.510389] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.510966] [ 27.511056] The buggy address belongs to the physical page: [ 27.511290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.511593] flags: 0x200000000000000(node=0|zone=2) [ 27.511778] page_type: f5(slab) [ 27.512035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.512355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.512606] page dumped because: kasan: bad access detected [ 27.512772] [ 27.512835] Memory state around the buggy address: [ 27.512988] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.513204] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.513524] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.513834] ^ [ 27.514064] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.514363] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.514573] ================================================================== [ 26.565076] ================================================================== [ 26.565361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 26.565673] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.565989] [ 26.566075] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.566147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.566161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.566186] Call Trace: [ 26.566208] <TASK> [ 26.566227] dump_stack_lvl+0x73/0xb0 [ 26.566269] print_report+0xd1/0x610 [ 26.566294] ? __virt_addr_valid+0x1db/0x2d0 [ 26.566320] ? kasan_atomics_helper+0x1079/0x5450 [ 26.566352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.566383] ? kasan_atomics_helper+0x1079/0x5450 [ 26.566413] kasan_report+0x141/0x180 [ 26.566438] ? kasan_atomics_helper+0x1079/0x5450 [ 26.566472] kasan_check_range+0x10c/0x1c0 [ 26.566499] __kasan_check_write+0x18/0x20 [ 26.566528] kasan_atomics_helper+0x1079/0x5450 [ 26.566560] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.566590] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.566619] ? kasan_atomics+0x152/0x310 [ 26.566649] kasan_atomics+0x1dc/0x310 [ 26.566676] ? __pfx_kasan_atomics+0x10/0x10 [ 26.566703] ? __pfx_read_tsc+0x10/0x10 [ 26.566729] ? ktime_get_ts64+0x86/0x230 [ 26.566757] kunit_try_run_case+0x1a5/0x480 [ 26.566781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.566803] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.566882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.566917] ? __kthread_parkme+0x82/0x180 [ 26.566940] ? preempt_count_sub+0x50/0x80 [ 26.566965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.566989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.567018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.567046] kthread+0x337/0x6f0 [ 26.567069] ? trace_preempt_on+0x20/0xc0 [ 26.567096] ? __pfx_kthread+0x10/0x10 [ 26.567120] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.567149] ? calculate_sigpending+0x7b/0xa0 [ 26.567177] ? __pfx_kthread+0x10/0x10 [ 26.567203] ret_from_fork+0x116/0x1d0 [ 26.567225] ? __pfx_kthread+0x10/0x10 [ 26.567260] ret_from_fork_asm+0x1a/0x30 [ 26.567295] </TASK> [ 26.567308] [ 26.577720] Allocated by task 313: [ 26.578143] kasan_save_stack+0x45/0x70 [ 26.578324] kasan_save_track+0x18/0x40 [ 26.578514] kasan_save_alloc_info+0x3b/0x50 [ 26.578733] __kasan_kmalloc+0xb7/0xc0 [ 26.578882] __kmalloc_cache_noprof+0x189/0x420 [ 26.579121] kasan_atomics+0x95/0x310 [ 26.579291] kunit_try_run_case+0x1a5/0x480 [ 26.579478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.579692] kthread+0x337/0x6f0 [ 26.579857] ret_from_fork+0x116/0x1d0 [ 26.580098] ret_from_fork_asm+0x1a/0x30 [ 26.580254] [ 26.580342] The buggy address belongs to the object at ffff8881059cb500 [ 26.580342] which belongs to the cache kmalloc-64 of size 64 [ 26.580947] The buggy address is located 0 bytes to the right of [ 26.580947] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.581463] [ 26.581550] The buggy address belongs to the physical page: [ 26.581780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.582641] flags: 0x200000000000000(node=0|zone=2) [ 26.582830] page_type: f5(slab) [ 26.582950] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.583168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.583474] page dumped because: kasan: bad access detected [ 26.583722] [ 26.583811] Memory state around the buggy address: [ 26.584035] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.584784] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.585282] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.585733] ^ [ 26.586385] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.587108] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.587589] ================================================================== [ 26.755134] ================================================================== [ 26.755652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 26.756519] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.757043] [ 26.757317] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.757393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.757407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.757432] Call Trace: [ 26.757456] <TASK> [ 26.757478] dump_stack_lvl+0x73/0xb0 [ 26.757513] print_report+0xd1/0x610 [ 26.757537] ? __virt_addr_valid+0x1db/0x2d0 [ 26.757563] ? kasan_atomics_helper+0x49ce/0x5450 [ 26.757594] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.757625] ? kasan_atomics_helper+0x49ce/0x5450 [ 26.757655] kasan_report+0x141/0x180 [ 26.757680] ? kasan_atomics_helper+0x49ce/0x5450 [ 26.757714] __asan_report_load4_noabort+0x18/0x20 [ 26.757741] kasan_atomics_helper+0x49ce/0x5450 [ 26.757855] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.757887] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.757916] ? kasan_atomics+0x152/0x310 [ 26.757986] kasan_atomics+0x1dc/0x310 [ 26.758013] ? __pfx_kasan_atomics+0x10/0x10 [ 26.758040] ? __pfx_read_tsc+0x10/0x10 [ 26.758069] ? ktime_get_ts64+0x86/0x230 [ 26.758097] kunit_try_run_case+0x1a5/0x480 [ 26.758122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.758145] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.758169] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.758199] ? __kthread_parkme+0x82/0x180 [ 26.758222] ? preempt_count_sub+0x50/0x80 [ 26.758260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.758284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.758312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.758340] kthread+0x337/0x6f0 [ 26.758363] ? trace_preempt_on+0x20/0xc0 [ 26.758390] ? __pfx_kthread+0x10/0x10 [ 26.758413] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.758442] ? calculate_sigpending+0x7b/0xa0 [ 26.758471] ? __pfx_kthread+0x10/0x10 [ 26.758496] ret_from_fork+0x116/0x1d0 [ 26.758520] ? __pfx_kthread+0x10/0x10 [ 26.758545] ret_from_fork_asm+0x1a/0x30 [ 26.758583] </TASK> [ 26.758596] [ 26.769610] Allocated by task 313: [ 26.769826] kasan_save_stack+0x45/0x70 [ 26.770147] kasan_save_track+0x18/0x40 [ 26.770360] kasan_save_alloc_info+0x3b/0x50 [ 26.770532] __kasan_kmalloc+0xb7/0xc0 [ 26.770661] __kmalloc_cache_noprof+0x189/0x420 [ 26.770816] kasan_atomics+0x95/0x310 [ 26.771058] kunit_try_run_case+0x1a5/0x480 [ 26.771276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.771527] kthread+0x337/0x6f0 [ 26.771715] ret_from_fork+0x116/0x1d0 [ 26.771942] ret_from_fork_asm+0x1a/0x30 [ 26.772149] [ 26.772225] The buggy address belongs to the object at ffff8881059cb500 [ 26.772225] which belongs to the cache kmalloc-64 of size 64 [ 26.772626] The buggy address is located 0 bytes to the right of [ 26.772626] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.773507] [ 26.773592] The buggy address belongs to the physical page: [ 26.773944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.774270] flags: 0x200000000000000(node=0|zone=2) [ 26.774575] page_type: f5(slab) [ 26.774722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.775125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.775531] page dumped because: kasan: bad access detected [ 26.775803] [ 26.775901] Memory state around the buggy address: [ 26.776138] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.776532] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.776848] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.777229] ^ [ 26.777521] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.777821] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.778105] ================================================================== [ 26.804150] ================================================================== [ 26.804527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 26.804939] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.805253] [ 26.805364] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.805418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.805433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.805458] Call Trace: [ 26.805482] <TASK> [ 26.805506] dump_stack_lvl+0x73/0xb0 [ 26.805538] print_report+0xd1/0x610 [ 26.805563] ? __virt_addr_valid+0x1db/0x2d0 [ 26.805616] ? kasan_atomics_helper+0x4eae/0x5450 [ 26.805647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.805677] ? kasan_atomics_helper+0x4eae/0x5450 [ 26.805707] kasan_report+0x141/0x180 [ 26.805732] ? kasan_atomics_helper+0x4eae/0x5450 [ 26.805774] __asan_report_load8_noabort+0x18/0x20 [ 26.805803] kasan_atomics_helper+0x4eae/0x5450 [ 26.805834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.805865] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.805893] ? kasan_atomics+0x152/0x310 [ 26.805923] kasan_atomics+0x1dc/0x310 [ 26.805949] ? __pfx_kasan_atomics+0x10/0x10 [ 26.805976] ? __pfx_read_tsc+0x10/0x10 [ 26.806002] ? ktime_get_ts64+0x86/0x230 [ 26.806031] kunit_try_run_case+0x1a5/0x480 [ 26.806056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.806078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.806103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.806136] ? __kthread_parkme+0x82/0x180 [ 26.806159] ? preempt_count_sub+0x50/0x80 [ 26.806184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.806208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.806246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.806275] kthread+0x337/0x6f0 [ 26.806298] ? trace_preempt_on+0x20/0xc0 [ 26.806326] ? __pfx_kthread+0x10/0x10 [ 26.806349] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.806378] ? calculate_sigpending+0x7b/0xa0 [ 26.806407] ? __pfx_kthread+0x10/0x10 [ 26.806432] ret_from_fork+0x116/0x1d0 [ 26.806453] ? __pfx_kthread+0x10/0x10 [ 26.806477] ret_from_fork_asm+0x1a/0x30 [ 26.806513] </TASK> [ 26.806526] [ 26.813736] Allocated by task 313: [ 26.813902] kasan_save_stack+0x45/0x70 [ 26.814100] kasan_save_track+0x18/0x40 [ 26.814292] kasan_save_alloc_info+0x3b/0x50 [ 26.814496] __kasan_kmalloc+0xb7/0xc0 [ 26.814672] __kmalloc_cache_noprof+0x189/0x420 [ 26.814847] kasan_atomics+0x95/0x310 [ 26.814978] kunit_try_run_case+0x1a5/0x480 [ 26.815116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.815421] kthread+0x337/0x6f0 [ 26.815719] ret_from_fork+0x116/0x1d0 [ 26.816066] ret_from_fork_asm+0x1a/0x30 [ 26.816295] [ 26.816387] The buggy address belongs to the object at ffff8881059cb500 [ 26.816387] which belongs to the cache kmalloc-64 of size 64 [ 26.817089] The buggy address is located 0 bytes to the right of [ 26.817089] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.817477] [ 26.817548] The buggy address belongs to the physical page: [ 26.817718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.818081] flags: 0x200000000000000(node=0|zone=2) [ 26.818569] page_type: f5(slab) [ 26.818831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.819153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.819390] page dumped because: kasan: bad access detected [ 26.819572] [ 26.819661] Memory state around the buggy address: [ 26.819964] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.820295] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.820614] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.821010] ^ [ 26.821181] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.821490] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.821895] ================================================================== [ 26.487057] ================================================================== [ 26.487320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 26.488117] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.488723] [ 26.488906] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.488960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.488975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.488999] Call Trace: [ 26.489019] <TASK> [ 26.489062] dump_stack_lvl+0x73/0xb0 [ 26.489106] print_report+0xd1/0x610 [ 26.489130] ? __virt_addr_valid+0x1db/0x2d0 [ 26.489167] ? kasan_atomics_helper+0xf10/0x5450 [ 26.489203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.489253] ? kasan_atomics_helper+0xf10/0x5450 [ 26.489284] kasan_report+0x141/0x180 [ 26.489320] ? kasan_atomics_helper+0xf10/0x5450 [ 26.489354] kasan_check_range+0x10c/0x1c0 [ 26.489382] __kasan_check_write+0x18/0x20 [ 26.489409] kasan_atomics_helper+0xf10/0x5450 [ 26.489441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.489471] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.489501] ? kasan_atomics+0x152/0x310 [ 26.489531] kasan_atomics+0x1dc/0x310 [ 26.489557] ? __pfx_kasan_atomics+0x10/0x10 [ 26.489587] ? __pfx_read_tsc+0x10/0x10 [ 26.489614] ? ktime_get_ts64+0x86/0x230 [ 26.489643] kunit_try_run_case+0x1a5/0x480 [ 26.489666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.489689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.489712] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.489743] ? __kthread_parkme+0x82/0x180 [ 26.489792] ? preempt_count_sub+0x50/0x80 [ 