Date
July 9, 2025, 1:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.062879] ================================================================== [ 32.062936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 32.063259] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.063591] [ 32.063705] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.063810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.064191] Hardware name: linux,dummy-virt (DT) [ 32.064260] Call trace: [ 32.064376] show_stack+0x20/0x38 (C) [ 32.064487] dump_stack_lvl+0x8c/0xd0 [ 32.064540] print_report+0x118/0x5d0 [ 32.064695] kasan_report+0xdc/0x128 [ 32.064885] kasan_check_range+0x100/0x1a8 [ 32.064999] __kasan_check_write+0x20/0x30 [ 32.065249] kasan_atomics_helper+0xa6c/0x4858 [ 32.065479] kasan_atomics+0x198/0x2e0 [ 32.065576] kunit_try_run_case+0x170/0x3f0 [ 32.065963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.066203] kthread+0x328/0x630 [ 32.066322] ret_from_fork+0x10/0x20 [ 32.066374] [ 32.066395] Allocated by task 297: [ 32.066631] kasan_save_stack+0x3c/0x68 [ 32.066856] kasan_save_track+0x20/0x40 [ 32.067208] kasan_save_alloc_info+0x40/0x58 [ 32.067295] __kasan_kmalloc+0xd4/0xd8 [ 32.067372] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.067619] kasan_atomics+0xb8/0x2e0 [ 32.067858] kunit_try_run_case+0x170/0x3f0 [ 32.068001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.068198] kthread+0x328/0x630 [ 32.068399] ret_from_fork+0x10/0x20 [ 32.068454] [ 32.068634] The buggy address belongs to the object at fff00000c9c2c400 [ 32.068634] which belongs to the cache kmalloc-64 of size 64 [ 32.068721] The buggy address is located 0 bytes to the right of [ 32.068721] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.068905] [ 32.068931] The buggy address belongs to the physical page: [ 32.069304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.069387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.069439] page_type: f5(slab) [ 32.069637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.069696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.070106] page dumped because: kasan: bad access detected [ 32.070149] [ 32.070170] Memory state around the buggy address: [ 32.070224] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.070479] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.070806] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.070963] ^ [ 32.071140] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.071503] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.071656] ================================================================== [ 32.405714] ================================================================== [ 32.405777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 32.406077] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.406195] [ 32.406233] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.406519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.406648] Hardware name: linux,dummy-virt (DT) [ 32.406811] Call trace: [ 32.406848] show_stack+0x20/0x38 (C) [ 32.407017] dump_stack_lvl+0x8c/0xd0 [ 32.407121] print_report+0x118/0x5d0 [ 32.407259] kasan_report+0xdc/0x128 [ 32.407337] kasan_check_range+0x100/0x1a8 [ 32.407392] __kasan_check_write+0x20/0x30 [ 32.407447] kasan_atomics_helper+0x17ec/0x4858 [ 32.407778] kasan_atomics+0x198/0x2e0 [ 32.407898] kunit_try_run_case+0x170/0x3f0 [ 32.407951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.408422] kthread+0x328/0x630 [ 32.408705] ret_from_fork+0x10/0x20 [ 32.408970] [ 32.409042] Allocated by task 297: [ 32.409094] kasan_save_stack+0x3c/0x68 [ 32.410138] kasan_save_track+0x20/0x40 [ 32.410213] kasan_save_alloc_info+0x40/0x58 [ 32.410548] __kasan_kmalloc+0xd4/0xd8 [ 32.410756] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.410852] kasan_atomics+0xb8/0x2e0 [ 32.411090] kunit_try_run_case+0x170/0x3f0 [ 32.411145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.411197] kthread+0x328/0x630 [ 32.411444] ret_from_fork+0x10/0x20 [ 32.411876] [ 32.411932] The buggy address belongs to the object at fff00000c9c2c400 [ 32.411932] which belongs to the cache kmalloc-64 of size 64 [ 32.411997] The buggy address is located 0 bytes to the right of [ 32.411997] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.412082] [ 32.412105] The buggy address belongs to the physical page: [ 32.412138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.412565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.412782] page_type: f5(slab) [ 32.413066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.413352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.413617] page dumped because: kasan: bad access detected [ 32.413811] [ 32.413902] Memory state around the buggy address: [ 32.414266] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.414415] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.414576] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.414740] ^ [ 32.414949] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.415259] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.415484] ================================================================== [ 32.385970] ================================================================== [ 32.386020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 32.386085] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.386137] [ 32.386168] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.386256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.386287] Hardware name: linux,dummy-virt (DT) [ 32.386320] Call trace: [ 32.386346] show_stack+0x20/0x38 (C) [ 32.386394] dump_stack_lvl+0x8c/0xd0 [ 32.386444] print_report+0x118/0x5d0 [ 32.386488] kasan_report+0xdc/0x128 [ 32.386534] kasan_check_range+0x100/0x1a8 [ 32.386580] __kasan_check_write+0x20/0x30 [ 32.386647] kasan_atomics_helper+0x175c/0x4858 [ 32.386698] kasan_atomics+0x198/0x2e0 [ 32.386744] kunit_try_run_case+0x170/0x3f0 [ 32.386796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.386852] kthread+0x328/0x630 [ 32.386896] ret_from_fork+0x10/0x20 [ 32.386946] [ 32.386969] Allocated by task 297: [ 32.387016] kasan_save_stack+0x3c/0x68 [ 32.387512] kasan_save_track+0x20/0x40 [ 32.387567] kasan_save_alloc_info+0x40/0x58 [ 32.387609] __kasan_kmalloc+0xd4/0xd8 [ 32.387945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.388668] kasan_atomics+0xb8/0x2e0 [ 32.388736] kunit_try_run_case+0x170/0x3f0 [ 32.388806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.389065] kthread+0x328/0x630 [ 32.389620] ret_from_fork+0x10/0x20 [ 32.389983] [ 32.390122] The buggy address belongs to the object at fff00000c9c2c400 [ 32.390122] which belongs to the cache kmalloc-64 of size 64 [ 32.390340] The buggy address is located 0 bytes to the right of [ 32.390340] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.390738] [ 32.390870] The buggy address belongs to the physical page: [ 32.390906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.391307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.391604] page_type: f5(slab) [ 32.391759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.392142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.392218] page dumped because: kasan: bad access detected [ 32.392438] [ 32.392556] Memory state around the buggy address: [ 32.392644] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.392726] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.392869] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.393296] ^ [ 32.393375] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.393506] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.393663] ================================================================== [ 32.156261] ================================================================== [ 32.156613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 32.156718] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.156842] [ 32.156876] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.156966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.157112] Hardware name: linux,dummy-virt (DT) [ 32.157148] Call trace: [ 32.157172] show_stack+0x20/0x38 (C) [ 32.157483] dump_stack_lvl+0x8c/0xd0 [ 32.157794] print_report+0x118/0x5d0 [ 32.157873] kasan_report+0xdc/0x128 [ 32.157920] kasan_check_range+0x100/0x1a8 [ 32.158217] __kasan_check_read+0x20/0x30 [ 32.158356] kasan_atomics_helper+0xdd4/0x4858 [ 32.158415] kasan_atomics+0x198/0x2e0 [ 32.158649] kunit_try_run_case+0x170/0x3f0 [ 32.158828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.158896] kthread+0x328/0x630 [ 32.158940] ret_from_fork+0x10/0x20 [ 32.159318] [ 32.159515] Allocated by task 297: [ 32.159558] kasan_save_stack+0x3c/0x68 [ 32.159622] kasan_save_track+0x20/0x40 [ 32.159748] kasan_save_alloc_info+0x40/0x58 [ 32.159792] __kasan_kmalloc+0xd4/0xd8 [ 32.159833] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.159877] kasan_atomics+0xb8/0x2e0 [ 32.160226] kunit_try_run_case+0x170/0x3f0 [ 32.160322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.160412] kthread+0x328/0x630 [ 32.160744] ret_from_fork+0x10/0x20 [ 32.160807] [ 32.160830] The buggy address belongs to the object at fff00000c9c2c400 [ 32.160830] which belongs to the cache kmalloc-64 of size 64 [ 32.161228] The buggy address is located 0 bytes to the right of [ 32.161228] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.161470] [ 32.161500] The buggy address belongs to the physical page: [ 32.161649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.161764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.162127] page_type: f5(slab) [ 32.162183] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.162432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.162636] page dumped because: kasan: bad access detected [ 32.162698] [ 32.162836] Memory state around the buggy address: [ 32.162931] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.163118] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.163217] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.163261] ^ [ 32.163295] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.163925] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.164127] ================================================================== [ 32.320659] ================================================================== [ 32.320900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 32.321316] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.321397] [ 32.321432] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.321520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.321548] Hardware name: linux,dummy-virt (DT) [ 32.321582] Call trace: [ 32.321772] show_stack+0x20/0x38 (C) [ 32.321836] dump_stack_lvl+0x8c/0xd0 [ 32.322202] print_report+0x118/0x5d0 [ 32.322273] kasan_report+0xdc/0x128 [ 32.322320] kasan_check_range+0x100/0x1a8 [ 32.322597] __kasan_check_write+0x20/0x30 [ 32.322843] kasan_atomics_helper+0x14e4/0x4858 [ 32.323229] kasan_atomics+0x198/0x2e0 [ 32.323302] kunit_try_run_case+0x170/0x3f0 [ 32.323592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.323886] kthread+0x328/0x630 [ 32.323940] ret_from_fork+0x10/0x20 [ 32.323990] [ 32.324329] Allocated by task 297: [ 32.324483] kasan_save_stack+0x3c/0x68 [ 32.324570] kasan_save_track+0x20/0x40 [ 32.325102] kasan_save_alloc_info+0x40/0x58 [ 32.325203] __kasan_kmalloc+0xd4/0xd8 [ 32.325640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.325721] kasan_atomics+0xb8/0x2e0 [ 32.326087] kunit_try_run_case+0x170/0x3f0 [ 32.326271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.326404] kthread+0x328/0x630 [ 32.326550] ret_from_fork+0x10/0x20 [ 32.326905] [ 32.326990] The buggy address belongs to the object at fff00000c9c2c400 [ 32.326990] which belongs to the cache kmalloc-64 of size 64 [ 32.327229] The buggy address is located 0 bytes to the right of [ 32.327229] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.327352] [ 32.327623] The buggy address belongs to the physical page: [ 32.328008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.328238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.328465] page_type: f5(slab) [ 32.328534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.328780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.328958] page dumped because: kasan: bad access detected [ 32.329232] [ 32.329335] Memory state around the buggy address: [ 32.329401] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329764] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329930] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.330085] ^ [ 32.330134] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.330411] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.330559] ================================================================== [ 32.310818] ================================================================== [ 32.310886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 32.310939] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.310990] [ 32.311424] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.311561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.311685] Hardware name: linux,dummy-virt (DT) [ 32.311726] Call trace: [ 32.311946] show_stack+0x20/0x38 (C) [ 32.312202] dump_stack_lvl+0x8c/0xd0 [ 32.312403] print_report+0x118/0x5d0 [ 32.312666] kasan_report+0xdc/0x128 [ 32.312842] kasan_check_range+0x100/0x1a8 [ 32.312959] __kasan_check_write+0x20/0x30 [ 32.313310] kasan_atomics_helper+0x147c/0x4858 [ 32.313518] kasan_atomics+0x198/0x2e0 [ 32.313740] kunit_try_run_case+0x170/0x3f0 [ 32.313977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.314048] kthread+0x328/0x630 [ 32.314295] ret_from_fork+0x10/0x20 [ 32.314507] [ 32.314852] Allocated by task 297: [ 32.314896] kasan_save_stack+0x3c/0x68 [ 32.315111] kasan_save_track+0x20/0x40 [ 32.315350] kasan_save_alloc_info+0x40/0x58 [ 32.315425] __kasan_kmalloc+0xd4/0xd8 [ 32.315625] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.315730] kasan_atomics+0xb8/0x2e0 [ 32.315773] kunit_try_run_case+0x170/0x3f0 [ 32.316048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.316398] kthread+0x328/0x630 [ 32.316462] ret_from_fork+0x10/0x20 [ 32.316502] [ 32.316634] The buggy address belongs to the object at fff00000c9c2c400 [ 32.316634] which belongs to the cache kmalloc-64 of size 64 [ 32.316709] The buggy address is located 0 bytes to the right of [ 32.316709] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.316929] [ 32.316955] The buggy address belongs to the physical page: [ 32.316991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.317047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.317113] page_type: f5(slab) [ 32.317391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.317725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.317974] page dumped because: kasan: bad access detected [ 32.318453] [ 32.318861] Memory state around the buggy address: [ 32.319008] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.319206] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.319310] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.319689] ^ [ 32.319988] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.320241] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.320316] ================================================================== [ 32.244529] ================================================================== [ 32.244591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 32.244643] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.244695] [ 32.244920] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.245155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.245351] Hardware name: linux,dummy-virt (DT) [ 32.245452] Call trace: [ 32.245511] show_stack+0x20/0x38 (C) [ 32.245572] dump_stack_lvl+0x8c/0xd0 [ 32.245796] print_report+0x118/0x5d0 [ 32.246108] kasan_report+0xdc/0x128 [ 32.246178] kasan_check_range+0x100/0x1a8 [ 32.246226] __kasan_check_write+0x20/0x30 [ 32.246453] kasan_atomics_helper+0x1128/0x4858 [ 32.246548] kasan_atomics+0x198/0x2e0 [ 32.246867] kunit_try_run_case+0x170/0x3f0 [ 32.246942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.247148] kthread+0x328/0x630 [ 32.247211] ret_from_fork+0x10/0x20 [ 32.247261] [ 32.247590] Allocated by task 297: [ 32.247653] kasan_save_stack+0x3c/0x68 [ 32.247923] kasan_save_track+0x20/0x40 [ 32.248162] kasan_save_alloc_info+0x40/0x58 [ 32.248291] __kasan_kmalloc+0xd4/0xd8 [ 32.248377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.248596] kasan_atomics+0xb8/0x2e0 [ 32.248662] kunit_try_run_case+0x170/0x3f0 [ 32.248851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.248914] kthread+0x328/0x630 [ 32.249162] ret_from_fork+0x10/0x20 [ 32.249313] [ 32.249614] The buggy address belongs to the object at fff00000c9c2c400 [ 32.249614] which belongs to the cache kmalloc-64 of size 64 [ 32.249778] The buggy address is located 0 bytes to the right of [ 32.249778] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.250047] [ 32.250233] The buggy address belongs to the physical page: [ 32.250598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.250678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.250730] page_type: f5(slab) [ 32.251089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.251187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.251371] page dumped because: kasan: bad access detected [ 32.251612] [ 32.251773] Memory state around the buggy address: [ 32.251858] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.251937] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.252361] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.252481] ^ [ 32.252546] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.252688] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.252751] ================================================================== [ 32.174001] ================================================================== [ 32.174070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 32.174124] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.174498] [ 32.174543] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.174867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.175070] Hardware name: linux,dummy-virt (DT) [ 32.175267] Call trace: [ 32.175302] show_stack+0x20/0x38 (C) [ 32.175769] dump_stack_lvl+0x8c/0xd0 [ 32.175854] print_report+0x118/0x5d0 [ 32.175935] kasan_report+0xdc/0x128 [ 32.176318] kasan_check_range+0x100/0x1a8 [ 32.176559] __kasan_check_write+0x20/0x30 [ 32.176782] kasan_atomics_helper+0xe44/0x4858 [ 32.176948] kasan_atomics+0x198/0x2e0 [ 32.177264] kunit_try_run_case+0x170/0x3f0 [ 32.177446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.177541] kthread+0x328/0x630 [ 32.177906] ret_from_fork+0x10/0x20 [ 32.178179] [ 32.178496] Allocated by task 297: [ 32.178550] kasan_save_stack+0x3c/0x68 [ 32.178641] kasan_save_track+0x20/0x40 [ 32.178683] kasan_save_alloc_info+0x40/0x58 [ 32.179159] __kasan_kmalloc+0xd4/0xd8 [ 32.179480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.179592] kasan_atomics+0xb8/0x2e0 [ 32.179793] kunit_try_run_case+0x170/0x3f0 [ 32.180028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.180266] kthread+0x328/0x630 [ 32.180469] ret_from_fork+0x10/0x20 [ 32.180709] [ 32.180754] The buggy address belongs to the object at fff00000c9c2c400 [ 32.180754] which belongs to the cache kmalloc-64 of size 64 [ 32.181139] The buggy address is located 0 bytes to the right of [ 32.181139] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.181279] [ 32.181367] The buggy address belongs to the physical page: [ 32.181682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.181933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.182040] page_type: f5(slab) [ 32.182212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.182361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.182547] page dumped because: kasan: bad access detected [ 32.182775] [ 32.182897] Memory state around the buggy address: [ 32.183076] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.183141] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.183223] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.183348] ^ [ 32.183384] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183838] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183924] ================================================================== [ 32.253497] ================================================================== [ 32.253550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 32.253685] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.253764] [ 32.253797] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.253885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.253920] Hardware name: linux,dummy-virt (DT) [ 32.253965] Call trace: [ 32.253991] show_stack+0x20/0x38 (C) [ 32.254041] dump_stack_lvl+0x8c/0xd0 [ 32.254111] print_report+0x118/0x5d0 [ 32.254157] kasan_report+0xdc/0x128 [ 32.254208] kasan_check_range+0x100/0x1a8 [ 32.254266] __kasan_check_write+0x20/0x30 [ 32.254314] kasan_atomics_helper+0x1190/0x4858 [ 32.254364] kasan_atomics+0x198/0x2e0 [ 32.254420] kunit_try_run_case+0x170/0x3f0 [ 32.254472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.254532] kthread+0x328/0x630 [ 32.254582] ret_from_fork+0x10/0x20 [ 32.254632] [ 32.254653] Allocated by task 297: [ 32.254689] kasan_save_stack+0x3c/0x68 [ 32.254734] kasan_save_track+0x20/0x40 [ 32.254773] kasan_save_alloc_info+0x40/0x58 [ 32.254823] __kasan_kmalloc+0xd4/0xd8 [ 32.254864] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.254906] kasan_atomics+0xb8/0x2e0 [ 32.254953] kunit_try_run_case+0x170/0x3f0 [ 32.254995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.255044] kthread+0x328/0x630 [ 32.255089] ret_from_fork+0x10/0x20 [ 32.255173] [ 32.255198] The buggy address belongs to the object at fff00000c9c2c400 [ 32.255198] which belongs to the cache kmalloc-64 of size 64 [ 32.255977] The buggy address is located 0 bytes to the right of [ 32.255977] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.256107] [ 32.256151] The buggy address belongs to the physical page: [ 32.256203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.256463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.256521] page_type: f5(slab) [ 32.256561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.256703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.256909] page dumped because: kasan: bad access detected [ 32.257111] [ 32.257208] Memory state around the buggy address: [ 32.257474] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.257637] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.258138] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.258250] ^ [ 32.258318] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.258458] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.258519] ================================================================== [ 32.210459] ================================================================== [ 32.210516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 32.210568] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.210934] [ 32.210987] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.211113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.211182] Hardware name: linux,dummy-virt (DT) [ 32.211241] Call trace: [ 32.211320] show_stack+0x20/0x38 (C) [ 32.211375] dump_stack_lvl+0x8c/0xd0 [ 32.211422] print_report+0x118/0x5d0 [ 32.211781] kasan_report+0xdc/0x128 [ 32.212085] kasan_check_range+0x100/0x1a8 [ 32.212360] __kasan_check_write+0x20/0x30 [ 32.212450] kasan_atomics_helper+0xf88/0x4858 [ 32.212741] kasan_atomics+0x198/0x2e0 [ 32.212945] kunit_try_run_case+0x170/0x3f0 [ 32.213002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.213273] kthread+0x328/0x630 [ 32.213663] ret_from_fork+0x10/0x20 [ 32.213838] [ 32.213890] Allocated by task 297: [ 32.214189] kasan_save_stack+0x3c/0x68 [ 32.214515] kasan_save_track+0x20/0x40 [ 32.214660] kasan_save_alloc_info+0x40/0x58 [ 32.214833] __kasan_kmalloc+0xd4/0xd8 [ 32.214942] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.215330] kasan_atomics+0xb8/0x2e0 [ 32.215435] kunit_try_run_case+0x170/0x3f0 [ 32.215540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.215862] kthread+0x328/0x630 [ 32.215910] ret_from_fork+0x10/0x20 [ 32.215959] [ 32.215982] The buggy address belongs to the object at fff00000c9c2c400 [ 32.215982] which belongs to the cache kmalloc-64 of size 64 [ 32.216044] The buggy address is located 0 bytes to the right of [ 32.216044] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.216687] [ 32.216776] The buggy address belongs to the physical page: [ 32.216880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.217289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.217663] page_type: f5(slab) [ 32.217789] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.217970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.218202] page dumped because: kasan: bad access detected [ 32.218283] [ 32.218338] Memory state around the buggy address: [ 32.218694] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.218754] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.218863] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.218905] ^ [ 32.218942] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.219313] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.219511] ================================================================== [ 32.268405] ================================================================== [ 32.268457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 32.268618] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.268677] [ 32.268707] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.269212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.269299] Hardware name: linux,dummy-virt (DT) [ 32.269336] Call trace: [ 32.269372] show_stack+0x20/0x38 (C) [ 32.269426] dump_stack_lvl+0x8c/0xd0 [ 32.269655] print_report+0x118/0x5d0 [ 32.269716] kasan_report+0xdc/0x128 [ 32.269853] kasan_check_range+0x100/0x1a8 [ 32.269907] __kasan_check_write+0x20/0x30 [ 32.269954] kasan_atomics_helper+0x126c/0x4858 [ 32.270013] kasan_atomics+0x198/0x2e0 [ 32.270193] kunit_try_run_case+0x170/0x3f0 [ 32.270391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.270691] kthread+0x328/0x630 [ 32.270829] ret_from_fork+0x10/0x20 [ 32.270888] [ 32.270910] Allocated by task 297: [ 32.270984] kasan_save_stack+0x3c/0x68 [ 32.271223] kasan_save_track+0x20/0x40 [ 32.271375] kasan_save_alloc_info+0x40/0x58 [ 32.271555] __kasan_kmalloc+0xd4/0xd8 [ 32.271610] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.271916] kasan_atomics+0xb8/0x2e0 [ 32.272161] kunit_try_run_case+0x170/0x3f0 [ 32.272279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.272549] kthread+0x328/0x630 [ 32.272716] ret_from_fork+0x10/0x20 [ 32.272763] [ 32.272793] The buggy address belongs to the object at fff00000c9c2c400 [ 32.272793] which belongs to the cache kmalloc-64 of size 64 [ 32.272855] The buggy address is located 0 bytes to the right of [ 32.272855] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.272954] [ 32.272986] The buggy address belongs to the physical page: [ 32.273034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.273130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.273191] page_type: f5(slab) [ 32.273239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.273299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.273343] page dumped because: kasan: bad access detected [ 32.273391] [ 32.273422] Memory state around the buggy address: [ 32.273461] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273507] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273563] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.273604] ^ [ 32.273639] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273685] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273735] ================================================================== [ 32.052579] ================================================================== [ 32.052621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 32.052670] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.052722] [ 32.052754] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.052842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.052891] Hardware name: linux,dummy-virt (DT) [ 32.053847] print_report+0x118/0x5d0 [ 32.055333] kthread+0x328/0x630 [ 32.056193] kasan_save_stack+0x3c/0x68 [ 32.057305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.058273] The buggy address is located 0 bytes to the right of [ 32.058273] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.058360] [ 32.058535] The buggy address belongs to the physical page: [ 32.058673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.059196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.059529] page_type: f5(slab) [ 32.059941] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.060048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.060174] page dumped because: kasan: bad access detected [ 32.060264] [ 32.060436] Memory state around the buggy address: [ 32.060543] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.060631] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.060767] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.060894] ^ [ 32.060960] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.061127] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.061174] ================================================================== [ 32.150192] ================================================================== [ 32.150248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 32.150314] Read of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.150367] [ 32.150400] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.150488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.150517] Hardware name: linux,dummy-virt (DT) [ 32.150549] Call trace: [ 32.150575] show_stack+0x20/0x38 (C) [ 32.150634] dump_stack_lvl+0x8c/0xd0 [ 32.150699] print_report+0x118/0x5d0 [ 32.150747] kasan_report+0xdc/0x128 [ 32.150792] __asan_report_load4_noabort+0x20/0x30 [ 32.150843] kasan_atomics_helper+0x3e04/0x4858 [ 32.150896] kasan_atomics+0x198/0x2e0 [ 32.150945] kunit_try_run_case+0x170/0x3f0 [ 32.150996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.151072] kthread+0x328/0x630 [ 32.151118] ret_from_fork+0x10/0x20 [ 32.151181] [ 32.151202] Allocated by task 297: [ 32.151233] kasan_save_stack+0x3c/0x68 [ 32.151275] kasan_save_track+0x20/0x40 [ 32.151317] kasan_save_alloc_info+0x40/0x58 [ 32.151359] __kasan_kmalloc+0xd4/0xd8 [ 32.151400] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.151443] kasan_atomics+0xb8/0x2e0 [ 32.151482] kunit_try_run_case+0x170/0x3f0 [ 32.151524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.151579] kthread+0x328/0x630 [ 32.151623] ret_from_fork+0x10/0x20 [ 32.152076] [ 32.152106] The buggy address belongs to the object at fff00000c9c2c400 [ 32.152106] which belongs to the cache kmalloc-64 of size 64 [ 32.152617] The buggy address is located 0 bytes to the right of [ 32.152617] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.152715] [ 32.152757] The buggy address belongs to the physical page: [ 32.152811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.152888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.153162] page_type: f5(slab) [ 32.153214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.153476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.153837] page dumped because: kasan: bad access detected [ 32.154139] [ 32.154263] Memory state around the buggy address: [ 32.154342] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.154409] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.154737] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.154931] ^ [ 32.155177] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.155429] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.155518] ================================================================== [ 32.286454] ================================================================== [ 32.286678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 32.286902] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.286968] [ 32.287061] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.287157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.287193] Hardware name: linux,dummy-virt (DT) [ 32.287237] Call trace: [ 32.287264] show_stack+0x20/0x38 (C) [ 32.287316] dump_stack_lvl+0x8c/0xd0 [ 32.287374] print_report+0x118/0x5d0 [ 32.287420] kasan_report+0xdc/0x128 [ 32.287473] kasan_check_range+0x100/0x1a8 [ 32.287521] __kasan_check_write+0x20/0x30 [ 32.287568] kasan_atomics_helper+0x1384/0x4858 [ 32.287619] kasan_atomics+0x198/0x2e0 [ 32.288100] kunit_try_run_case+0x170/0x3f0 [ 32.288518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.288592] kthread+0x328/0x630 [ 32.288648] ret_from_fork+0x10/0x20 [ 32.289041] [ 32.289349] Allocated by task 297: [ 32.289403] kasan_save_stack+0x3c/0x68 [ 32.289613] kasan_save_track+0x20/0x40 [ 32.289861] kasan_save_alloc_info+0x40/0x58 [ 32.290118] __kasan_kmalloc+0xd4/0xd8 [ 32.290205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.290398] kasan_atomics+0xb8/0x2e0 [ 32.290494] kunit_try_run_case+0x170/0x3f0 [ 32.290765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.290936] kthread+0x328/0x630 [ 32.291423] ret_from_fork+0x10/0x20 [ 32.291500] [ 32.291554] The buggy address belongs to the object at fff00000c9c2c400 [ 32.291554] which belongs to the cache kmalloc-64 of size 64 [ 32.291646] The buggy address is located 0 bytes to the right of [ 32.291646] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.292128] [ 32.292164] The buggy address belongs to the physical page: [ 32.292348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.292505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.292688] page_type: f5(slab) [ 32.293329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.293430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.293818] page dumped because: kasan: bad access detected [ 32.294000] [ 32.294203] Memory state around the buggy address: [ 32.294380] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.294580] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.294719] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.294797] ^ [ 32.294966] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.295047] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.295145] ================================================================== [ 32.194295] ================================================================== [ 32.194389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 32.194497] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.194562] [ 32.194859] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.195083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.195161] Hardware name: linux,dummy-virt (DT) [ 32.195199] Call trace: [ 32.195224] show_stack+0x20/0x38 (C) [ 32.195429] dump_stack_lvl+0x8c/0xd0 [ 32.195502] print_report+0x118/0x5d0 [ 32.195568] kasan_report+0xdc/0x128 [ 32.195613] kasan_check_range+0x100/0x1a8 [ 32.195758] __kasan_check_write+0x20/0x30 [ 32.196109] kasan_atomics_helper+0xeb8/0x4858 [ 32.196589] kasan_atomics+0x198/0x2e0 [ 32.196656] kunit_try_run_case+0x170/0x3f0 [ 32.196993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.197432] kthread+0x328/0x630 [ 32.197492] ret_from_fork+0x10/0x20 [ 32.197858] [ 32.198206] Allocated by task 297: [ 32.198320] kasan_save_stack+0x3c/0x68 [ 32.198449] kasan_save_track+0x20/0x40 [ 32.198598] kasan_save_alloc_info+0x40/0x58 [ 32.198641] __kasan_kmalloc+0xd4/0xd8 [ 32.198961] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.199330] kasan_atomics+0xb8/0x2e0 [ 32.199753] kunit_try_run_case+0x170/0x3f0 [ 32.199825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.200015] kthread+0x328/0x630 [ 32.200452] ret_from_fork+0x10/0x20 [ 32.200555] [ 32.200922] The buggy address belongs to the object at fff00000c9c2c400 [ 32.200922] which belongs to the cache kmalloc-64 of size 64 [ 32.200999] The buggy address is located 0 bytes to the right of [ 32.200999] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.201114] [ 32.201138] The buggy address belongs to the physical page: [ 32.201193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.201248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.201297] page_type: f5(slab) [ 32.201339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.201403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.201466] page dumped because: kasan: bad access detected [ 32.201501] [ 32.201530] Memory state around the buggy address: [ 32.201565] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.201610] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.201660] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.201701] ^ [ 32.201737] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.201781] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.201837] ================================================================== [ 32.228261] ================================================================== [ 32.228310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 32.228361] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.228413] [ 32.228467] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.228565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.228593] Hardware name: linux,dummy-virt (DT) [ 32.228635] Call trace: [ 32.228665] show_stack+0x20/0x38 (C) [ 32.228713] dump_stack_lvl+0x8c/0xd0 [ 32.228763] print_report+0x118/0x5d0 [ 32.228807] kasan_report+0xdc/0x128 [ 32.228853] kasan_check_range+0x100/0x1a8 [ 32.228898] __kasan_check_write+0x20/0x30 [ 32.228944] kasan_atomics_helper+0x1058/0x4858 [ 32.229003] kasan_atomics+0x198/0x2e0 [ 32.229064] kunit_try_run_case+0x170/0x3f0 [ 32.229289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.229366] kthread+0x328/0x630 [ 32.229411] ret_from_fork+0x10/0x20 [ 32.229460] [ 32.229481] Allocated by task 297: [ 32.230204] kasan_save_stack+0x3c/0x68 [ 32.230274] kasan_save_track+0x20/0x40 [ 32.230495] kasan_save_alloc_info+0x40/0x58 [ 32.230555] __kasan_kmalloc+0xd4/0xd8 [ 32.230680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.230809] kasan_atomics+0xb8/0x2e0 [ 32.230879] kunit_try_run_case+0x170/0x3f0 [ 32.230922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.231262] kthread+0x328/0x630 [ 32.231324] ret_from_fork+0x10/0x20 [ 32.231713] [ 32.231860] The buggy address belongs to the object at fff00000c9c2c400 [ 32.231860] which belongs to the cache kmalloc-64 of size 64 [ 32.231949] The buggy address is located 0 bytes to the right of [ 32.231949] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.232312] [ 32.232411] The buggy address belongs to the physical page: [ 32.232466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.232532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.232900] page_type: f5(slab) [ 32.232958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.233205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.233419] page dumped because: kasan: bad access detected [ 32.233519] [ 32.233692] Memory state around the buggy address: [ 32.233945] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.234111] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.234215] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.234405] ^ [ 32.234481] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.234976] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235194] ================================================================== [ 32.347452] ================================================================== [ 32.347506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 32.347560] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.347768] [ 32.347976] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.348443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.348484] Hardware name: linux,dummy-virt (DT) [ 32.348519] Call trace: [ 32.348754] show_stack+0x20/0x38 (C) [ 32.348895] dump_stack_lvl+0x8c/0xd0 [ 32.349005] print_report+0x118/0x5d0 [ 32.349380] kasan_report+0xdc/0x128 [ 32.349502] __asan_report_load8_noabort+0x20/0x30 [ 32.349671] kasan_atomics_helper+0x3db0/0x4858 [ 32.349859] kasan_atomics+0x198/0x2e0 [ 32.350195] kunit_try_run_case+0x170/0x3f0 [ 32.350448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.350848] kthread+0x328/0x630 [ 32.350968] ret_from_fork+0x10/0x20 [ 32.351024] [ 32.351047] Allocated by task 297: [ 32.351622] kasan_save_stack+0x3c/0x68 [ 32.351829] kasan_save_track+0x20/0x40 [ 32.351917] kasan_save_alloc_info+0x40/0x58 [ 32.351977] __kasan_kmalloc+0xd4/0xd8 [ 32.352017] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.352427] kasan_atomics+0xb8/0x2e0 [ 32.352541] kunit_try_run_case+0x170/0x3f0 [ 32.352941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.353079] kthread+0x328/0x630 [ 32.353194] ret_from_fork+0x10/0x20 [ 32.353235] [ 32.353257] The buggy address belongs to the object at fff00000c9c2c400 [ 32.353257] which belongs to the cache kmalloc-64 of size 64 [ 32.353470] The buggy address is located 0 bytes to the right of [ 32.353470] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.353635] [ 32.353682] The buggy address belongs to the physical page: [ 32.353717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.353783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.353840] page_type: f5(slab) [ 32.353904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.353970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.354040] page dumped because: kasan: bad access detected [ 32.354087] [ 32.354123] Memory state around the buggy address: [ 32.354155] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.354224] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.354280] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.354330] ^ [ 32.354365] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.354411] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.354453] ================================================================== [ 32.202203] ================================================================== [ 32.202254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 32.202304] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.202357] [ 32.202407] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.202505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.202534] Hardware name: linux,dummy-virt (DT) [ 32.202567] Call trace: [ 32.202591] show_stack+0x20/0x38 (C) [ 32.202638] dump_stack_lvl+0x8c/0xd0 [ 32.202690] print_report+0x118/0x5d0 [ 32.202739] kasan_report+0xdc/0x128 [ 32.202784] kasan_check_range+0x100/0x1a8 [ 32.202832] __kasan_check_write+0x20/0x30 [ 32.202889] kasan_atomics_helper+0xf20/0x4858 [ 32.202940] kasan_atomics+0x198/0x2e0 [ 32.202989] kunit_try_run_case+0x170/0x3f0 [ 32.203045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.203561] kthread+0x328/0x630 [ 32.204128] ret_from_fork+0x10/0x20 [ 32.204236] [ 32.204290] Allocated by task 297: [ 32.204356] kasan_save_stack+0x3c/0x68 [ 32.204436] kasan_save_track+0x20/0x40 [ 32.204766] kasan_save_alloc_info+0x40/0x58 [ 32.204902] __kasan_kmalloc+0xd4/0xd8 [ 32.204957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.205000] kasan_atomics+0xb8/0x2e0 [ 32.205040] kunit_try_run_case+0x170/0x3f0 [ 32.205098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.205571] kthread+0x328/0x630 [ 32.205846] ret_from_fork+0x10/0x20 [ 32.206394] [ 32.206504] The buggy address belongs to the object at fff00000c9c2c400 [ 32.206504] which belongs to the cache kmalloc-64 of size 64 [ 32.206768] The buggy address is located 0 bytes to the right of [ 32.206768] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.207044] [ 32.207140] The buggy address belongs to the physical page: [ 32.207473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.207790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.207895] page_type: f5(slab) [ 32.207944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.208278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.208350] page dumped because: kasan: bad access detected [ 32.208476] [ 32.208558] Memory state around the buggy address: [ 32.208743] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.208828] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.209165] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.209349] ^ [ 32.209501] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.209549] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.209590] ================================================================== [ 32.331254] ================================================================== [ 32.331335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 32.331408] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.331463] [ 32.331647] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.331887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.332268] Hardware name: linux,dummy-virt (DT) [ 32.332430] Call trace: [ 32.332515] show_stack+0x20/0x38 (C) [ 32.332724] dump_stack_lvl+0x8c/0xd0 [ 32.332948] print_report+0x118/0x5d0 [ 32.333028] kasan_report+0xdc/0x128 [ 32.333252] kasan_check_range+0x100/0x1a8 [ 32.333311] __kasan_check_write+0x20/0x30 [ 32.333524] kasan_atomics_helper+0x154c/0x4858 [ 32.333995] kasan_atomics+0x198/0x2e0 [ 32.334110] kunit_try_run_case+0x170/0x3f0 [ 32.334165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.334236] kthread+0x328/0x630 [ 32.334282] ret_from_fork+0x10/0x20 [ 32.334332] [ 32.334355] Allocated by task 297: [ 32.334384] kasan_save_stack+0x3c/0x68 [ 32.334519] kasan_save_track+0x20/0x40 [ 32.334567] kasan_save_alloc_info+0x40/0x58 [ 32.334607] __kasan_kmalloc+0xd4/0xd8 [ 32.334659] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.334711] kasan_atomics+0xb8/0x2e0 [ 32.334760] kunit_try_run_case+0x170/0x3f0 [ 32.334811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.334868] kthread+0x328/0x630 [ 32.334911] ret_from_fork+0x10/0x20 [ 32.334950] [ 32.334978] The buggy address belongs to the object at fff00000c9c2c400 [ 32.334978] which belongs to the cache kmalloc-64 of size 64 [ 32.335039] The buggy address is located 0 bytes to the right of [ 32.335039] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.335117] [ 32.335148] The buggy address belongs to the physical page: [ 32.335183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.335246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.335315] page_type: f5(slab) [ 32.335364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.335416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.335460] page dumped because: kasan: bad access detected [ 32.335495] [ 32.335515] Memory state around the buggy address: [ 32.335549] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.335595] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.336001] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.336527] ^ [ 32.336576] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.336626] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.336667] ================================================================== [ 32.236061] ================================================================== [ 32.236317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 32.236670] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.236864] [ 32.236952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.237143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.237214] Hardware name: linux,dummy-virt (DT) [ 32.237250] Call trace: [ 32.237276] show_stack+0x20/0x38 (C) [ 32.237328] dump_stack_lvl+0x8c/0xd0 [ 32.237545] print_report+0x118/0x5d0 [ 32.237905] kasan_report+0xdc/0x128 [ 32.238092] kasan_check_range+0x100/0x1a8 [ 32.238153] __kasan_check_write+0x20/0x30 [ 32.238229] kasan_atomics_helper+0x10c0/0x4858 [ 32.238423] kasan_atomics+0x198/0x2e0 [ 32.238502] kunit_try_run_case+0x170/0x3f0 [ 32.238555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.238797] kthread+0x328/0x630 [ 32.239155] ret_from_fork+0x10/0x20 [ 32.239369] [ 32.239415] Allocated by task 297: [ 32.239448] kasan_save_stack+0x3c/0x68 [ 32.239854] kasan_save_track+0x20/0x40 [ 32.239938] kasan_save_alloc_info+0x40/0x58 [ 32.240377] __kasan_kmalloc+0xd4/0xd8 [ 32.240589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.240641] kasan_atomics+0xb8/0x2e0 [ 32.240702] kunit_try_run_case+0x170/0x3f0 [ 32.240752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.241087] kthread+0x328/0x630 [ 32.241347] ret_from_fork+0x10/0x20 [ 32.241687] [ 32.242163] The buggy address belongs to the object at fff00000c9c2c400 [ 32.242163] which belongs to the cache kmalloc-64 of size 64 [ 32.242234] The buggy address is located 0 bytes to the right of [ 32.242234] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.242537] [ 32.242602] The buggy address belongs to the physical page: [ 32.242719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.242780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.242828] page_type: f5(slab) [ 32.242895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.242956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.243010] page dumped because: kasan: bad access detected [ 32.243044] [ 32.243086] Memory state around the buggy address: [ 32.243129] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.243177] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.243222] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.243263] ^ [ 32.243299] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.243357] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.243397] ================================================================== [ 32.165434] ================================================================== [ 32.165588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 32.165649] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.165702] [ 32.165795] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.165915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.166133] Hardware name: linux,dummy-virt (DT) [ 32.166323] Call trace: [ 32.166398] show_stack+0x20/0x38 (C) [ 32.166463] dump_stack_lvl+0x8c/0xd0 [ 32.166705] print_report+0x118/0x5d0 [ 32.166861] kasan_report+0xdc/0x128 [ 32.166918] __asan_report_load8_noabort+0x20/0x30 [ 32.167205] kasan_atomics_helper+0x3f58/0x4858 [ 32.167283] kasan_atomics+0x198/0x2e0 [ 32.167679] kunit_try_run_case+0x170/0x3f0 [ 32.167759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.168000] kthread+0x328/0x630 [ 32.168198] ret_from_fork+0x10/0x20 [ 32.168546] [ 32.168636] Allocated by task 297: [ 32.168712] kasan_save_stack+0x3c/0x68 [ 32.169117] kasan_save_track+0x20/0x40 [ 32.169199] kasan_save_alloc_info+0x40/0x58 [ 32.169405] __kasan_kmalloc+0xd4/0xd8 [ 32.169590] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.169748] kasan_atomics+0xb8/0x2e0 [ 32.169818] kunit_try_run_case+0x170/0x3f0 [ 32.169879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.169928] kthread+0x328/0x630 [ 32.170150] ret_from_fork+0x10/0x20 [ 32.170354] [ 32.170399] The buggy address belongs to the object at fff00000c9c2c400 [ 32.170399] which belongs to the cache kmalloc-64 of size 64 [ 32.170490] The buggy address is located 0 bytes to the right of [ 32.170490] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.170689] [ 32.170717] The buggy address belongs to the physical page: [ 32.171100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.171301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.171605] page_type: f5(slab) [ 32.171881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.172146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.172311] page dumped because: kasan: bad access detected [ 32.172381] [ 32.172549] Memory state around the buggy address: [ 32.172614] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.172799] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.172980] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.173138] ^ [ 32.173186] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.173233] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.173274] ================================================================== [ 32.073012] ================================================================== [ 32.073086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 32.073142] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.073242] [ 32.073275] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.073854] kasan_atomics+0x198/0x2e0 [ 32.074279] kasan_save_alloc_info+0x40/0x58 [ 32.074718] The buggy address is located 0 bytes to the right of [ 32.074718] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.074791] [ 32.074814] The buggy address belongs to the physical page: [ 32.074856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.074909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.074956] page_type: f5(slab) [ 32.074997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.075050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.075490] page dumped because: kasan: bad access detected [ 32.075528] [ 32.075947] Memory state around the buggy address: [ 32.076185] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.076343] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.076822] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.079114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.080125] kasan_atomics+0x198/0x2e0 [ 32.082307] kasan_atomics+0xb8/0x2e0 [ 32.083667] [ 32.083703] The buggy address belongs to the physical page: [ 32.084243] page_type: f5(slab) [ 32.085045] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.085623] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.087527] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.089319] kasan_check_range+0x100/0x1a8 [ 32.090154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.091446] __kasan_kmalloc+0xd4/0xd8 [ 32.092345] ret_from_fork+0x10/0x20 [ 32.093213] The buggy address belongs to the physical page: [ 32.093265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.093923] page dumped because: kasan: bad access detected [ 32.094764] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.095245] ================================================================== [ 32.048570] ================================================================== [ 32.048628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 32.048877] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.049110] [ 32.049156] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.049311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.049344] Hardware name: linux,dummy-virt (DT) [ 32.049443] Call trace: [ 32.049535] show_stack+0x20/0x38 (C) [ 32.049593] dump_stack_lvl+0x8c/0xd0 [ 32.049642] print_report+0x118/0x5d0 [ 32.049836] kasan_report+0xdc/0x128 [ 32.049880] kasan_check_range+0x100/0x1a8 [ 32.050071] __kasan_check_write+0x20/0x30 [ 32.050236] kasan_atomics_helper+0x99c/0x4858 [ 32.050297] kasan_atomics+0x198/0x2e0 [ 32.050491] kunit_try_run_case+0x170/0x3f0 [ 32.050549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.050643] kthread+0x328/0x630 [ 32.050686] ret_from_fork+0x10/0x20 [ 32.050945] [ 32.050981] Allocated by task 297: [ 32.051013] kasan_save_stack+0x3c/0x68 [ 32.051076] kasan_save_track+0x20/0x40 [ 32.051117] kasan_save_alloc_info+0x40/0x58 [ 32.051157] __kasan_kmalloc+0xd4/0xd8 [ 32.051197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.051237] kasan_atomics+0xb8/0x2e0 [ 32.051423] kunit_try_run_case+0x170/0x3f0 [ 32.051478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.051524] kthread+0x328/0x630 [ 32.051559] ret_from_fork+0x10/0x20 [ 32.051601] [ 32.051625] The buggy address belongs to the object at fff00000c9c2c400 [ 32.051625] which belongs to the cache kmalloc-64 of size 64 [ 32.051684] The buggy address is located 0 bytes to the right of [ 32.051684] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.051749] [ 32.051785] The buggy address belongs to the physical page: [ 32.051829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.051881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.051931] page_type: f5(slab) [ 32.051973] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.052028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.052084] page dumped because: kasan: bad access detected [ 32.052128] [ 32.052156] Memory state around the buggy address: [ 32.052200] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.052247] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.052293] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.052334] ^ [ 32.052370] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.052416] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.052458] ================================================================== [ 32.259350] ================================================================== [ 32.259415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 32.259578] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.259635] [ 32.259689] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.259858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.259888] Hardware name: linux,dummy-virt (DT) [ 32.259920] Call trace: [ 32.259945] show_stack+0x20/0x38 (C) [ 32.260305] dump_stack_lvl+0x8c/0xd0 [ 32.260495] print_report+0x118/0x5d0 [ 32.260670] kasan_report+0xdc/0x128 [ 32.260775] kasan_check_range+0x100/0x1a8 [ 32.260958] __kasan_check_write+0x20/0x30 [ 32.261143] kasan_atomics_helper+0x11f8/0x4858 [ 32.261213] kasan_atomics+0x198/0x2e0 [ 32.261285] kunit_try_run_case+0x170/0x3f0 [ 32.261498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.261805] kthread+0x328/0x630 [ 32.261985] ret_from_fork+0x10/0x20 [ 32.262156] [ 32.262184] Allocated by task 297: [ 32.262215] kasan_save_stack+0x3c/0x68 [ 32.262293] kasan_save_track+0x20/0x40 [ 32.262635] kasan_save_alloc_info+0x40/0x58 [ 32.263039] __kasan_kmalloc+0xd4/0xd8 [ 32.263110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.263283] kasan_atomics+0xb8/0x2e0 [ 32.263376] kunit_try_run_case+0x170/0x3f0 [ 32.263538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.263882] kthread+0x328/0x630 [ 32.263964] ret_from_fork+0x10/0x20 [ 32.264019] [ 32.264041] The buggy address belongs to the object at fff00000c9c2c400 [ 32.264041] which belongs to the cache kmalloc-64 of size 64 [ 32.264115] The buggy address is located 0 bytes to the right of [ 32.264115] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.264182] [ 32.264676] The buggy address belongs to the physical page: [ 32.264985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.265163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.265483] page_type: f5(slab) [ 32.265719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.266137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.266245] page dumped because: kasan: bad access detected [ 32.266316] [ 32.266396] Memory state around the buggy address: [ 32.266516] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.266890] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.266974] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.267085] ^ [ 32.267152] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.267506] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.267601] ================================================================== [ 32.131407] ================================================================== [ 32.131470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 32.131644] Read of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.131871] [ 32.131935] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.132421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.132458] Hardware name: linux,dummy-virt (DT) [ 32.132763] Call trace: [ 32.132812] show_stack+0x20/0x38 (C) [ 32.132878] dump_stack_lvl+0x8c/0xd0 [ 32.132952] print_report+0x118/0x5d0 [ 32.133000] kasan_report+0xdc/0x128 [ 32.133047] __asan_report_load4_noabort+0x20/0x30 [ 32.133169] kasan_atomics_helper+0x3dd8/0x4858 [ 32.133225] kasan_atomics+0x198/0x2e0 [ 32.133274] kunit_try_run_case+0x170/0x3f0 [ 32.133324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.133400] kthread+0x328/0x630 [ 32.133444] ret_from_fork+0x10/0x20 [ 32.133504] [ 32.133531] Allocated by task 297: [ 32.133571] kasan_save_stack+0x3c/0x68 [ 32.133616] kasan_save_track+0x20/0x40 [ 32.133674] kasan_save_alloc_info+0x40/0x58 [ 32.133714] __kasan_kmalloc+0xd4/0xd8 [ 32.133766] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.133818] kasan_atomics+0xb8/0x2e0 [ 32.133866] kunit_try_run_case+0x170/0x3f0 [ 32.133907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.133954] kthread+0x328/0x630 [ 32.133994] ret_from_fork+0x10/0x20 [ 32.134062] [ 32.134999] The buggy address belongs to the object at fff00000c9c2c400 [ 32.134999] which belongs to the cache kmalloc-64 of size 64 [ 32.135299] The buggy address is located 0 bytes to the right of [ 32.135299] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.135470] [ 32.135754] The buggy address belongs to the physical page: [ 32.135857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.136029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.136390] page_type: f5(slab) [ 32.136446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.136711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.136909] page dumped because: kasan: bad access detected [ 32.137089] [ 32.137181] Memory state around the buggy address: [ 32.137219] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.137270] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.137833] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.137915] ^ [ 32.138196] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.138602] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.138692] ================================================================== [ 32.139396] ================================================================== [ 32.139831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 32.139954] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.140132] [ 32.140249] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.140364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.140554] Hardware name: linux,dummy-virt (DT) [ 32.140766] Call trace: [ 32.140848] show_stack+0x20/0x38 (C) [ 32.140942] dump_stack_lvl+0x8c/0xd0 [ 32.141312] print_report+0x118/0x5d0 [ 32.141394] kasan_report+0xdc/0x128 [ 32.141441] kasan_check_range+0x100/0x1a8 [ 32.141489] __kasan_check_write+0x20/0x30 [ 32.141719] kasan_atomics_helper+0xd3c/0x4858 [ 32.142138] kasan_atomics+0x198/0x2e0 [ 32.142226] kunit_try_run_case+0x170/0x3f0 [ 32.142283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.142753] kthread+0x328/0x630 [ 32.142992] ret_from_fork+0x10/0x20 [ 32.143189] [ 32.143215] Allocated by task 297: [ 32.143379] kasan_save_stack+0x3c/0x68 [ 32.143586] kasan_save_track+0x20/0x40 [ 32.143805] kasan_save_alloc_info+0x40/0x58 [ 32.143998] __kasan_kmalloc+0xd4/0xd8 [ 32.144068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.144113] kasan_atomics+0xb8/0x2e0 [ 32.144155] kunit_try_run_case+0x170/0x3f0 [ 32.144530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.144965] kthread+0x328/0x630 [ 32.145108] ret_from_fork+0x10/0x20 [ 32.145151] [ 32.145174] The buggy address belongs to the object at fff00000c9c2c400 [ 32.145174] which belongs to the cache kmalloc-64 of size 64 [ 32.145524] The buggy address is located 0 bytes to the right of [ 32.145524] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.145918] [ 32.145964] The buggy address belongs to the physical page: [ 32.145997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.146404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.146577] page_type: f5(slab) [ 32.146827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.147229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.147335] page dumped because: kasan: bad access detected [ 32.147442] [ 32.147539] Memory state around the buggy address: [ 32.147720] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.147785] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.147831] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.147872] ^ [ 32.147908] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.148418] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.148635] ================================================================== [ 32.394926] ================================================================== [ 32.394998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 32.395111] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.395486] [ 32.395656] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.395779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.396026] Hardware name: linux,dummy-virt (DT) [ 32.396187] Call trace: [ 32.396223] show_stack+0x20/0x38 (C) [ 32.396423] dump_stack_lvl+0x8c/0xd0 [ 32.396479] print_report+0x118/0x5d0 [ 32.396540] kasan_report+0xdc/0x128 [ 32.396588] __asan_report_load8_noabort+0x20/0x30 [ 32.396638] kasan_atomics_helper+0x3e20/0x4858 [ 32.397261] kasan_atomics+0x198/0x2e0 [ 32.397596] kunit_try_run_case+0x170/0x3f0 [ 32.397858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.398113] kthread+0x328/0x630 [ 32.398277] ret_from_fork+0x10/0x20 [ 32.398514] [ 32.398729] Allocated by task 297: [ 32.398883] kasan_save_stack+0x3c/0x68 [ 32.398937] kasan_save_track+0x20/0x40 [ 32.399148] kasan_save_alloc_info+0x40/0x58 [ 32.399608] __kasan_kmalloc+0xd4/0xd8 [ 32.399764] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.399812] kasan_atomics+0xb8/0x2e0 [ 32.399886] kunit_try_run_case+0x170/0x3f0 [ 32.399930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.400269] kthread+0x328/0x630 [ 32.400520] ret_from_fork+0x10/0x20 [ 32.400692] [ 32.400806] The buggy address belongs to the object at fff00000c9c2c400 [ 32.400806] which belongs to the cache kmalloc-64 of size 64 [ 32.400958] The buggy address is located 0 bytes to the right of [ 32.400958] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.401040] [ 32.401805] The buggy address belongs to the physical page: [ 32.401941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.402001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.402243] page_type: f5(slab) [ 32.402463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.402798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.402911] page dumped because: kasan: bad access detected [ 32.402975] [ 32.403357] Memory state around the buggy address: [ 32.403713] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.403799] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.404100] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.404183] ^ [ 32.404429] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.404500] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.404673] ================================================================== [ 32.364815] ================================================================== [ 32.364907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 32.364969] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.365022] [ 32.365219] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.365493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.365567] Hardware name: linux,dummy-virt (DT) [ 32.365601] Call trace: [ 32.365628] show_stack+0x20/0x38 (C) [ 32.365681] dump_stack_lvl+0x8c/0xd0 [ 32.365897] print_report+0x118/0x5d0 [ 32.366077] kasan_report+0xdc/0x128 [ 32.366138] __asan_report_load8_noabort+0x20/0x30 [ 32.366190] kasan_atomics_helper+0x3df4/0x4858 [ 32.366240] kasan_atomics+0x198/0x2e0 [ 32.366290] kunit_try_run_case+0x170/0x3f0 [ 32.366341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.366397] kthread+0x328/0x630 [ 32.366442] ret_from_fork+0x10/0x20 [ 32.366501] [ 32.366524] Allocated by task 297: [ 32.366563] kasan_save_stack+0x3c/0x68 [ 32.366609] kasan_save_track+0x20/0x40 [ 32.366653] kasan_save_alloc_info+0x40/0x58 [ 32.366695] __kasan_kmalloc+0xd4/0xd8 [ 32.366745] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.366788] kasan_atomics+0xb8/0x2e0 [ 32.366827] kunit_try_run_case+0x170/0x3f0 [ 32.366869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.366916] kthread+0x328/0x630 [ 32.366960] ret_from_fork+0x10/0x20 [ 32.367000] [ 32.367021] The buggy address belongs to the object at fff00000c9c2c400 [ 32.367021] which belongs to the cache kmalloc-64 of size 64 [ 32.367093] The buggy address is located 0 bytes to the right of [ 32.367093] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.367172] [ 32.367197] The buggy address belongs to the physical page: [ 32.367230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.367286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.367344] page_type: f5(slab) [ 32.367390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.367444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.367486] page dumped because: kasan: bad access detected [ 32.367529] [ 32.367549] Memory state around the buggy address: [ 32.367583] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.368043] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.368586] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.368676] ^ [ 32.368715] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.368763] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.368806] ================================================================== [ 32.185355] ================================================================== [ 32.185409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 32.185463] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.185516] [ 32.185980] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.186208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.186417] Hardware name: linux,dummy-virt (DT) [ 32.186492] Call trace: [ 32.186644] show_stack+0x20/0x38 (C) [ 32.186706] dump_stack_lvl+0x8c/0xd0 [ 32.186758] print_report+0x118/0x5d0 [ 32.186825] kasan_report+0xdc/0x128 [ 32.186922] __asan_report_store8_noabort+0x20/0x30 [ 32.187281] kasan_atomics_helper+0x3e5c/0x4858 [ 32.187354] kasan_atomics+0x198/0x2e0 [ 32.187405] kunit_try_run_case+0x170/0x3f0 [ 32.187946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.188033] kthread+0x328/0x630 [ 32.188225] ret_from_fork+0x10/0x20 [ 32.188508] [ 32.188609] Allocated by task 297: [ 32.188905] kasan_save_stack+0x3c/0x68 [ 32.189159] kasan_save_track+0x20/0x40 [ 32.189265] kasan_save_alloc_info+0x40/0x58 [ 32.189308] __kasan_kmalloc+0xd4/0xd8 [ 32.189380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.189538] kasan_atomics+0xb8/0x2e0 [ 32.189931] kunit_try_run_case+0x170/0x3f0 [ 32.190007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.190391] kthread+0x328/0x630 [ 32.190572] ret_from_fork+0x10/0x20 [ 32.190797] [ 32.190823] The buggy address belongs to the object at fff00000c9c2c400 [ 32.190823] which belongs to the cache kmalloc-64 of size 64 [ 32.190916] The buggy address is located 0 bytes to the right of [ 32.190916] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.191299] [ 32.191475] The buggy address belongs to the physical page: [ 32.191609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.191727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.191834] page_type: f5(slab) [ 32.191984] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.192047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.192103] page dumped because: kasan: bad access detected [ 32.192311] [ 32.192367] Memory state around the buggy address: [ 32.192406] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.192454] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.192539] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.192592] ^ [ 32.192629] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192675] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192728] ================================================================== [ 32.355384] ================================================================== [ 32.355640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 32.355864] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.356161] [ 32.356276] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.356595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.356804] Hardware name: linux,dummy-virt (DT) [ 32.357179] Call trace: [ 32.357259] show_stack+0x20/0x38 (C) [ 32.357413] dump_stack_lvl+0x8c/0xd0 [ 32.357502] print_report+0x118/0x5d0 [ 32.357608] kasan_report+0xdc/0x128 [ 32.357715] kasan_check_range+0x100/0x1a8 [ 32.358025] __kasan_check_write+0x20/0x30 [ 32.358582] kasan_atomics_helper+0x1644/0x4858 [ 32.358669] kasan_atomics+0x198/0x2e0 [ 32.358975] kunit_try_run_case+0x170/0x3f0 [ 32.359050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.359145] kthread+0x328/0x630 [ 32.359337] ret_from_fork+0x10/0x20 [ 32.359401] [ 32.359547] Allocated by task 297: [ 32.359730] kasan_save_stack+0x3c/0x68 [ 32.359793] kasan_save_track+0x20/0x40 [ 32.360147] kasan_save_alloc_info+0x40/0x58 [ 32.360236] __kasan_kmalloc+0xd4/0xd8 [ 32.360321] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.360366] kasan_atomics+0xb8/0x2e0 [ 32.360413] kunit_try_run_case+0x170/0x3f0 [ 32.360643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.360838] kthread+0x328/0x630 [ 32.361064] ret_from_fork+0x10/0x20 [ 32.361243] [ 32.361289] The buggy address belongs to the object at fff00000c9c2c400 [ 32.361289] which belongs to the cache kmalloc-64 of size 64 [ 32.361608] The buggy address is located 0 bytes to the right of [ 32.361608] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.361798] [ 32.361857] The buggy address belongs to the physical page: [ 32.362112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.362282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.362641] page_type: f5(slab) [ 32.362805] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.363146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.363218] page dumped because: kasan: bad access detected [ 32.363298] [ 32.363379] Memory state around the buggy address: [ 32.363554] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.363776] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.363870] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.363978] ^ [ 32.364035] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.364175] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.364393] ================================================================== [ 32.274435] ================================================================== [ 32.274858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 32.275156] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.275346] [ 32.275390] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.275547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.275750] Hardware name: linux,dummy-virt (DT) [ 32.275996] Call trace: [ 32.276048] show_stack+0x20/0x38 (C) [ 32.276364] dump_stack_lvl+0x8c/0xd0 [ 32.276519] print_report+0x118/0x5d0 [ 32.276625] kasan_report+0xdc/0x128 [ 32.276762] kasan_check_range+0x100/0x1a8 [ 32.276815] __kasan_check_write+0x20/0x30 [ 32.276862] kasan_atomics_helper+0x12d8/0x4858 [ 32.276920] kasan_atomics+0x198/0x2e0 [ 32.276968] kunit_try_run_case+0x170/0x3f0 [ 32.277212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.277910] kthread+0x328/0x630 [ 32.277988] ret_from_fork+0x10/0x20 [ 32.278327] [ 32.278404] Allocated by task 297: [ 32.278476] kasan_save_stack+0x3c/0x68 [ 32.278703] kasan_save_track+0x20/0x40 [ 32.279067] kasan_save_alloc_info+0x40/0x58 [ 32.279544] __kasan_kmalloc+0xd4/0xd8 [ 32.279698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.279813] kasan_atomics+0xb8/0x2e0 [ 32.280035] kunit_try_run_case+0x170/0x3f0 [ 32.280243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.280377] kthread+0x328/0x630 [ 32.280636] ret_from_fork+0x10/0x20 [ 32.280795] [ 32.281248] The buggy address belongs to the object at fff00000c9c2c400 [ 32.281248] which belongs to the cache kmalloc-64 of size 64 [ 32.281615] The buggy address is located 0 bytes to the right of [ 32.281615] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.281697] [ 32.282102] The buggy address belongs to the physical page: [ 32.282171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.282384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.282574] page_type: f5(slab) [ 32.282648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.282962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.283104] page dumped because: kasan: bad access detected [ 32.283462] [ 32.283512] Memory state around the buggy address: [ 32.283765] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.284135] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.284311] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.284478] ^ [ 32.284571] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.284720] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.284936] ================================================================== [ 32.296113] ================================================================== [ 32.296223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 32.296295] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.296349] [ 32.296389] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.296478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.296506] Hardware name: linux,dummy-virt (DT) [ 32.296540] Call trace: [ 32.296996] show_stack+0x20/0x38 (C) [ 32.297147] dump_stack_lvl+0x8c/0xd0 [ 32.297241] print_report+0x118/0x5d0 [ 32.297347] kasan_report+0xdc/0x128 [ 32.297436] __asan_report_load8_noabort+0x20/0x30 [ 32.297487] kasan_atomics_helper+0x3f04/0x4858 [ 32.297546] kasan_atomics+0x198/0x2e0 [ 32.297594] kunit_try_run_case+0x170/0x3f0 [ 32.297645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.297702] kthread+0x328/0x630 [ 32.297747] ret_from_fork+0x10/0x20 [ 32.297796] [ 32.297858] Allocated by task 297: [ 32.297902] kasan_save_stack+0x3c/0x68 [ 32.297955] kasan_save_track+0x20/0x40 [ 32.297997] kasan_save_alloc_info+0x40/0x58 [ 32.298037] __kasan_kmalloc+0xd4/0xd8 [ 32.298096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.298138] kasan_atomics+0xb8/0x2e0 [ 32.298177] kunit_try_run_case+0x170/0x3f0 [ 32.298218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.298264] kthread+0x328/0x630 [ 32.298299] ret_from_fork+0x10/0x20 [ 32.298337] [ 32.298358] The buggy address belongs to the object at fff00000c9c2c400 [ 32.298358] which belongs to the cache kmalloc-64 of size 64 [ 32.298418] The buggy address is located 0 bytes to the right of [ 32.298418] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.298486] [ 32.298507] The buggy address belongs to the physical page: [ 32.298540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.298595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.298642] page_type: f5(slab) [ 32.298681] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.298742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.298795] page dumped because: kasan: bad access detected [ 32.298829] [ 32.298854] Memory state around the buggy address: [ 32.298886] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.298942] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.298988] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.299028] ^ [ 32.299472] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.299527] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.299987] ================================================================== [ 32.369825] ================================================================== [ 32.369896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 32.369950] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.370081] [ 32.370118] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.370210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.370410] Hardware name: linux,dummy-virt (DT) [ 32.370672] Call trace: [ 32.370894] show_stack+0x20/0x38 (C) [ 32.370965] dump_stack_lvl+0x8c/0xd0 [ 32.371082] print_report+0x118/0x5d0 [ 32.371134] kasan_report+0xdc/0x128 [ 32.371179] kasan_check_range+0x100/0x1a8 [ 32.371272] __kasan_check_write+0x20/0x30 [ 32.371324] kasan_atomics_helper+0x16d0/0x4858 [ 32.371375] kasan_atomics+0x198/0x2e0 [ 32.371995] kunit_try_run_case+0x170/0x3f0 [ 32.372112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.372249] kthread+0x328/0x630 [ 32.372443] ret_from_fork+0x10/0x20 [ 32.372678] [ 32.372750] Allocated by task 297: [ 32.373047] kasan_save_stack+0x3c/0x68 [ 32.373199] kasan_save_track+0x20/0x40 [ 32.373469] kasan_save_alloc_info+0x40/0x58 [ 32.373709] __kasan_kmalloc+0xd4/0xd8 [ 32.374099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.374183] kasan_atomics+0xb8/0x2e0 [ 32.374246] kunit_try_run_case+0x170/0x3f0 [ 32.374325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.374564] kthread+0x328/0x630 [ 32.374752] ret_from_fork+0x10/0x20 [ 32.374966] [ 32.375143] The buggy address belongs to the object at fff00000c9c2c400 [ 32.375143] which belongs to the cache kmalloc-64 of size 64 [ 32.375299] The buggy address is located 0 bytes to the right of [ 32.375299] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.375553] [ 32.375641] The buggy address belongs to the physical page: [ 32.375893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.376045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.376180] page_type: f5(slab) [ 32.376274] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.376620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.376741] page dumped because: kasan: bad access detected [ 32.376924] [ 32.377092] Memory state around the buggy address: [ 32.377208] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.377328] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.377496] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.377586] ^ [ 32.377810] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.378005] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.378119] ================================================================== [ 32.301023] ================================================================== [ 32.301097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 32.301149] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.301321] [ 32.301415] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.301801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.301884] Hardware name: linux,dummy-virt (DT) [ 32.301920] Call trace: [ 32.301947] show_stack+0x20/0x38 (C) [ 32.302181] dump_stack_lvl+0x8c/0xd0 [ 32.302351] print_report+0x118/0x5d0 [ 32.302530] kasan_report+0xdc/0x128 [ 32.302604] kasan_check_range+0x100/0x1a8 [ 32.302655] __kasan_check_write+0x20/0x30 [ 32.302729] kasan_atomics_helper+0x1414/0x4858 [ 32.303115] kasan_atomics+0x198/0x2e0 [ 32.303184] kunit_try_run_case+0x170/0x3f0 [ 32.303237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.303525] kthread+0x328/0x630 [ 32.303900] ret_from_fork+0x10/0x20 [ 32.304224] [ 32.304320] Allocated by task 297: [ 32.304677] kasan_save_stack+0x3c/0x68 [ 32.304796] kasan_save_track+0x20/0x40 [ 32.305104] kasan_save_alloc_info+0x40/0x58 [ 32.305203] __kasan_kmalloc+0xd4/0xd8 [ 32.305366] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.305442] kasan_atomics+0xb8/0x2e0 [ 32.305648] kunit_try_run_case+0x170/0x3f0 [ 32.305867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.305966] kthread+0x328/0x630 [ 32.306216] ret_from_fork+0x10/0x20 [ 32.306358] [ 32.306502] The buggy address belongs to the object at fff00000c9c2c400 [ 32.306502] which belongs to the cache kmalloc-64 of size 64 [ 32.306705] The buggy address is located 0 bytes to the right of [ 32.306705] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.306997] [ 32.307158] The buggy address belongs to the physical page: [ 32.307206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.307265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.307820] page_type: f5(slab) [ 32.308073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.308180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.308340] page dumped because: kasan: bad access detected [ 32.308426] [ 32.308506] Memory state around the buggy address: [ 32.308727] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309067] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309169] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.309410] ^ [ 32.309613] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309671] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309875] ================================================================== [ 32.032880] ================================================================== [ 32.032942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.032997] Read of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.033180] [ 32.033281] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.033377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.033524] Hardware name: linux,dummy-virt (DT) [ 32.033569] Call trace: [ 32.033633] show_stack+0x20/0x38 (C) [ 32.033685] dump_stack_lvl+0x8c/0xd0 [ 32.033744] print_report+0x118/0x5d0 [ 32.033789] kasan_report+0xdc/0x128 [ 32.033835] __asan_report_load4_noabort+0x20/0x30 [ 32.033895] kasan_atomics_helper+0x42d8/0x4858 [ 32.033948] kasan_atomics+0x198/0x2e0 [ 32.033995] kunit_try_run_case+0x170/0x3f0 [ 32.034077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.034137] kthread+0x328/0x630 [ 32.034179] ret_from_fork+0x10/0x20 [ 32.034229] [ 32.034257] Allocated by task 297: [ 32.034289] kasan_save_stack+0x3c/0x68 [ 32.034332] kasan_save_track+0x20/0x40 [ 32.034373] kasan_save_alloc_info+0x40/0x58 [ 32.034419] __kasan_kmalloc+0xd4/0xd8 [ 32.034460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.034511] kasan_atomics+0xb8/0x2e0 [ 32.034550] kunit_try_run_case+0x170/0x3f0 [ 32.034599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.034646] kthread+0x328/0x630 [ 32.034681] ret_from_fork+0x10/0x20 [ 32.034719] [ 32.034739] The buggy address belongs to the object at fff00000c9c2c400 [ 32.034739] which belongs to the cache kmalloc-64 of size 64 [ 32.034928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.036914] ^ [ 32.038407] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.039907] kasan_check_range+0x100/0x1a8 [ 32.041433] Allocated by task 297: [ 32.041507] kasan_save_stack+0x3c/0x68 [ 32.041667] kasan_save_track+0x20/0x40 [ 32.041715] kasan_save_alloc_info+0x40/0x58 [ 32.041944] __kasan_kmalloc+0xd4/0xd8 [ 32.042107] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.042374] kasan_atomics+0xb8/0x2e0 [ 32.042479] kunit_try_run_case+0x170/0x3f0 [ 32.042586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.042723] kthread+0x328/0x630 [ 32.042964] ret_from_fork+0x10/0x20 [ 32.043141] [ 32.043230] The buggy address belongs to the object at fff00000c9c2c400 [ 32.043230] which belongs to the cache kmalloc-64 of size 64 [ 32.043408] The buggy address is located 0 bytes to the right of [ 32.043408] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.043481] [ 32.043646] The buggy address belongs to the physical page: [ 32.043909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.044121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.044330] page_type: f5(slab) [ 32.044535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.044663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.044767] page dumped because: kasan: bad access detected [ 32.044948] [ 32.045025] Memory state around the buggy address: [ 32.045090] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.045368] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.045426] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.045870] ^ [ 32.046027] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.046147] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.046431] ================================================================== [ 32.337376] ================================================================== [ 32.337439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 32.337491] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.337554] [ 32.337792] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.338270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.338319] Hardware name: linux,dummy-virt (DT) [ 32.338368] Call trace: [ 32.338630] show_stack+0x20/0x38 (C) [ 32.338869] dump_stack_lvl+0x8c/0xd0 [ 32.338983] print_report+0x118/0x5d0 [ 32.339574] kasan_report+0xdc/0x128 [ 32.339690] kasan_check_range+0x100/0x1a8 [ 32.339774] __kasan_check_write+0x20/0x30 [ 32.340030] kasan_atomics_helper+0x15b4/0x4858 [ 32.340365] kasan_atomics+0x198/0x2e0 [ 32.340436] kunit_try_run_case+0x170/0x3f0 [ 32.340626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.340788] kthread+0x328/0x630 [ 32.340907] ret_from_fork+0x10/0x20 [ 32.341005] [ 32.341205] Allocated by task 297: [ 32.341239] kasan_save_stack+0x3c/0x68 [ 32.341472] kasan_save_track+0x20/0x40 [ 32.341569] kasan_save_alloc_info+0x40/0x58 [ 32.341915] __kasan_kmalloc+0xd4/0xd8 [ 32.342080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.342166] kasan_atomics+0xb8/0x2e0 [ 32.342480] kunit_try_run_case+0x170/0x3f0 [ 32.342559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.342656] kthread+0x328/0x630 [ 32.342857] ret_from_fork+0x10/0x20 [ 32.342927] [ 32.343225] The buggy address belongs to the object at fff00000c9c2c400 [ 32.343225] which belongs to the cache kmalloc-64 of size 64 [ 32.343467] The buggy address is located 0 bytes to the right of [ 32.343467] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.343862] [ 32.343912] The buggy address belongs to the physical page: [ 32.344089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.344153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.344352] page_type: f5(slab) [ 32.344523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.344983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.345140] page dumped because: kasan: bad access detected [ 32.345247] [ 32.345589] Memory state around the buggy address: [ 32.345705] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.345857] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.345971] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.346075] ^ [ 32.346129] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.346319] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.346469] ================================================================== [ 32.378436] ================================================================== [ 32.378646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 32.378931] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.379130] [ 32.379173] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.379263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.379320] Hardware name: linux,dummy-virt (DT) [ 32.379386] Call trace: [ 32.379412] show_stack+0x20/0x38 (C) [ 32.379547] dump_stack_lvl+0x8c/0xd0 [ 32.379602] print_report+0x118/0x5d0 [ 32.379945] kasan_report+0xdc/0x128 [ 32.380134] __asan_report_load8_noabort+0x20/0x30 [ 32.380432] kasan_atomics_helper+0x3e10/0x4858 [ 32.380541] kasan_atomics+0x198/0x2e0 [ 32.380688] kunit_try_run_case+0x170/0x3f0 [ 32.380864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.380959] kthread+0x328/0x630 [ 32.381005] ret_from_fork+0x10/0x20 [ 32.381397] [ 32.381453] Allocated by task 297: [ 32.381661] kasan_save_stack+0x3c/0x68 [ 32.381805] kasan_save_track+0x20/0x40 [ 32.382154] kasan_save_alloc_info+0x40/0x58 [ 32.382239] __kasan_kmalloc+0xd4/0xd8 [ 32.382453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.382720] kasan_atomics+0xb8/0x2e0 [ 32.382939] kunit_try_run_case+0x170/0x3f0 [ 32.383142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.383415] kthread+0x328/0x630 [ 32.383570] ret_from_fork+0x10/0x20 [ 32.383633] [ 32.383849] The buggy address belongs to the object at fff00000c9c2c400 [ 32.383849] which belongs to the cache kmalloc-64 of size 64 [ 32.384147] The buggy address is located 0 bytes to the right of [ 32.384147] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.384245] [ 32.384613] The buggy address belongs to the physical page: [ 32.384723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.384788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.385068] page_type: f5(slab) [ 32.385162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.385226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.385270] page dumped because: kasan: bad access detected [ 32.385304] [ 32.385341] Memory state around the buggy address: [ 32.385407] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.385455] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.385522] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.385564] ^ [ 32.385600] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.385645] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.385688] ================================================================== [ 32.220373] ================================================================== [ 32.220491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 32.220558] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297 [ 32.220610] [ 32.220646] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.221108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.221204] Hardware name: linux,dummy-virt (DT) [ 32.221239] Call trace: [ 32.221330] show_stack+0x20/0x38 (C) [ 32.221416] dump_stack_lvl+0x8c/0xd0 [ 32.221579] print_report+0x118/0x5d0 [ 32.221633] kasan_report+0xdc/0x128 [ 32.221826] kasan_check_range+0x100/0x1a8 [ 32.222004] __kasan_check_write+0x20/0x30 [ 32.222075] kasan_atomics_helper+0xff0/0x4858 [ 32.222127] kasan_atomics+0x198/0x2e0 [ 32.222366] kunit_try_run_case+0x170/0x3f0 [ 32.222823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.222907] kthread+0x328/0x630 [ 32.222955] ret_from_fork+0x10/0x20 [ 32.223214] [ 32.223347] Allocated by task 297: [ 32.223391] kasan_save_stack+0x3c/0x68 [ 32.223643] kasan_save_track+0x20/0x40 [ 32.223799] kasan_save_alloc_info+0x40/0x58 [ 32.224048] __kasan_kmalloc+0xd4/0xd8 [ 32.224224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.224364] kasan_atomics+0xb8/0x2e0 [ 32.224523] kunit_try_run_case+0x170/0x3f0 [ 32.224568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.224624] kthread+0x328/0x630 [ 32.224660] ret_from_fork+0x10/0x20 [ 32.224999] [ 32.225111] The buggy address belongs to the object at fff00000c9c2c400 [ 32.225111] which belongs to the cache kmalloc-64 of size 64 [ 32.225410] The buggy address is located 0 bytes to the right of [ 32.225410] allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430) [ 32.225590] [ 32.225632] The buggy address belongs to the physical page: [ 32.225873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.226221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.226367] page_type: f5(slab) [ 32.226735] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.226826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.227017] page dumped because: kasan: bad access detected [ 32.227265] [ 32.227374] Memory state around the buggy address: [ 32.227590] fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.227776] fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.227843] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.227892] ^ [ 32.227928] fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.227983] fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.228023] ==================================================================
[ 27.111139] ================================================================== [ 27.112071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 27.112743] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.113310] [ 27.113403] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.113458] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.113473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.113498] Call Trace: [ 27.113521] <TASK> [ 27.113542] dump_stack_lvl+0x73/0xb0 [ 27.113576] print_report+0xd1/0x610 [ 27.113599] ? __virt_addr_valid+0x1db/0x2d0 [ 27.113625] ? kasan_atomics_helper+0x1079/0x5450 [ 27.113647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.113674] ? kasan_atomics_helper+0x1079/0x5450 [ 27.113708] kasan_report+0x141/0x180 [ 27.113731] ? kasan_atomics_helper+0x1079/0x5450 [ 27.113758] kasan_check_range+0x10c/0x1c0 [ 27.113792] __kasan_check_write+0x18/0x20 [ 27.113816] kasan_atomics_helper+0x1079/0x5450 [ 27.113840] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.113863] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.113898] ? kasan_save_alloc_info+0x3b/0x50 [ 27.113927] kasan_atomics+0x1dc/0x310 [ 27.113962] ? __pfx_kasan_atomics+0x10/0x10 [ 27.113987] ? __pfx_read_tsc+0x10/0x10 [ 27.114011] ? ktime_get_ts64+0x86/0x230 [ 27.114038] kunit_try_run_case+0x1a5/0x480 [ 27.114070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.114092] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.114118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.114155] ? __kthread_parkme+0x82/0x180 [ 27.114179] ? preempt_count_sub+0x50/0x80 [ 27.114204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.114228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.114254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.114280] kthread+0x337/0x6f0 [ 27.114301] ? trace_preempt_on+0x20/0xc0 [ 27.114327] ? __pfx_kthread+0x10/0x10 [ 27.114349] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.114372] ? calculate_sigpending+0x7b/0xa0 [ 27.114398] ? __pfx_kthread+0x10/0x10 [ 27.114429] ret_from_fork+0x116/0x1d0 [ 27.114450] ? __pfx_kthread+0x10/0x10 [ 27.114471] ret_from_fork_asm+0x1a/0x30 [ 27.114514] </TASK> [ 27.114526] [ 27.123892] Allocated by task 315: [ 27.124098] kasan_save_stack+0x45/0x70 [ 27.124329] kasan_save_track+0x18/0x40 [ 27.124522] kasan_save_alloc_info+0x3b/0x50 [ 27.124740] __kasan_kmalloc+0xb7/0xc0 [ 27.125029] __kmalloc_cache_noprof+0x189/0x420 [ 27.125198] kasan_atomics+0x95/0x310 [ 27.125328] kunit_try_run_case+0x1a5/0x480 [ 27.125468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.125749] kthread+0x337/0x6f0 [ 27.125921] ret_from_fork+0x116/0x1d0 [ 27.126105] ret_from_fork_asm+0x1a/0x30 [ 27.126284] [ 27.126351] The buggy address belongs to the object at ffff8881058d6700 [ 27.126351] which belongs to the cache kmalloc-64 of size 64 [ 27.126725] The buggy address is located 0 bytes to the right of [ 27.126725] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.127276] [ 27.127373] The buggy address belongs to the physical page: [ 27.127655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.128009] flags: 0x200000000000000(node=0|zone=2) [ 27.128176] page_type: f5(slab) [ 27.128348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.128717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.129068] page dumped because: kasan: bad access detected [ 27.129295] [ 27.129399] Memory state around the buggy address: [ 27.129593] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.129960] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.130265] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.130555] ^ [ 27.130772] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.131088] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.131400] ================================================================== [ 27.643258] ================================================================== [ 27.643522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 27.644157] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.644529] [ 27.644736] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.644795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.644811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.644835] Call Trace: [ 27.644857] <TASK> [ 27.644881] dump_stack_lvl+0x73/0xb0 [ 27.644915] print_report+0xd1/0x610 [ 27.644941] ? __virt_addr_valid+0x1db/0x2d0 [ 27.644967] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.644989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.645016] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.645038] kasan_report+0x141/0x180 [ 27.645060] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.645087] kasan_check_range+0x10c/0x1c0 [ 27.645111] __kasan_check_write+0x18/0x20 [ 27.645134] kasan_atomics_helper+0x1d7a/0x5450 [ 27.645158] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.645180] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.645205] ? kasan_save_alloc_info+0x3b/0x50 [ 27.645235] kasan_atomics+0x1dc/0x310 [ 27.645259] ? __pfx_kasan_atomics+0x10/0x10 [ 27.645283] ? __pfx_read_tsc+0x10/0x10 [ 27.645307] ? ktime_get_ts64+0x86/0x230 [ 27.645334] kunit_try_run_case+0x1a5/0x480 [ 27.645357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.645378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.645404] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.645429] ? __kthread_parkme+0x82/0x180 [ 27.645452] ? preempt_count_sub+0x50/0x80 [ 27.645478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.645501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.645527] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.645553] kthread+0x337/0x6f0 [ 27.645574] ? trace_preempt_on+0x20/0xc0 [ 27.645602] ? __pfx_kthread+0x10/0x10 [ 27.645625] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.645648] ? calculate_sigpending+0x7b/0xa0 [ 27.645674] ? __pfx_kthread+0x10/0x10 [ 27.645868] ret_from_fork+0x116/0x1d0 [ 27.645895] ? __pfx_kthread+0x10/0x10 [ 27.645918] ret_from_fork_asm+0x1a/0x30 [ 27.645952] </TASK> [ 27.645966] [ 27.655687] Allocated by task 315: [ 27.656063] kasan_save_stack+0x45/0x70 [ 27.656280] kasan_save_track+0x18/0x40 [ 27.656570] kasan_save_alloc_info+0x3b/0x50 [ 27.656794] __kasan_kmalloc+0xb7/0xc0 [ 27.657048] __kmalloc_cache_noprof+0x189/0x420 [ 27.657257] kasan_atomics+0x95/0x310 [ 27.657425] kunit_try_run_case+0x1a5/0x480 [ 27.657619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.657855] kthread+0x337/0x6f0 [ 27.658330] ret_from_fork+0x116/0x1d0 [ 27.658515] ret_from_fork_asm+0x1a/0x30 [ 27.658657] [ 27.658767] The buggy address belongs to the object at ffff8881058d6700 [ 27.658767] which belongs to the cache kmalloc-64 of size 64 [ 27.659391] The buggy address is located 0 bytes to the right of [ 27.659391] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.660165] [ 27.660329] The buggy address belongs to the physical page: [ 27.660572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.661132] flags: 0x200000000000000(node=0|zone=2) [ 27.661433] page_type: f5(slab) [ 27.661574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.662069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.662441] page dumped because: kasan: bad access detected [ 27.662636] [ 27.662745] Memory state around the buggy address: [ 27.662949] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.663430] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.663795] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.664148] ^ [ 27.664356] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.664642] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.665165] ================================================================== [ 27.313893] ================================================================== [ 27.315297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 27.315629] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.316015] [ 27.316148] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.316204] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.316219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.316254] Call Trace: [ 27.316275] <TASK> [ 27.316297] dump_stack_lvl+0x73/0xb0 [ 27.316342] print_report+0xd1/0x610 [ 27.316366] ? __virt_addr_valid+0x1db/0x2d0 [ 27.316392] ? kasan_atomics_helper+0x1467/0x5450 [ 27.316414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.316450] ? kasan_atomics_helper+0x1467/0x5450 [ 27.316473] kasan_report+0x141/0x180 [ 27.316495] ? kasan_atomics_helper+0x1467/0x5450 [ 27.316613] kasan_check_range+0x10c/0x1c0 [ 27.316640] __kasan_check_write+0x18/0x20 [ 27.316664] kasan_atomics_helper+0x1467/0x5450 [ 27.316688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.316726] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.316753] ? kasan_save_alloc_info+0x3b/0x50 [ 27.316792] kasan_atomics+0x1dc/0x310 [ 27.316815] ? __pfx_kasan_atomics+0x10/0x10 [ 27.316840] ? __pfx_read_tsc+0x10/0x10 [ 27.316875] ? ktime_get_ts64+0x86/0x230 [ 27.316902] kunit_try_run_case+0x1a5/0x480 [ 27.316937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.316958] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.316984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.317008] ? __kthread_parkme+0x82/0x180 [ 27.317030] ? preempt_count_sub+0x50/0x80 [ 27.317055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.317078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.317104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.317129] kthread+0x337/0x6f0 [ 27.317150] ? trace_preempt_on+0x20/0xc0 [ 27.317174] ? __pfx_kthread+0x10/0x10 [ 27.317196] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.317219] ? calculate_sigpending+0x7b/0xa0 [ 27.317244] ? __pfx_kthread+0x10/0x10 [ 27.317267] ret_from_fork+0x116/0x1d0 [ 27.317287] ? __pfx_kthread+0x10/0x10 [ 27.317309] ret_from_fork_asm+0x1a/0x30 [ 27.317342] </TASK> [ 27.317356] [ 27.324944] Allocated by task 315: [ 27.325155] kasan_save_stack+0x45/0x70 [ 27.325369] kasan_save_track+0x18/0x40 [ 27.325504] kasan_save_alloc_info+0x3b/0x50 [ 27.325679] __kasan_kmalloc+0xb7/0xc0 [ 27.325881] __kmalloc_cache_noprof+0x189/0x420 [ 27.326101] kasan_atomics+0x95/0x310 [ 27.326262] kunit_try_run_case+0x1a5/0x480 [ 27.326405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.326831] kthread+0x337/0x6f0 [ 27.326968] ret_from_fork+0x116/0x1d0 [ 27.327173] ret_from_fork_asm+0x1a/0x30 [ 27.327311] [ 27.327379] The buggy address belongs to the object at ffff8881058d6700 [ 27.327379] which belongs to the cache kmalloc-64 of size 64 [ 27.327757] The buggy address is located 0 bytes to the right of [ 27.327757] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.328330] [ 27.328423] The buggy address belongs to the physical page: [ 27.328671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.328962] flags: 0x200000000000000(node=0|zone=2) [ 27.329124] page_type: f5(slab) [ 27.329242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.329586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.330209] page dumped because: kasan: bad access detected [ 27.330462] [ 27.330553] Memory state around the buggy address: [ 27.330764] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.331085] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.331385] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.331676] ^ [ 27.331925] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.332227] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.332513] ================================================================== [ 27.131954] ================================================================== [ 27.132890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 27.133226] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.133446] [ 27.133544] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.133609] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.133624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.133648] Call Trace: [ 27.133682] <TASK> [ 27.133713] dump_stack_lvl+0x73/0xb0 [ 27.133748] print_report+0xd1/0x610 [ 27.133772] ? __virt_addr_valid+0x1db/0x2d0 [ 27.133798] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.133821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.133869] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.133892] kasan_report+0x141/0x180 [ 27.133925] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.133952] __asan_report_load4_noabort+0x18/0x20 [ 27.133977] kasan_atomics_helper+0x4a1c/0x5450 [ 27.134000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.134023] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.134049] ? kasan_save_alloc_info+0x3b/0x50 [ 27.134077] kasan_atomics+0x1dc/0x310 [ 27.134101] ? __pfx_kasan_atomics+0x10/0x10 [ 27.134126] ? __pfx_read_tsc+0x10/0x10 [ 27.134150] ? ktime_get_ts64+0x86/0x230 [ 27.134177] kunit_try_run_case+0x1a5/0x480 [ 27.134201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.134222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.134248] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.134273] ? __kthread_parkme+0x82/0x180 [ 27.134305] ? preempt_count_sub+0x50/0x80 [ 27.134331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.134354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.134391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.134418] kthread+0x337/0x6f0 [ 27.134440] ? trace_preempt_on+0x20/0xc0 [ 27.134464] ? __pfx_kthread+0x10/0x10 [ 27.134486] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.134509] ? calculate_sigpending+0x7b/0xa0 [ 27.134536] ? __pfx_kthread+0x10/0x10 [ 27.134567] ret_from_fork+0x116/0x1d0 [ 27.134588] ? __pfx_kthread+0x10/0x10 [ 27.134609] ret_from_fork_asm+0x1a/0x30 [ 27.134653] </TASK> [ 27.134667] [ 27.142275] Allocated by task 315: [ 27.142509] kasan_save_stack+0x45/0x70 [ 27.142730] kasan_save_track+0x18/0x40 [ 27.142966] kasan_save_alloc_info+0x3b/0x50 [ 27.143152] __kasan_kmalloc+0xb7/0xc0 [ 27.143342] __kmalloc_cache_noprof+0x189/0x420 [ 27.143553] kasan_atomics+0x95/0x310 [ 27.143745] kunit_try_run_case+0x1a5/0x480 [ 27.143949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.144183] kthread+0x337/0x6f0 [ 27.144361] ret_from_fork+0x116/0x1d0 [ 27.144546] ret_from_fork_asm+0x1a/0x30 [ 27.144724] [ 27.144851] The buggy address belongs to the object at ffff8881058d6700 [ 27.144851] which belongs to the cache kmalloc-64 of size 64 [ 27.145332] The buggy address is located 0 bytes to the right of [ 27.145332] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.145768] [ 27.145853] The buggy address belongs to the physical page: [ 27.146248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.146601] flags: 0x200000000000000(node=0|zone=2) [ 27.146861] page_type: f5(slab) [ 27.147219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.147520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.147753] page dumped because: kasan: bad access detected [ 27.148018] [ 27.148111] Memory state around the buggy address: [ 27.148362] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.148681] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.149234] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.149547] ^ [ 27.149735] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.150166] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.150428] ================================================================== [ 27.874367] ================================================================== [ 27.875129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 27.875549] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.876116] [ 27.876368] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.876557] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.876576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.876599] Call Trace: [ 27.876617] <TASK> [ 27.876636] dump_stack_lvl+0x73/0xb0 [ 27.876669] print_report+0xd1/0x610 [ 27.876706] ? __virt_addr_valid+0x1db/0x2d0 [ 27.876731] ? kasan_atomics_helper+0x224c/0x5450 [ 27.876754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.876795] ? kasan_atomics_helper+0x224c/0x5450 [ 27.876818] kasan_report+0x141/0x180 [ 27.876840] ? kasan_atomics_helper+0x224c/0x5450 [ 27.876867] kasan_check_range+0x10c/0x1c0 [ 27.876892] __kasan_check_write+0x18/0x20 [ 27.876915] kasan_atomics_helper+0x224c/0x5450 [ 27.876938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.876961] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.876986] ? kasan_save_alloc_info+0x3b/0x50 [ 27.877016] kasan_atomics+0x1dc/0x310 [ 27.877038] ? __pfx_kasan_atomics+0x10/0x10 [ 27.877063] ? __pfx_read_tsc+0x10/0x10 [ 27.877086] ? ktime_get_ts64+0x86/0x230 [ 27.877112] kunit_try_run_case+0x1a5/0x480 [ 27.877134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.877156] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.877181] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.877206] ? __kthread_parkme+0x82/0x180 [ 27.877227] ? preempt_count_sub+0x50/0x80 [ 27.877252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.877275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.877301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.877327] kthread+0x337/0x6f0 [ 27.877347] ? trace_preempt_on+0x20/0xc0 [ 27.877372] ? __pfx_kthread+0x10/0x10 [ 27.877394] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.877417] ? calculate_sigpending+0x7b/0xa0 [ 27.877442] ? __pfx_kthread+0x10/0x10 [ 27.877464] ret_from_fork+0x116/0x1d0 [ 27.877484] ? __pfx_kthread+0x10/0x10 [ 27.877506] ret_from_fork_asm+0x1a/0x30 [ 27.877538] </TASK> [ 27.877551] [ 27.887849] Allocated by task 315: [ 27.888053] kasan_save_stack+0x45/0x70 [ 27.888370] kasan_save_track+0x18/0x40 [ 27.888563] kasan_save_alloc_info+0x3b/0x50 [ 27.888766] __kasan_kmalloc+0xb7/0xc0 [ 27.889189] __kmalloc_cache_noprof+0x189/0x420 [ 27.889480] kasan_atomics+0x95/0x310 [ 27.889663] kunit_try_run_case+0x1a5/0x480 [ 27.890013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.890351] kthread+0x337/0x6f0 [ 27.890505] ret_from_fork+0x116/0x1d0 [ 27.890860] ret_from_fork_asm+0x1a/0x30 [ 27.891181] [ 27.891261] The buggy address belongs to the object at ffff8881058d6700 [ 27.891261] which belongs to the cache kmalloc-64 of size 64 [ 27.891766] The buggy address is located 0 bytes to the right of [ 27.891766] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.892581] [ 27.892678] The buggy address belongs to the physical page: [ 27.893087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.893588] flags: 0x200000000000000(node=0|zone=2) [ 27.894161] page_type: f5(slab) [ 27.894558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.895306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.895603] page dumped because: kasan: bad access detected [ 27.895810] [ 27.895967] Memory state around the buggy address: [ 27.896377] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.897073] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.897710] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.898048] ^ [ 27.898201] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.898411] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.898620] ================================================================== [ 26.836628] ================================================================== [ 26.837123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 26.837364] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.837990] [ 26.838200] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.838255] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.838270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.838294] Call Trace: [ 26.838309] <TASK> [ 26.838329] dump_stack_lvl+0x73/0xb0 [ 26.838360] print_report+0xd1/0x610 [ 26.838385] ? __virt_addr_valid+0x1db/0x2d0 [ 26.838410] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.838431] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.838459] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.838480] kasan_report+0x141/0x180 [ 26.838503] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.838529] kasan_check_range+0x10c/0x1c0 [ 26.838554] __kasan_check_write+0x18/0x20 [ 26.838578] kasan_atomics_helper+0x8f9/0x5450 [ 26.838612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.838635] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.838659] ? kasan_save_alloc_info+0x3b/0x50 [ 26.838706] kasan_atomics+0x1dc/0x310 [ 26.838731] ? __pfx_kasan_atomics+0x10/0x10 [ 26.838756] ? __pfx_read_tsc+0x10/0x10 [ 26.838789] ? ktime_get_ts64+0x86/0x230 [ 26.838815] kunit_try_run_case+0x1a5/0x480 [ 26.838839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.838860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.838901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.838936] ? __kthread_parkme+0x82/0x180 [ 26.838958] ? preempt_count_sub+0x50/0x80 [ 26.838983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.839006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.839032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.839059] kthread+0x337/0x6f0 [ 26.839080] ? trace_preempt_on+0x20/0xc0 [ 26.839104] ? __pfx_kthread+0x10/0x10 [ 26.839126] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.839148] ? calculate_sigpending+0x7b/0xa0 [ 26.839174] ? __pfx_kthread+0x10/0x10 [ 26.839197] ret_from_fork+0x116/0x1d0 [ 26.839218] ? __pfx_kthread+0x10/0x10 [ 26.839239] ret_from_fork_asm+0x1a/0x30 [ 26.839271] </TASK> [ 26.839284] [ 26.853505] Allocated by task 315: [ 26.853885] kasan_save_stack+0x45/0x70 [ 26.854344] kasan_save_track+0x18/0x40 [ 26.854478] kasan_save_alloc_info+0x3b/0x50 [ 26.854625] __kasan_kmalloc+0xb7/0xc0 [ 26.854767] __kmalloc_cache_noprof+0x189/0x420 [ 26.855186] kasan_atomics+0x95/0x310 [ 26.855654] kunit_try_run_case+0x1a5/0x480 [ 26.856103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.856687] kthread+0x337/0x6f0 [ 26.857049] ret_from_fork+0x116/0x1d0 [ 26.857415] ret_from_fork_asm+0x1a/0x30 [ 26.857824] [ 26.858027] The buggy address belongs to the object at ffff8881058d6700 [ 26.858027] which belongs to the cache kmalloc-64 of size 64 [ 26.859111] The buggy address is located 0 bytes to the right of [ 26.859111] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.860023] [ 26.860097] The buggy address belongs to the physical page: [ 26.860418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.861165] flags: 0x200000000000000(node=0|zone=2) [ 26.861611] page_type: f5(slab) [ 26.861765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.862222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.862678] page dumped because: kasan: bad access detected [ 26.862872] [ 26.863062] Memory state around the buggy address: [ 26.863569] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.864061] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.864303] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.864918] ^ [ 26.865421] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.865682] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.865941] ================================================================== [ 26.585534] ================================================================== [ 26.586029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 26.586370] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.586704] [ 26.586870] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.586922] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.586937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.586960] Call Trace: [ 26.586975] <TASK> [ 26.586992] dump_stack_lvl+0x73/0xb0 [ 26.587022] print_report+0xd1/0x610 [ 26.587047] ? __virt_addr_valid+0x1db/0x2d0 [ 26.587072] ? kasan_atomics_helper+0x3df/0x5450 [ 26.587094] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.587121] ? kasan_atomics_helper+0x3df/0x5450 [ 26.587143] kasan_report+0x141/0x180 [ 26.587166] ? kasan_atomics_helper+0x3df/0x5450 [ 26.587192] kasan_check_range+0x10c/0x1c0 [ 26.587217] __kasan_check_read+0x15/0x20 [ 26.587241] kasan_atomics_helper+0x3df/0x5450 [ 26.587265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.587288] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.587312] ? kasan_save_alloc_info+0x3b/0x50 [ 26.587341] kasan_atomics+0x1dc/0x310 [ 26.587365] ? __pfx_kasan_atomics+0x10/0x10 [ 26.587389] ? __pfx_read_tsc+0x10/0x10 [ 26.587413] ? ktime_get_ts64+0x86/0x230 [ 26.587439] kunit_try_run_case+0x1a5/0x480 [ 26.587462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.587485] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.587510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.587536] ? __kthread_parkme+0x82/0x180 [ 26.587558] ? preempt_count_sub+0x50/0x80 [ 26.587634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.587659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.587685] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.587725] kthread+0x337/0x6f0 [ 26.587746] ? trace_preempt_on+0x20/0xc0 [ 26.587782] ? __pfx_kthread+0x10/0x10 [ 26.587804] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.587832] ? calculate_sigpending+0x7b/0xa0 [ 26.587858] ? __pfx_kthread+0x10/0x10 [ 26.587882] ret_from_fork+0x116/0x1d0 [ 26.587903] ? __pfx_kthread+0x10/0x10 [ 26.587943] ret_from_fork_asm+0x1a/0x30 [ 26.587975] </TASK> [ 26.587988] [ 26.594933] Allocated by task 315: [ 26.595062] kasan_save_stack+0x45/0x70 [ 26.595201] kasan_save_track+0x18/0x40 [ 26.595329] kasan_save_alloc_info+0x3b/0x50 [ 26.595471] __kasan_kmalloc+0xb7/0xc0 [ 26.595596] __kmalloc_cache_noprof+0x189/0x420 [ 26.595845] kasan_atomics+0x95/0x310 [ 26.596089] kunit_try_run_case+0x1a5/0x480 [ 26.596289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.596541] kthread+0x337/0x6f0 [ 26.596714] ret_from_fork+0x116/0x1d0 [ 26.597088] ret_from_fork_asm+0x1a/0x30 [ 26.597293] [ 26.597388] The buggy address belongs to the object at ffff8881058d6700 [ 26.597388] which belongs to the cache kmalloc-64 of size 64 [ 26.598223] The buggy address is located 0 bytes to the right of [ 26.598223] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.598645] [ 26.598730] The buggy address belongs to the physical page: [ 26.599254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.599601] flags: 0x200000000000000(node=0|zone=2) [ 26.599771] page_type: f5(slab) [ 26.600204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.600520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.600855] page dumped because: kasan: bad access detected [ 26.601087] [ 26.601157] Memory state around the buggy address: [ 26.601308] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.601520] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.601762] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.602371] ^ [ 26.602604] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.603235] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.603524] ================================================================== [ 26.496177] ================================================================== [ 26.497354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 26.497932] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.498567] [ 26.498762] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.498818] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.498833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.498868] Call Trace: [ 26.498882] <TASK> [ 26.498915] dump_stack_lvl+0x73/0xb0 [ 26.498949] print_report+0xd1/0x610 [ 26.498972] ? __virt_addr_valid+0x1db/0x2d0 [ 26.498997] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.499018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.499044] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.499065] kasan_report+0x141/0x180 [ 26.499087] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.499112] __asan_report_load4_noabort+0x18/0x20 [ 26.499136] kasan_atomics_helper+0x4bbc/0x5450 [ 26.499158] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.499180] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.499204] ? kasan_save_alloc_info+0x3b/0x50 [ 26.499232] kasan_atomics+0x1dc/0x310 [ 26.499253] ? __pfx_kasan_atomics+0x10/0x10 [ 26.499277] ? __pfx_read_tsc+0x10/0x10 [ 26.499300] ? ktime_get_ts64+0x86/0x230 [ 26.499326] kunit_try_run_case+0x1a5/0x480 [ 26.499349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.499370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.499394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.499418] ? __kthread_parkme+0x82/0x180 [ 26.499439] ? preempt_count_sub+0x50/0x80 [ 26.499463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.499485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.499510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.499536] kthread+0x337/0x6f0 [ 26.499555] ? trace_preempt_on+0x20/0xc0 [ 26.499580] ? __pfx_kthread+0x10/0x10 [ 26.499600] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.499623] ? calculate_sigpending+0x7b/0xa0 [ 26.499647] ? __pfx_kthread+0x10/0x10 [ 26.499667] ret_from_fork+0x116/0x1d0 [ 26.499687] ? __pfx_kthread+0x10/0x10 [ 26.499730] ret_from_fork_asm+0x1a/0x30 [ 26.499761] </TASK> [ 26.499772] [ 26.512929] Allocated by task 315: [ 26.513065] kasan_save_stack+0x45/0x70 [ 26.513204] kasan_save_track+0x18/0x40 [ 26.513331] kasan_save_alloc_info+0x3b/0x50 [ 26.513468] __kasan_kmalloc+0xb7/0xc0 [ 26.513591] __kmalloc_cache_noprof+0x189/0x420 [ 26.513847] kasan_atomics+0x95/0x310 [ 26.514172] kunit_try_run_case+0x1a5/0x480 [ 26.514532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.514999] kthread+0x337/0x6f0 [ 26.515288] ret_from_fork+0x116/0x1d0 [ 26.515618] ret_from_fork_asm+0x1a/0x30 [ 26.516189] [ 26.516276] The buggy address belongs to the object at ffff8881058d6700 [ 26.516276] which belongs to the cache kmalloc-64 of size 64 [ 26.516622] The buggy address is located 0 bytes to the right of [ 26.516622] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.517610] [ 26.518674] The buggy address belongs to the physical page: [ 26.520361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.521430] flags: 0x200000000000000(node=0|zone=2) [ 26.521905] page_type: f5(slab) [ 26.522617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.523130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.523364] page dumped because: kasan: bad access detected [ 26.523536] [ 26.523605] Memory state around the buggy address: [ 26.524438] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.525518] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.526479] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.527395] ^ [ 26.528081] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.529099] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.529362] ================================================================== [ 26.603984] ================================================================== [ 26.604273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 26.604567] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.604964] [ 26.605075] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.605123] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.605139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.605160] Call Trace: [ 26.605177] <TASK> [ 26.605193] dump_stack_lvl+0x73/0xb0 [ 26.605222] print_report+0xd1/0x610 [ 26.605244] ? __virt_addr_valid+0x1db/0x2d0 [ 26.605268] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.605291] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.605318] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.605340] kasan_report+0x141/0x180 [ 26.605363] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.605390] __asan_report_load4_noabort+0x18/0x20 [ 26.605415] kasan_atomics_helper+0x4b54/0x5450 [ 26.605439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.605461] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.605486] ? kasan_save_alloc_info+0x3b/0x50 [ 26.605514] kasan_atomics+0x1dc/0x310 [ 26.605539] ? __pfx_kasan_atomics+0x10/0x10 [ 26.605564] ? __pfx_read_tsc+0x10/0x10 [ 26.605587] ? ktime_get_ts64+0x86/0x230 [ 26.605611] kunit_try_run_case+0x1a5/0x480 [ 26.605634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.605655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.605680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.605718] ? __kthread_parkme+0x82/0x180 [ 26.605739] ? preempt_count_sub+0x50/0x80 [ 26.605764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.605797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.605823] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.605850] kthread+0x337/0x6f0 [ 26.605871] ? trace_preempt_on+0x20/0xc0 [ 26.605939] ? __pfx_kthread+0x10/0x10 [ 26.605963] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.605987] ? calculate_sigpending+0x7b/0xa0 [ 26.606011] ? __pfx_kthread+0x10/0x10 [ 26.606034] ret_from_fork+0x116/0x1d0 [ 26.606055] ? __pfx_kthread+0x10/0x10 [ 26.606077] ret_from_fork_asm+0x1a/0x30 [ 26.606110] </TASK> [ 26.606121] [ 26.613421] Allocated by task 315: [ 26.613549] kasan_save_stack+0x45/0x70 [ 26.613689] kasan_save_track+0x18/0x40 [ 26.614067] kasan_save_alloc_info+0x3b/0x50 [ 26.614284] __kasan_kmalloc+0xb7/0xc0 [ 26.614478] __kmalloc_cache_noprof+0x189/0x420 [ 26.614687] kasan_atomics+0x95/0x310 [ 26.614959] kunit_try_run_case+0x1a5/0x480 [ 26.615139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.615357] kthread+0x337/0x6f0 [ 26.615506] ret_from_fork+0x116/0x1d0 [ 26.615680] ret_from_fork_asm+0x1a/0x30 [ 26.615959] [ 26.616042] The buggy address belongs to the object at ffff8881058d6700 [ 26.616042] which belongs to the cache kmalloc-64 of size 64 [ 26.616449] The buggy address is located 0 bytes to the right of [ 26.616449] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.617065] [ 26.617178] The buggy address belongs to the physical page: [ 26.617432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.617846] flags: 0x200000000000000(node=0|zone=2) [ 26.618254] page_type: f5(slab) [ 26.618431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.618724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.619095] page dumped because: kasan: bad access detected [ 26.619269] [ 26.619335] Memory state around the buggy address: [ 26.619555] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.620026] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.620247] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.620456] ^ [ 26.620608] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.621355] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.621686] ================================================================== [ 26.867047] ================================================================== [ 26.867765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 26.868587] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.869252] [ 26.869476] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.869532] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.869547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.869584] Call Trace: [ 26.869601] <TASK> [ 26.869623] dump_stack_lvl+0x73/0xb0 [ 26.869670] print_report+0xd1/0x610 [ 26.869704] ? __virt_addr_valid+0x1db/0x2d0 [ 26.869731] ? kasan_atomics_helper+0x992/0x5450 [ 26.869763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.869800] ? kasan_atomics_helper+0x992/0x5450 [ 26.869834] kasan_report+0x141/0x180 [ 26.869857] ? kasan_atomics_helper+0x992/0x5450 [ 26.869884] kasan_check_range+0x10c/0x1c0 [ 26.869908] __kasan_check_write+0x18/0x20 [ 26.869932] kasan_atomics_helper+0x992/0x5450 [ 26.869955] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.869978] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.870004] ? kasan_save_alloc_info+0x3b/0x50 [ 26.870033] kasan_atomics+0x1dc/0x310 [ 26.870057] ? __pfx_kasan_atomics+0x10/0x10 [ 26.870082] ? __pfx_read_tsc+0x10/0x10 [ 26.870106] ? ktime_get_ts64+0x86/0x230 [ 26.870133] kunit_try_run_case+0x1a5/0x480 [ 26.870156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.870178] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.870203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.870228] ? __kthread_parkme+0x82/0x180 [ 26.870251] ? preempt_count_sub+0x50/0x80 [ 26.870275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.870298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.870324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.870351] kthread+0x337/0x6f0 [ 26.870372] ? trace_preempt_on+0x20/0xc0 [ 26.870397] ? __pfx_kthread+0x10/0x10 [ 26.870418] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.870442] ? calculate_sigpending+0x7b/0xa0 [ 26.870467] ? __pfx_kthread+0x10/0x10 [ 26.870490] ret_from_fork+0x116/0x1d0 [ 26.870511] ? __pfx_kthread+0x10/0x10 [ 26.870532] ret_from_fork_asm+0x1a/0x30 [ 26.870564] </TASK> [ 26.870577] [ 26.883119] Allocated by task 315: [ 26.883466] kasan_save_stack+0x45/0x70 [ 26.883791] kasan_save_track+0x18/0x40 [ 26.883932] kasan_save_alloc_info+0x3b/0x50 [ 26.884348] __kasan_kmalloc+0xb7/0xc0 [ 26.884711] __kmalloc_cache_noprof+0x189/0x420 [ 26.885045] kasan_atomics+0x95/0x310 [ 26.885187] kunit_try_run_case+0x1a5/0x480 [ 26.885538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.886180] kthread+0x337/0x6f0 [ 26.886410] ret_from_fork+0x116/0x1d0 [ 26.886658] ret_from_fork_asm+0x1a/0x30 [ 26.886828] [ 26.886963] The buggy address belongs to the object at ffff8881058d6700 [ 26.886963] which belongs to the cache kmalloc-64 of size 64 [ 26.887567] The buggy address is located 0 bytes to the right of [ 26.887567] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.888139] [ 26.888317] The buggy address belongs to the physical page: [ 26.888594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.888883] flags: 0x200000000000000(node=0|zone=2) [ 26.889336] page_type: f5(slab) [ 26.889631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.890308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.890994] page dumped because: kasan: bad access detected [ 26.891409] [ 26.891477] Memory state around the buggy address: [ 26.891629] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.892046] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.892662] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.893286] ^ [ 26.893718] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.894453] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.894666] ================================================================== [ 27.014064] ================================================================== [ 27.014446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 27.014830] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.015156] [ 27.015265] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.015326] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.015342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.015364] Call Trace: [ 27.015393] <TASK> [ 27.015411] dump_stack_lvl+0x73/0xb0 [ 27.015443] print_report+0xd1/0x610 [ 27.015466] ? __virt_addr_valid+0x1db/0x2d0 [ 27.015500] ? kasan_atomics_helper+0xde0/0x5450 [ 27.015522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.015549] ? kasan_atomics_helper+0xde0/0x5450 [ 27.015582] kasan_report+0x141/0x180 [ 27.015605] ? kasan_atomics_helper+0xde0/0x5450 [ 27.015631] kasan_check_range+0x10c/0x1c0 [ 27.015656] __kasan_check_write+0x18/0x20 [ 27.015679] kasan_atomics_helper+0xde0/0x5450 [ 27.015721] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.015744] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.015768] ? kasan_save_alloc_info+0x3b/0x50 [ 27.015821] kasan_atomics+0x1dc/0x310 [ 27.015844] ? __pfx_kasan_atomics+0x10/0x10 [ 27.015868] ? __pfx_read_tsc+0x10/0x10 [ 27.015891] ? ktime_get_ts64+0x86/0x230 [ 27.015917] kunit_try_run_case+0x1a5/0x480 [ 27.015940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.015961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.015986] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.016011] ? __kthread_parkme+0x82/0x180 [ 27.016032] ? preempt_count_sub+0x50/0x80 [ 27.016057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.016079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.016105] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.016132] kthread+0x337/0x6f0 [ 27.016153] ? trace_preempt_on+0x20/0xc0 [ 27.016177] ? __pfx_kthread+0x10/0x10 [ 27.016208] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.016231] ? calculate_sigpending+0x7b/0xa0 [ 27.016267] ? __pfx_kthread+0x10/0x10 [ 27.016290] ret_from_fork+0x116/0x1d0 [ 27.016311] ? __pfx_kthread+0x10/0x10 [ 27.016332] ret_from_fork_asm+0x1a/0x30 [ 27.016364] </TASK> [ 27.016376] [ 27.024284] Allocated by task 315: [ 27.024467] kasan_save_stack+0x45/0x70 [ 27.024645] kasan_save_track+0x18/0x40 [ 27.024845] kasan_save_alloc_info+0x3b/0x50 [ 27.025044] __kasan_kmalloc+0xb7/0xc0 [ 27.025235] __kmalloc_cache_noprof+0x189/0x420 [ 27.025435] kasan_atomics+0x95/0x310 [ 27.025614] kunit_try_run_case+0x1a5/0x480 [ 27.025879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.026106] kthread+0x337/0x6f0 [ 27.026264] ret_from_fork+0x116/0x1d0 [ 27.026397] ret_from_fork_asm+0x1a/0x30 [ 27.026540] [ 27.026652] The buggy address belongs to the object at ffff8881058d6700 [ 27.026652] which belongs to the cache kmalloc-64 of size 64 [ 27.027122] The buggy address is located 0 bytes to the right of [ 27.027122] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.027893] [ 27.027963] The buggy address belongs to the physical page: [ 27.028230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.028485] flags: 0x200000000000000(node=0|zone=2) [ 27.028645] page_type: f5(slab) [ 27.028775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.029005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.029524] page dumped because: kasan: bad access detected [ 27.029779] [ 27.029868] Memory state around the buggy address: [ 27.030083] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.030522] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.030753] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.031070] ^ [ 27.031256] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.031534] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.031755] ================================================================== [ 27.072372] ================================================================== [ 27.072740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 27.073437] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.073833] [ 27.073947] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.074015] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.074031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.074055] Call Trace: [ 27.074077] <TASK> [ 27.074097] dump_stack_lvl+0x73/0xb0 [ 27.074130] print_report+0xd1/0x610 [ 27.074153] ? __virt_addr_valid+0x1db/0x2d0 [ 27.074179] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.074201] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.074230] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.074253] kasan_report+0x141/0x180 [ 27.074276] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.074312] kasan_check_range+0x10c/0x1c0 [ 27.074337] __kasan_check_write+0x18/0x20 [ 27.074371] kasan_atomics_helper+0xfa9/0x5450 [ 27.074395] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.074418] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.074444] ? kasan_save_alloc_info+0x3b/0x50 [ 27.074473] kasan_atomics+0x1dc/0x310 [ 27.074506] ? __pfx_kasan_atomics+0x10/0x10 [ 27.074532] ? __pfx_read_tsc+0x10/0x10 [ 27.074567] ? ktime_get_ts64+0x86/0x230 [ 27.074595] kunit_try_run_case+0x1a5/0x480 [ 27.074623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.074645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.074679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.074721] ? __kthread_parkme+0x82/0x180 [ 27.074743] ? preempt_count_sub+0x50/0x80 [ 27.074767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.074799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.074825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.074852] kthread+0x337/0x6f0 [ 27.074882] ? trace_preempt_on+0x20/0xc0 [ 27.074907] ? __pfx_kthread+0x10/0x10 [ 27.074929] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.074962] ? calculate_sigpending+0x7b/0xa0 [ 27.074988] ? __pfx_kthread+0x10/0x10 [ 27.075011] ret_from_fork+0x116/0x1d0 [ 27.075032] ? __pfx_kthread+0x10/0x10 [ 27.075063] ret_from_fork_asm+0x1a/0x30 [ 27.075096] </TASK> [ 27.075109] [ 27.082504] Allocated by task 315: [ 27.082632] kasan_save_stack+0x45/0x70 [ 27.082883] kasan_save_track+0x18/0x40 [ 27.083072] kasan_save_alloc_info+0x3b/0x50 [ 27.083339] __kasan_kmalloc+0xb7/0xc0 [ 27.083538] __kmalloc_cache_noprof+0x189/0x420 [ 27.083766] kasan_atomics+0x95/0x310 [ 27.083927] kunit_try_run_case+0x1a5/0x480 [ 27.084069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.084314] kthread+0x337/0x6f0 [ 27.084506] ret_from_fork+0x116/0x1d0 [ 27.084704] ret_from_fork_asm+0x1a/0x30 [ 27.084922] [ 27.085005] The buggy address belongs to the object at ffff8881058d6700 [ 27.085005] which belongs to the cache kmalloc-64 of size 64 [ 27.085492] The buggy address is located 0 bytes to the right of [ 27.085492] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.086058] [ 27.086131] The buggy address belongs to the physical page: [ 27.086299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.086536] flags: 0x200000000000000(node=0|zone=2) [ 27.086709] page_type: f5(slab) [ 27.087035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.087371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.087707] page dumped because: kasan: bad access detected [ 27.088210] [ 27.088287] Memory state around the buggy address: [ 27.088439] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.088650] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.088993] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.089339] ^ [ 27.089590] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.089976] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.090254] ================================================================== [ 27.151077] ================================================================== [ 27.151864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 27.152248] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.152494] [ 27.152581] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.152636] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.152651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.152675] Call Trace: [ 27.152707] <TASK> [ 27.152732] dump_stack_lvl+0x73/0xb0 [ 27.152766] print_report+0xd1/0x610 [ 27.152790] ? __virt_addr_valid+0x1db/0x2d0 [ 27.152816] ? kasan_atomics_helper+0x1148/0x5450 [ 27.152839] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.152866] ? kasan_atomics_helper+0x1148/0x5450 [ 27.152889] kasan_report+0x141/0x180 [ 27.152912] ? kasan_atomics_helper+0x1148/0x5450 [ 27.152939] kasan_check_range+0x10c/0x1c0 [ 27.152964] __kasan_check_write+0x18/0x20 [ 27.153011] kasan_atomics_helper+0x1148/0x5450 [ 27.153035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.153058] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.153095] ? kasan_save_alloc_info+0x3b/0x50 [ 27.153124] kasan_atomics+0x1dc/0x310 [ 27.153148] ? __pfx_kasan_atomics+0x10/0x10 [ 27.153173] ? __pfx_read_tsc+0x10/0x10 [ 27.153198] ? ktime_get_ts64+0x86/0x230 [ 27.153226] kunit_try_run_case+0x1a5/0x480 [ 27.153250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.153272] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.153297] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.153323] ? __kthread_parkme+0x82/0x180 [ 27.153346] ? preempt_count_sub+0x50/0x80 [ 27.153371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.153394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.153420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.153447] kthread+0x337/0x6f0 [ 27.153468] ? trace_preempt_on+0x20/0xc0 [ 27.153504] ? __pfx_kthread+0x10/0x10 [ 27.153527] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.153550] ? calculate_sigpending+0x7b/0xa0 [ 27.153587] ? __pfx_kthread+0x10/0x10 [ 27.153610] ret_from_fork+0x116/0x1d0 [ 27.153631] ? __pfx_kthread+0x10/0x10 [ 27.153664] ret_from_fork_asm+0x1a/0x30 [ 27.153707] </TASK> [ 27.153719] [ 27.161286] Allocated by task 315: [ 27.161496] kasan_save_stack+0x45/0x70 [ 27.161718] kasan_save_track+0x18/0x40 [ 27.162061] kasan_save_alloc_info+0x3b/0x50 [ 27.162265] __kasan_kmalloc+0xb7/0xc0 [ 27.162395] __kmalloc_cache_noprof+0x189/0x420 [ 27.162547] kasan_atomics+0x95/0x310 [ 27.162677] kunit_try_run_case+0x1a5/0x480 [ 27.163012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.163264] kthread+0x337/0x6f0 [ 27.163428] ret_from_fork+0x116/0x1d0 [ 27.163614] ret_from_fork_asm+0x1a/0x30 [ 27.163854] [ 27.163932] The buggy address belongs to the object at ffff8881058d6700 [ 27.163932] which belongs to the cache kmalloc-64 of size 64 [ 27.164283] The buggy address is located 0 bytes to the right of [ 27.164283] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.164916] [ 27.165008] The buggy address belongs to the physical page: [ 27.165211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.165450] flags: 0x200000000000000(node=0|zone=2) [ 27.165612] page_type: f5(slab) [ 27.165756] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.166125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.166452] page dumped because: kasan: bad access detected [ 27.166705] [ 27.166797] Memory state around the buggy address: [ 27.167015] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.167269] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.167478] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.167685] ^ [ 27.167964] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.168281] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.168617] ================================================================== [ 27.665994] ================================================================== [ 27.666703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 27.667165] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.667591] [ 27.667767] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.667837] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.667853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.667876] Call Trace: [ 27.667896] <TASK> [ 27.667917] dump_stack_lvl+0x73/0xb0 [ 27.667951] print_report+0xd1/0x610 [ 27.667976] ? __virt_addr_valid+0x1db/0x2d0 [ 27.668007] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.668030] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.668057] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.668079] kasan_report+0x141/0x180 [ 27.668102] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.668129] kasan_check_range+0x10c/0x1c0 [ 27.668152] __kasan_check_write+0x18/0x20 [ 27.668176] kasan_atomics_helper+0x1e12/0x5450 [ 27.668200] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.668221] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.668246] ? kasan_save_alloc_info+0x3b/0x50 [ 27.668275] kasan_atomics+0x1dc/0x310 [ 27.668297] ? __pfx_kasan_atomics+0x10/0x10 [ 27.668321] ? __pfx_read_tsc+0x10/0x10 [ 27.668345] ? ktime_get_ts64+0x86/0x230 [ 27.668372] kunit_try_run_case+0x1a5/0x480 [ 27.668396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.668416] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.668441] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.668466] ? __kthread_parkme+0x82/0x180 [ 27.668488] ? preempt_count_sub+0x50/0x80 [ 27.668512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.668535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.668561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.668588] kthread+0x337/0x6f0 [ 27.668608] ? trace_preempt_on+0x20/0xc0 [ 27.668633] ? __pfx_kthread+0x10/0x10 [ 27.668654] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.668677] ? calculate_sigpending+0x7b/0xa0 [ 27.668714] ? __pfx_kthread+0x10/0x10 [ 27.668737] ret_from_fork+0x116/0x1d0 [ 27.668758] ? __pfx_kthread+0x10/0x10 [ 27.668789] ret_from_fork_asm+0x1a/0x30 [ 27.668822] </TASK> [ 27.668834] [ 27.675947] Allocated by task 315: [ 27.676124] kasan_save_stack+0x45/0x70 [ 27.676329] kasan_save_track+0x18/0x40 [ 27.676517] kasan_save_alloc_info+0x3b/0x50 [ 27.676735] __kasan_kmalloc+0xb7/0xc0 [ 27.676921] __kmalloc_cache_noprof+0x189/0x420 [ 27.677101] kasan_atomics+0x95/0x310 [ 27.677230] kunit_try_run_case+0x1a5/0x480 [ 27.677426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.677678] kthread+0x337/0x6f0 [ 27.677852] ret_from_fork+0x116/0x1d0 [ 27.677983] ret_from_fork_asm+0x1a/0x30 [ 27.678154] [ 27.678245] The buggy address belongs to the object at ffff8881058d6700 [ 27.678245] which belongs to the cache kmalloc-64 of size 64 [ 27.678746] The buggy address is located 0 bytes to the right of [ 27.678746] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.679223] [ 27.679293] The buggy address belongs to the physical page: [ 27.679543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.679922] flags: 0x200000000000000(node=0|zone=2) [ 27.680103] page_type: f5(slab) [ 27.680220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.680447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.680666] page dumped because: kasan: bad access detected [ 27.680867] [ 27.680955] Memory state around the buggy address: [ 27.681177] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.681500] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.681825] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.682039] ^ [ 27.682191] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.682400] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.682679] ================================================================== [ 27.804672] ================================================================== [ 27.805430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 27.806014] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.806345] [ 27.806454] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.806509] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.806525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.806548] Call Trace: [ 27.806570] <TASK> [ 27.806590] dump_stack_lvl+0x73/0xb0 [ 27.806622] print_report+0xd1/0x610 [ 27.806645] ? __virt_addr_valid+0x1db/0x2d0 [ 27.806671] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.806705] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.806732] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.806754] kasan_report+0x141/0x180 [ 27.806777] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.806804] __asan_report_load8_noabort+0x18/0x20 [ 27.806854] kasan_atomics_helper+0x4fb2/0x5450 [ 27.806893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.806918] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.806972] ? kasan_save_alloc_info+0x3b/0x50 [ 27.807000] kasan_atomics+0x1dc/0x310 [ 27.807023] ? __pfx_kasan_atomics+0x10/0x10 [ 27.807048] ? __pfx_read_tsc+0x10/0x10 [ 27.807071] ? ktime_get_ts64+0x86/0x230 [ 27.807098] kunit_try_run_case+0x1a5/0x480 [ 27.807121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.807142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.807167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.807192] ? __kthread_parkme+0x82/0x180 [ 27.807215] ? preempt_count_sub+0x50/0x80 [ 27.807239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.807280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.807319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.807346] kthread+0x337/0x6f0 [ 27.807380] ? trace_preempt_on+0x20/0xc0 [ 27.807417] ? __pfx_kthread+0x10/0x10 [ 27.807439] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.807462] ? calculate_sigpending+0x7b/0xa0 [ 27.807486] ? __pfx_kthread+0x10/0x10 [ 27.807509] ret_from_fork+0x116/0x1d0 [ 27.807530] ? __pfx_kthread+0x10/0x10 [ 27.807551] ret_from_fork_asm+0x1a/0x30 [ 27.807584] </TASK> [ 27.807597] [ 27.814836] Allocated by task 315: [ 27.815037] kasan_save_stack+0x45/0x70 [ 27.815244] kasan_save_track+0x18/0x40 [ 27.815424] kasan_save_alloc_info+0x3b/0x50 [ 27.815582] __kasan_kmalloc+0xb7/0xc0 [ 27.815790] __kmalloc_cache_noprof+0x189/0x420 [ 27.816111] kasan_atomics+0x95/0x310 [ 27.816325] kunit_try_run_case+0x1a5/0x480 [ 27.816518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.816753] kthread+0x337/0x6f0 [ 27.816899] ret_from_fork+0x116/0x1d0 [ 27.817025] ret_from_fork_asm+0x1a/0x30 [ 27.817341] [ 27.817433] The buggy address belongs to the object at ffff8881058d6700 [ 27.817433] which belongs to the cache kmalloc-64 of size 64 [ 27.817957] The buggy address is located 0 bytes to the right of [ 27.817957] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.818564] [ 27.818661] The buggy address belongs to the physical page: [ 27.819127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.819467] flags: 0x200000000000000(node=0|zone=2) [ 27.819646] page_type: f5(slab) [ 27.819772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.819997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.820211] page dumped because: kasan: bad access detected [ 27.820592] [ 27.820680] Memory state around the buggy address: [ 27.821018] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.821356] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.821702] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.822053] ^ [ 27.822419] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.822754] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.823074] ================================================================== [ 26.552370] ================================================================== [ 26.552652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 26.552894] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.553111] [ 26.553191] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.553238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.553253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.553276] Call Trace: [ 26.553292] <TASK> [ 26.553311] dump_stack_lvl+0x73/0xb0 [ 26.553340] print_report+0xd1/0x610 [ 26.553361] ? __virt_addr_valid+0x1db/0x2d0 [ 26.553386] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.553407] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.553433] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.553455] kasan_report+0x141/0x180 [ 26.553476] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.553502] __asan_report_load4_noabort+0x18/0x20 [ 26.553526] kasan_atomics_helper+0x4b88/0x5450 [ 26.553548] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.553572] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.553596] ? kasan_save_alloc_info+0x3b/0x50 [ 26.553624] kasan_atomics+0x1dc/0x310 [ 26.553647] ? __pfx_kasan_atomics+0x10/0x10 [ 26.553671] ? __pfx_read_tsc+0x10/0x10 [ 26.553704] ? ktime_get_ts64+0x86/0x230 [ 26.553732] kunit_try_run_case+0x1a5/0x480 [ 26.553754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.553775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.553800] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.553824] ? __kthread_parkme+0x82/0x180 [ 26.553845] ? preempt_count_sub+0x50/0x80 [ 26.553868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.553890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.553915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.553941] kthread+0x337/0x6f0 [ 26.553961] ? trace_preempt_on+0x20/0xc0 [ 26.553985] ? __pfx_kthread+0x10/0x10 [ 26.554006] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.554027] ? calculate_sigpending+0x7b/0xa0 [ 26.554105] ? __pfx_kthread+0x10/0x10 [ 26.554132] ret_from_fork+0x116/0x1d0 [ 26.554153] ? __pfx_kthread+0x10/0x10 [ 26.554176] ret_from_fork_asm+0x1a/0x30 [ 26.554208] </TASK> [ 26.554221] [ 26.561419] Allocated by task 315: [ 26.561568] kasan_save_stack+0x45/0x70 [ 26.561736] kasan_save_track+0x18/0x40 [ 26.561918] kasan_save_alloc_info+0x3b/0x50 [ 26.562132] __kasan_kmalloc+0xb7/0xc0 [ 26.562265] __kmalloc_cache_noprof+0x189/0x420 [ 26.562417] kasan_atomics+0x95/0x310 [ 26.562549] kunit_try_run_case+0x1a5/0x480 [ 26.562705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.563109] kthread+0x337/0x6f0 [ 26.563283] ret_from_fork+0x116/0x1d0 [ 26.563468] ret_from_fork_asm+0x1a/0x30 [ 26.563660] [ 26.563761] The buggy address belongs to the object at ffff8881058d6700 [ 26.563761] which belongs to the cache kmalloc-64 of size 64 [ 26.564422] The buggy address is located 0 bytes to the right of [ 26.564422] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.564794] [ 26.564953] The buggy address belongs to the physical page: [ 26.565175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.565413] flags: 0x200000000000000(node=0|zone=2) [ 26.565573] page_type: f5(slab) [ 26.565709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.566342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.566648] page dumped because: kasan: bad access detected [ 26.566931] [ 26.567004] Memory state around the buggy address: [ 26.567157] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.567368] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.567578] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.567856] ^ [ 26.568025] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.568332] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.568649] ================================================================== [ 26.644500] ================================================================== [ 26.644906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 26.645353] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.645598] [ 26.645679] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.645743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.645757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.645779] Call Trace: [ 26.645793] <TASK> [ 26.645811] dump_stack_lvl+0x73/0xb0 [ 26.645840] print_report+0xd1/0x610 [ 26.646085] ? __virt_addr_valid+0x1db/0x2d0 [ 26.646116] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.646140] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.646167] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.646189] kasan_report+0x141/0x180 [ 26.646212] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.646239] __asan_report_store4_noabort+0x1b/0x30 [ 26.646264] kasan_atomics_helper+0x4b3a/0x5450 [ 26.646287] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.646310] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.646335] ? kasan_save_alloc_info+0x3b/0x50 [ 26.646363] kasan_atomics+0x1dc/0x310 [ 26.646391] ? __pfx_kasan_atomics+0x10/0x10 [ 26.646418] ? __pfx_read_tsc+0x10/0x10 [ 26.646442] ? ktime_get_ts64+0x86/0x230 [ 26.646468] kunit_try_run_case+0x1a5/0x480 [ 26.646491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.646513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.646538] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.646563] ? __kthread_parkme+0x82/0x180 [ 26.646585] ? preempt_count_sub+0x50/0x80 [ 26.646611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.646654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.646681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.646718] kthread+0x337/0x6f0 [ 26.646740] ? trace_preempt_on+0x20/0xc0 [ 26.646765] ? __pfx_kthread+0x10/0x10 [ 26.646797] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.646821] ? calculate_sigpending+0x7b/0xa0 [ 26.646846] ? __pfx_kthread+0x10/0x10 [ 26.646869] ret_from_fork+0x116/0x1d0 [ 26.646938] ? __pfx_kthread+0x10/0x10 [ 26.646961] ret_from_fork_asm+0x1a/0x30 [ 26.646993] </TASK> [ 26.647005] [ 26.654756] Allocated by task 315: [ 26.655005] kasan_save_stack+0x45/0x70 [ 26.655291] kasan_save_track+0x18/0x40 [ 26.655509] kasan_save_alloc_info+0x3b/0x50 [ 26.655704] __kasan_kmalloc+0xb7/0xc0 [ 26.655973] __kmalloc_cache_noprof+0x189/0x420 [ 26.656368] kasan_atomics+0x95/0x310 [ 26.656503] kunit_try_run_case+0x1a5/0x480 [ 26.656714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.656967] kthread+0x337/0x6f0 [ 26.657195] ret_from_fork+0x116/0x1d0 [ 26.657404] ret_from_fork_asm+0x1a/0x30 [ 26.657546] [ 26.657614] The buggy address belongs to the object at ffff8881058d6700 [ 26.657614] which belongs to the cache kmalloc-64 of size 64 [ 26.658135] The buggy address is located 0 bytes to the right of [ 26.658135] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.658595] [ 26.658804] The buggy address belongs to the physical page: [ 26.659119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.659481] flags: 0x200000000000000(node=0|zone=2) [ 26.659645] page_type: f5(slab) [ 26.659776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.660008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.660647] page dumped because: kasan: bad access detected [ 26.660890] [ 26.660958] Memory state around the buggy address: [ 26.661109] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.661423] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.661736] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.662537] ^ [ 26.662918] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.663278] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.663520] ================================================================== [ 26.624119] ================================================================== [ 26.624531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 26.625337] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.626012] [ 26.626143] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.626339] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.626355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.626379] Call Trace: [ 26.626401] <TASK> [ 26.626418] dump_stack_lvl+0x73/0xb0 [ 26.626449] print_report+0xd1/0x610 [ 26.626471] ? __virt_addr_valid+0x1db/0x2d0 [ 26.626496] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.626519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.626545] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.626568] kasan_report+0x141/0x180 [ 26.626591] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.626617] kasan_check_range+0x10c/0x1c0 [ 26.626641] __kasan_check_write+0x18/0x20 [ 26.626665] kasan_atomics_helper+0x4a0/0x5450 [ 26.626688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.626722] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.626747] ? kasan_save_alloc_info+0x3b/0x50 [ 26.626776] kasan_atomics+0x1dc/0x310 [ 26.626799] ? __pfx_kasan_atomics+0x10/0x10 [ 26.626824] ? __pfx_read_tsc+0x10/0x10 [ 26.626847] ? ktime_get_ts64+0x86/0x230 [ 26.626873] kunit_try_run_case+0x1a5/0x480 [ 26.626905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.626926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.626952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.626977] ? __kthread_parkme+0x82/0x180 [ 26.626999] ? preempt_count_sub+0x50/0x80 [ 26.627023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.627046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.627074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.627100] kthread+0x337/0x6f0 [ 26.627121] ? trace_preempt_on+0x20/0xc0 [ 26.627145] ? __pfx_kthread+0x10/0x10 [ 26.627167] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.627190] ? calculate_sigpending+0x7b/0xa0 [ 26.627215] ? __pfx_kthread+0x10/0x10 [ 26.627238] ret_from_fork+0x116/0x1d0 [ 26.627259] ? __pfx_kthread+0x10/0x10 [ 26.627281] ret_from_fork_asm+0x1a/0x30 [ 26.627313] </TASK> [ 26.627326] [ 26.635730] Allocated by task 315: [ 26.636011] kasan_save_stack+0x45/0x70 [ 26.636165] kasan_save_track+0x18/0x40 [ 26.636301] kasan_save_alloc_info+0x3b/0x50 [ 26.636524] __kasan_kmalloc+0xb7/0xc0 [ 26.636714] __kmalloc_cache_noprof+0x189/0x420 [ 26.636867] kasan_atomics+0x95/0x310 [ 26.637212] kunit_try_run_case+0x1a5/0x480 [ 26.637427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.637656] kthread+0x337/0x6f0 [ 26.637786] ret_from_fork+0x116/0x1d0 [ 26.637917] ret_from_fork_asm+0x1a/0x30 [ 26.638056] [ 26.638139] The buggy address belongs to the object at ffff8881058d6700 [ 26.638139] which belongs to the cache kmalloc-64 of size 64 [ 26.638769] The buggy address is located 0 bytes to the right of [ 26.638769] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.639578] [ 26.639714] The buggy address belongs to the physical page: [ 26.640246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.640532] flags: 0x200000000000000(node=0|zone=2) [ 26.640796] page_type: f5(slab) [ 26.641053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.641281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.641495] page dumped because: kasan: bad access detected [ 26.641657] [ 26.641752] Memory state around the buggy address: [ 26.641979] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.642302] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.642623] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.643050] ^ [ 26.643279] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.643569] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.643939] ================================================================== [ 26.765430] ================================================================== [ 26.765706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 26.766056] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.766368] [ 26.766455] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.766522] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.766538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.766561] Call Trace: [ 26.766580] <TASK> [ 26.766599] dump_stack_lvl+0x73/0xb0 [ 26.766630] print_report+0xd1/0x610 [ 26.766655] ? __virt_addr_valid+0x1db/0x2d0 [ 26.766681] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.766717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.766744] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.766765] kasan_report+0x141/0x180 [ 26.766789] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.766817] kasan_check_range+0x10c/0x1c0 [ 26.766852] __kasan_check_write+0x18/0x20 [ 26.766877] kasan_atomics_helper+0x7c7/0x5450 [ 26.766916] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.766940] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.766965] ? kasan_save_alloc_info+0x3b/0x50 [ 26.766993] kasan_atomics+0x1dc/0x310 [ 26.767017] ? __pfx_kasan_atomics+0x10/0x10 [ 26.767041] ? __pfx_read_tsc+0x10/0x10 [ 26.767065] ? ktime_get_ts64+0x86/0x230 [ 26.767091] kunit_try_run_case+0x1a5/0x480 [ 26.767116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.767136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.767162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.767187] ? __kthread_parkme+0x82/0x180 [ 26.767208] ? preempt_count_sub+0x50/0x80 [ 26.767234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.767256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.767282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.767308] kthread+0x337/0x6f0 [ 26.767328] ? trace_preempt_on+0x20/0xc0 [ 26.767353] ? __pfx_kthread+0x10/0x10 [ 26.767376] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.767399] ? calculate_sigpending+0x7b/0xa0 [ 26.767425] ? __pfx_kthread+0x10/0x10 [ 26.767448] ret_from_fork+0x116/0x1d0 [ 26.767470] ? __pfx_kthread+0x10/0x10 [ 26.767492] ret_from_fork_asm+0x1a/0x30 [ 26.767525] </TASK> [ 26.767538] [ 26.778466] Allocated by task 315: [ 26.778607] kasan_save_stack+0x45/0x70 [ 26.778967] kasan_save_track+0x18/0x40 [ 26.780815] kasan_save_alloc_info+0x3b/0x50 [ 26.781510] __kasan_kmalloc+0xb7/0xc0 [ 26.781676] __kmalloc_cache_noprof+0x189/0x420 [ 26.781853] kasan_atomics+0x95/0x310 [ 26.781985] kunit_try_run_case+0x1a5/0x480 [ 26.782126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.782297] kthread+0x337/0x6f0 [ 26.782415] ret_from_fork+0x116/0x1d0 [ 26.782546] ret_from_fork_asm+0x1a/0x30 [ 26.782685] [ 26.784142] The buggy address belongs to the object at ffff8881058d6700 [ 26.784142] which belongs to the cache kmalloc-64 of size 64 [ 26.786138] The buggy address is located 0 bytes to the right of [ 26.786138] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.787852] [ 26.788269] The buggy address belongs to the physical page: [ 26.789333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.790389] flags: 0x200000000000000(node=0|zone=2) [ 26.791029] page_type: f5(slab) [ 26.791490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.791989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.793030] page dumped because: kasan: bad access detected [ 26.793714] [ 26.794095] Memory state around the buggy address: [ 26.794602] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.795650] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.796372] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.796605] ^ [ 26.797040] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.798032] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.798796] ================================================================== [ 27.823629] ================================================================== [ 27.824096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 27.824485] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.826983] [ 27.827517] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.827578] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.827594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.827618] Call Trace: [ 27.827638] <TASK> [ 27.827658] dump_stack_lvl+0x73/0xb0 [ 27.827709] print_report+0xd1/0x610 [ 27.827733] ? __virt_addr_valid+0x1db/0x2d0 [ 27.827892] ? kasan_atomics_helper+0x218a/0x5450 [ 27.827929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.827959] ? kasan_atomics_helper+0x218a/0x5450 [ 27.827982] kasan_report+0x141/0x180 [ 27.828006] ? kasan_atomics_helper+0x218a/0x5450 [ 27.828034] kasan_check_range+0x10c/0x1c0 [ 27.828095] __kasan_check_write+0x18/0x20 [ 27.828160] kasan_atomics_helper+0x218a/0x5450 [ 27.828186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.828221] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.828247] ? kasan_save_alloc_info+0x3b/0x50 [ 27.828279] kasan_atomics+0x1dc/0x310 [ 27.828305] ? __pfx_kasan_atomics+0x10/0x10 [ 27.828330] ? __pfx_read_tsc+0x10/0x10 [ 27.828354] ? ktime_get_ts64+0x86/0x230 [ 27.828382] kunit_try_run_case+0x1a5/0x480 [ 27.828405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.828427] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.828453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.828478] ? __kthread_parkme+0x82/0x180 [ 27.828499] ? preempt_count_sub+0x50/0x80 [ 27.828524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.828547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.828573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.828599] kthread+0x337/0x6f0 [ 27.828619] ? trace_preempt_on+0x20/0xc0 [ 27.828644] ? __pfx_kthread+0x10/0x10 [ 27.828666] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.828689] ? calculate_sigpending+0x7b/0xa0 [ 27.828727] ? __pfx_kthread+0x10/0x10 [ 27.828751] ret_from_fork+0x116/0x1d0 [ 27.828778] ? __pfx_kthread+0x10/0x10 [ 27.828800] ret_from_fork_asm+0x1a/0x30 [ 27.828831] </TASK> [ 27.828844] [ 27.841478] Allocated by task 315: [ 27.841648] kasan_save_stack+0x45/0x70 [ 27.841813] kasan_save_track+0x18/0x40 [ 27.841946] kasan_save_alloc_info+0x3b/0x50 [ 27.842091] __kasan_kmalloc+0xb7/0xc0 [ 27.842386] __kmalloc_cache_noprof+0x189/0x420 [ 27.842641] kasan_atomics+0x95/0x310 [ 27.842904] kunit_try_run_case+0x1a5/0x480 [ 27.843053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.843224] kthread+0x337/0x6f0 [ 27.843383] ret_from_fork+0x116/0x1d0 [ 27.843571] ret_from_fork_asm+0x1a/0x30 [ 27.843801] [ 27.843901] The buggy address belongs to the object at ffff8881058d6700 [ 27.843901] which belongs to the cache kmalloc-64 of size 64 [ 27.844385] The buggy address is located 0 bytes to the right of [ 27.844385] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.845065] [ 27.845143] The buggy address belongs to the physical page: [ 27.845374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.845706] flags: 0x200000000000000(node=0|zone=2) [ 27.845865] page_type: f5(slab) [ 27.845981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.846275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.846865] page dumped because: kasan: bad access detected [ 27.847104] [ 27.847171] Memory state around the buggy address: [ 27.847316] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.847565] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.848085] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.848459] ^ [ 27.848734] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.849049] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.849346] ================================================================== [ 27.466557] ================================================================== [ 27.467333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 27.468072] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.468391] [ 27.468545] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.468614] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.468629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.468683] Call Trace: [ 27.468723] <TASK> [ 27.468744] dump_stack_lvl+0x73/0xb0 [ 27.468809] print_report+0xd1/0x610 [ 27.468832] ? __virt_addr_valid+0x1db/0x2d0 [ 27.468870] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.468903] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.468929] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.468952] kasan_report+0x141/0x180 [ 27.468974] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.469031] kasan_check_range+0x10c/0x1c0 [ 27.469056] __kasan_check_write+0x18/0x20 [ 27.469089] kasan_atomics_helper+0x18b1/0x5450 [ 27.469113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.469136] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.469161] ? kasan_save_alloc_info+0x3b/0x50 [ 27.469190] kasan_atomics+0x1dc/0x310 [ 27.469214] ? __pfx_kasan_atomics+0x10/0x10 [ 27.469238] ? __pfx_read_tsc+0x10/0x10 [ 27.469262] ? ktime_get_ts64+0x86/0x230 [ 27.469290] kunit_try_run_case+0x1a5/0x480 [ 27.469313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.469335] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.469361] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.469387] ? __kthread_parkme+0x82/0x180 [ 27.469409] ? preempt_count_sub+0x50/0x80 [ 27.469433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.469456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.469482] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.469508] kthread+0x337/0x6f0 [ 27.469529] ? trace_preempt_on+0x20/0xc0 [ 27.469554] ? __pfx_kthread+0x10/0x10 [ 27.469576] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.469599] ? calculate_sigpending+0x7b/0xa0 [ 27.469624] ? __pfx_kthread+0x10/0x10 [ 27.469647] ret_from_fork+0x116/0x1d0 [ 27.469668] ? __pfx_kthread+0x10/0x10 [ 27.469700] ret_from_fork_asm+0x1a/0x30 [ 27.469733] </TASK> [ 27.469746] [ 27.477272] Allocated by task 315: [ 27.477502] kasan_save_stack+0x45/0x70 [ 27.477717] kasan_save_track+0x18/0x40 [ 27.477942] kasan_save_alloc_info+0x3b/0x50 [ 27.478230] __kasan_kmalloc+0xb7/0xc0 [ 27.478430] __kmalloc_cache_noprof+0x189/0x420 [ 27.478641] kasan_atomics+0x95/0x310 [ 27.478803] kunit_try_run_case+0x1a5/0x480 [ 27.479078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.479311] kthread+0x337/0x6f0 [ 27.479487] ret_from_fork+0x116/0x1d0 [ 27.479679] ret_from_fork_asm+0x1a/0x30 [ 27.479977] [ 27.480094] The buggy address belongs to the object at ffff8881058d6700 [ 27.480094] which belongs to the cache kmalloc-64 of size 64 [ 27.480500] The buggy address is located 0 bytes to the right of [ 27.480500] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.481145] [ 27.481216] The buggy address belongs to the physical page: [ 27.481386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.481624] flags: 0x200000000000000(node=0|zone=2) [ 27.482008] page_type: f5(slab) [ 