26.489817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.489841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.489870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.489899] kthread+0x337/0x6f0 [ 26.489922] ? trace_preempt_on+0x20/0xc0 [ 26.489949] ? __pfx_kthread+0x10/0x10 [ 26.489973] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.490002] ? calculate_sigpending+0x7b/0xa0 [ 26.490031] ? __pfx_kthread+0x10/0x10 [ 26.490055] ret_from_fork+0x116/0x1d0 [ 26.490077] ? __pfx_kthread+0x10/0x10 [ 26.490101] ret_from_fork_asm+0x1a/0x30 [ 26.490137] </TASK> [ 26.490149] [ 26.499990] Allocated by task 313: [ 26.500176] kasan_save_stack+0x45/0x70 [ 26.500397] kasan_save_track+0x18/0x40 [ 26.500572] kasan_save_alloc_info+0x3b/0x50 [ 26.500784] __kasan_kmalloc+0xb7/0xc0 [ 26.501345] __kmalloc_cache_noprof+0x189/0x420 [ 26.501542] kasan_atomics+0x95/0x310 [ 26.501961] kunit_try_run_case+0x1a5/0x480 [ 26.502183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.502625] kthread+0x337/0x6f0 [ 26.502786] ret_from_fork+0x116/0x1d0 [ 26.503059] ret_from_fork_asm+0x1a/0x30 [ 26.503411] [ 26.503517] The buggy address belongs to the object at ffff8881059cb500 [ 26.503517] which belongs to the cache kmalloc-64 of size 64 [ 26.504295] The buggy address is located 0 bytes to the right of [ 26.504295] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.504951] [ 26.505028] The buggy address belongs to the physical page: [ 26.505341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.505641] flags: 0x200000000000000(node=0|zone=2) [ 26.505915] page_type: f5(slab) [ 26.506067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.506542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.506903] page dumped because: kasan: bad access detected [ 26.507193] [ 26.507351] Memory state around the buggy address: [ 26.507608] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.507892] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.508362] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.508636] ^ [ 26.508853] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.509152] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.509586] ================================================================== [ 26.986259] ================================================================== [ 26.986598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 26.987198] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.987471] [ 26.987560] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.987613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.987627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.987651] Call Trace: [ 26.987672] <TASK> [ 26.987693] dump_stack_lvl+0x73/0xb0 [ 26.987745] print_report+0xd1/0x610 [ 26.987769] ? __virt_addr_valid+0x1db/0x2d0 [ 26.987806] ? kasan_atomics_helper+0x1818/0x5450 [ 26.987837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.987866] ? kasan_atomics_helper+0x1818/0x5450 [ 26.987897] kasan_report+0x141/0x180 [ 26.987921] ? kasan_atomics_helper+0x1818/0x5450 [ 26.987956] kasan_check_range+0x10c/0x1c0 [ 26.987985] __kasan_check_write+0x18/0x20 [ 26.988014] kasan_atomics_helper+0x1818/0x5450 [ 26.988045] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.988076] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.988166] ? kasan_atomics+0x152/0x310 [ 26.988198] kasan_atomics+0x1dc/0x310 [ 26.988233] ? __pfx_kasan_atomics+0x10/0x10 [ 26.988271] ? __pfx_read_tsc+0x10/0x10 [ 26.988310] ? ktime_get_ts64+0x86/0x230 [ 26.988347] kunit_try_run_case+0x1a5/0x480 [ 26.988371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.988394] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.988428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.988460] ? __kthread_parkme+0x82/0x180 [ 26.988482] ? preempt_count_sub+0x50/0x80 [ 26.988507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.988531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.988560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.988589] kthread+0x337/0x6f0 [ 26.988612] ? trace_preempt_on+0x20/0xc0 [ 26.988648] ? __pfx_kthread+0x10/0x10 [ 26.988673] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.988711] ? calculate_sigpending+0x7b/0xa0 [ 26.988741] ? __pfx_kthread+0x10/0x10 [ 26.988812] ret_from_fork+0x116/0x1d0 [ 26.988853] ? __pfx_kthread+0x10/0x10 [ 26.988879] ret_from_fork_asm+0x1a/0x30 [ 26.988926] </TASK> [ 26.988939] [ 26.997286] Allocated by task 313: [ 26.997478] kasan_save_stack+0x45/0x70 [ 26.997708] kasan_save_track+0x18/0x40 [ 26.998104] kasan_save_alloc_info+0x3b/0x50 [ 26.998454] __kasan_kmalloc+0xb7/0xc0 [ 26.998620] __kmalloc_cache_noprof+0x189/0x420 [ 26.998774] kasan_atomics+0x95/0x310 [ 26.999092] kunit_try_run_case+0x1a5/0x480 [ 26.999317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.999595] kthread+0x337/0x6f0 [ 26.999805] ret_from_fork+0x116/0x1d0 [ 26.999955] ret_from_fork_asm+0x1a/0x30 [ 27.000095] [ 27.000164] The buggy address belongs to the object at ffff8881059cb500 [ 27.000164] which belongs to the cache kmalloc-64 of size 64 [ 27.000658] The buggy address is located 0 bytes to the right of [ 27.000658] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.001266] [ 27.001346] The buggy address belongs to the physical page: [ 27.001518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.001756] flags: 0x200000000000000(node=0|zone=2) [ 27.001959] page_type: f5(slab) [ 27.002125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.002473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.002818] page dumped because: kasan: bad access detected [ 27.003069] [ 27.003163] Memory state around the buggy address: [ 27.004379] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.005001] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.005331] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.005744] ^ [ 27.005939] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.006595] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.006994] ================================================================== [ 27.032328] ================================================================== [ 27.032755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 27.033186] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.033531] [ 27.033629] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.033682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.033696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.033721] Call Trace: [ 27.033743] <TASK> [ 27.033963] dump_stack_lvl+0x73/0xb0 [ 27.034000] print_report+0xd1/0x610 [ 27.034088] ? __virt_addr_valid+0x1db/0x2d0 [ 27.034119] ? kasan_atomics_helper+0x194a/0x5450 [ 27.034149] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.034181] ? kasan_atomics_helper+0x194a/0x5450 [ 27.034332] kasan_report+0x141/0x180 [ 27.034358] ? kasan_atomics_helper+0x194a/0x5450 [ 27.034394] kasan_check_range+0x10c/0x1c0 [ 27.034422] __kasan_check_write+0x18/0x20 [ 27.034449] kasan_atomics_helper+0x194a/0x5450 [ 27.034481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.034604] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.034633] ? kasan_atomics+0x152/0x310 [ 27.034662] kasan_atomics+0x1dc/0x310 [ 27.034689] ? __pfx_kasan_atomics+0x10/0x10 [ 27.034717] ? __pfx_read_tsc+0x10/0x10 [ 27.034745] ? ktime_get_ts64+0x86/0x230 [ 27.034804] kunit_try_run_case+0x1a5/0x480 [ 27.034836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.034858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.034882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.034913] ? __kthread_parkme+0x82/0x180 [ 27.034936] ? preempt_count_sub+0x50/0x80 [ 27.034962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.034985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.035014] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.035042] kthread+0x337/0x6f0 [ 27.035065] ? trace_preempt_on+0x20/0xc0 [ 27.035091] ? __pfx_kthread+0x10/0x10 [ 27.035115] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.035144] ? calculate_sigpending+0x7b/0xa0 [ 27.035172] ? __pfx_kthread+0x10/0x10 [ 27.035197] ret_from_fork+0x116/0x1d0 [ 27.035218] ? __pfx_kthread+0x10/0x10 [ 27.035253] ret_from_fork_asm+0x1a/0x30 [ 27.035289] </TASK> [ 27.035303] [ 27.045834] Allocated by task 313: [ 27.046250] kasan_save_stack+0x45/0x70 [ 27.046425] kasan_save_track+0x18/0x40 [ 27.046622] kasan_save_alloc_info+0x3b/0x50 [ 27.047014] __kasan_kmalloc+0xb7/0xc0 [ 27.047310] __kmalloc_cache_noprof+0x189/0x420 [ 27.047659] kasan_atomics+0x95/0x310 [ 27.047846] kunit_try_run_case+0x1a5/0x480 [ 27.048046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.048458] kthread+0x337/0x6f0 [ 27.048732] ret_from_fork+0x116/0x1d0 [ 27.048946] ret_from_fork_asm+0x1a/0x30 [ 27.049327] [ 27.049425] The buggy address belongs to the object at ffff8881059cb500 [ 27.049425] which belongs to the cache kmalloc-64 of size 64 [ 27.049831] The buggy address is located 0 bytes to the right of [ 27.049831] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.050515] [ 27.050983] The buggy address belongs to the physical page: [ 27.051218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.051549] flags: 0x200000000000000(node=0|zone=2) [ 27.051910] page_type: f5(slab) [ 27.052188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.052601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.053071] page dumped because: kasan: bad access detected [ 27.053376] [ 27.053593] Memory state around the buggy address: [ 27.054144] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.054423] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.054727] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.055074] ^ [ 27.055415] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.056042] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.056379] ================================================================== [ 26.322180] ================================================================== [ 26.322835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 26.323104] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.323514] [ 26.323662] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.323716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.323730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.323831] Call Trace: [ 26.323853] <TASK> [ 26.323875] dump_stack_lvl+0x73/0xb0 [ 26.323947] print_report+0xd1/0x610 [ 26.323971] ? __virt_addr_valid+0x1db/0x2d0 [ 26.323999] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.324061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.324094] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.324125] kasan_report+0x141/0x180 [ 26.324149] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.324185] kasan_check_range+0x10c/0x1c0 [ 26.324252] __kasan_check_write+0x18/0x20 [ 26.324281] kasan_atomics_helper+0xb6a/0x5450 [ 26.324313] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.324343] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.324404] ? kasan_atomics+0x152/0x310 [ 26.324434] kasan_atomics+0x1dc/0x310 [ 26.324461] ? __pfx_kasan_atomics+0x10/0x10 [ 26.324488] ? __pfx_read_tsc+0x10/0x10 [ 26.324516] ? ktime_get_ts64+0x86/0x230 [ 26.324544] kunit_try_run_case+0x1a5/0x480 [ 26.324568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.324590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.324643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.324698] ? __kthread_parkme+0x82/0x180 [ 26.324721] ? preempt_count_sub+0x50/0x80 [ 26.324822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.324849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.324878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.324907] kthread+0x337/0x6f0 [ 26.324930] ? trace_preempt_on+0x20/0xc0 [ 26.324958] ? __pfx_kthread+0x10/0x10 [ 26.324982] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.325010] ? calculate_sigpending+0x7b/0xa0 [ 26.325040] ? __pfx_kthread+0x10/0x10 [ 26.325066] ret_from_fork+0x116/0x1d0 [ 26.325088] ? __pfx_kthread+0x10/0x10 [ 26.325112] ret_from_fork_asm+0x1a/0x30 [ 26.325149] </TASK> [ 26.325162] [ 26.334338] Allocated by task 313: [ 26.334554] kasan_save_stack+0x45/0x70 [ 26.334888] kasan_save_track+0x18/0x40 [ 26.335164] kasan_save_alloc_info+0x3b/0x50 [ 26.335472] __kasan_kmalloc+0xb7/0xc0 [ 26.335656] __kmalloc_cache_noprof+0x189/0x420 [ 26.335934] kasan_atomics+0x95/0x310 [ 26.336114] kunit_try_run_case+0x1a5/0x480 [ 26.336285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.336537] kthread+0x337/0x6f0 [ 26.336678] ret_from_fork+0x116/0x1d0 [ 26.336807] ret_from_fork_asm+0x1a/0x30 [ 26.336969] [ 26.337063] The buggy address belongs to the object at ffff8881059cb500 [ 26.337063] which belongs to the cache kmalloc-64 of size 64 [ 26.337945] The buggy address is located 0 bytes to the right of [ 26.337945] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.338513] [ 26.338592] The buggy address belongs to the physical page: [ 26.338907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.339316] flags: 0x200000000000000(node=0|zone=2) [ 26.339579] page_type: f5(slab) [ 26.339727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.340164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.340549] page dumped because: kasan: bad access detected [ 26.340903] [ 26.341000] Memory state around the buggy address: [ 26.341224] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.341554] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.342117] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.342440] ^ [ 26.342707] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.343121] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.343420] ================================================================== [ 27.455867] ================================================================== [ 27.456161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 27.456656] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.456900] [ 27.457052] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.457105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.457119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.457143] Call Trace: [ 27.457162] <TASK> [ 27.457181] dump_stack_lvl+0x73/0xb0 [ 27.457218] print_report+0xd1/0x610 [ 27.457254] ? __virt_addr_valid+0x1db/0x2d0 [ 27.457281] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.457311] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.457341] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.457372] kasan_report+0x141/0x180 [ 27.457396] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.457432] __asan_report_load8_noabort+0x18/0x20 [ 27.457460] kasan_atomics_helper+0x4fa5/0x5450 [ 27.457492] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.457522] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.457551] ? kasan_atomics+0x152/0x310 [ 27.457580] kasan_atomics+0x1dc/0x310 [ 27.457606] ? __pfx_kasan_atomics+0x10/0x10 [ 27.457635] ? __pfx_read_tsc+0x10/0x10 [ 27.457660] ? ktime_get_ts64+0x86/0x230 [ 27.457689] kunit_try_run_case+0x1a5/0x480 [ 27.457715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.457738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.457761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.457793] ? __kthread_parkme+0x82/0x180 [ 27.457815] ? preempt_count_sub+0x50/0x80 [ 27.457853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.457877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.457905] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.457934] kthread+0x337/0x6f0 [ 27.457957] ? trace_preempt_on+0x20/0xc0 [ 27.457983] ? __pfx_kthread+0x10/0x10 [ 27.458008] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.458038] ? calculate_sigpending+0x7b/0xa0 [ 27.458066] ? __pfx_kthread+0x10/0x10 [ 27.458092] ret_from_fork+0x116/0x1d0 [ 27.458113] ? __pfx_kthread+0x10/0x10 [ 27.458138] ret_from_fork_asm+0x1a/0x30 [ 27.458174] </TASK> [ 27.458186] [ 27.467636] Allocated by task 313: [ 27.468050] kasan_save_stack+0x45/0x70 [ 27.468366] kasan_save_track+0x18/0x40 [ 27.468565] kasan_save_alloc_info+0x3b/0x50 [ 27.468764] __kasan_kmalloc+0xb7/0xc0 [ 27.469123] __kmalloc_cache_noprof+0x189/0x420 [ 27.469538] kasan_atomics+0x95/0x310 [ 27.469723] kunit_try_run_case+0x1a5/0x480 [ 27.470191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.470495] kthread+0x337/0x6f0 [ 27.470755] ret_from_fork+0x116/0x1d0 [ 27.471079] ret_from_fork_asm+0x1a/0x30 [ 27.471276] [ 27.471366] The buggy address belongs to the object at ffff8881059cb500 [ 27.471366] which belongs to the cache kmalloc-64 of size 64 [ 27.472066] The buggy address is located 0 bytes to the right of [ 27.472066] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.472865] [ 27.473094] The buggy address belongs to the physical page: [ 27.473501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.473998] flags: 0x200000000000000(node=0|zone=2) [ 27.474295] page_type: f5(slab) [ 27.474568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.475036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.475356] page dumped because: kasan: bad access detected [ 27.475580] [ 27.475662] Memory state around the buggy address: [ 27.476192] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.476666] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.477209] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.477703] ^ [ 27.478090] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.478525] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.478980] ================================================================== [ 26.280976] ================================================================== [ 26.281283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 26.281563] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.281877] [ 26.281984] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.282035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.282049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.282073] Call Trace: [ 26.282092] <TASK> [ 26.282114] dump_stack_lvl+0x73/0xb0 [ 26.282144] print_report+0xd1/0x610 [ 26.282167] ? __virt_addr_valid+0x1db/0x2d0 [ 26.282193] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.282222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.282362] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.282394] kasan_report+0x141/0x180 [ 26.282420] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.282455] kasan_check_range+0x10c/0x1c0 [ 26.282482] __kasan_check_write+0x18/0x20 [ 26.282509] kasan_atomics_helper+0xa2b/0x5450 [ 26.282541] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.282573] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.282601] ? kasan_atomics+0x152/0x310 [ 26.282631] kasan_atomics+0x1dc/0x310 [ 26.282657] ? __pfx_kasan_atomics+0x10/0x10 [ 26.282685] ? __pfx_read_tsc+0x10/0x10 [ 26.282712] ? ktime_get_ts64+0x86/0x230 [ 26.282742] kunit_try_run_case+0x1a5/0x480 [ 26.282809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.282834] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.282881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.282913] ? __kthread_parkme+0x82/0x180 [ 26.282936] ? preempt_count_sub+0x50/0x80 [ 26.282979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.283003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.283039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.283068] kthread+0x337/0x6f0 [ 26.283091] ? trace_preempt_on+0x20/0xc0 [ 26.283118] ? __pfx_kthread+0x10/0x10 [ 26.283143] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.283172] ? calculate_sigpending+0x7b/0xa0 [ 26.283201] ? __pfx_kthread+0x10/0x10 [ 26.283227] ret_from_fork+0x116/0x1d0 [ 26.283261] ? __pfx_kthread+0x10/0x10 [ 26.283286] ret_from_fork_asm+0x1a/0x30 [ 26.283322] </TASK> [ 26.283335] [ 26.291820] Allocated by task 313: [ 26.292037] kasan_save_stack+0x45/0x70 [ 26.292276] kasan_save_track+0x18/0x40 [ 26.292468] kasan_save_alloc_info+0x3b/0x50 [ 26.292703] __kasan_kmalloc+0xb7/0xc0 [ 26.293160] __kmalloc_cache_noprof+0x189/0x420 [ 26.293392] kasan_atomics+0x95/0x310 [ 26.293580] kunit_try_run_case+0x1a5/0x480 [ 26.293913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.294174] kthread+0x337/0x6f0 [ 26.294357] ret_from_fork+0x116/0x1d0 [ 26.294542] ret_from_fork_asm+0x1a/0x30 [ 26.294857] [ 26.295000] The buggy address belongs to the object at ffff8881059cb500 [ 26.295000] which belongs to the cache kmalloc-64 of size 64 [ 26.295491] The buggy address is located 0 bytes to the right of [ 26.295491] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.296105] [ 26.296235] The buggy address belongs to the physical page: [ 26.296506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.296966] flags: 0x200000000000000(node=0|zone=2) [ 26.297167] page_type: f5(slab) [ 26.297380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.298085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.298364] page dumped because: kasan: bad access detected [ 26.298591] [ 26.298682] Memory state around the buggy address: [ 26.298993] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.299327] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.299594] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.300004] ^ [ 26.300166] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.300494] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.300952] ================================================================== [ 26.647929] ================================================================== [ 26.648261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 26.648601] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.648986] [ 26.649109] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.649164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.649178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.649208] Call Trace: [ 26.649231] <TASK> [ 26.649263] dump_stack_lvl+0x73/0xb0 [ 26.649298] print_report+0xd1/0x610 [ 26.649322] ? __virt_addr_valid+0x1db/0x2d0 [ 26.649349] ? kasan_atomics_helper+0x4a02/0x5450 [ 26.649379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.649410] ? kasan_atomics_helper+0x4a02/0x5450 [ 26.649441] kasan_report+0x141/0x180 [ 26.649466] ? kasan_atomics_helper+0x4a02/0x5450 [ 26.649526] __asan_report_load4_noabort+0x18/0x20 [ 26.649554] kasan_atomics_helper+0x4a02/0x5450 [ 26.649586] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.649617] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.649646] ? kasan_atomics+0x152/0x310 [ 26.649693] kasan_atomics+0x1dc/0x310 [ 26.649720] ? __pfx_kasan_atomics+0x10/0x10 [ 26.649815] ? __pfx_read_tsc+0x10/0x10 [ 26.649860] ? ktime_get_ts64+0x86/0x230 [ 26.649889] kunit_try_run_case+0x1a5/0x480 [ 26.649914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.649959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.649984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.650031] ? __kthread_parkme+0x82/0x180 [ 26.650054] ? preempt_count_sub+0x50/0x80 [ 26.650081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.650104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.650133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.650162] kthread+0x337/0x6f0 [ 26.650185] ? trace_preempt_on+0x20/0xc0 [ 26.650213] ? __pfx_kthread+0x10/0x10 [ 26.650249] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.650279] ? calculate_sigpending+0x7b/0xa0 [ 26.650308] ? __pfx_kthread+0x10/0x10 [ 26.650334] ret_from_fork+0x116/0x1d0 [ 26.650355] ? __pfx_kthread+0x10/0x10 [ 26.650380] ret_from_fork_asm+0x1a/0x30 [ 26.650417] </TASK> [ 26.650431] [ 26.661430] Allocated by task 313: [ 26.661892] kasan_save_stack+0x45/0x70 [ 26.662278] kasan_save_track+0x18/0x40 [ 26.662460] kasan_save_alloc_info+0x3b/0x50 [ 26.662653] __kasan_kmalloc+0xb7/0xc0 [ 26.662824] __kmalloc_cache_noprof+0x189/0x420 [ 26.663350] kasan_atomics+0x95/0x310 [ 26.663612] kunit_try_run_case+0x1a5/0x480 [ 26.664079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.664357] kthread+0x337/0x6f0 [ 26.664508] ret_from_fork+0x116/0x1d0 [ 26.664684] ret_from_fork_asm+0x1a/0x30 [ 26.665166] [ 26.665267] The buggy address belongs to the object at ffff8881059cb500 [ 26.665267] which belongs to the cache kmalloc-64 of size 64 [ 26.665784] The buggy address is located 0 bytes to the right of [ 26.665784] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.666486] [ 26.666567] The buggy address belongs to the physical page: [ 26.667047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.667357] flags: 0x200000000000000(node=0|zone=2) [ 26.667621] page_type: f5(slab) [ 26.667943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.668459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.668789] page dumped because: kasan: bad access detected [ 26.669332] [ 26.669426] Memory state around the buggy address: [ 26.669827] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.670201] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.670651] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.671183] ^ [ 26.671601] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.672091] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.672414] ================================================================== [ 26.673110] ================================================================== [ 26.673462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 26.674177] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.674632] [ 26.674925] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.674984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.674998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.675108] Call Trace: [ 26.675131] <TASK> [ 26.675153] dump_stack_lvl+0x73/0xb0 [ 26.675187] print_report+0xd1/0x610 [ 26.675212] ? __virt_addr_valid+0x1db/0x2d0 [ 26.675251] ? kasan_atomics_helper+0x1217/0x5450 [ 26.675281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.675311] ? kasan_atomics_helper+0x1217/0x5450 [ 26.675342] kasan_report+0x141/0x180 [ 26.675366] ? kasan_atomics_helper+0x1217/0x5450 [ 26.675400] kasan_check_range+0x10c/0x1c0 [ 26.675428] __kasan_check_write+0x18/0x20 [ 26.675455] kasan_atomics_helper+0x1217/0x5450 [ 26.675486] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.675517] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.675548] ? kasan_atomics+0x152/0x310 [ 26.675578] kasan_atomics+0x1dc/0x310 [ 26.675606] ? __pfx_kasan_atomics+0x10/0x10 [ 26.675634] ? __pfx_read_tsc+0x10/0x10 [ 26.675661] ? ktime_get_ts64+0x86/0x230 [ 26.675690] kunit_try_run_case+0x1a5/0x480 [ 26.675713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.675735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.675777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.675809] ? __kthread_parkme+0x82/0x180 [ 26.675843] ? preempt_count_sub+0x50/0x80 [ 26.675869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.675893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.675922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.675951] kthread+0x337/0x6f0 [ 26.675975] ? trace_preempt_on+0x20/0xc0 [ 26.676001] ? __pfx_kthread+0x10/0x10 [ 26.676025] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.676054] ? calculate_sigpending+0x7b/0xa0 [ 26.676083] ? __pfx_kthread+0x10/0x10 [ 26.676109] ret_from_fork+0x116/0x1d0 [ 26.676133] ? __pfx_kthread+0x10/0x10 [ 26.676158] ret_from_fork_asm+0x1a/0x30 [ 26.676195] </TASK> [ 26.676208] [ 26.688721] Allocated by task 313: [ 26.688942] kasan_save_stack+0x45/0x70 [ 26.689350] kasan_save_track+0x18/0x40 [ 26.689537] kasan_save_alloc_info+0x3b/0x50 [ 26.689738] __kasan_kmalloc+0xb7/0xc0 [ 26.690138] __kmalloc_cache_noprof+0x189/0x420 [ 26.690419] kasan_atomics+0x95/0x310 [ 26.690616] kunit_try_run_case+0x1a5/0x480 [ 26.691058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.691534] kthread+0x337/0x6f0 [ 26.691700] ret_from_fork+0x116/0x1d0 [ 26.692070] ret_from_fork_asm+0x1a/0x30 [ 26.692371] [ 26.692479] The buggy address belongs to the object at ffff8881059cb500 [ 26.692479] which belongs to the cache kmalloc-64 of size 64 [ 26.693382] The buggy