27.482224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.482571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.482918] page dumped because: kasan: bad access detected [ 27.483097] [ 27.483261] Memory state around the buggy address: [ 27.483515] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.483932] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.484214] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.484428] ^ [ 27.484579] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.484958] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.485207] ================================================================== [ 27.899289] ================================================================== [ 27.900200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 27.900887] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.901965] [ 27.902166] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.902224] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.902239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.902263] Call Trace: [ 27.902283] <TASK> [ 27.902304] dump_stack_lvl+0x73/0xb0 [ 27.902338] print_report+0xd1/0x610 [ 27.902361] ? __virt_addr_valid+0x1db/0x2d0 [ 27.902387] ? kasan_atomics_helper+0x5115/0x5450 [ 27.902409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.902436] ? kasan_atomics_helper+0x5115/0x5450 [ 27.902458] kasan_report+0x141/0x180 [ 27.902481] ? kasan_atomics_helper+0x5115/0x5450 [ 27.902508] __asan_report_load8_noabort+0x18/0x20 [ 27.902533] kasan_atomics_helper+0x5115/0x5450 [ 27.902556] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.902579] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.902605] ? kasan_save_alloc_info+0x3b/0x50 [ 27.902634] kasan_atomics+0x1dc/0x310 [ 27.902657] ? __pfx_kasan_atomics+0x10/0x10 [ 27.902681] ? __pfx_read_tsc+0x10/0x10 [ 27.902716] ? ktime_get_ts64+0x86/0x230 [ 27.902742] kunit_try_run_case+0x1a5/0x480 [ 27.902765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.902804] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.902832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.902856] ? __kthread_parkme+0x82/0x180 [ 27.902879] ? preempt_count_sub+0x50/0x80 [ 27.902904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.902926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.902952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.902978] kthread+0x337/0x6f0 [ 27.902998] ? trace_preempt_on+0x20/0xc0 [ 27.903024] ? __pfx_kthread+0x10/0x10 [ 27.903045] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.903068] ? calculate_sigpending+0x7b/0xa0 [ 27.903094] ? __pfx_kthread+0x10/0x10 [ 27.903116] ret_from_fork+0x116/0x1d0 [ 27.903137] ? __pfx_kthread+0x10/0x10 [ 27.903158] ret_from_fork_asm+0x1a/0x30 [ 27.903190] </TASK> [ 27.903203] [ 27.911964] Allocated by task 315: [ 27.912094] kasan_save_stack+0x45/0x70 [ 27.912232] kasan_save_track+0x18/0x40 [ 27.912419] kasan_save_alloc_info+0x3b/0x50 [ 27.912623] __kasan_kmalloc+0xb7/0xc0 [ 27.912839] __kmalloc_cache_noprof+0x189/0x420 [ 27.913056] kasan_atomics+0x95/0x310 [ 27.913236] kunit_try_run_case+0x1a5/0x480 [ 27.913422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.913595] kthread+0x337/0x6f0 [ 27.913726] ret_from_fork+0x116/0x1d0 [ 27.914102] ret_from_fork_asm+0x1a/0x30 [ 27.914299] [ 27.914394] The buggy address belongs to the object at ffff8881058d6700 [ 27.914394] which belongs to the cache kmalloc-64 of size 64 [ 27.914904] The buggy address is located 0 bytes to the right of [ 27.914904] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.915319] [ 27.915411] The buggy address belongs to the physical page: [ 27.915663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.916035] flags: 0x200000000000000(node=0|zone=2) [ 27.916208] page_type: f5(slab) [ 27.916380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.916686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.917071] page dumped because: kasan: bad access detected [ 27.917237] [ 27.917301] Memory state around the buggy address: [ 27.917449] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.917660] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.918198] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.918505] ^ [ 27.918668] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.919178] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.919388] ================================================================== [ 26.918356] ================================================================== [ 26.918709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 26.918953] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.919492] [ 26.919604] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.919657] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.919671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.919708] Call Trace: [ 26.919731] <TASK> [ 26.919767] dump_stack_lvl+0x73/0xb0 [ 26.919802] print_report+0xd1/0x610 [ 26.919834] ? __virt_addr_valid+0x1db/0x2d0 [ 26.919861] ? kasan_atomics_helper+0xac7/0x5450 [ 26.919883] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.919910] ? kasan_atomics_helper+0xac7/0x5450 [ 26.919933] kasan_report+0x141/0x180 [ 26.919955] ? kasan_atomics_helper+0xac7/0x5450 [ 26.920025] kasan_check_range+0x10c/0x1c0 [ 26.920052] __kasan_check_write+0x18/0x20 [ 26.920088] kasan_atomics_helper+0xac7/0x5450 [ 26.920111] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.920134] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.920161] ? kasan_save_alloc_info+0x3b/0x50 [ 26.920190] kasan_atomics+0x1dc/0x310 [ 26.920214] ? __pfx_kasan_atomics+0x10/0x10 [ 26.920239] ? __pfx_read_tsc+0x10/0x10 [ 26.920264] ? ktime_get_ts64+0x86/0x230 [ 26.920292] kunit_try_run_case+0x1a5/0x480 [ 26.920317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.920339] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.920365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.920390] ? __kthread_parkme+0x82/0x180 [ 26.920413] ? preempt_count_sub+0x50/0x80 [ 26.920438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.920460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.920486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.920512] kthread+0x337/0x6f0 [ 26.920534] ? trace_preempt_on+0x20/0xc0 [ 26.920559] ? __pfx_kthread+0x10/0x10 [ 26.920581] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.920604] ? calculate_sigpending+0x7b/0xa0 [ 26.920638] ? __pfx_kthread+0x10/0x10 [ 26.920660] ret_from_fork+0x116/0x1d0 [ 26.920681] ? __pfx_kthread+0x10/0x10 [ 26.920719] ret_from_fork_asm+0x1a/0x30 [ 26.920752] </TASK> [ 26.920766] [ 26.928216] Allocated by task 315: [ 26.928345] kasan_save_stack+0x45/0x70 [ 26.928488] kasan_save_track+0x18/0x40 [ 26.928621] kasan_save_alloc_info+0x3b/0x50 [ 26.928956] __kasan_kmalloc+0xb7/0xc0 [ 26.929147] __kmalloc_cache_noprof+0x189/0x420 [ 26.929401] kasan_atomics+0x95/0x310 [ 26.929630] kunit_try_run_case+0x1a5/0x480 [ 26.929959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.930257] kthread+0x337/0x6f0 [ 26.930378] ret_from_fork+0x116/0x1d0 [ 26.930553] ret_from_fork_asm+0x1a/0x30 [ 26.930750] [ 26.930848] The buggy address belongs to the object at ffff8881058d6700 [ 26.930848] which belongs to the cache kmalloc-64 of size 64 [ 26.931440] The buggy address is located 0 bytes to the right of [ 26.931440] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.932011] [ 26.932091] The buggy address belongs to the physical page: [ 26.932341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.932670] flags: 0x200000000000000(node=0|zone=2) [ 26.932934] page_type: f5(slab) [ 26.933098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.933418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.933672] page dumped because: kasan: bad access detected [ 26.934076] [ 26.934191] Memory state around the buggy address: [ 26.934391] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.934628] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.935155] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.935458] ^ [ 26.935649] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.935985] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.936288] ================================================================== [ 27.369268] ================================================================== [ 27.369505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 27.369796] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.370358] [ 27.370538] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.370587] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.370615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.370638] Call Trace: [ 27.370657] <TASK> [ 27.370685] dump_stack_lvl+0x73/0xb0 [ 27.370723] print_report+0xd1/0x610 [ 27.370745] ? __virt_addr_valid+0x1db/0x2d0 [ 27.370770] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.370793] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.370819] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.370841] kasan_report+0x141/0x180 [ 27.370863] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.370890] kasan_check_range+0x10c/0x1c0 [ 27.370913] __kasan_check_write+0x18/0x20 [ 27.370936] kasan_atomics_helper+0x15b6/0x5450 [ 27.370959] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.370981] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.371005] ? kasan_save_alloc_info+0x3b/0x50 [ 27.371033] kasan_atomics+0x1dc/0x310 [ 27.371056] ? __pfx_kasan_atomics+0x10/0x10 [ 27.371080] ? __pfx_read_tsc+0x10/0x10 [ 27.371103] ? ktime_get_ts64+0x86/0x230 [ 27.371129] kunit_try_run_case+0x1a5/0x480 [ 27.371152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.371172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.371197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.371221] ? __kthread_parkme+0x82/0x180 [ 27.371241] ? preempt_count_sub+0x50/0x80 [ 27.371266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.371304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.371341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.371367] kthread+0x337/0x6f0 [ 27.371399] ? trace_preempt_on+0x20/0xc0 [ 27.371424] ? __pfx_kthread+0x10/0x10 [ 27.371445] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.371469] ? calculate_sigpending+0x7b/0xa0 [ 27.371494] ? __pfx_kthread+0x10/0x10 [ 27.371516] ret_from_fork+0x116/0x1d0 [ 27.371538] ? __pfx_kthread+0x10/0x10 [ 27.371559] ret_from_fork_asm+0x1a/0x30 [ 27.371592] </TASK> [ 27.371604] [ 27.379035] Allocated by task 315: [ 27.379260] kasan_save_stack+0x45/0x70 [ 27.379456] kasan_save_track+0x18/0x40 [ 27.379644] kasan_save_alloc_info+0x3b/0x50 [ 27.379971] __kasan_kmalloc+0xb7/0xc0 [ 27.380147] __kmalloc_cache_noprof+0x189/0x420 [ 27.380415] kasan_atomics+0x95/0x310 [ 27.380617] kunit_try_run_case+0x1a5/0x480 [ 27.380783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.381038] kthread+0x337/0x6f0 [ 27.381263] ret_from_fork+0x116/0x1d0 [ 27.381486] ret_from_fork_asm+0x1a/0x30 [ 27.381626] [ 27.381703] The buggy address belongs to the object at ffff8881058d6700 [ 27.381703] which belongs to the cache kmalloc-64 of size 64 [ 27.382049] The buggy address is located 0 bytes to the right of [ 27.382049] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.382830] [ 27.382924] The buggy address belongs to the physical page: [ 27.383217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.383563] flags: 0x200000000000000(node=0|zone=2) [ 27.383732] page_type: f5(slab) [ 27.383854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.384135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.384604] page dumped because: kasan: bad access detected [ 27.385115] [ 27.385209] Memory state around the buggy address: [ 27.385433] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.385806] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.386124] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.386398] ^ [ 27.386646] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.386997] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.387298] ================================================================== [ 27.722327] ================================================================== [ 27.722672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 27.723040] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.723303] [ 27.723393] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.723447] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.723463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.723486] Call Trace: [ 27.723507] <TASK> [ 27.723529] dump_stack_lvl+0x73/0xb0 [ 27.723561] print_report+0xd1/0x610 [ 27.723584] ? __virt_addr_valid+0x1db/0x2d0 [ 27.723620] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.723642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.723668] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.723702] kasan_report+0x141/0x180 [ 27.723725] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.723752] __asan_report_load8_noabort+0x18/0x20 [ 27.723776] kasan_atomics_helper+0x4f71/0x5450 [ 27.723800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.723826] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.723852] ? kasan_save_alloc_info+0x3b/0x50 [ 27.723881] kasan_atomics+0x1dc/0x310 [ 27.723905] ? __pfx_kasan_atomics+0x10/0x10 [ 27.723930] ? __pfx_read_tsc+0x10/0x10 [ 27.723979] ? ktime_get_ts64+0x86/0x230 [ 27.724019] kunit_try_run_case+0x1a5/0x480 [ 27.724043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.724082] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.724108] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.724147] ? __kthread_parkme+0x82/0x180 [ 27.724182] ? preempt_count_sub+0x50/0x80 [ 27.724207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.724230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.724255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.724283] kthread+0x337/0x6f0 [ 27.724303] ? trace_preempt_on+0x20/0xc0 [ 27.724328] ? __pfx_kthread+0x10/0x10 [ 27.724351] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.724374] ? calculate_sigpending+0x7b/0xa0 [ 27.724399] ? __pfx_kthread+0x10/0x10 [ 27.724422] ret_from_fork+0x116/0x1d0 [ 27.724444] ? __pfx_kthread+0x10/0x10 [ 27.724466] ret_from_fork_asm+0x1a/0x30 [ 27.724501] </TASK> [ 27.724514] [ 27.732772] Allocated by task 315: [ 27.732913] kasan_save_stack+0x45/0x70 [ 27.733060] kasan_save_track+0x18/0x40 [ 27.733191] kasan_save_alloc_info+0x3b/0x50 [ 27.733333] __kasan_kmalloc+0xb7/0xc0 [ 27.733531] __kmalloc_cache_noprof+0x189/0x420 [ 27.733798] kasan_atomics+0x95/0x310 [ 27.734014] kunit_try_run_case+0x1a5/0x480 [ 27.734244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.734521] kthread+0x337/0x6f0 [ 27.734712] ret_from_fork+0x116/0x1d0 [ 27.735077] ret_from_fork_asm+0x1a/0x30 [ 27.735270] [ 27.735363] The buggy address belongs to the object at ffff8881058d6700 [ 27.735363] which belongs to the cache kmalloc-64 of size 64 [ 27.735860] The buggy address is located 0 bytes to the right of [ 27.735860] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.736414] [ 27.736522] The buggy address belongs to the physical page: [ 27.736728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.737237] flags: 0x200000000000000(node=0|zone=2) [ 27.737462] page_type: f5(slab) [ 27.737630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.737994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.738318] page dumped because: kasan: bad access detected [ 27.738551] [ 27.738655] Memory state around the buggy address: [ 27.738907] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.739216] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.739516] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.739887] ^ [ 27.740100] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.740342] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.740554] ================================================================== [ 27.250445] ================================================================== [ 27.250803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 27.251187] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.251526] [ 27.251617] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.251669] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.251683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.251718] Call Trace: [ 27.251738] <TASK> [ 27.251759] dump_stack_lvl+0x73/0xb0 [ 27.251801] print_report+0xd1/0x610 [ 27.251840] ? __virt_addr_valid+0x1db/0x2d0 [ 27.251865] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.251898] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.251926] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.251948] kasan_report+0x141/0x180 [ 27.251971] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.251998] __asan_report_load4_noabort+0x18/0x20 [ 27.252022] kasan_atomics_helper+0x49ce/0x5450 [ 27.252045] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.252068] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.252093] ? kasan_save_alloc_info+0x3b/0x50 [ 27.252122] kasan_atomics+0x1dc/0x310 [ 27.252145] ? __pfx_kasan_atomics+0x10/0x10 [ 27.252170] ? __pfx_read_tsc+0x10/0x10 [ 27.252194] ? ktime_get_ts64+0x86/0x230 [ 27.252221] kunit_try_run_case+0x1a5/0x480 [ 27.252245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.252266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.252301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.252325] ? __kthread_parkme+0x82/0x180 [ 27.252348] ? preempt_count_sub+0x50/0x80 [ 27.252383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.252406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.252432] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.252458] kthread+0x337/0x6f0 [ 27.252480] ? trace_preempt_on+0x20/0xc0 [ 27.252507] ? __pfx_kthread+0x10/0x10 [ 27.252529] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.252552] ? calculate_sigpending+0x7b/0xa0 [ 27.252578] ? __pfx_kthread+0x10/0x10 [ 27.252601] ret_from_fork+0x116/0x1d0 [ 27.252631] ? __pfx_kthread+0x10/0x10 [ 27.252653] ret_from_fork_asm+0x1a/0x30 [ 27.252685] </TASK> [ 27.252713] [ 27.260382] Allocated by task 315: [ 27.260508] kasan_save_stack+0x45/0x70 [ 27.260650] kasan_save_track+0x18/0x40 [ 27.260841] kasan_save_alloc_info+0x3b/0x50 [ 27.261050] __kasan_kmalloc+0xb7/0xc0 [ 27.261256] __kmalloc_cache_noprof+0x189/0x420 [ 27.261476] kasan_atomics+0x95/0x310 [ 27.261658] kunit_try_run_case+0x1a5/0x480 [ 27.262189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.262475] kthread+0x337/0x6f0 [ 27.262646] ret_from_fork+0x116/0x1d0 [ 27.263559] ret_from_fork_asm+0x1a/0x30 [ 27.263874] [ 27.264010] The buggy address belongs to the object at ffff8881058d6700 [ 27.264010] which belongs to the cache kmalloc-64 of size 64 [ 27.264467] The buggy address is located 0 bytes to the right of [ 27.264467] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.265547] [ 27.265835] The buggy address belongs to the physical page: [ 27.266227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.266768] flags: 0x200000000000000(node=0|zone=2) [ 27.267021] page_type: f5(slab) [ 27.267182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.267490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.268063] page dumped because: kasan: bad access detected [ 27.268569] [ 27.268674] Memory state around the buggy address: [ 27.269093] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.269432] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.269733] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.270545] ^ [ 27.270794] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.271077] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.271357] ================================================================== [ 26.739858] ================================================================== [ 26.740182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 26.740492] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.740798] [ 26.740916] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.740969] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.740984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.741008] Call Trace: [ 26.741028] <TASK> [ 26.741047] dump_stack_lvl+0x73/0xb0 [ 26.741077] print_report+0xd1/0x610 [ 26.741101] ? __virt_addr_valid+0x1db/0x2d0 [ 26.741136] ? kasan_atomics_helper+0x72f/0x5450 [ 26.741159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.741186] ? kasan_atomics_helper+0x72f/0x5450 [ 26.741208] kasan_report+0x141/0x180 [ 26.741231] ? kasan_atomics_helper+0x72f/0x5450 [ 26.741258] kasan_check_range+0x10c/0x1c0 [ 26.741283] __kasan_check_write+0x18/0x20 [ 26.741307] kasan_atomics_helper+0x72f/0x5450 [ 26.741332] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.741355] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.741380] ? kasan_save_alloc_info+0x3b/0x50 [ 26.741408] kasan_atomics+0x1dc/0x310 [ 26.741432] ? __pfx_kasan_atomics+0x10/0x10 [ 26.741457] ? __pfx_read_tsc+0x10/0x10 [ 26.741480] ? ktime_get_ts64+0x86/0x230 [ 26.741507] kunit_try_run_case+0x1a5/0x480 [ 26.741531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.741552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.741578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.741603] ? __kthread_parkme+0x82/0x180 [ 26.741624] ? preempt_count_sub+0x50/0x80 [ 26.741649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.741673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.741710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.741736] kthread+0x337/0x6f0 [ 26.741758] ? trace_preempt_on+0x20/0xc0 [ 26.741783] ? __pfx_kthread+0x10/0x10 [ 26.741816] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.741840] ? calculate_sigpending+0x7b/0xa0 [ 26.741866] ? __pfx_kthread+0x10/0x10 [ 26.741889] ret_from_fork+0x116/0x1d0 [ 26.741917] ? __pfx_kthread+0x10/0x10 [ 26.741939] ret_from_fork_asm+0x1a/0x30 [ 26.741972] </TASK> [ 26.741984] [ 26.753426] Allocated by task 315: [ 26.753591] kasan_save_stack+0x45/0x70 [ 26.754035] kasan_save_track+0x18/0x40 [ 26.754272] kasan_save_alloc_info+0x3b/0x50 [ 26.754569] __kasan_kmalloc+0xb7/0xc0 [ 26.754772] __kmalloc_cache_noprof+0x189/0x420 [ 26.755171] kasan_atomics+0x95/0x310 [ 26.755381] kunit_try_run_case+0x1a5/0x480 [ 26.755566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.755797] kthread+0x337/0x6f0 [ 26.756295] ret_from_fork+0x116/0x1d0 [ 26.756603] ret_from_fork_asm+0x1a/0x30 [ 26.757042] [ 26.757295] The buggy address belongs to the object at ffff8881058d6700 [ 26.757295] which belongs to the cache kmalloc-64 of size 64 [ 26.757936] The buggy address is located 0 bytes to the right of [ 26.757936] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.758440] [ 26.758533] The buggy address belongs to the physical page: [ 26.758771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.759446] flags: 0x200000000000000(node=0|zone=2) [ 26.759897] page_type: f5(slab) [ 26.760278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.760850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.761409] page dumped because: kasan: bad access detected [ 26.761773] [ 26.762025] Memory state around the buggy address: [ 26.762245] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.762530] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.763123] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.763589] ^ [ 26.764046] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.764475] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.764933] ================================================================== [ 27.351068] ================================================================== [ 27.351423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 27.351765] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.352089] [ 27.352194] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.352243] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.352258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.352280] Call Trace: [ 27.352298] <TASK> [ 27.352316] dump_stack_lvl+0x73/0xb0 [ 27.352346] print_report+0xd1/0x610 [ 27.352368] ? __virt_addr_valid+0x1db/0x2d0 [ 27.352392] ? kasan_atomics_helper+0x151d/0x5450 [ 27.352412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.352438] ? kasan_atomics_helper+0x151d/0x5450 [ 27.352459] kasan_report+0x141/0x180 [ 27.352482] ? kasan_atomics_helper+0x151d/0x5450 [ 27.352508] kasan_check_range+0x10c/0x1c0 [ 27.352532] __kasan_check_write+0x18/0x20 [ 27.352554] kasan_atomics_helper+0x151d/0x5450 [ 27.352577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.352598] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.352622] ? kasan_save_alloc_info+0x3b/0x50 [ 27.352650] kasan_atomics+0x1dc/0x310 [ 27.352673] ? __pfx_kasan_atomics+0x10/0x10 [ 27.352707] ? __pfx_read_tsc+0x10/0x10 [ 27.352730] ? ktime_get_ts64+0x86/0x230 [ 27.352757] kunit_try_run_case+0x1a5/0x480 [ 27.352779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.352800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.352824] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.352848] ? __kthread_parkme+0x82/0x180 [ 27.352869] ? preempt_count_sub+0x50/0x80 [ 27.352911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.352934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.352960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.352989] kthread+0x337/0x6f0 [ 27.353010] ? trace_preempt_on+0x20/0xc0 [ 27.353035] ? __pfx_kthread+0x10/0x10 [ 27.353057] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.353092] ? calculate_sigpending+0x7b/0xa0 [ 27.353117] ? __pfx_kthread+0x10/0x10 [ 27.353151] ret_from_fork+0x116/0x1d0 [ 27.353172] ? __pfx_kthread+0x10/0x10 [ 27.353195] ret_from_fork_asm+0x1a/0x30 [ 27.353227] </TASK> [ 27.353239] [ 27.361097] Allocated by task 315: [ 27.361224] kasan_save_stack+0x45/0x70 [ 27.361441] kasan_save_track+0x18/0x40 [ 27.361607] kasan_save_alloc_info+0x3b/0x50 [ 27.361828] __kasan_kmalloc+0xb7/0xc0 [ 27.362004] __kmalloc_cache_noprof+0x189/0x420 [ 27.362226] kasan_atomics+0x95/0x310 [ 27.362393] kunit_try_run_case+0x1a5/0x480 [ 27.362590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.362855] kthread+0x337/0x6f0 [ 27.363024] ret_from_fork+0x116/0x1d0 [ 27.363218] ret_from_fork_asm+0x1a/0x30 [ 27.363395] [ 27.363474] The buggy address belongs to the object at ffff8881058d6700 [ 27.363474] which belongs to the cache kmalloc-64 of size 64 [ 27.364022] The buggy address is located 0 bytes to the right of [ 27.364022] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.364437] [ 27.364505] The buggy address belongs to the physical page: [ 27.364677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.364926] flags: 0x200000000000000(node=0|zone=2) [ 27.365087] page_type: f5(slab) [ 27.365203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.365903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.366248] page dumped because: kasan: bad access detected [ 27.366493] [ 27.366582] Memory state around the buggy address: [ 27.366843] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.367153] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.367444] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.367652] ^ [ 27.367926] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.368246] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.368587] ================================================================== [ 27.741155] ================================================================== [ 27.741507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 27.742041] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.742333] [ 27.742422] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.742476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.742492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.742516] Call Trace: [ 27.742540] <TASK> [ 27.742561] dump_stack_lvl+0x73/0xb0 [ 27.742594] print_report+0xd1/0x610 [ 27.742617] ? __virt_addr_valid+0x1db/0x2d0 [ 27.742642] ? kasan_atomics_helper+0x2006/0x5450 [ 27.742664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.742690] ? kasan_atomics_helper+0x2006/0x5450 [ 27.742727] kasan_report+0x141/0x180 [ 27.742749] ? kasan_atomics_helper+0x2006/0x5450 [ 27.742776] kasan_check_range+0x10c/0x1c0 [ 27.742800] __kasan_check_write+0x18/0x20 [ 27.742824] kasan_atomics_helper+0x2006/0x5450 [ 27.742848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.742870] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.742895] ? kasan_save_alloc_info+0x3b/0x50 [ 27.742923] kasan_atomics+0x1dc/0x310 [ 27.742947] ? __pfx_kasan_atomics+0x10/0x10 [ 27.742972] ? __pfx_read_tsc+0x10/0x10 [ 27.742995] ? ktime_get_ts64+0x86/0x230 [ 27.743022] kunit_try_run_case+0x1a5/0x480 [ 27.743045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.743067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.743103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.743150] ? __kthread_parkme+0x82/0x180 [ 27.743173] ? preempt_count_sub+0x50/0x80 [ 27.743200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.743223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.743264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.743290] kthread+0x337/0x6f0 [ 27.743325] ? trace_preempt_on+0x20/0xc0 [ 27.743363] ? __pfx_kthread+0x10/0x10 [ 27.743398] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.743421] ? calculate_sigpending+0x7b/0xa0 [ 27.743447] ? __pfx_kthread+0x10/0x10 [ 27.743469] ret_from_fork+0x116/0x1d0 [ 27.743490] ? __pfx_kthread+0x10/0x10 [ 27.743512] ret_from_fork_asm+0x1a/0x30 [ 27.743544] </TASK> [ 27.743557] [ 27.751985] Allocated by task 315: [ 27.752207] kasan_save_stack+0x45/0x70 [ 27.752355] kasan_save_track+0x18/0x40 [ 27.752540] kasan_save_alloc_info+0x3b/0x50 [ 27.752718] __kasan_kmalloc+0xb7/0xc0 [ 27.752946] __kmalloc_cache_noprof+0x189/0x420 [ 27.753202] kasan_atomics+0x95/0x310 [ 27.753435] kunit_try_run_case+0x1a5/0x480 [ 27.753659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.754127] kthread+0x337/0x6f0 [ 27.754293] ret_from_fork+0x116/0x1d0 [ 27.754477] ret_from_fork_asm+0x1a/0x30 [ 27.754669] [ 27.754770] The buggy address belongs to the object at ffff8881058d6700 [ 27.754770] which belongs to the cache kmalloc-64 of size 64 [ 27.755302] The buggy address is located 0 bytes to the right of [ 27.755302] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.755956] [ 27.756045] The buggy address belongs to the physical page: [ 27.756213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.756450] flags: 0x200000000000000(node=0|zone=2) [ 27.756610] page_type: f5(slab) [ 27.756739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.757422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.757771] page dumped because: kasan: bad access detected [ 27.758049] [ 27.758159] Memory state around the buggy address: [ 27.758551] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.758949] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.759304] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.759610] ^ [ 27.759963] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.760276] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.760526] ================================================================== [ 27.091064] ================================================================== [ 27.091497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 27.091985] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.092397] [ 27.092504] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.092558] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.092584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.092608] Call Trace: [ 27.092628] <TASK> [ 27.092648] dump_stack_lvl+0x73/0xb0 [ 27.092681] print_report+0xd1/0x610 [ 27.092713] ? __virt_addr_valid+0x1db/0x2d0 [ 27.092739] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.092761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.092789] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.092812] kasan_report+0x141/0x180 [ 27.092845] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.092872] __asan_report_load4_noabort+0x18/0x20 [ 27.092897] kasan_atomics_helper+0x4a36/0x5450 [ 27.092921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.092954] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.092978] ? kasan_save_alloc_info+0x3b/0x50 [ 27.093017] kasan_atomics+0x1dc/0x310 [ 27.093041] ? __pfx_kasan_atomics+0x10/0x10 [ 27.093067] ? __pfx_read_tsc+0x10/0x10 [ 27.093091] ? ktime_get_ts64+0x86/0x230 [ 27.093118] kunit_try_run_case+0x1a5/0x480 [ 27.093142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.093163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.093189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.093213] ? __kthread_parkme+0x82/0x180 [ 27.093236] ? preempt_count_sub+0x50/0x80 [ 27.093262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.093284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.093311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.093338] kthread+0x337/0x6f0 [ 27.093359] ? trace_preempt_on+0x20/0xc0 [ 27.093384] ? __pfx_kthread+0x10/0x10 [ 27.093415] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.093438] ? calculate_sigpending+0x7b/0xa0 [ 27.093464] ? __pfx_kthread+0x10/0x10 [ 27.093497] ret_from_fork+0x116/0x1d0 [ 27.093518] ? __pfx_kthread+0x10/0x10 [ 27.093539] ret_from_fork_asm+0x1a/0x30 [ 27.093572] </TASK> [ 27.093584] [ 27.101252] Allocated by task 315: [ 27.101420] kasan_save_stack+0x45/0x70 [ 27.101568] kasan_save_track+0x18/0x40 [ 27.101767] kasan_save_alloc_info+0x3b/0x50 [ 27.102005] __kasan_kmalloc+0xb7/0xc0 [ 27.102183] __kmalloc_cache_noprof+0x189/0x420 [ 27.102400] kasan_atomics+0x95/0x310 [ 27.102591] kunit_try_run_case+0x1a5/0x480 [ 27.102774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.103033] kthread+0x337/0x6f0 [ 27.103198] ret_from_fork+0x116/0x1d0 [ 27.103352] ret_from_fork_asm+0x1a/0x30 [ 27.103546] [ 27.103624] The buggy address belongs to the object at ffff8881058d6700 [ 27.103624] which belongs to the cache kmalloc-64 of size 64 [ 27.104147] The buggy address is located 0 bytes to the right of [ 27.104147] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.104618] [ 27.104709] The buggy address belongs to the physical page: [ 27.105007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.105346] flags: 0x200000000000000(node=0|zone=2) [ 27.105570] page_type: f5(slab) [ 27.105705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.106046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.106265] page dumped because: kasan: bad access detected [ 27.106433] [ 27.106497] Memory state around the buggy address: [ 27.106647] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.107519] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.108115] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.108823] ^ [ 27.109225] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.109959] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.110555] ================================================================== [ 26.936850] ================================================================== [ 26.937136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 