address is located 0 bytes to the right of [ 26.693382] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.694245] [ 26.694622] The buggy address belongs to the physical page: [ 26.695089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.695469] flags: 0x200000000000000(node=0|zone=2) [ 26.695702] page_type: f5(slab) [ 26.695921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.696320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.696704] page dumped because: kasan: bad access detected [ 26.697023] [ 26.697211] Memory state around the buggy address: [ 26.697394] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.698102] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.698623] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.699375] ^ [ 26.699922] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.700625] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.701450] ================================================================== [ 26.427882] ================================================================== [ 26.428197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 26.428841] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.429484] [ 26.429655] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.429749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.429764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.429789] Call Trace: [ 26.429810] <TASK> [ 26.429832] dump_stack_lvl+0x73/0xb0 [ 26.429864] print_report+0xd1/0x610 [ 26.429889] ? __virt_addr_valid+0x1db/0x2d0 [ 26.429916] ? kasan_atomics_helper+0xde0/0x5450 [ 26.429946] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.429977] ? kasan_atomics_helper+0xde0/0x5450 [ 26.430008] kasan_report+0x141/0x180 [ 26.430033] ? kasan_atomics_helper+0xde0/0x5450 [ 26.430067] kasan_check_range+0x10c/0x1c0 [ 26.430095] __kasan_check_write+0x18/0x20 [ 26.430123] kasan_atomics_helper+0xde0/0x5450 [ 26.430154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.430185] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.430213] ? kasan_atomics+0x152/0x310 [ 26.430254] kasan_atomics+0x1dc/0x310 [ 26.430281] ? __pfx_kasan_atomics+0x10/0x10 [ 26.430308] ? __pfx_read_tsc+0x10/0x10 [ 26.430335] ? ktime_get_ts64+0x86/0x230 [ 26.430364] kunit_try_run_case+0x1a5/0x480 [ 26.430387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.430409] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.430433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.430464] ? __kthread_parkme+0x82/0x180 [ 26.430486] ? preempt_count_sub+0x50/0x80 [ 26.430512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.430536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.430564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.430592] kthread+0x337/0x6f0 [ 26.430615] ? trace_preempt_on+0x20/0xc0 [ 26.430641] ? __pfx_kthread+0x10/0x10 [ 26.430665] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.430695] ? calculate_sigpending+0x7b/0xa0 [ 26.430724] ? __pfx_kthread+0x10/0x10 [ 26.430767] ret_from_fork+0x116/0x1d0 [ 26.430796] ? __pfx_kthread+0x10/0x10 [ 26.430821] ret_from_fork_asm+0x1a/0x30 [ 26.430869] </TASK> [ 26.430882] [ 26.444544] Allocated by task 313: [ 26.444904] kasan_save_stack+0x45/0x70 [ 26.445383] kasan_save_track+0x18/0x40 [ 26.445824] kasan_save_alloc_info+0x3b/0x50 [ 26.446075] __kasan_kmalloc+0xb7/0xc0 [ 26.446206] __kmalloc_cache_noprof+0x189/0x420 [ 26.446371] kasan_atomics+0x95/0x310 [ 26.446501] kunit_try_run_case+0x1a5/0x480 [ 26.446640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.446982] kthread+0x337/0x6f0 [ 26.447288] ret_from_fork+0x116/0x1d0 [ 26.447762] ret_from_fork_asm+0x1a/0x30 [ 26.448301] [ 26.448465] The buggy address belongs to the object at ffff8881059cb500 [ 26.448465] which belongs to the cache kmalloc-64 of size 64 [ 26.449625] The buggy address is located 0 bytes to the right of [ 26.449625] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.450871] [ 26.451037] The buggy address belongs to the physical page: [ 26.451508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.452003] flags: 0x200000000000000(node=0|zone=2) [ 26.452174] page_type: f5(slab) [ 26.452309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.452535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.452930] page dumped because: kasan: bad access detected [ 26.453473] [ 26.453626] Memory state around the buggy address: [ 26.454087] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.454689] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.455333] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.456036] ^ [ 26.456471] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.457296] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.458136] ================================================================== [ 26.106494] ================================================================== [ 26.107901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 26.109148] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.110457] [ 26.110895] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.110957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.110971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.110997] Call Trace: [ 26.111018] <TASK> [ 26.111040] dump_stack_lvl+0x73/0xb0 [ 26.111077] print_report+0xd1/0x610 [ 26.111616] ? __virt_addr_valid+0x1db/0x2d0 [ 26.111645] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.111719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.111791] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.111826] kasan_report+0x141/0x180 [ 26.111853] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.111888] kasan_check_range+0x10c/0x1c0 [ 26.111915] __kasan_check_write+0x18/0x20 [ 26.111944] kasan_atomics_helper+0x5fe/0x5450 [ 26.111976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.112007] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.112036] ? kasan_atomics+0x152/0x310 [ 26.112066] kasan_atomics+0x1dc/0x310 [ 26.112091] ? __pfx_kasan_atomics+0x10/0x10 [ 26.112119] ? __pfx_read_tsc+0x10/0x10 [ 26.112146] ? ktime_get_ts64+0x86/0x230 [ 26.112176] kunit_try_run_case+0x1a5/0x480 [ 26.112200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.112221] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.112258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.112289] ? __kthread_parkme+0x82/0x180 [ 26.112312] ? preempt_count_sub+0x50/0x80 [ 26.112339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.112363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.112391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.112420] kthread+0x337/0x6f0 [ 26.112443] ? trace_preempt_on+0x20/0xc0 [ 26.112470] ? __pfx_kthread+0x10/0x10 [ 26.112494] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.112523] ? calculate_sigpending+0x7b/0xa0 [ 26.112551] ? __pfx_kthread+0x10/0x10 [ 26.112577] ret_from_fork+0x116/0x1d0 [ 26.112599] ? __pfx_kthread+0x10/0x10 [ 26.112623] ret_from_fork_asm+0x1a/0x30 [ 26.112658] </TASK> [ 26.112672] [ 26.129979] Allocated by task 313: [ 26.130176] kasan_save_stack+0x45/0x70 [ 26.130683] kasan_save_track+0x18/0x40 [ 26.131193] kasan_save_alloc_info+0x3b/0x50 [ 26.131646] __kasan_kmalloc+0xb7/0xc0 [ 26.132041] __kmalloc_cache_noprof+0x189/0x420 [ 26.132209] kasan_atomics+0x95/0x310 [ 26.132579] kunit_try_run_case+0x1a5/0x480 [ 26.133173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.133968] kthread+0x337/0x6f0 [ 26.134222] ret_from_fork+0x116/0x1d0 [ 26.134371] ret_from_fork_asm+0x1a/0x30 [ 26.134512] [ 26.134581] The buggy address belongs to the object at ffff8881059cb500 [ 26.134581] which belongs to the cache kmalloc-64 of size 64 [ 26.135465] The buggy address is located 0 bytes to the right of [ 26.135465] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.136857] [ 26.137103] The buggy address belongs to the physical page: [ 26.138164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.138439] flags: 0x200000000000000(node=0|zone=2) [ 26.138606] page_type: f5(slab) [ 26.138727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.139472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.140258] page dumped because: kasan: bad access detected [ 26.140521] [ 26.140599] Memory state around the buggy address: [ 26.140767] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.141470] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.142050] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.142860] ^ [ 26.143175] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.143401] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.143610] ================================================================== [ 26.237969] ================================================================== [ 26.238502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 26.238986] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.239510] [ 26.239623] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.239697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.239712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.239738] Call Trace: [ 26.239800] <TASK> [ 26.239824] dump_stack_lvl+0x73/0xb0 [ 26.239858] print_report+0xd1/0x610 [ 26.239884] ? __virt_addr_valid+0x1db/0x2d0 [ 26.239910] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.239963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.239995] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.240026] kasan_report+0x141/0x180 [ 26.240050] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.240085] kasan_check_range+0x10c/0x1c0 [ 26.240112] __kasan_check_write+0x18/0x20 [ 26.240140] kasan_atomics_helper+0x8f9/0x5450 [ 26.240171] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.240220] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.240262] ? kasan_atomics+0x152/0x310 [ 26.240292] kasan_atomics+0x1dc/0x310 [ 26.240338] ? __pfx_kasan_atomics+0x10/0x10 [ 26.240365] ? __pfx_read_tsc+0x10/0x10 [ 26.240392] ? ktime_get_ts64+0x86/0x230 [ 26.240421] kunit_try_run_case+0x1a5/0x480 [ 26.240445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.240467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.240508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.240540] ? __kthread_parkme+0x82/0x180 [ 26.240562] ? preempt_count_sub+0x50/0x80 [ 26.240588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.240612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.240640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.240668] kthread+0x337/0x6f0 [ 26.240692] ? trace_preempt_on+0x20/0xc0 [ 26.240718] ? __pfx_kthread+0x10/0x10 [ 26.240807] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.240840] ? calculate_sigpending+0x7b/0xa0 [ 26.240868] ? __pfx_kthread+0x10/0x10 [ 26.240904] ret_from_fork+0x116/0x1d0 [ 26.240926] ? __pfx_kthread+0x10/0x10 [ 26.240950] ret_from_fork_asm+0x1a/0x30 [ 26.240986] </TASK> [ 26.241000] [ 26.249796] Allocated by task 313: [ 26.250006] kasan_save_stack+0x45/0x70 [ 26.250206] kasan_save_track+0x18/0x40 [ 26.250404] kasan_save_alloc_info+0x3b/0x50 [ 26.250625] __kasan_kmalloc+0xb7/0xc0 [ 26.250860] __kmalloc_cache_noprof+0x189/0x420 [ 26.251078] kasan_atomics+0x95/0x310 [ 26.251211] kunit_try_run_case+0x1a5/0x480 [ 26.251433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.251710] kthread+0x337/0x6f0 [ 26.251863] ret_from_fork+0x116/0x1d0 [ 26.252089] ret_from_fork_asm+0x1a/0x30 [ 26.252351] [ 26.252446] The buggy address belongs to the object at ffff8881059cb500 [ 26.252446] which belongs to the cache kmalloc-64 of size 64 [ 26.253023] The buggy address is located 0 bytes to the right of [ 26.253023] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.253959] [ 26.254029] The buggy address belongs to the physical page: [ 26.254200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.254973] flags: 0x200000000000000(node=0|zone=2) [ 26.255249] page_type: f5(slab) [ 26.255436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.255671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.255978] page dumped because: kasan: bad access detected [ 26.256251] [ 26.256353] Memory state around the buggy address: [ 26.256645] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.257295] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.257836] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.258102] ^ [ 26.258273] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.258587] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.258993] ================================================================== [ 26.177103] ================================================================== [ 26.177462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 26.177849] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.178129] [ 26.178218] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.178283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.178297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.178322] Call Trace: [ 26.178344] <TASK> [ 26.178366] dump_stack_lvl+0x73/0xb0 [ 26.178398] print_report+0xd1/0x610 [ 26.178422] ? __virt_addr_valid+0x1db/0x2d0 [ 26.178450] ? kasan_atomics_helper+0x72f/0x5450 [ 26.178480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.178510] ? kasan_atomics_helper+0x72f/0x5450 [ 26.178541] kasan_report+0x141/0x180 [ 26.178565] ? kasan_atomics_helper+0x72f/0x5450 [ 26.178600] kasan_check_range+0x10c/0x1c0 [ 26.178627] __kasan_check_write+0x18/0x20 [ 26.178655] kasan_atomics_helper+0x72f/0x5450 [ 26.178686] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.178717] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.178745] ? kasan_atomics+0x152/0x310 [ 26.178830] kasan_atomics+0x1dc/0x310 [ 26.178857] ? __pfx_kasan_atomics+0x10/0x10 [ 26.178885] ? __pfx_read_tsc+0x10/0x10 [ 26.178912] ? ktime_get_ts64+0x86/0x230 [ 26.178941] kunit_try_run_case+0x1a5/0x480 [ 26.178964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.178987] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.179011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.179041] ? __kthread_parkme+0x82/0x180 [ 26.179065] ? preempt_count_sub+0x50/0x80 [ 26.179092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.179116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.179144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.179174] kthread+0x337/0x6f0 [ 26.179198] ? trace_preempt_on+0x20/0xc0 [ 26.179226] ? __pfx_kthread+0x10/0x10 [ 26.179263] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.179291] ? calculate_sigpending+0x7b/0xa0 [ 26.179321] ? __pfx_kthread+0x10/0x10 [ 26.179346] ret_from_fork+0x116/0x1d0 [ 26.179368] ? __pfx_kthread+0x10/0x10 [ 26.179392] ret_from_fork_asm+0x1a/0x30 [ 26.179428] </TASK> [ 26.179442] [ 26.186835] Allocated by task 313: [ 26.186968] kasan_save_stack+0x45/0x70 [ 26.187107] kasan_save_track+0x18/0x40 [ 26.187304] kasan_save_alloc_info+0x3b/0x50 [ 26.187526] __kasan_kmalloc+0xb7/0xc0 [ 26.187710] __kmalloc_cache_noprof+0x189/0x420 [ 26.187930] kasan_atomics+0x95/0x310 [ 26.188128] kunit_try_run_case+0x1a5/0x480 [ 26.188346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.188741] kthread+0x337/0x6f0 [ 26.189217] ret_from_fork+0x116/0x1d0 [ 26.189385] ret_from_fork_asm+0x1a/0x30 [ 26.189585] [ 26.189681] The buggy address belongs to the object at ffff8881059cb500 [ 26.189681] which belongs to the cache kmalloc-64 of size 64 [ 26.190407] The buggy address is located 0 bytes to the right of [ 26.190407] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.190777] [ 26.190846] The buggy address belongs to the physical page: [ 26.191091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.191748] flags: 0x200000000000000(node=0|zone=2) [ 26.191930] page_type: f5(slab) [ 26.192047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.192280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.192499] page dumped because: kasan: bad access detected [ 26.192945] [ 26.193043] Memory state around the buggy address: [ 26.193289] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.193606] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.193920] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.194452] ^ [ 26.194611] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.194885] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.195226] ================================================================== [ 26.860554] ================================================================== [ 26.860995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 26.861374] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.861671] [ 26.861824] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.861898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.861912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.861937] Call Trace: [ 26.861961] <TASK> [ 26.861983] dump_stack_lvl+0x73/0xb0 [ 26.862015] print_report+0xd1/0x610 [ 26.862039] ? __virt_addr_valid+0x1db/0x2d0 [ 26.862065] ? kasan_atomics_helper+0x151d/0x5450 [ 26.862095] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.862126] ? kasan_atomics_helper+0x151d/0x5450 [ 26.862156] kasan_report+0x141/0x180 [ 26.862182] ? kasan_atomics_helper+0x151d/0x5450 [ 26.862216] kasan_check_range+0x10c/0x1c0 [ 26.862254] __kasan_check_write+0x18/0x20 [ 26.862283] kasan_atomics_helper+0x151d/0x5450 [ 26.862313] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.862344] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.862373] ? kasan_atomics+0x152/0x310 [ 26.862402] kasan_atomics+0x1dc/0x310 [ 26.862428] ? __pfx_kasan_atomics+0x10/0x10 [ 26.862456] ? __pfx_read_tsc+0x10/0x10 [ 26.862484] ? ktime_get_ts64+0x86/0x230 [ 26.862513] kunit_try_run_case+0x1a5/0x480 [ 26.862536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.862559] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.862582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.862613] ? __kthread_parkme+0x82/0x180 [ 26.862636] ? preempt_count_sub+0x50/0x80 [ 26.862662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.862685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.862714] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.862804] kthread+0x337/0x6f0 [ 26.862830] ? trace_preempt_on+0x20/0xc0 [ 26.862874] ? __pfx_kthread+0x10/0x10 [ 26.862899] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.862927] ? calculate_sigpending+0x7b/0xa0 [ 26.862957] ? __pfx_kthread+0x10/0x10 [ 26.862983] ret_from_fork+0x116/0x1d0 [ 26.863004] ? __pfx_kthread+0x10/0x10 [ 26.863028] ret_from_fork_asm+0x1a/0x30 [ 26.863064] </TASK> [ 26.863077] [ 26.871149] Allocated by task 313: [ 26.871340] kasan_save_stack+0x45/0x70 [ 26.871502] kasan_save_track+0x18/0x40 [ 26.871690] kasan_save_alloc_info+0x3b/0x50 [ 26.871991] __kasan_kmalloc+0xb7/0xc0 [ 26.872144] __kmalloc_cache_noprof+0x189/0x420 [ 26.872309] kasan_atomics+0x95/0x310 [ 26.872493] kunit_try_run_case+0x1a5/0x480 [ 26.872693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.872982] kthread+0x337/0x6f0 [ 26.873150] ret_from_fork+0x116/0x1d0 [ 26.873349] ret_from_fork_asm+0x1a/0x30 [ 26.873542] [ 26.873610] The buggy address belongs to the object at ffff8881059cb500 [ 26.873610] which belongs to the cache kmalloc-64 of size 64 [ 26.874091] The buggy address is located 0 bytes to the right of [ 26.874091] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.874458] [ 26.874533] The buggy address belongs to the physical page: [ 26.874723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.875067] flags: 0x200000000000000(node=0|zone=2) [ 26.875308] page_type: f5(slab) [ 26.875470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.875794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.876062] page dumped because: kasan: bad access detected [ 26.876231] [ 26.876389] Memory state around the buggy address: [ 26.876614] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.877007] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.877347] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.877645] ^ [ 26.878106] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.878408] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.878685] ================================================================== [ 26.965579] ================================================================== [ 26.966083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 26.966365] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.966714] [ 26.966824] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.966878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.966912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.966937] Call Trace: [ 26.966959] <TASK> [ 26.966980] dump_stack_lvl+0x73/0xb0 [ 26.967011] print_report+0xd1/0x610 [ 26.967109] ? __virt_addr_valid+0x1db/0x2d0 [ 26.967138] ? kasan_atomics_helper+0x177f/0x5450 [ 26.967176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.967207] ? kasan_atomics_helper+0x177f/0x5450 [ 26.967253] kasan_report+0x141/0x180 [ 26.967277] ? kasan_atomics_helper+0x177f/0x5450 [ 26.967313] kasan_check_range+0x10c/0x1c0 [ 26.967341] __kasan_check_write+0x18/0x20 [ 26.967369] kasan_atomics_helper+0x177f/0x5450 [ 26.967409] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.967440] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.967479] ? kasan_atomics+0x152/0x310 [ 26.967509] kasan_atomics+0x1dc/0x310 [ 26.967536] ? __pfx_kasan_atomics+0x10/0x10 [ 26.967572] ? __pfx_read_tsc+0x10/0x10 [ 26.967598] ? ktime_get_ts64+0x86/0x230 [ 26.967637] kunit_try_run_case+0x1a5/0x480 [ 26.967662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.967684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.967710] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.967742] ? __kthread_parkme+0x82/0x180 [ 26.967800] ? preempt_count_sub+0x50/0x80 [ 26.967828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.967852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.967890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.967920] kthread+0x337/0x6f0 [ 26.967943] ? trace_preempt_on+0x20/0xc0 [ 26.967992] ? __pfx_kthread+0x10/0x10 [ 26.968016] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.968045] ? calculate_sigpending+0x7b/0xa0 [ 26.968084] ? __pfx_kthread+0x10/0x10 [ 26.968109] ret_from_fork+0x116/0x1d0 [ 26.968131] ? __pfx_kthread+0x10/0x10 [ 26.968167] ret_from_fork_asm+0x1a/0x30 [ 26.968202] </TASK> [ 26.968216] [ 26.977284] Allocated by task 313: [ 26.977473] kasan_save_stack+0x45/0x70 [ 26.977695] kasan_save_track+0x18/0x40 [ 26.977916] kasan_save_alloc_info+0x3b/0x50 [ 26.978117] __kasan_kmalloc+0xb7/0xc0 [ 26.978325] __kmalloc_cache_noprof+0x189/0x420 [ 26.978493] kasan_atomics+0x95/0x310 [ 26.978677] kunit_try_run_case+0x1a5/0x480 [ 26.978880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.979068] kthread+0x337/0x6f0 [ 26.979186] ret_from_fork+0x116/0x1d0 [ 26.979366] ret_from_fork_asm+0x1a/0x30 [ 26.979692] [ 26.979860] The buggy address belongs to the object at ffff8881059cb500 [ 26.979860] which belongs to the cache kmalloc-64 of size 64 [ 26.980346] The buggy address is located 0 bytes to the right of [ 26.980346] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.981116] [ 26.981227] The buggy address belongs to the physical page: [ 26.981469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.981963] flags: 0x200000000000000(node=0|zone=2) [ 26.982365] page_type: f5(slab) [ 26.982548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.982979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.983207] page dumped because: kasan: bad access detected [ 26.983384] [ 26.983451] Memory state around the buggy address: [ 26.983670] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.983996] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.984304] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.984511] ^ [ 26.984662] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.985341] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.985653] ================================================================== [ 26.879232] ================================================================== [ 26.879556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 26.879928] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.880176] [ 26.880307] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.880361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.880374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.880399] Call Trace: [ 26.880421] <TASK> [ 26.880442] dump_stack_lvl+0x73/0xb0 [ 26.880475] print_report+0xd1/0x610 [ 26.880500] ? __virt_addr_valid+0x1db/0x2d0 [ 26.880526] ? kasan_atomics_helper+0x15b6/0x5450 [ 26.880556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.880586] ? kasan_atomics_helper+0x15b6/0x5450 [ 26.880618] kasan_report+0x141/0x180 [ 26.880643] ? kasan_atomics_helper+0x15b6/0x5450 [ 26.880678] kasan_check_range+0x10c/0x1c0 [ 26.880705] __kasan_check_write+0x18/0x20 [ 26.880733] kasan_atomics_helper+0x15b6/0x5450 [ 26.880839] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.880888] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.880918] ? kasan_atomics+0x152/0x310 [ 26.880948] kasan_atomics+0x1dc/0x310 [ 26.880974] ? __pfx_kasan_atomics+0x10/0x10 [ 26.881002] ? __pfx_read_tsc+0x10/0x10 [ 26.881029] ? ktime_get_ts64+0x86/0x230 [ 26.881058] kunit_try_run_case+0x1a5/0x480 [ 26.881082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.881104] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.881128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.881160] ? __kthread_parkme+0x82/0x180 [ 26.881182] ? preempt_count_sub+0x50/0x80 [ 26.881215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.881248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.881277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.881306] kthread+0x337/0x6f0 [ 26.881331] ? trace_preempt_on+0x20/0xc0 [ 26.881359] ? __pfx_kthread+0x10/0x10 [ 26.881384] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.881413] ? calculate_sigpending+0x7b/0xa0 [ 26.881442] ? __pfx_kthread+0x10/0x10 [ 26.881467] ret_from_fork+0x116/0x1d0 [ 26.881488] ? __pfx_kthread+0x10/0x10 [ 26.881512] ret_from_fork_asm+0x1a/0x30 [ 26.881548] </TASK> [ 26.881561] [ 26.889336] Allocated by task 313: [ 26.889501] kasan_save_stack+0x45/0x70 [ 26.889671] kasan_save_track+0x18/0x40 [ 26.890079] kasan_save_alloc_info+0x3b/0x50 [ 26.890261] __kasan_kmalloc+0xb7/0xc0 [ 26.890447] __kmalloc_cache_noprof+0x189/0x420 [ 26.890654] kasan_atomics+0x95/0x310 [ 26.890909] kunit_try_run_case+0x1a5/0x480 [ 26.891102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.891348] kthread+0x337/0x6f0 [ 26.891480] ret_from_fork+0x116/0x1d0 [ 26.891607] ret_from_fork_asm+0x1a/0x30 [ 26.892209] [ 26.892347] The buggy address belongs to the object at ffff8881059cb500 [ 26.892347] which belongs to the cache kmalloc-64 of size 64 [ 26.894504] The buggy address is located 0 bytes to the right of [ 26.894504] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.896979] [ 26.897472] The buggy address belongs to the physical page: [ 26.897906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.899044] flags: 0x200000000000000(node=0|zone=2) [ 26.899614] page_type: f5(slab) [ 26.899992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.901003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.901235] page dumped because: kasan: bad access detected [ 26.901409] [ 26.901473] Memory state around the buggy address: [ 26.901620] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.903393] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.904382] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.905514] ^ [ 26.905946] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.906797] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.907400] ================================================================== [ 27.270652] ================================================================== [ 27.271001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 27.271342] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.271706] [ 27.271795] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.271866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.271879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.271903] Call Trace: [ 27.271922] <TASK> [ 27.271941] dump_stack_lvl+0x73/0xb0 [ 27.271973] print_report+0xd1/0x610 [ 27.271997] ? __virt_addr_valid+0x1db/0x2d0 [ 27.272023] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.272052] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.272082] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.272113] kasan_report+0x141/0x180 [ 27.272137] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.272171] kasan_check_range+0x10c/0x1c0 [ 27.272198] __kasan_check_write+0x18/0x20 [ 27.272224] kasan_atomics_helper+0x1eaa/0x5450 [ 27.272265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.272296] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.272324] ? kasan_atomics+0x152/0x310 [ 27.272353] kasan_atomics+0x1dc/0x310 [ 27.272379] ? __pfx_kasan_atomics+0x10/0x10 [ 27.272407] ? __pfx_read_tsc+0x10/0x10 [ 27.272433] ? ktime_get_ts64+0x86/0x230 [ 27.272460] kunit_try_run_case+0x1a5/0x480 [ 27.272484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.272505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.272528] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.272559] ? __kthread_parkme+0x82/0x180 [ 27.272581] ? preempt_count_sub+0x50/0x80 [ 27.272647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.272693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.272722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.272756] kthread+0x337/0x6f0 [ 27.272780] ? trace_preempt_on+0x20/0xc0 [ 27.272806] ? __pfx_kthread+0x10/0x10 [ 27.272830] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.272858] ? calculate_sigpending+0x7b/0xa0 [ 27.272921] ? __pfx_kthread+0x10/0x10 [ 27.272946] ret_from_fork+0x116/0x1d0 [ 27.272967] ? __pfx_kthread+0x10/0x10 [ 27.272991] ret_from_fork_asm+0x1a/0x30 [ 27.273025] </TASK> [ 27.273038] [ 27.281169] Allocated by task 313: [ 27.281371] kasan_save_stack+0x45/0x70 [ 27.281624] kasan_save_track+0x18/0x40 [ 27.281949] kasan_save_alloc_info+0x3b/0x50 [ 27.282226] __kasan_kmalloc+0xb7/0xc0 [ 27.282411] __kmalloc_cache_noprof+0x189/0x420 [ 27.282662] kasan_atomics+0x95/0x310 [ 27.282832] kunit_try_run_case+0x1a5/0x480 [ 27.283049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.283280] kthread+0x337/0x6f0 [ 27.283553] ret_from_fork+0x116/0x1d0 [ 27.283729] ret_from_fork_asm+0x1a/0x30 [ 27.283934] [ 27.284003] The buggy address belongs to the object at ffff8881059cb500 [ 27.284003] which belongs to the cache kmalloc-64 of size 64 [ 27.284535] The buggy address is located 0 bytes to the right of [ 27.284535] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.285185] [ 27.285295] The buggy address belongs to the physical page: [ 27.285505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.285932] flags: 0x200000000000000(node=0|zone=2) [ 27.286152] page_type: f5(slab) [ 27.286322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.286636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.287022] page dumped because: kasan: bad access detected [ 27.287254] [ 27.287345] Memory state around the buggy address: [ 27.287532] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.287866] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.288230] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.288445] ^ [ 27.288592] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.288797] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.289002] ================================================================== [ 27.402601] ================================================================== [ 27.402868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 27.403118] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.403448] [ 27.403555] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.403603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.403616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.403638] Call Trace: [ 27.403656] <TASK> [ 27.403674] dump_stack_lvl+0x73/0xb0 [ 27.403702] print_report+0xd1/0x610 [ 27.403726] ? __virt_addr_valid+0x1db/0x2d0 [ 27.403751] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.403780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.403809] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.403839] kasan_report+0x141/0x180 [ 27.403863] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.403896] __asan_report_load8_noabort+0x18/0x20 [ 27.403924] kasan_atomics_helper+0x4fb2/0x5450 [ 27.403955] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.403984] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.404012] ? kasan_atomics+0x152/0x310 [ 27.404042] kasan_atomics+0x1dc/0x310 [ 27.404068] ? __pfx_kasan_atomics+0x10/0x10 [ 27.404094] ? __pfx_read_tsc+0x10/0x10 [ 27.404120] ? ktime_get_ts64+0x86/0x230 [ 27.404187] kunit_try_run_case+0x1a5/0x480 [ 27.404211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.404233] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.404268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.404301] ? __kthread_parkme+0x82/0x180 [ 27.404333] ? preempt_count_sub+0x50/0x80 [ 27.404359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.404383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.404422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.404452] kthread+0x337/0x6f0 [ 27.404475] ? trace_preempt_on+0x20/0xc0 [ 27.404501] ? __pfx_kthread+0x10/0x10 [ 27.404525] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.404554] ? calculate_sigpending+0x7b/0xa0 [ 27.404583] ? __pfx_kthread+0x10/0x10 [ 27.404609] ret_from_fork+0x116/0x1d0 [ 27.404630] ? __pfx_kthread+0x10/0x10 [ 27.404654] ret_from_fork_asm+0x1a/0x30 [ 27.404689] </TASK> [ 27.404702] [ 27.412410] Allocated by task 313: [ 27.413082] kasan_save_stack+0x45/0x70 [ 27.413921] kasan_save_track+0x18/0x40 [ 27.414116] kasan_save_alloc_info+0x3b/0x50 [ 27.414345] __kasan_kmalloc+0xb7/0xc0 [ 27.414516] __kmalloc_cache_noprof+0x189/0x420 [ 27.414705] kasan_atomics+0x95/0x310 [ 27.415988] kunit_try_run_case+0x1a5/0x480 [ 27.416686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.417581] kthread+0x337/0x6f0 [ 27.418269] ret_from_fork+0x116/0x1d0 [ 27.418984] ret_from_fork_asm+0x1a/0x30 [ 27.419331] [ 27.419420] The buggy address belongs to the object at ffff8881059cb500 [ 27.419420] which belongs to the cache kmalloc-64 of size 64 [ 27.419776] The buggy address is located 0 bytes to the right of [ 27.419776] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.421714] [ 27.421822] The buggy address belongs to the physical page: [ 27.422052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.422370] flags: 0x200000000000000(node=0|zone=2) [ 27.422583] page_type: f5(slab) [ 27.422736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.423615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.424173] page dumped because: kasan: bad access detected [ 27.424621] [ 27.424868] Memory state around the buggy address: [ 27.425367] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.425807] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.426327] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.426831] ^ [ 27.427167] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.427625] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.428251] ================================================================== [ 27.429721] ================================================================== [ 27.430119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 27.430475] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.430779] [ 27.431174] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.431399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.431421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.431447] Call Trace: [ 27.431470] <TASK> [ 27.431494] dump_stack_lvl+0x73/0xb0 [ 27.431529] print_report+0xd1/0x610 [ 27.431555] ? __virt_addr_valid+0x1db/0x2d0 [ 27.431581] ? kasan_atomics_helper+0x218a/0x5450 [ 27.431612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.431642] ? kasan_atomics_helper+0x218a/0x5450 [ 27.431673] kasan_report+0x141/0x180 [ 27.431697] ? kasan_atomics_helper+0x218a/0x5450 [ 27.431733] kasan_check_range+0x10c/0x1c0 [ 27.431760] __kasan_check_write+0x18/0x20 [ 27.431788] kasan_atomics_helper+0x218a/0x5450 [ 27.431829] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.431862] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.431891] ? kasan_atomics+0x152/0x310 [ 27.431921] kasan_atomics+0x1dc/0x310 [ 27.431946] ? __pfx_kasan_atomics+0x10/0x10 [ 27.431974] ? __pfx_read_tsc+0x10/0x10 [ 27.432000] ? ktime_get_ts64+0x86/0x230 [ 27.432029] kunit_try_run_case+0x1a5/0x480 [ 27.432054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.432076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.432101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.432132] ? __kthread_parkme+0x82/0x180 [ 27.432154] ? preempt_count_sub+0x50/0x80 [ 27.432182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.432205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.432234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.432277] kthread+0x337/0x6f0 [ 27.432300] ? trace_preempt_on+0x20/0xc0 [ 27.432327] ? __pfx_kthread+0x10/0x10 [ 27.432351] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.432379] ? calculate_sigpending+0x7b/0xa0 [ 27.432408] ? __pfx_kthread+0x10/0x10 [ 27.432433] ret_from_fork+0x116/0x1d0 [ 27.432454] ? __pfx_kthread+0x10/0x10 [ 27.432479] ret_from_fork_asm+0x1a/0x30 [ 27.432514] </TASK> [ 27.432526] [ 27.443509] Allocated by task 313: [ 27.443677] kasan_save_stack+0x45/0x70 [ 27.444111] kasan_save_track+0x18/0x40 [ 27.444406] kasan_save_alloc_info+0x3b/0x50 [ 27.444726] __kasan_kmalloc+0xb7/0xc0 [ 27.445164] __kmalloc_cache_noprof+0x189/0x420 [ 27.445393] kasan_atomics+0x95/0x310 [ 27.445564] kunit_try_run_case+0x1a5/0x480 [ 27.445748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.446313] kthread+0x337/0x6f0 [ 27.446524] ret_from_fork+0x116/0x1d0 [ 27.446832] ret_from_fork_asm+0x1a/0x30 [ 27.447156] [ 27.447403] The buggy address belongs to the object at ffff8881059cb500 [ 27.447403] which belongs to the cache kmalloc-64 of size 64 [ 27.448194] The buggy address is located 0 bytes to the right of [ 27.448194] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.448715] [ 27.448806] The buggy address belongs to the physical page: [ 27.449378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.449991] flags: 0x200000000000000(node=0|zone=2) [ 27.450346] page_type: f5(slab) [ 27.450659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.451159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.451611] page dumped because: kasan: bad access detected [ 27.452038] [ 27.452134] Memory state around the buggy address: [ 27.452581] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.453245] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.453621] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.454160] ^ [ 27.454462] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.455036] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.455342] ================================================================== [ 27.176918] ================================================================== [ 27.177583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 27.178360] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.178726] [ 27.178853] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.178911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.178979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.179017] Call Trace: [ 27.179040] <TASK> [ 27.179063] dump_stack_lvl+0x73/0xb0 [ 27.179108] print_report+0xd1/0x610 [ 27.179149] ? __virt_addr_valid+0x1db/0x2d0 [ 27.179189] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.179219] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.179259] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.179291] kasan_report+0x141/0x180 [ 27.179316] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.179350] __asan_report_load8_noabort+0x18/0x20 [ 27.179378] kasan_atomics_helper+0x4f30/0x5450 [ 27.179410] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.179441] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.179471] ? kasan_atomics+0x152/0x310 [ 27.179502] kasan_atomics+0x1dc/0x310 [ 27.179528] ? __pfx_kasan_atomics+0x10/0x10 [ 27.179555] ? __pfx_read_tsc+0x10/0x10 [ 27.179581] ? ktime_get_ts64+0x86/0x230 [ 27.179610] kunit_try_run_case+0x1a5/0x480 [ 27.179634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.179656] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.179680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.179711] ? __kthread_parkme+0x82/0x180 [ 27.179734] ? preempt_count_sub+0x50/0x80 [ 27.179807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.179844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.179872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.179901] kthread+0x337/0x6f0 [ 27.179924] ? trace_preempt_on+0x20/0xc0 [ 27.179952] ? __pfx_kthread+0x10/0x10 [ 27.179976] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.180006] ? calculate_sigpending+0x7b/0xa0 [ 27.180035] ? __pfx_kthread+0x10/0x10 [ 27.180060] ret_from_fork+0x116/0x1d0 [ 27.180082] ? __pfx_kthread+0x10/0x10 [ 27.180107] ret_from_fork_asm+0x1a/0x30 [ 27.180143] </TASK> [ 27.180157] [ 27.192694] Allocated by task 313: [ 27.193299] kasan_save_stack+0x45/0x70 [ 27.193490] kasan_save_track+0x18/0x40 [ 27.193875] kasan_save_alloc_info+0x3b/0x50 [ 27.194088] __kasan_kmalloc+0xb7/0xc0 [ 27.194275] __kmalloc_cache_noprof+0x189/0x420 [ 27.194485] kasan_atomics+0x95/0x310 [ 27.194658] kunit_try_run_case+0x1a5/0x480 [ 27.195156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.195580] kthread+0x337/0x6f0 [ 27.195885] ret_from_fork+0x116/0x1d0 [ 27.196039] ret_from_fork_asm+0x1a/0x30 [ 27.196634] [ 27.196712] The buggy address belongs to the object at ffff8881059cb500 [ 27.196712] which belongs to the cache kmalloc-64 of size 64 [ 27.197652] The buggy address is located 0 bytes to the right of [ 27.197652] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.198395] [ 27.198509] The buggy address belongs to the physical page: [ 27.198739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.199289] flags: 0x200000000000000(node=0|zone=2) [ 27.199626] page_type: f5(slab) [ 27.199855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.200390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.200809] page dumped because: kasan: bad access detected [ 27.201356] [ 27.201452] Memory state around the buggy address: [ 27.201640] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.202305] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.202724] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.203165] ^ [ 27.203409] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.204218] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.205093] ================================================================== [ 25.951741] ================================================================== [ 25.952471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 25.953281] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 25.953997] [ 25.954208] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.954277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.954290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.954315] Call Trace: [ 25.954336] <TASK> [ 25.954358] dump_stack_lvl+0x73/0xb0 [ 25.954391] print_report+0xd1/0x610 [ 25.954415] ? __virt_addr_valid+0x1db/0x2d0 [ 25.954442] ? kasan_atomics_helper+0x4b6e/0x5450 [ 25.954472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.954502] ? kasan_atomics_helper+0x4b6e/0x5450 [ 25.954533] kasan_report+0x141/0x180 [ 25.954557] ? kasan_atomics_helper+0x4b6e/0x5450 [ 25.954592] __asan_report_store4_noabort+0x1b/0x30 [ 25.954621] kasan_atomics_helper+0x4b6e/0x5450 [ 25.954652] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.954683] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.954712] ? kasan_atomics+0x152/0x310 [ 25.954742] kasan_atomics+0x1dc/0x310 [ 25.954813] ? __pfx_kasan_atomics+0x10/0x10 [ 25.954842] ? __pfx_read_tsc+0x10/0x10 [ 25.954869] ? ktime_get_ts64+0x86/0x230 [ 25.954898] kunit_try_run_case+0x1a5/0x480 [ 25.954922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.954944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.954968] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.955001] ? __kthread_parkme+0x82/0x180 [ 25.955024] ? preempt_count_sub+0x50/0x80 [ 25.955060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.955084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.955114] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.955143] kthread+0x337/0x6f0 [ 25.955167] ? trace_preempt_on+0x20/0xc0 [ 25.955193] ? __pfx_kthread+0x10/0x10 [ 25.955218] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.955259] ? calculate_sigpending+0x7b/0xa0 [ 25.955289] ? __pfx_kthread+0x10/0x10 [ 25.955314] ret_from_fork+0x116/0x1d0 [ 25.955335] ? __pfx_kthread+0x10/0x10 [ 25.955358] ret_from_fork_asm+0x1a/0x30 [ 25.955394] </TASK> [ 25.955407] [ 25.965905] Allocated by task 313: [ 25.966070] kasan_save_stack+0x45/0x70 [ 25.966353] kasan_save_track+0x18/0x40 [ 25.966543] kasan_save_alloc_info+0x3b/0x50 [ 25.966795] __kasan_kmalloc+0xb7/0xc0 [ 25.966947] __kmalloc_cache_noprof+0x189/0x420 [ 25.967102] kasan_atomics+0x95/0x310 [ 25.967231] kunit_try_run_case+0x1a5/0x480 [ 25.967446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.967699] kthread+0x337/0x6f0 [ 25.967910] ret_from_fork+0x116/0x1d0 [ 25.968158] ret_from_fork_asm+0x1a/0x30 [ 25.968373] [ 25.968452] The buggy address belongs to the object at ffff8881059cb500 [ 25.968452] which belongs to the cache kmalloc-64 of size 64 [ 25.969039] The buggy address is located 0 bytes to the right of [ 25.969039] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 25.969517] [ 25.969611] The buggy address belongs to the physical page: [ 25.969858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 25.970536] flags: 0x200000000000000(node=0|zone=2) [ 25.970875] page_type: f5(slab) [ 25.971023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.971331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.971651] page dumped because: kasan: bad access detected [ 25.971932] [ 25.972027] Memory state around the buggy address: [ 25.972187] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.972412] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.972658] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.972962] ^ [ 25.973407] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.973641] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.973849] ================================================================== [ 27.206153] ================================================================== [ 27.206930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 27.207184] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.207424] [ 27.207515] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.207569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.207585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.207608] Call Trace: [ 27.207631] <TASK> [ 27.207653] dump_stack_lvl+0x73/0xb0 [ 27.207684] print_report+0xd1/0x610 [ 27.207709] ? __virt_addr_valid+0x1db/0x2d0 [ 27.207735] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.207767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.207797] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.207828] kasan_report+0x141/0x180 [ 27.207852] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.207959] kasan_check_range+0x10c/0x1c0 [ 27.207988] __kasan_check_write+0x18/0x20 [ 27.208018] kasan_atomics_helper+0x1ce1/0x5450 [ 27.208049] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.208079] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.208108] ? kasan_atomics+0x152/0x310 [ 27.208138] kasan_atomics+0x1dc/0x310 [ 27.208164] ? __pfx_kasan_atomics+0x10/0x10 [ 27.208191] ? __pfx_read_tsc+0x10/0x10 [ 27.208218] ? ktime_get_ts64+0x86/0x230 [ 27.208259] kunit_try_run_case+0x1a5/0x480 [ 27.208283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.208305] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.208329] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.208359] ? __kthread_parkme+0x82/0x180 [ 27.208382] ? preempt_count_sub+0x50/0x80 [ 27.208408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.208431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.208459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.208488] kthread+0x337/0x6f0 [ 27.208511] ? trace_preempt_on+0x20/0xc0 [ 27.208537] ? __pfx_kthread+0x10/0x10 [ 27.208561] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.208589] ? calculate_sigpending+0x7b/0xa0 [ 27.208618] ? __pfx_kthread+0x10/0x10 [ 27.208643] ret_from_fork+0x116/0x1d0 [ 27.208664] ? __pfx_kthread+0x10/0x10 [ 27.208689] ret_from_fork_asm+0x1a/0x30 [ 27.208724] </TASK> [ 27.208737] [ 27.217454] Allocated by task 313: [ 27.217638] kasan_save_stack+0x45/0x70 [ 27.217965] kasan_save_track+0x18/0x40 [ 27.218151] kasan_save_alloc_info+0x3b/0x50 [ 27.218356] __kasan_kmalloc+0xb7/0xc0 [ 27.218527] __kmalloc_cache_noprof+0x189/0x420 [ 27.218730] kasan_atomics+0x95/0x310 [ 27.219106] kunit_try_run_case+0x1a5/0x480 [ 27.219309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.219543] kthread+0x337/0x6f0 [ 27.219696] ret_from_fork+0x116/0x1d0 [ 27.220045] ret_from_fork_asm+0x1a/0x30 [ 27.220234] [ 27.220331] The buggy address belongs to the object at ffff8881059cb500 [ 27.220331] which belongs to the cache kmalloc-64 of size 64 [ 27.220853] The buggy address is located 0 bytes to the right of [ 27.220853] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.221359] [ 27.221450] The buggy address belongs to the physical page: [ 27.221673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.223009] flags: 0x200000000000000(node=0|zone=2) [ 27.223203] page_type: f5(slab) [ 27.223340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.223569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.223799] page dumped because: kasan: bad access detected [ 27.223985] [ 27.224051] Memory state around the buggy address: [ 27.224205] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.224424] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.224635] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.224900] ^ [ 27.225127] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.225891] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.226501] ================================================================== [ 26.907923] ================================================================== [ 26.908471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 26.909320] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.910102] [ 26.910213] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.910313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.910329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.910391] Call Trace: [ 26.910415] <TASK> [ 26.910438] dump_stack_lvl+0x73/0xb0 [ 26.910484] print_report+0xd1/0x610 [ 26.910508] ? __virt_addr_valid+0x1db/0x2d0 [ 26.910537] ? kasan_atomics_helper+0x164f/0x5450 [ 26.910568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.910599] ? kasan_atomics_helper+0x164f/0x5450 [ 26.910629] kasan_report+0x141/0x180 [ 26.910653] ? kasan_atomics_helper+0x164f/0x5450 [ 26.910688] kasan_check_range+0x10c/0x1c0 [ 26.910715] __kasan_check_write+0x18/0x20 [ 26.910743] kasan_atomics_helper+0x164f/0x5450 [ 26.910785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.910828] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.910858] ? kasan_atomics+0x152/0x310 [ 26.910888] kasan_atomics+0x1dc/0x310 [ 26.910914] ? __pfx_kasan_atomics+0x10/0x10 [ 26.910942] ? __pfx_read_tsc+0x10/0x10 [ 26.910969] ? ktime_get_ts64+0x86/0x230 [ 26.910998] kunit_try_run_case+0x1a5/0x480 [ 26.911023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.911045] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.911069] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.911100] ? __kthread_parkme+0x82/0x180 [ 26.911123] ? preempt_count_sub+0x50/0x80 [ 26.911149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.911173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.911202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.911232] kthread+0x337/0x6f0 [ 26.911264] ? trace_preempt_on+0x20/0xc0 [ 26.911291] ? __pfx_kthread+0x10/0x10 [ 26.911315] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.911344] ? calculate_sigpending+0x7b/0xa0 [ 26.911375] ? __pfx_kthread+0x10/0x10 [ 26.911401] ret_from_fork+0x116/0x1d0 [ 26.911422] ? __pfx_kthread+0x10/0x10 [ 26.911446] ret_from_fork_asm+0x1a/0x30 [ 26.911484] </TASK> [ 26.911496] [ 26.926156] Allocated by task 313: [ 26.926317] kasan_save_stack+0x45/0x70 [ 26.926483] kasan_save_track+0x18/0x40 [ 26.926906] kasan_save_alloc_info+0x3b/0x50 [ 26.927415] __kasan_kmalloc+0xb7/0xc0 [ 26.927724] __kmalloc_cache_noprof+0x189/0x420 [ 26.928196] kasan_atomics+0x95/0x310 [ 26.928492] kunit_try_run_case+0x1a5/0x480 [ 26.928636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.928803] kthread+0x337/0x6f0 [ 26.929051] ret_from_fork+0x116/0x1d0 [ 26.929465] ret_from_fork_asm+0x1a/0x30 [ 26.929718] [ 26.929934] The buggy address belongs to the object at ffff8881059cb500 [ 26.929934] which belongs to the cache kmalloc-64 of size 64 [ 26.930799] The buggy address is located 0 bytes to the right of [ 26.930799] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.931782] [ 26.931950] The buggy address belongs to the physical page: [ 26.932580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.933129] flags: 0x200000000000000(node=0|zone=2) [ 26.933493] page_type: f5(slab) [ 26.933857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.934518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.934735] page dumped because: kasan: bad access detected [ 26.935107] [ 26.935313] Memory state around the buggy address: [ 26.935868] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.936685] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.937404] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.937905] ^ [ 26.938056] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.938270] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.938471] ================================================================== [ 27.252377] ================================================================== [ 27.252702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 27.253064] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.253340] [ 27.253426] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.253476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.253490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.253513] Call Trace: [ 27.253532] <TASK> [ 27.253551] dump_stack_lvl+0x73/0xb0 [ 27.253582] print_report+0xd1/0x610 [ 27.253607] ? __virt_addr_valid+0x1db/0x2d0 [ 27.253632] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.253661] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.253691] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.253720] kasan_report+0x141/0x180 [ 27.253768] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.253820] kasan_check_range+0x10c/0x1c0 [ 27.253847] __kasan_check_write+0x18/0x20 [ 27.253874] kasan_atomics_helper+0x1e12/0x5450 [ 27.253906] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.253936] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.253964] ? kasan_atomics+0x152/0x310 [ 27.253993] kasan_atomics+0x1dc/0x310 [ 27.254019] ? __pfx_kasan_atomics+0x10/0x10 [ 27.254046] ? __pfx_read_tsc+0x10/0x10 [ 27.254072] ? ktime_get_ts64+0x86/0x230 [ 27.254100] kunit_try_run_case+0x1a5/0x480 [ 27.254124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.254146] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.254169] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.254199] ? __kthread_parkme+0x82/0x180 [ 27.254223] ? preempt_count_sub+0x50/0x80 [ 27.254275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.254300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.254328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.254356] kthread+0x337/0x6f0 [ 27.254378] ? trace_preempt_on+0x20/0xc0 [ 27.254404] ? __pfx_kthread+0x10/0x10 [ 27.254428] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.254456] ? calculate_sigpending+0x7b/0xa0 [ 27.254484] ? __pfx_kthread+0x10/0x10 [ 27.254509] ret_from_fork+0x116/0x1d0 [ 27.254529] ? __pfx_kthread+0x10/0x10 [ 27.254553] ret_from_fork_asm+0x1a/0x30 [ 27.254587] </TASK> [ 27.254601] [ 27.262364] Allocated by task 313: [ 27.262495] kasan_save_stack+0x45/0x70 [ 27.262632] kasan_save_track+0x18/0x40 [ 27.262764] kasan_save_alloc_info+0x3b/0x50 [ 27.262983] __kasan_kmalloc+0xb7/0xc0 [ 27.263269] __kmalloc_cache_noprof+0x189/0x420 [ 27.263485] kasan_atomics+0x95/0x310 [ 27.263665] kunit_try_run_case+0x1a5/0x480 [ 27.263881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.264135] kthread+0x337/0x6f0 [ 27.264434] ret_from_fork+0x116/0x1d0 [ 27.264615] ret_from_fork_asm+0x1a/0x30 [ 27.264835] [ 27.264925] The buggy address belongs to the object at ffff8881059cb500 [ 27.264925] which belongs to the cache kmalloc-64 of size 64 [ 27.265602] The buggy address is located 0 bytes to the right of [ 27.265602] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.265956] [ 27.266036] The buggy address belongs to the physical page: [ 27.266293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.266641] flags: 0x200000000000000(node=0|zone=2) [ 27.266876] page_type: f5(slab) [ 27.267046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.267434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.267778] page dumped because: kasan: bad access detected [ 27.268041] [ 27.268153] Memory state around the buggy address: [ 27.268352] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.268554] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.268791] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.269111] ^ [ 27.269339] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.269725] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.270223] ================================================================== [ 27.308869] ================================================================== [ 27.309231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 27.309546] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 27.309763] [ 27.309848] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 27.309896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.309910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.309934] Call Trace: [ 27.309954] <TASK> [ 27.309974] dump_stack_lvl+0x73/0xb0 [ 27.310002] print_report+0xd1/0x610 [ 27.310025] ? __virt_addr_valid+0x1db/0x2d0 [ 27.310050] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.310081] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.310110] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.310140] kasan_report+0x141/0x180 [ 27.310163] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.310197] __asan_report_load8_noabort+0x18/0x20 [ 27.310224] kasan_atomics_helper+0x4f71/0x5450 [ 27.310265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.310295] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.310323] ? kasan_atomics+0x152/0x310 [ 27.310363] kasan_atomics+0x1dc/0x310 [ 27.310390] ? __pfx_kasan_atomics+0x10/0x10 [ 27.310417] ? __pfx_read_tsc+0x10/0x10 [ 27.310443] ? ktime_get_ts64+0x86/0x230 [ 27.310470] kunit_try_run_case+0x1a5/0x480 [ 27.310494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.310527] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.310560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.310590] ? __kthread_parkme+0x82/0x180 [ 27.310612] ? preempt_count_sub+0x50/0x80 [ 27.310638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.310662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.310690] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.310719] kthread+0x337/0x6f0 [ 27.310765] ? trace_preempt_on+0x20/0xc0 [ 27.310791] ? __pfx_kthread+0x10/0x10 [ 27.310814] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.310843] ? calculate_sigpending+0x7b/0xa0 [ 27.310872] ? __pfx_kthread+0x10/0x10 [ 27.310896] ret_from_fork+0x116/0x1d0 [ 27.310917] ? __pfx_kthread+0x10/0x10 [ 27.310941] ret_from_fork_asm+0x1a/0x30 [ 27.310977] </TASK> [ 27.310989] [ 27.323893] Allocated by task 313: [ 27.324301] kasan_save_stack+0x45/0x70 [ 27.324616] kasan_save_track+0x18/0x40 [ 27.324875] kasan_save_alloc_info+0x3b/0x50 [ 27.325258] __kasan_kmalloc+0xb7/0xc0 [ 27.325544] __kmalloc_cache_noprof+0x189/0x420 [ 27.325961] kasan_atomics+0x95/0x310 [ 27.326273] kunit_try_run_case+0x1a5/0x480 [ 27.326571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.327062] kthread+0x337/0x6f0 [ 27.327365] ret_from_fork+0x116/0x1d0 [ 27.327662] ret_from_fork_asm+0x1a/0x30 [ 27.328002] [ 27.328126] The buggy address belongs to the object at ffff8881059cb500 [ 27.328126] which belongs to the cache kmalloc-64 of size 64 [ 27.328848] The buggy address is located 0 bytes to the right of [ 27.328848] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 27.329609] [ 27.329717] The buggy address belongs to the physical page: [ 27.330216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 27.330623] flags: 0x200000000000000(node=0|zone=2) [ 27.331006] page_type: f5(slab) [ 27.331300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.331721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.332094] page dumped because: kasan: bad access detected [ 27.332336] [ 27.332417] Memory state around the buggy address: [ 27.332646] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.333210] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.333589] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.333997] ^ [ 27.334381] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.334735] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.335197] ================================================================== [ 26.216719] ================================================================== [ 26.217356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 26.217590] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.218042] [ 26.218281] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.218337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.218368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.218393] Call Trace: [ 26.218428] <TASK> [ 26.218463] dump_stack_lvl+0x73/0xb0 [ 26.218508] print_report+0xd1/0x610 [ 26.218533] ? __virt_addr_valid+0x1db/0x2d0 [ 26.218558] ? kasan_atomics_helper+0x860/0x5450 [ 26.218588] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.218619] ? kasan_atomics_helper+0x860/0x5450 [ 26.218649] kasan_report+0x141/0x180 [ 26.218673] ? kasan_atomics_helper+0x860/0x5450 [ 26.218708] kasan_check_range+0x10c/0x1c0 [ 26.218735] __kasan_check_write+0x18/0x20 [ 26.218763] kasan_atomics_helper+0x860/0x5450 [ 26.218794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.218825] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.218853] ? kasan_atomics+0x152/0x310 [ 26.218884] kasan_atomics+0x1dc/0x310 [ 26.218912] ? __pfx_kasan_atomics+0x10/0x10 [ 26.218959] ? __pfx_read_tsc+0x10/0x10 [ 26.218987] ? ktime_get_ts64+0x86/0x230 [ 26.219016] kunit_try_run_case+0x1a5/0x480 [ 26.219040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.219114] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.219142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.219193] ? __kthread_parkme+0x82/0x180 [ 26.219217] ? preempt_count_sub+0x50/0x80 [ 26.219255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.219279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.219307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.219353] kthread+0x337/0x6f0 [ 26.219389] ? trace_preempt_on+0x20/0xc0 [ 26.219415] ? __pfx_kthread+0x10/0x10 [ 26.219439] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.219482] ? calculate_sigpending+0x7b/0xa0 [ 26.219524] ? __pfx_kthread+0x10/0x10 [ 26.219549] ret_from_fork+0x116/0x1d0 [ 26.219570] ? __pfx_kthread+0x10/0x10 [ 26.219594] ret_from_fork_asm+0x1a/0x30 [ 26.219630] </TASK> [ 26.219644] [ 26.227867] Allocated by task 313: [ 26.228126] kasan_save_stack+0x45/0x70 [ 26.228426] kasan_save_track+0x18/0x40 [ 26.228857] kasan_save_alloc_info+0x3b/0x50 [ 26.229063] __kasan_kmalloc+0xb7/0xc0 [ 26.229275] __kmalloc_cache_noprof+0x189/0x420 [ 26.229505] kasan_atomics+0x95/0x310 [ 26.229724] kunit_try_run_case+0x1a5/0x480 [ 26.230045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.230351] kthread+0x337/0x6f0 [ 26.230477] ret_from_fork+0x116/0x1d0 [ 26.230608] ret_from_fork_asm+0x1a/0x30 [ 26.230745] [ 26.230838] The buggy address belongs to the object at ffff8881059cb500 [ 26.230838] which belongs to the cache kmalloc-64 of size 64 [ 26.231438] The buggy address is located 0 bytes to the right of [ 26.231438] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.232177] [ 26.232310] The buggy address belongs to the physical page: [ 26.232662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.232898] flags: 0x200000000000000(node=0|zone=2) [ 26.233056] page_type: f5(slab) [ 26.233173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.233412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.234140] page dumped because: kasan: bad access detected [ 26.234603] [ 26.234724] Memory state around the buggy address: [ 26.234968] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.235410] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.235701] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.236463] ^ [ 26.236710] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.237132] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.237369] ================================================================== [ 26.535272] ================================================================== [ 26.535508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 26.535749] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313 [ 26.535965] [ 26.536051] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 26.536101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.536115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.536138] Call Trace: [ 26.536157] <TASK> [ 26.536176] dump_stack_lvl+0x73/0xb0 [ 26.536206] print_report+0xd1/0x610 [ 26.536229] ? __virt_addr_valid+0x1db/0x2d0 [ 26.536719] ? kasan_atomics_helper+0x4a36/0x5450 [ 26.536753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.536784] ? kasan_atomics_helper+0x4a36/0x5450 [ 26.537276] kasan_report+0x141/0x180 [ 26.537310] ? kasan_atomics_helper+0x4a36/0x5450 [ 26.537348] __asan_report_load4_noabort+0x18/0x20 [ 26.537378] kasan_atomics_helper+0x4a36/0x5450 [ 26.537410] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.537440] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.537468] ? kasan_atomics+0x152/0x310 [ 26.537498] kasan_atomics+0x1dc/0x310 [ 26.537524] ? __pfx_kasan_atomics+0x10/0x10 [ 26.537551] ? __pfx_read_tsc+0x10/0x10 [ 26.537579] ? ktime_get_ts64+0x86/0x230 [ 26.537607] kunit_try_run_case+0x1a5/0x480 [ 26.537631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.537653] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.537677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.537707] ? __kthread_parkme+0x82/0x180 [ 26.537729] ? preempt_count_sub+0x50/0x80 [ 26.537790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.537833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.537864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.537893] kthread+0x337/0x6f0 [ 26.537916] ? trace_preempt_on+0x20/0xc0 [ 26.537943] ? __pfx_kthread+0x10/0x10 [ 26.537967] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.537996] ? calculate_sigpending+0x7b/0xa0 [ 26.538025] ? __pfx_kthread+0x10/0x10 [ 26.538051] ret_from_fork+0x116/0x1d0 [ 26.538072] ? __pfx_kthread+0x10/0x10 [ 26.538096] ret_from_fork_asm+0x1a/0x30 [ 26.538132] </TASK> [ 26.538145] [ 26.552604] Allocated by task 313: [ 26.552932] kasan_save_stack+0x45/0x70 [ 26.553307] kasan_save_track+0x18/0x40 [ 26.553649] kasan_save_alloc_info+0x3b/0x50 [ 26.554057] __kasan_kmalloc+0xb7/0xc0 [ 26.554389] __kmalloc_cache_noprof+0x189/0x420 [ 26.554774] kasan_atomics+0x95/0x310 [ 26.555177] kunit_try_run_case+0x1a5/0x480 [ 26.555983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.556255] kthread+0x337/0x6f0 [ 26.556552] ret_from_fork+0x116/0x1d0 [ 26.556714] ret_from_fork_asm+0x1a/0x30 [ 26.556924] [ 26.557019] The buggy address belongs to the object at ffff8881059cb500 [ 26.557019] which belongs to the cache kmalloc-64 of size 64 [ 26.558268] The buggy address is located 0 bytes to the right of [ 26.558268] allocated 48-byte region [ffff8881059cb500, ffff8881059cb530) [ 26.558739] [ 26.559399] The buggy address belongs to the physical page: [ 26.559634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb [ 26.559916] flags: 0x200000000000000(node=0|zone=2) [ 26.560101] page_type: f5(slab) [ 26.560340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.560751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.561231] page dumped because: kasan: bad access detected [ 26.561480] [ 26.561554] Memory state around the buggy address: [ 26.561760] ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.562404] ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.562808] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.563361] ^ [ 26.563582] ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.564122] ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.564399] ==================================================================