26.937476] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.937921] [ 26.938030] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.938079] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.938094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.938117] Call Trace: [ 26.938135] <TASK> [ 26.938154] dump_stack_lvl+0x73/0xb0 [ 26.938186] print_report+0xd1/0x610 [ 26.938209] ? __virt_addr_valid+0x1db/0x2d0 [ 26.938235] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.938257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.938284] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.938305] kasan_report+0x141/0x180 [ 26.938328] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.938355] kasan_check_range+0x10c/0x1c0 [ 26.938380] __kasan_check_write+0x18/0x20 [ 26.938403] kasan_atomics_helper+0xb6a/0x5450 [ 26.938426] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.938449] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.938475] ? kasan_save_alloc_info+0x3b/0x50 [ 26.938504] kasan_atomics+0x1dc/0x310 [ 26.938528] ? __pfx_kasan_atomics+0x10/0x10 [ 26.938567] ? __pfx_read_tsc+0x10/0x10 [ 26.938591] ? ktime_get_ts64+0x86/0x230 [ 26.938618] kunit_try_run_case+0x1a5/0x480 [ 26.938642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.938663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.938689] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.938725] ? __kthread_parkme+0x82/0x180 [ 26.938748] ? preempt_count_sub+0x50/0x80 [ 26.938773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.938805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.938832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.938858] kthread+0x337/0x6f0 [ 26.938879] ? trace_preempt_on+0x20/0xc0 [ 26.938903] ? __pfx_kthread+0x10/0x10 [ 26.938925] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.938959] ? calculate_sigpending+0x7b/0xa0 [ 26.938985] ? __pfx_kthread+0x10/0x10 [ 26.939008] ret_from_fork+0x116/0x1d0 [ 26.939040] ? __pfx_kthread+0x10/0x10 [ 26.939062] ret_from_fork_asm+0x1a/0x30 [ 26.939095] </TASK> [ 26.939107] [ 26.946931] Allocated by task 315: [ 26.947167] kasan_save_stack+0x45/0x70 [ 26.947309] kasan_save_track+0x18/0x40 [ 26.947440] kasan_save_alloc_info+0x3b/0x50 [ 26.947645] __kasan_kmalloc+0xb7/0xc0 [ 26.947922] __kmalloc_cache_noprof+0x189/0x420 [ 26.948155] kasan_atomics+0x95/0x310 [ 26.948327] kunit_try_run_case+0x1a5/0x480 [ 26.948527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.948826] kthread+0x337/0x6f0 [ 26.948955] ret_from_fork+0x116/0x1d0 [ 26.949149] ret_from_fork_asm+0x1a/0x30 [ 26.949284] [ 26.949351] The buggy address belongs to the object at ffff8881058d6700 [ 26.949351] which belongs to the cache kmalloc-64 of size 64 [ 26.949703] The buggy address is located 0 bytes to the right of [ 26.949703] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.950250] [ 26.950345] The buggy address belongs to the physical page: [ 26.950595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.951061] flags: 0x200000000000000(node=0|zone=2) [ 26.951296] page_type: f5(slab) [ 26.951414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.951721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.952227] page dumped because: kasan: bad access detected [ 26.952426] [ 26.952536] Memory state around the buggy address: [ 26.952727] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.953057] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.953376] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.953664] ^ [ 26.953966] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.954237] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.954448] ================================================================== [ 26.569090] ================================================================== [ 26.569320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 26.569651] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.569982] [ 26.570084] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.570134] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.570149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.570171] Call Trace: [ 26.570191] <TASK> [ 26.570210] dump_stack_lvl+0x73/0xb0 [ 26.570239] print_report+0xd1/0x610 [ 26.570261] ? __virt_addr_valid+0x1db/0x2d0 [ 26.570285] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.570306] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.570332] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.570354] kasan_report+0x141/0x180 [ 26.570376] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.570403] __asan_report_store4_noabort+0x1b/0x30 [ 26.570428] kasan_atomics_helper+0x4b6e/0x5450 [ 26.570451] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.570474] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.570498] ? kasan_save_alloc_info+0x3b/0x50 [ 26.570526] kasan_atomics+0x1dc/0x310 [ 26.570549] ? __pfx_kasan_atomics+0x10/0x10 [ 26.570573] ? __pfx_read_tsc+0x10/0x10 [ 26.570596] ? ktime_get_ts64+0x86/0x230 [ 26.570622] kunit_try_run_case+0x1a5/0x480 [ 26.570644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.570665] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.570690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.570962] ? __kthread_parkme+0x82/0x180 [ 26.570985] ? preempt_count_sub+0x50/0x80 [ 26.571011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.571034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.571062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.571088] kthread+0x337/0x6f0 [ 26.571109] ? trace_preempt_on+0x20/0xc0 [ 26.571135] ? __pfx_kthread+0x10/0x10 [ 26.571157] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.571181] ? calculate_sigpending+0x7b/0xa0 [ 26.571207] ? __pfx_kthread+0x10/0x10 [ 26.571229] ret_from_fork+0x116/0x1d0 [ 26.571250] ? __pfx_kthread+0x10/0x10 [ 26.571273] ret_from_fork_asm+0x1a/0x30 [ 26.571309] </TASK> [ 26.571324] [ 26.578549] Allocated by task 315: [ 26.578752] kasan_save_stack+0x45/0x70 [ 26.578947] kasan_save_track+0x18/0x40 [ 26.579145] kasan_save_alloc_info+0x3b/0x50 [ 26.579354] __kasan_kmalloc+0xb7/0xc0 [ 26.579512] __kmalloc_cache_noprof+0x189/0x420 [ 26.579664] kasan_atomics+0x95/0x310 [ 26.579802] kunit_try_run_case+0x1a5/0x480 [ 26.579947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.580118] kthread+0x337/0x6f0 [ 26.580238] ret_from_fork+0x116/0x1d0 [ 26.580366] ret_from_fork_asm+0x1a/0x30 [ 26.580501] [ 26.580566] The buggy address belongs to the object at ffff8881058d6700 [ 26.580566] which belongs to the cache kmalloc-64 of size 64 [ 26.580921] The buggy address is located 0 bytes to the right of [ 26.580921] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.581277] [ 26.581346] The buggy address belongs to the physical page: [ 26.581712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.582527] flags: 0x200000000000000(node=0|zone=2) [ 26.582722] page_type: f5(slab) [ 26.582842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.583067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.583285] page dumped because: kasan: bad access detected [ 26.583451] [ 26.583515] Memory state around the buggy address: [ 26.583665] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.583891] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.584101] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.584307] ^ [ 26.584457] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.584671] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.584887] ================================================================== [ 27.486191] ================================================================== [ 27.486540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 27.486863] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.487237] [ 27.487343] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.487397] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.487413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.487437] Call Trace: [ 27.487459] <TASK> [ 27.487479] dump_stack_lvl+0x73/0xb0 [ 27.487512] print_report+0xd1/0x610 [ 27.487535] ? __virt_addr_valid+0x1db/0x2d0 [ 27.487597] ? kasan_atomics_helper+0x194a/0x5450 [ 27.487620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.487658] ? kasan_atomics_helper+0x194a/0x5450 [ 27.487715] kasan_report+0x141/0x180 [ 27.487738] ? kasan_atomics_helper+0x194a/0x5450 [ 27.487776] kasan_check_range+0x10c/0x1c0 [ 27.487811] __kasan_check_write+0x18/0x20 [ 27.487840] kasan_atomics_helper+0x194a/0x5450 [ 27.487863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.487886] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.487940] ? kasan_save_alloc_info+0x3b/0x50 [ 27.487990] kasan_atomics+0x1dc/0x310 [ 27.488014] ? __pfx_kasan_atomics+0x10/0x10 [ 27.488039] ? __pfx_read_tsc+0x10/0x10 [ 27.488064] ? ktime_get_ts64+0x86/0x230 [ 27.488091] kunit_try_run_case+0x1a5/0x480 [ 27.488115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.488136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.488162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.488187] ? __kthread_parkme+0x82/0x180 [ 27.488209] ? preempt_count_sub+0x50/0x80 [ 27.488234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.488257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.488283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.488309] kthread+0x337/0x6f0 [ 27.488330] ? trace_preempt_on+0x20/0xc0 [ 27.488354] ? __pfx_kthread+0x10/0x10 [ 27.488376] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.488399] ? calculate_sigpending+0x7b/0xa0 [ 27.488425] ? __pfx_kthread+0x10/0x10 [ 27.488447] ret_from_fork+0x116/0x1d0 [ 27.488468] ? __pfx_kthread+0x10/0x10 [ 27.488491] ret_from_fork_asm+0x1a/0x30 [ 27.488523] </TASK> [ 27.488535] [ 27.496285] Allocated by task 315: [ 27.496509] kasan_save_stack+0x45/0x70 [ 27.496700] kasan_save_track+0x18/0x40 [ 27.496833] kasan_save_alloc_info+0x3b/0x50 [ 27.497025] __kasan_kmalloc+0xb7/0xc0 [ 27.497347] __kmalloc_cache_noprof+0x189/0x420 [ 27.498249] kasan_atomics+0x95/0x310 [ 27.499015] kunit_try_run_case+0x1a5/0x480 [ 27.499184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.499450] kthread+0x337/0x6f0 [ 27.499622] ret_from_fork+0x116/0x1d0 [ 27.499831] ret_from_fork_asm+0x1a/0x30 [ 27.500024] [ 27.500372] The buggy address belongs to the object at ffff8881058d6700 [ 27.500372] which belongs to the cache kmalloc-64 of size 64 [ 27.500998] The buggy address is located 0 bytes to the right of [ 27.500998] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.501421] [ 27.501534] The buggy address belongs to the physical page: [ 27.501811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.502256] flags: 0x200000000000000(node=0|zone=2) [ 27.502462] page_type: f5(slab) [ 27.502586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.503115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.503397] page dumped because: kasan: bad access detected [ 27.503652] [ 27.503730] Memory state around the buggy address: [ 27.503913] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.504334] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.504635] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.504969] ^ [ 27.505138] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.505455] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.505766] ================================================================== [ 27.620579] ================================================================== [ 27.621259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 27.621676] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.622160] [ 27.622269] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.622321] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.622336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.622429] Call Trace: [ 27.622448] <TASK> [ 27.622466] dump_stack_lvl+0x73/0xb0 [ 27.622500] print_report+0xd1/0x610 [ 27.622523] ? __virt_addr_valid+0x1db/0x2d0 [ 27.622548] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.622570] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.622597] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.622619] kasan_report+0x141/0x180 [ 27.622642] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.622668] kasan_check_range+0x10c/0x1c0 [ 27.622704] __kasan_check_write+0x18/0x20 [ 27.622728] kasan_atomics_helper+0x1ce1/0x5450 [ 27.622752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.622783] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.622808] ? kasan_save_alloc_info+0x3b/0x50 [ 27.622837] kasan_atomics+0x1dc/0x310 [ 27.622861] ? __pfx_kasan_atomics+0x10/0x10 [ 27.622885] ? __pfx_read_tsc+0x10/0x10 [ 27.622908] ? ktime_get_ts64+0x86/0x230 [ 27.622935] kunit_try_run_case+0x1a5/0x480 [ 27.622958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.622980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.623005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.623030] ? __kthread_parkme+0x82/0x180 [ 27.623051] ? preempt_count_sub+0x50/0x80 [ 27.623076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.623098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.623124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.623151] kthread+0x337/0x6f0 [ 27.623171] ? trace_preempt_on+0x20/0xc0 [ 27.623195] ? __pfx_kthread+0x10/0x10 [ 27.623217] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.623240] ? calculate_sigpending+0x7b/0xa0 [ 27.623266] ? __pfx_kthread+0x10/0x10 [ 27.623288] ret_from_fork+0x116/0x1d0 [ 27.623309] ? __pfx_kthread+0x10/0x10 [ 27.623330] ret_from_fork_asm+0x1a/0x30 [ 27.623363] </TASK> [ 27.623376] [ 27.632982] Allocated by task 315: [ 27.633179] kasan_save_stack+0x45/0x70 [ 27.633381] kasan_save_track+0x18/0x40 [ 27.633568] kasan_save_alloc_info+0x3b/0x50 [ 27.633768] __kasan_kmalloc+0xb7/0xc0 [ 27.634354] __kmalloc_cache_noprof+0x189/0x420 [ 27.634554] kasan_atomics+0x95/0x310 [ 27.634760] kunit_try_run_case+0x1a5/0x480 [ 27.635145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.635401] kthread+0x337/0x6f0 [ 27.635666] ret_from_fork+0x116/0x1d0 [ 27.635859] ret_from_fork_asm+0x1a/0x30 [ 27.636202] [ 27.636288] The buggy address belongs to the object at ffff8881058d6700 [ 27.636288] which belongs to the cache kmalloc-64 of size 64 [ 27.636968] The buggy address is located 0 bytes to the right of [ 27.636968] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.637579] [ 27.637684] The buggy address belongs to the physical page: [ 27.637950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.638444] flags: 0x200000000000000(node=0|zone=2) [ 27.638670] page_type: f5(slab) [ 27.638822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.639312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.639677] page dumped because: kasan: bad access detected [ 27.639965] [ 27.640050] Memory state around the buggy address: [ 27.640262] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.640556] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.640866] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.641429] ^ [ 27.641611] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.642122] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.642501] ================================================================== [ 27.546279] ================================================================== [ 27.546744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 27.547470] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.547795] [ 27.547950] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.548005] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.548020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.548043] Call Trace: [ 27.548060] <TASK> [ 27.548081] dump_stack_lvl+0x73/0xb0 [ 27.548114] print_report+0xd1/0x610 [ 27.548138] ? __virt_addr_valid+0x1db/0x2d0 [ 27.548164] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.548186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.548212] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.548235] kasan_report+0x141/0x180 [ 27.548257] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.548284] kasan_check_range+0x10c/0x1c0 [ 27.548309] __kasan_check_write+0x18/0x20 [ 27.548333] kasan_atomics_helper+0x1b22/0x5450 [ 27.548356] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.548379] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.548403] ? kasan_save_alloc_info+0x3b/0x50 [ 27.548433] kasan_atomics+0x1dc/0x310 [ 27.548456] ? __pfx_kasan_atomics+0x10/0x10 [ 27.548481] ? __pfx_read_tsc+0x10/0x10 [ 27.548504] ? ktime_get_ts64+0x86/0x230 [ 27.548530] kunit_try_run_case+0x1a5/0x480 [ 27.548553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.548575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.548600] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.548625] ? __kthread_parkme+0x82/0x180 [ 27.548646] ? preempt_count_sub+0x50/0x80 [ 27.548671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.548706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.548732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.548758] kthread+0x337/0x6f0 [ 27.548790] ? trace_preempt_on+0x20/0xc0 [ 27.548815] ? __pfx_kthread+0x10/0x10 [ 27.548836] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.548861] ? calculate_sigpending+0x7b/0xa0 [ 27.548888] ? __pfx_kthread+0x10/0x10 [ 27.548911] ret_from_fork+0x116/0x1d0 [ 27.548931] ? __pfx_kthread+0x10/0x10 [ 27.548953] ret_from_fork_asm+0x1a/0x30 [ 27.548985] </TASK> [ 27.548999] [ 27.557155] Allocated by task 315: [ 27.557282] kasan_save_stack+0x45/0x70 [ 27.557424] kasan_save_track+0x18/0x40 [ 27.557611] kasan_save_alloc_info+0x3b/0x50 [ 27.557827] __kasan_kmalloc+0xb7/0xc0 [ 27.558189] __kmalloc_cache_noprof+0x189/0x420 [ 27.558410] kasan_atomics+0x95/0x310 [ 27.558589] kunit_try_run_case+0x1a5/0x480 [ 27.558787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.558992] kthread+0x337/0x6f0 [ 27.559111] ret_from_fork+0x116/0x1d0 [ 27.559239] ret_from_fork_asm+0x1a/0x30 [ 27.559374] [ 27.559441] The buggy address belongs to the object at ffff8881058d6700 [ 27.559441] which belongs to the cache kmalloc-64 of size 64 [ 27.560008] The buggy address is located 0 bytes to the right of [ 27.560008] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.560563] [ 27.560659] The buggy address belongs to the physical page: [ 27.560978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.561276] flags: 0x200000000000000(node=0|zone=2) [ 27.561433] page_type: f5(slab) [ 27.561551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.562649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.563595] page dumped because: kasan: bad access detected [ 27.564415] [ 27.564591] Memory state around the buggy address: [ 27.565403] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.566125] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.566684] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.567528] ^ [ 27.568184] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.568420] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.568632] ================================================================== [ 27.683562] ================================================================== [ 27.684112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 27.684451] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.684774] [ 27.684869] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.684919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.684933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.684956] Call Trace: [ 27.684973] <TASK> [ 27.684991] dump_stack_lvl+0x73/0xb0 [ 27.685022] print_report+0xd1/0x610 [ 27.685045] ? __virt_addr_valid+0x1db/0x2d0 [ 27.685070] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.685091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.685118] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.685141] kasan_report+0x141/0x180 [ 27.685164] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.685190] kasan_check_range+0x10c/0x1c0 [ 27.685214] __kasan_check_write+0x18/0x20 [ 27.685238] kasan_atomics_helper+0x1eaa/0x5450 [ 27.685260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.685283] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.685307] ? kasan_save_alloc_info+0x3b/0x50 [ 27.685335] kasan_atomics+0x1dc/0x310 [ 27.685359] ? __pfx_kasan_atomics+0x10/0x10 [ 27.685383] ? __pfx_read_tsc+0x10/0x10 [ 27.685406] ? ktime_get_ts64+0x86/0x230 [ 27.685432] kunit_try_run_case+0x1a5/0x480 [ 27.685455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.685476] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.685503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.685530] ? __kthread_parkme+0x82/0x180 [ 27.685552] ? preempt_count_sub+0x50/0x80 [ 27.685576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.685598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.685624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.685649] kthread+0x337/0x6f0 [ 27.685671] ? trace_preempt_on+0x20/0xc0 [ 27.685706] ? __pfx_kthread+0x10/0x10 [ 27.685729] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.685752] ? calculate_sigpending+0x7b/0xa0 [ 27.685777] ? __pfx_kthread+0x10/0x10 [ 27.685800] ret_from_fork+0x116/0x1d0 [ 27.685821] ? __pfx_kthread+0x10/0x10 [ 27.685843] ret_from_fork_asm+0x1a/0x30 [ 27.685874] </TASK> [ 27.685887] [ 27.693470] Allocated by task 315: [ 27.693650] kasan_save_stack+0x45/0x70 [ 27.693913] kasan_save_track+0x18/0x40 [ 27.694089] kasan_save_alloc_info+0x3b/0x50 [ 27.694270] __kasan_kmalloc+0xb7/0xc0 [ 27.694430] __kmalloc_cache_noprof+0x189/0x420 [ 27.694580] kasan_atomics+0x95/0x310 [ 27.694720] kunit_try_run_case+0x1a5/0x480 [ 27.694927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.695175] kthread+0x337/0x6f0 [ 27.695338] ret_from_fork+0x116/0x1d0 [ 27.695548] ret_from_fork_asm+0x1a/0x30 [ 27.695749] [ 27.695891] The buggy address belongs to the object at ffff8881058d6700 [ 27.695891] which belongs to the cache kmalloc-64 of size 64 [ 27.696337] The buggy address is located 0 bytes to the right of [ 27.696337] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.696834] [ 27.696915] The buggy address belongs to the physical page: [ 27.697146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.697449] flags: 0x200000000000000(node=0|zone=2) [ 27.697647] page_type: f5(slab) [ 27.697786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.698089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.698412] page dumped because: kasan: bad access detected [ 27.698613] [ 27.698714] Memory state around the buggy address: [ 27.698925] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.699210] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.699450] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.699660] ^ [ 27.700025] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.700353] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.700608] ================================================================== [ 27.052925] ================================================================== [ 27.053224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 27.053560] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.054190] [ 27.054288] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.054344] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.054359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.054383] Call Trace: [ 27.054405] <TASK> [ 27.054425] dump_stack_lvl+0x73/0xb0 [ 27.054474] print_report+0xd1/0x610 [ 27.054499] ? __virt_addr_valid+0x1db/0x2d0 [ 27.054524] ? kasan_atomics_helper+0xf10/0x5450 [ 27.054559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.054586] ? kasan_atomics_helper+0xf10/0x5450 [ 27.054617] kasan_report+0x141/0x180 [ 27.054640] ? kasan_atomics_helper+0xf10/0x5450 [ 27.054666] kasan_check_range+0x10c/0x1c0 [ 27.054720] __kasan_check_write+0x18/0x20 [ 27.054745] kasan_atomics_helper+0xf10/0x5450 [ 27.054768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.054801] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.054827] ? kasan_save_alloc_info+0x3b/0x50 [ 27.054855] kasan_atomics+0x1dc/0x310 [ 27.054879] ? __pfx_kasan_atomics+0x10/0x10 [ 27.054903] ? __pfx_read_tsc+0x10/0x10 [ 27.054927] ? ktime_get_ts64+0x86/0x230 [ 27.054963] kunit_try_run_case+0x1a5/0x480 [ 27.054986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.055008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.055045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.055071] ? __kthread_parkme+0x82/0x180 [ 27.055102] ? preempt_count_sub+0x50/0x80 [ 27.055127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.055149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.055183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.055210] kthread+0x337/0x6f0 [ 27.055230] ? trace_preempt_on+0x20/0xc0 [ 27.055274] ? __pfx_kthread+0x10/0x10 [ 27.055295] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.055318] ? calculate_sigpending+0x7b/0xa0 [ 27.055354] ? __pfx_kthread+0x10/0x10 [ 27.055377] ret_from_fork+0x116/0x1d0 [ 27.055398] ? __pfx_kthread+0x10/0x10 [ 27.055419] ret_from_fork_asm+0x1a/0x30 [ 27.055453] </TASK> [ 27.055465] [ 27.062969] Allocated by task 315: [ 27.063104] kasan_save_stack+0x45/0x70 [ 27.063246] kasan_save_track+0x18/0x40 [ 27.063377] kasan_save_alloc_info+0x3b/0x50 [ 27.063520] __kasan_kmalloc+0xb7/0xc0 [ 27.063646] __kmalloc_cache_noprof+0x189/0x420 [ 27.063900] kasan_atomics+0x95/0x310 [ 27.064091] kunit_try_run_case+0x1a5/0x480 [ 27.064301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.064557] kthread+0x337/0x6f0 [ 27.064737] ret_from_fork+0x116/0x1d0 [ 27.064940] ret_from_fork_asm+0x1a/0x30 [ 27.065133] [ 27.065228] The buggy address belongs to the object at ffff8881058d6700 [ 27.065228] which belongs to the cache kmalloc-64 of size 64 [ 27.065841] The buggy address is located 0 bytes to the right of [ 27.065841] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.066276] [ 27.066347] The buggy address belongs to the physical page: [ 27.066516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.066795] flags: 0x200000000000000(node=0|zone=2) [ 27.067214] page_type: f5(slab) [ 27.067563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.068134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.068480] page dumped because: kasan: bad access detected [ 27.068714] [ 27.068796] Memory state around the buggy address: [ 27.069050] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.069391] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.069654] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.070148] ^ [ 27.070400] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.070728] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.071094] ================================================================== [ 27.570165] ================================================================== [ 27.571606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 27.572461] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.573030] [ 27.573407] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.573474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.573490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.573514] Call Trace: [ 27.573533] <TASK> [ 27.573552] dump_stack_lvl+0x73/0xb0 [ 27.573591] print_report+0xd1/0x610 [ 27.573616] ? __virt_addr_valid+0x1db/0x2d0 [ 27.573643] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.573665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.573702] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.573724] kasan_report+0x141/0x180 [ 27.573747] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.573950] kasan_check_range+0x10c/0x1c0 [ 27.574026] __kasan_check_write+0x18/0x20 [ 27.574054] kasan_atomics_helper+0x1c18/0x5450 [ 27.574080] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.574104] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.574132] ? kasan_save_alloc_info+0x3b/0x50 [ 27.574161] kasan_atomics+0x1dc/0x310 [ 27.574184] ? __pfx_kasan_atomics+0x10/0x10 [ 27.574209] ? __pfx_read_tsc+0x10/0x10 [ 27.574234] ? ktime_get_ts64+0x86/0x230 [ 27.574260] kunit_try_run_case+0x1a5/0x480 [ 27.574284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.574305] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.574331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.574356] ? __kthread_parkme+0x82/0x180 [ 27.574378] ? preempt_count_sub+0x50/0x80 [ 27.574403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.574426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.574451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.574478] kthread+0x337/0x6f0 [ 27.574499] ? trace_preempt_on+0x20/0xc0 [ 27.574524] ? __pfx_kthread+0x10/0x10 [ 27.574546] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.574569] ? calculate_sigpending+0x7b/0xa0 [ 27.574594] ? __pfx_kthread+0x10/0x10 [ 27.574617] ret_from_fork+0x116/0x1d0 [ 27.574638] ? __pfx_kthread+0x10/0x10 [ 27.574660] ret_from_fork_asm+0x1a/0x30 [ 27.574704] </TASK> [ 27.574717] [ 27.587388] Allocated by task 315: [ 27.587580] kasan_save_stack+0x45/0x70 [ 27.587773] kasan_save_track+0x18/0x40 [ 27.588283] kasan_save_alloc_info+0x3b/0x50 [ 27.588448] __kasan_kmalloc+0xb7/0xc0 [ 27.588752] __kmalloc_cache_noprof+0x189/0x420 [ 27.589067] kasan_atomics+0x95/0x310 [ 27.589299] kunit_try_run_case+0x1a5/0x480 [ 27.589562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.589895] kthread+0x337/0x6f0 [ 27.590077] ret_from_fork+0x116/0x1d0 [ 27.590368] ret_from_fork_asm+0x1a/0x30 [ 27.590561] [ 27.590654] The buggy address belongs to the object at ffff8881058d6700 [ 27.590654] which belongs to the cache kmalloc-64 of size 64 [ 27.591298] The buggy address is located 0 bytes to the right of [ 27.591298] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.591982] [ 27.592093] The buggy address belongs to the physical page: [ 27.592303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.592637] flags: 0x200000000000000(node=0|zone=2) [ 27.592864] page_type: f5(slab) [ 27.593333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.593622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.594137] page dumped because: kasan: bad access detected [ 27.594454] [ 27.594529] Memory state around the buggy address: [ 27.594823] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.595284] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.595599] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.596079] ^ [ 27.596359] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.596610] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.597039] ================================================================== [ 26.711507] ================================================================== [ 26.712217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 26.712545] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.713152] [ 26.713281] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.713546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.713564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.713587] Call Trace: [ 26.713611] <TASK> [ 26.713674] dump_stack_lvl+0x73/0xb0 [ 26.713726] print_report+0xd1/0x610 [ 26.713749] ? __virt_addr_valid+0x1db/0x2d0 [ 26.713783] ? kasan_atomics_helper+0x697/0x5450 [ 26.713805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.713832] ? kasan_atomics_helper+0x697/0x5450 [ 26.713854] kasan_report+0x141/0x180 [ 26.713876] ? kasan_atomics_helper+0x697/0x5450 [ 26.713966] kasan_check_range+0x10c/0x1c0 [ 26.713991] __kasan_check_write+0x18/0x20 [ 26.714015] kasan_atomics_helper+0x697/0x5450 [ 26.714039] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.714062] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.714089] ? kasan_save_alloc_info+0x3b/0x50 [ 26.714120] kasan_atomics+0x1dc/0x310 [ 26.714144] ? __pfx_kasan_atomics+0x10/0x10 [ 26.714170] ? __pfx_read_tsc+0x10/0x10 [ 26.714193] ? ktime_get_ts64+0x86/0x230 [ 26.714221] kunit_try_run_case+0x1a5/0x480 [ 26.714245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.714266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.714293] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.714318] ? __kthread_parkme+0x82/0x180 [ 26.714340] ? preempt_count_sub+0x50/0x80 [ 26.714365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.714389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.714416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.714442] kthread+0x337/0x6f0 [ 26.714463] ? trace_preempt_on+0x20/0xc0 [ 26.714488] ? __pfx_kthread+0x10/0x10 [ 26.714510] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.714533] ? calculate_sigpending+0x7b/0xa0 [ 26.714558] ? __pfx_kthread+0x10/0x10 [ 26.714581] ret_from_fork+0x116/0x1d0 [ 26.714602] ? __pfx_kthread+0x10/0x10 [ 26.714623] ret_from_fork_asm+0x1a/0x30 [ 26.714657] </TASK> [ 26.714670] [ 26.727425] Allocated by task 315: [ 26.727620] kasan_save_stack+0x45/0x70 [ 26.727863] kasan_save_track+0x18/0x40 [ 26.728221] kasan_save_alloc_info+0x3b/0x50 [ 26.728585] __kasan_kmalloc+0xb7/0xc0 [ 26.728932] __kmalloc_cache_noprof+0x189/0x420 [ 26.729266] kasan_atomics+0x95/0x310 [ 26.729444] kunit_try_run_case+0x1a5/0x480 [ 26.729635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.730087] kthread+0x337/0x6f0 [ 26.730386] ret_from_fork+0x116/0x1d0 [ 26.730769] ret_from_fork_asm+0x1a/0x30 [ 26.731106] [ 26.731332] The buggy address belongs to the object at ffff8881058d6700 [ 26.731332] which belongs to the cache kmalloc-64 of size 64 [ 26.732133] The buggy address is located 0 bytes to the right of [ 26.732133] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.732958] [ 26.733195] The buggy address belongs to the physical page: [ 26.733434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.733756] flags: 0x200000000000000(node=0|zone=2) [ 26.734293] page_type: f5(slab) [ 26.734725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.735310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.735629] page dumped because: kasan: bad access detected [ 26.736218] [ 26.736319] Memory state around the buggy address: [ 26.736748] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.737274] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.737743] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.738059] ^ [ 26.738431] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.739072] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.739377] ================================================================== [ 26.800248] ================================================================== [ 26.801160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 26.802038] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.802604] [ 26.802715] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.802778] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.802794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.802819] Call Trace: [ 26.802837] <TASK> [ 26.802857] dump_stack_lvl+0x73/0xb0 [ 26.802893] print_report+0xd1/0x610 [ 26.802916] ? __virt_addr_valid+0x1db/0x2d0 [ 26.802942] ? kasan_atomics_helper+0x860/0x5450 [ 26.802964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.802992] ? kasan_atomics_helper+0x860/0x5450 [ 26.803014] kasan_report+0x141/0x180 [ 26.803037] ? kasan_atomics_helper+0x860/0x5450 [ 26.803063] kasan_check_range+0x10c/0x1c0 [ 26.803087] __kasan_check_write+0x18/0x20 [ 26.803111] kasan_atomics_helper+0x860/0x5450 [ 26.803135] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.803158] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.803183] ? kasan_save_alloc_info+0x3b/0x50 [ 26.803212] kasan_atomics+0x1dc/0x310 [ 26.803235] ? __pfx_kasan_atomics+0x10/0x10 [ 26.803259] ? __pfx_read_tsc+0x10/0x10 [ 26.803282] ? ktime_get_ts64+0x86/0x230 [ 26.803310] kunit_try_run_case+0x1a5/0x480 [ 26.803333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.803355] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.803380] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.803405] ? __kthread_parkme+0x82/0x180 [ 26.803427] ? preempt_count_sub+0x50/0x80 [ 26.803451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.803474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.803500] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.803527] kthread+0x337/0x6f0 [ 26.803547] ? trace_preempt_on+0x20/0xc0 [ 26.803571] ? __pfx_kthread+0x10/0x10 [ 26.803593] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.803616] ? calculate_sigpending+0x7b/0xa0 [ 26.803641] ? __pfx_kthread+0x10/0x10 [ 26.803663] ret_from_fork+0x116/0x1d0 [ 26.803684] ? __pfx_kthread+0x10/0x10 [ 26.803904] ret_from_fork_asm+0x1a/0x30 [ 26.803967] </TASK> [ 26.803981] [ 26.820839] Allocated by task 315: [ 26.821121] kasan_save_stack+0x45/0x70 [ 26.821644] kasan_save_track+0x18/0x40 [ 26.821979] kasan_save_alloc_info+0x3b/0x50 [ 26.822441] __kasan_kmalloc+0xb7/0xc0 [ 26.822813] __kmalloc_cache_noprof+0x189/0x420 [ 26.823256] kasan_atomics+0x95/0x310 [ 26.823594] kunit_try_run_case+0x1a5/0x480 [ 26.823943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.824532] kthread+0x337/0x6f0 [ 26.824762] ret_from_fork+0x116/0x1d0 [ 26.825223] ret_from_fork_asm+0x1a/0x30 [ 26.825590] [ 26.825684] The buggy address belongs to the object at ffff8881058d6700 [ 26.825684] which belongs to the cache kmalloc-64 of size 64 [ 26.826767] The buggy address is located 0 bytes to the right of [ 26.826767] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.828033] [ 26.828151] The buggy address belongs to the physical page: [ 26.828609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.828948] flags: 0x200000000000000(node=0|zone=2) [ 26.829651] page_type: f5(slab) [ 26.830096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.830847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.831416] page dumped because: kasan: bad access detected [ 26.831934] [ 26.832005] Memory state around the buggy address: [ 26.832156] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.832799] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.833540] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.834269] ^ [ 26.834607] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.834984] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.835721] ================================================================== [ 26.688305] ================================================================== [ 26.688611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 26.689057] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.689288] [ 26.689404] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.689460] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.689476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.689501] Call Trace: [ 26.689524] <TASK> [ 26.689550] dump_stack_lvl+0x73/0xb0 [ 26.689584] print_report+0xd1/0x610 [ 26.689608] ? __virt_addr_valid+0x1db/0x2d0 [ 26.689633] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.689655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.689683] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.689719] kasan_report+0x141/0x180 [ 26.689742] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.689769] kasan_check_range+0x10c/0x1c0 [ 26.689793] __kasan_check_write+0x18/0x20 [ 26.689834] kasan_atomics_helper+0x5fe/0x5450 [ 26.689856] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.689879] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.689905] ? kasan_save_alloc_info+0x3b/0x50 [ 26.689933] kasan_atomics+0x1dc/0x310 [ 26.689957] ? __pfx_kasan_atomics+0x10/0x10 [ 26.689982] ? __pfx_read_tsc+0x10/0x10 [ 26.690033] ? ktime_get_ts64+0x86/0x230 [ 26.690061] kunit_try_run_case+0x1a5/0x480 [ 26.690086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.690106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.690132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.690157] ? __kthread_parkme+0x82/0x180 [ 26.690180] ? preempt_count_sub+0x50/0x80 [ 26.690205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.690228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.690255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.690281] kthread+0x337/0x6f0 [ 26.690302] ? trace_preempt_on+0x20/0xc0 [ 26.690327] ? __pfx_kthread+0x10/0x10 [ 26.690349] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.690372] ? calculate_sigpending+0x7b/0xa0 [ 26.690399] ? __pfx_kthread+0x10/0x10 [ 26.690422] ret_from_fork+0x116/0x1d0 [ 26.690443] ? __pfx_kthread+0x10/0x10 [ 26.690464] ret_from_fork_asm+0x1a/0x30 [ 26.690497] </TASK> [ 26.690510] [ 26.698205] Allocated by task 315: [ 26.698336] kasan_save_stack+0x45/0x70 [ 26.698732] kasan_save_track+0x18/0x40 [ 26.699105] kasan_save_alloc_info+0x3b/0x50 [ 26.699300] __kasan_kmalloc+0xb7/0xc0 [ 26.699477] __kmalloc_cache_noprof+0x189/0x420 [ 26.699702] kasan_atomics+0x95/0x310 [ 26.699911] kunit_try_run_case+0x1a5/0x480 [ 26.700091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.700306] kthread+0x337/0x6f0 [ 26.700502] ret_from_fork+0x116/0x1d0 [ 26.700676] ret_from_fork_asm+0x1a/0x30 [ 26.700853] [ 26.700920] The buggy address belongs to the object at ffff8881058d6700 [ 26.700920] which belongs to the cache kmalloc-64 of size 64 [ 26.702949] The buggy address is located 0 bytes to the right of [ 26.702949] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.703374] [ 26.703449] The buggy address belongs to the physical page: [ 26.703623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.704611] flags: 0x200000000000000(node=0|zone=2) [ 26.705257] page_type: f5(slab) [ 26.705565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.706163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.706509] page dumped because: kasan: bad access detected [ 26.706955] [ 26.707191] Memory state around the buggy address: [ 26.707655] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.708313] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.708599] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.709154] ^ [ 26.709611] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.710270] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.710685] ================================================================== [ 27.188150] ================================================================== [ 27.188509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 27.189021] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.189631] [ 27.189785] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.189862] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.189878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.189902] Call Trace: [ 27.189936] <TASK> [ 27.189959] dump_stack_lvl+0x73/0xb0 [ 27.190004] print_report+0xd1/0x610 [ 27.190028] ? __virt_addr_valid+0x1db/0x2d0 [ 27.190065] ? kasan_atomics_helper+0x1217/0x5450 [ 27.190087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.190114] ? kasan_atomics_helper+0x1217/0x5450 [ 27.190137] kasan_report+0x141/0x180 [ 27.190159] ? kasan_atomics_helper+0x1217/0x5450 [ 27.190186] kasan_check_range+0x10c/0x1c0 [ 27.190211] __kasan_check_write+0x18/0x20 [ 27.190235] kasan_atomics_helper+0x1217/0x5450 [ 27.190258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.190281] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.190306] ? kasan_save_alloc_info+0x3b/0x50 [ 27.190336] kasan_atomics+0x1dc/0x310 [ 27.190369] ? __pfx_kasan_atomics+0x10/0x10 [ 27.190394] ? __pfx_read_tsc+0x10/0x10 [ 27.190418] ? ktime_get_ts64+0x86/0x230 [ 27.190455] kunit_try_run_case+0x1a5/0x480 [ 27.190480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.190501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.190527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.190561] ? __kthread_parkme+0x82/0x180 [ 27.190583] ? preempt_count_sub+0x50/0x80 [ 27.190609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.190641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.190668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.190702] kthread+0x337/0x6f0 [ 27.190722] ? trace_preempt_on+0x20/0xc0 [ 27.190756] ? __pfx_kthread+0x10/0x10 [ 27.190778] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.190812] ? calculate_sigpending+0x7b/0xa0 [ 27.190850] ? __pfx_kthread+0x10/0x10 [ 27.190873] ret_from_fork+0x116/0x1d0 [ 27.190894] ? __pfx_kthread+0x10/0x10 [ 27.190916] ret_from_fork_asm+0x1a/0x30 [ 27.190958] </TASK> [ 27.190972] [ 27.198748] Allocated by task 315: [ 27.198993] kasan_save_stack+0x45/0x70 [ 27.199167] kasan_save_track+0x18/0x40 [ 27.199359] kasan_save_alloc_info+0x3b/0x50 [ 27.199541] __kasan_kmalloc+0xb7/0xc0 [ 27.199753] __kmalloc_cache_noprof+0x189/0x420 [ 27.200198] kasan_atomics+0x95/0x310 [ 27.200383] kunit_try_run_case+0x1a5/0x480 [ 27.200575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.201804] kthread+0x337/0x6f0 [ 27.202051] ret_from_fork+0x116/0x1d0 [ 27.202206] ret_from_fork_asm+0x1a/0x30 [ 27.202348] [ 27.202419] The buggy address belongs to the object at ffff8881058d6700 [ 27.202419] which belongs to the cache kmalloc-64 of size 64 [ 27.203473] The buggy address is located 0 bytes to the right of [ 27.203473] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.204544] [ 27.204748] The buggy address belongs to the physical page: [ 27.205284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.205788] flags: 0x200000000000000(node=0|zone=2) [ 27.206225] page_type: f5(slab) [ 27.206526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.207565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.208056] page dumped because: kasan: bad access detected [ 27.208305] [ 27.208393] Memory state around the buggy address: [ 27.208603] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.209357] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.209912] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.210213] ^ [ 27.210424] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.210730] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.210942] ================================================================== [ 27.506468] ================================================================== [ 27.506841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 27.507130] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.507572] [ 27.507711] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.507764] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.507779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.507802] Call Trace: [ 27.507831] <TASK> [ 27.507871] dump_stack_lvl+0x73/0xb0 [ 27.507904] print_report+0xd1/0x610 [ 27.507938] ? __virt_addr_valid+0x1db/0x2d0 [ 27.507963] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.507987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.508013] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.508036] kasan_report+0x141/0x180 [ 27.508068] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.508094] kasan_check_range+0x10c/0x1c0 [ 27.508129] __kasan_check_write+0x18/0x20 [ 27.508152] kasan_atomics_helper+0x19e3/0x5450 [ 27.508176] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.508198] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.508224] ? kasan_save_alloc_info+0x3b/0x50 [ 27.508253] kasan_atomics+0x1dc/0x310 [ 27.508275] ? __pfx_kasan_atomics+0x10/0x10 [ 27.508300] ? __pfx_read_tsc+0x10/0x10 [ 27.508325] ? ktime_get_ts64+0x86/0x230 [ 27.508352] kunit_try_run_case+0x1a5/0x480 [ 27.508375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.508397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.508423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.508448] ? __kthread_parkme+0x82/0x180 [ 27.508471] ? preempt_count_sub+0x50/0x80 [ 27.508496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.508519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.508545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.508571] kthread+0x337/0x6f0 [ 27.508591] ? trace_preempt_on+0x20/0xc0 [ 27.508616] ? __pfx_kthread+0x10/0x10 [ 27.508638] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.508662] ? calculate_sigpending+0x7b/0xa0 [ 27.508688] ? __pfx_kthread+0x10/0x10 [ 27.508719] ret_from_fork+0x116/0x1d0 [ 27.508749] ? __pfx_kthread+0x10/0x10 [ 27.508771] ret_from_fork_asm+0x1a/0x30 [ 27.508804] </TASK> [ 27.508827] [ 27.516331] Allocated by task 315: [ 27.516505] kasan_save_stack+0x45/0x70 [ 27.516744] kasan_save_track+0x18/0x40 [ 27.516944] kasan_save_alloc_info+0x3b/0x50 [ 27.517137] __kasan_kmalloc+0xb7/0xc0 [ 27.517328] __kmalloc_cache_noprof+0x189/0x420 [ 27.517529] kasan_atomics+0x95/0x310 [ 27.517713] kunit_try_run_case+0x1a5/0x480 [ 27.518017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.518256] kthread+0x337/0x6f0 [ 27.518424] ret_from_fork+0x116/0x1d0 [ 27.518607] ret_from_fork_asm+0x1a/0x30 [ 27.518856] [ 27.518936] The buggy address belongs to the object at ffff8881058d6700 [ 27.518936] which belongs to the cache kmalloc-64 of size 64 [ 27.519437] The buggy address is located 0 bytes to the right of [ 27.519437] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.520040] [ 27.520113] The buggy address belongs to the physical page: [ 27.520397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.520726] flags: 0x200000000000000(node=0|zone=2) [ 27.521030] page_type: f5(slab) [ 27.521181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.521526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.521762] page dumped because: kasan: bad access detected [ 27.521939] [ 27.522005] Memory state around the buggy address: [ 27.522196] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.522628] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.523141] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.523352] ^ [ 27.523503] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.523736] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.524288] ================================================================== [ 26.955053] ================================================================== [ 26.955392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 26.955728] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.956052] [ 26.956154] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.956201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.956216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.956237] Call Trace: [ 26.956254] <TASK> [ 26.956271] dump_stack_lvl+0x73/0xb0 [ 26.956300] print_report+0xd1/0x610 [ 26.956323] ? __virt_addr_valid+0x1db/0x2d0 [ 26.956347] ? kasan_atomics_helper+0xc70/0x5450 [ 26.956368] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.956394] ? kasan_atomics_helper+0xc70/0x5450 [ 26.956415] kasan_report+0x141/0x180 [ 26.956437] ? kasan_atomics_helper+0xc70/0x5450 [ 26.956463] kasan_check_range+0x10c/0x1c0 [ 26.956486] __kasan_check_write+0x18/0x20 [ 26.956509] kasan_atomics_helper+0xc70/0x5450 [ 26.956531] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.956553] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.956577] ? kasan_save_alloc_info+0x3b/0x50 [ 26.956605] kasan_atomics+0x1dc/0x310 [ 26.956630] ? __pfx_kasan_atomics+0x10/0x10 [ 26.956654] ? __pfx_read_tsc+0x10/0x10 [ 26.956713] ? ktime_get_ts64+0x86/0x230 [ 26.956741] kunit_try_run_case+0x1a5/0x480 [ 26.956765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.956787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.956812] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.956837] ? __kthread_parkme+0x82/0x180 [ 26.956859] ? preempt_count_sub+0x50/0x80 [ 26.956884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.956908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.956934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.956960] kthread+0x337/0x6f0 [ 26.956981] ? trace_preempt_on+0x20/0xc0 [ 26.957006] ? __pfx_kthread+0x10/0x10 [ 26.957028] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.957051] ? calculate_sigpending+0x7b/0xa0 [ 26.957077] ? __pfx_kthread+0x10/0x10 [ 26.957100] ret_from_fork+0x116/0x1d0 [ 26.957133] ? __pfx_kthread+0x10/0x10 [ 26.957154] ret_from_fork_asm+0x1a/0x30 [ 26.957186] </TASK> [ 26.957199] [ 26.964954] Allocated by task 315: [ 26.965127] kasan_save_stack+0x45/0x70 [ 26.965326] kasan_save_track+0x18/0x40 [ 26.965513] kasan_save_alloc_info+0x3b/0x50 [ 26.965724] __kasan_kmalloc+0xb7/0xc0 [ 26.965975] __kmalloc_cache_noprof+0x189/0x420 [ 26.966174] kasan_atomics+0x95/0x310 [ 26.966365] kunit_try_run_case+0x1a5/0x480 [ 26.966543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.966820] kthread+0x337/0x6f0 [ 26.966986] ret_from_fork+0x116/0x1d0 [ 26.967161] ret_from_fork_asm+0x1a/0x30 [ 26.967297] [ 26.967364] The buggy address belongs to the object at ffff8881058d6700 [ 26.967364] which belongs to the cache kmalloc-64 of size 64 [ 26.967714] The buggy address is located 0 bytes to the right of [ 26.967714] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.968080] [ 26.968150] The buggy address belongs to the physical page: [ 26.968332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.968708] flags: 0x200000000000000(node=0|zone=2) [ 26.968939] page_type: f5(slab) [ 26.969101] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.969434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.969771] page dumped because: kasan: bad access detected [ 26.970020] [ 26.970109] Memory state around the buggy address: [ 26.970457] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.970746] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.971038] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.971249] ^ [ 26.971403] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.971612] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.972080] ================================================================== [ 26.895412] ================================================================== [ 26.896092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 26.896748] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.897398] [ 26.897590] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.897646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.897661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.897685] Call Trace: [ 26.897710] <TASK> [ 26.897743] dump_stack_lvl+0x73/0xb0 [ 26.897776] print_report+0xd1/0x610 [ 26.897799] ? __virt_addr_valid+0x1db/0x2d0 [ 26.897837] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.897859] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.897886] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.897909] kasan_report+0x141/0x180 [ 26.897933] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.897959] kasan_check_range+0x10c/0x1c0 [ 26.897984] __kasan_check_write+0x18/0x20 [ 26.898008] kasan_atomics_helper+0xa2b/0x5450 [ 26.898043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.898068] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.898095] ? kasan_save_alloc_info+0x3b/0x50 [ 26.898124] kasan_atomics+0x1dc/0x310 [ 26.898148] ? __pfx_kasan_atomics+0x10/0x10 [ 26.898172] ? __pfx_read_tsc+0x10/0x10 [ 26.898197] ? ktime_get_ts64+0x86/0x230 [ 26.898224] kunit_try_run_case+0x1a5/0x480 [ 26.898248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.898269] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.898296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.898320] ? __kthread_parkme+0x82/0x180 [ 26.898343] ? preempt_count_sub+0x50/0x80 [ 26.898368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.898390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.898417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.898443] kthread+0x337/0x6f0 [ 26.898464] ? trace_preempt_on+0x20/0xc0 [ 26.898490] ? __pfx_kthread+0x10/0x10 [ 26.898513] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.898536] ? calculate_sigpending+0x7b/0xa0 [ 26.898562] ? __pfx_kthread+0x10/0x10 [ 26.898585] ret_from_fork+0x116/0x1d0 [ 26.898606] ? __pfx_kthread+0x10/0x10 [ 26.898628] ret_from_fork_asm+0x1a/0x30 [ 26.898662] </TASK> [ 26.898675] [ 26.910184] Allocated by task 315: [ 26.910507] kasan_save_stack+0x45/0x70 [ 26.910842] kasan_save_track+0x18/0x40 [ 26.910981] kasan_save_alloc_info+0x3b/0x50 [ 26.911127] __kasan_kmalloc+0xb7/0xc0 [ 26.911254] __kmalloc_cache_noprof+0x189/0x420 [ 26.911405] kasan_atomics+0x95/0x310 [ 26.911533] kunit_try_run_case+0x1a5/0x480 [ 26.911672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.911915] kthread+0x337/0x6f0 [ 26.912114] ret_from_fork+0x116/0x1d0 [ 26.912305] ret_from_fork_asm+0x1a/0x30 [ 26.912458] [ 26.912526] The buggy address belongs to the object at ffff8881058d6700 [ 26.912526] which belongs to the cache kmalloc-64 of size 64 [ 26.913000] The buggy address is located 0 bytes to the right of [ 26.913000] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.913418] [ 26.913526] The buggy address belongs to the physical page: [ 26.913845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.914263] flags: 0x200000000000000(node=0|zone=2) [ 26.914509] page_type: f5(slab) [ 26.914667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.915028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.915343] page dumped because: kasan: bad access detected [ 26.915582] [ 26.915672] Memory state around the buggy address: [ 26.915905] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.916201] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.916460] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.916759] ^ [ 26.916999] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.917286] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.917592] ================================================================== [ 27.290446] ================================================================== [ 27.291154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 27.291501] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.291860] [ 27.291951] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.292006] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.292021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.292045] Call Trace: [ 27.292066] <TASK> [ 27.292088] dump_stack_lvl+0x73/0xb0 [ 27.292121] print_report+0xd1/0x610 [ 27.292146] ? __virt_addr_valid+0x1db/0x2d0 [ 27.292172] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.292195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.292222] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.292244] kasan_report+0x141/0x180 [ 27.292267] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.292294] __asan_report_load8_noabort+0x18/0x20 [ 27.292331] kasan_atomics_helper+0x4eae/0x5450 [ 27.292354] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.292377] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.292422] ? kasan_save_alloc_info+0x3b/0x50 [ 27.292452] kasan_atomics+0x1dc/0x310 [ 27.292475] ? __pfx_kasan_atomics+0x10/0x10 [ 27.292511] ? __pfx_read_tsc+0x10/0x10 [ 27.292537] ? ktime_get_ts64+0x86/0x230 [ 27.292564] kunit_try_run_case+0x1a5/0x480 [ 27.292588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.292610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.292635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.292660] ? __kthread_parkme+0x82/0x180 [ 27.292683] ? preempt_count_sub+0x50/0x80 [ 27.292723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.292746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.292772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.292819] kthread+0x337/0x6f0 [ 27.292840] ? trace_preempt_on+0x20/0xc0 [ 27.292866] ? __pfx_kthread+0x10/0x10 [ 27.292897] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.292920] ? calculate_sigpending+0x7b/0xa0 [ 27.292946] ? __pfx_kthread+0x10/0x10 [ 27.292968] ret_from_fork+0x116/0x1d0 [ 27.292989] ? __pfx_kthread+0x10/0x10 [ 27.293011] ret_from_fork_asm+0x1a/0x30 [ 27.293043] </TASK> [ 27.293056] [ 27.300547] Allocated by task 315: [ 27.300745] kasan_save_stack+0x45/0x70 [ 27.300937] kasan_save_track+0x18/0x40 [ 27.301071] kasan_save_alloc_info+0x3b/0x50 [ 27.301308] __kasan_kmalloc+0xb7/0xc0 [ 27.301508] __kmalloc_cache_noprof+0x189/0x420 [ 27.301702] kasan_atomics+0x95/0x310 [ 27.302006] kunit_try_run_case+0x1a5/0x480 [ 27.302178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.302397] kthread+0x337/0x6f0 [ 27.302563] ret_from_fork+0x116/0x1d0 [ 27.303880] ret_from_fork_asm+0x1a/0x30 [ 27.304084] [ 27.304179] The buggy address belongs to the object at ffff8881058d6700 [ 27.304179] which belongs to the cache kmalloc-64 of size 64 [ 27.305902] The buggy address is located 0 bytes to the right of [ 27.305902] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.306284] [ 27.306359] The buggy address belongs to the physical page: [ 27.306528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.306812] flags: 0x200000000000000(node=0|zone=2) [ 27.307045] page_type: f5(slab) [ 27.307209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.307541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.307934] page dumped because: kasan: bad access detected [ 27.308200] [ 27.308270] Memory state around the buggy address: [ 27.308416] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.309456] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.310933] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.311995] ^ [ 27.312172] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.312392] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.312603] ================================================================== [ 27.427191] ================================================================== [ 27.427539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 27.428333] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.428749] [ 27.428871] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.428957] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.428973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.428995] Call Trace: [ 27.429023] <TASK> [ 27.429043] dump_stack_lvl+0x73/0xb0 [ 27.429076] print_report+0xd1/0x610 [ 27.429099] ? __virt_addr_valid+0x1db/0x2d0 [ 27.429125] ? kasan_atomics_helper+0x177f/0x5450 [ 27.429147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.429173] ? kasan_atomics_helper+0x177f/0x5450 [ 27.429198] kasan_report+0x141/0x180 [ 27.429221] ? kasan_atomics_helper+0x177f/0x5450 [ 27.429277] kasan_check_range+0x10c/0x1c0 [ 27.429302] __kasan_check_write+0x18/0x20 [ 27.429336] kasan_atomics_helper+0x177f/0x5450 [ 27.429360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.429382] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.429408] ? kasan_save_alloc_info+0x3b/0x50 [ 27.429437] kasan_atomics+0x1dc/0x310 [ 27.429461] ? __pfx_kasan_atomics+0x10/0x10 [ 27.429486] ? __pfx_read_tsc+0x10/0x10 [ 27.429539] ? ktime_get_ts64+0x86/0x230 [ 27.429577] kunit_try_run_case+0x1a5/0x480 [ 27.429613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.429636] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.429663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.429689] ? __kthread_parkme+0x82/0x180 [ 27.429721] ? preempt_count_sub+0x50/0x80 [ 27.429746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.429770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.429808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.429835] kthread+0x337/0x6f0 [ 27.429856] ? trace_preempt_on+0x20/0xc0 [ 27.429881] ? __pfx_kthread+0x10/0x10 [ 27.429904] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.429928] ? calculate_sigpending+0x7b/0xa0 [ 27.429954] ? __pfx_kthread+0x10/0x10 [ 27.429978] ret_from_fork+0x116/0x1d0 [ 27.429999] ? __pfx_kthread+0x10/0x10 [ 27.430021] ret_from_fork_asm+0x1a/0x30 [ 27.430055] </TASK> [ 27.430068] [ 27.438022] Allocated by task 315: [ 27.438378] kasan_save_stack+0x45/0x70 [ 27.438622] kasan_save_track+0x18/0x40 [ 27.438873] kasan_save_alloc_info+0x3b/0x50 [ 27.439085] __kasan_kmalloc+0xb7/0xc0 [ 27.439303] __kmalloc_cache_noprof+0x189/0x420 [ 27.439474] kasan_atomics+0x95/0x310 [ 27.439610] kunit_try_run_case+0x1a5/0x480 [ 27.439878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.440158] kthread+0x337/0x6f0 [ 27.440280] ret_from_fork+0x116/0x1d0 [ 27.440410] ret_from_fork_asm+0x1a/0x30 [ 27.440650] [ 27.440752] The buggy address belongs to the object at ffff8881058d6700 [ 27.440752] which belongs to the cache kmalloc-64 of size 64 [ 27.441322] The buggy address is located 0 bytes to the right of [ 27.441322] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.441687] [ 27.441785] The buggy address belongs to the physical page: [ 27.442087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.442577] flags: 0x200000000000000(node=0|zone=2) [ 27.442828] page_type: f5(slab) [ 27.443044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.443340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.443571] page dumped because: kasan: bad access detected [ 27.443909] [ 27.444048] Memory state around the buggy address: [ 27.444243] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.444540] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.445004] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.445351] ^ [ 27.445581] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.445902] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.446113] ================================================================== [ 26.995871] ================================================================== [ 26.996135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 26.996498] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.996774] [ 26.996877] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.996927] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.996942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.996974] Call Trace: [ 26.996992] <TASK> [ 26.997011] dump_stack_lvl+0x73/0xb0 [ 26.997054] print_report+0xd1/0x610 [ 26.997078] ? __virt_addr_valid+0x1db/0x2d0 [ 26.997125] ? kasan_atomics_helper+0xd47/0x5450 [ 26.997147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.997174] ? kasan_atomics_helper+0xd47/0x5450 [ 26.997207] kasan_report+0x141/0x180 [ 26.997229] ? kasan_atomics_helper+0xd47/0x5450 [ 26.997256] kasan_check_range+0x10c/0x1c0 [ 26.997280] __kasan_check_write+0x18/0x20 [ 26.997304] kasan_atomics_helper+0xd47/0x5450 [ 26.997327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.997350] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.997374] ? kasan_save_alloc_info+0x3b/0x50 [ 26.997403] kasan_atomics+0x1dc/0x310 [ 26.997426] ? __pfx_kasan_atomics+0x10/0x10 [ 26.997451] ? __pfx_read_tsc+0x10/0x10 [ 26.997483] ? ktime_get_ts64+0x86/0x230 [ 26.997509] kunit_try_run_case+0x1a5/0x480 [ 26.997543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.997564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.997589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.997614] ? __kthread_parkme+0x82/0x180 [ 26.997635] ? preempt_count_sub+0x50/0x80 [ 26.997660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.997682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.997717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.997743] kthread+0x337/0x6f0 [ 26.997764] ? trace_preempt_on+0x20/0xc0 [ 26.997788] ? __pfx_kthread+0x10/0x10 [ 26.997810] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.997833] ? calculate_sigpending+0x7b/0xa0 [ 26.997858] ? __pfx_kthread+0x10/0x10 [ 26.997890] ret_from_fork+0x116/0x1d0 [ 26.997921] ? __pfx_kthread+0x10/0x10 [ 26.997943] ret_from_fork_asm+0x1a/0x30 [ 26.997986] </TASK> [ 26.997998] [ 27.005771] Allocated by task 315: [ 27.006020] kasan_save_stack+0x45/0x70 [ 27.006229] kasan_save_track+0x18/0x40 [ 27.006396] kasan_save_alloc_info+0x3b/0x50 [ 27.006611] __kasan_kmalloc+0xb7/0xc0 [ 27.006817] __kmalloc_cache_noprof+0x189/0x420 [ 27.007003] kasan_atomics+0x95/0x310 [ 27.007134] kunit_try_run_case+0x1a5/0x480 [ 27.007316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.007590] kthread+0x337/0x6f0 [ 27.007762] ret_from_fork+0x116/0x1d0 [ 27.007902] ret_from_fork_asm+0x1a/0x30 [ 27.008038] [ 27.008114] The buggy address belongs to the object at ffff8881058d6700 [ 27.008114] which belongs to the cache kmalloc-64 of size 64 [ 27.008656] The buggy address is located 0 bytes to the right of [ 27.008656] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.009081] [ 27.009151] The buggy address belongs to the physical page: [ 27.009320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.009818] flags: 0x200000000000000(node=0|zone=2) [ 27.010051] page_type: f5(slab) [ 27.010215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.010549] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.010911] page dumped because: kasan: bad access detected [ 27.011079] [ 27.011144] Memory state around the buggy address: [ 27.011297] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.011542] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.011994] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.012337] ^ [ 27.012535] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.012907] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.013187] ================================================================== [ 27.597543] ================================================================== [ 27.597828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 27.598105] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.599219] [ 27.599459] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.599518] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.599590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.599614] Call Trace: [ 27.599634] <TASK> [ 27.599657] dump_stack_lvl+0x73/0xb0 [ 27.599704] print_report+0xd1/0x610 [ 27.599728] ? __virt_addr_valid+0x1db/0x2d0 [ 27.599753] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.599788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.599819] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.599842] kasan_report+0x141/0x180 [ 27.599865] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.599892] __asan_report_load8_noabort+0x18/0x20 [ 27.599917] kasan_atomics_helper+0x4f30/0x5450 [ 27.599940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.599963] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.599987] ? kasan_save_alloc_info+0x3b/0x50 [ 27.600016] kasan_atomics+0x1dc/0x310 [ 27.600040] ? __pfx_kasan_atomics+0x10/0x10 [ 27.600065] ? __pfx_read_tsc+0x10/0x10 [ 27.600089] ? ktime_get_ts64+0x86/0x230 [ 27.600116] kunit_try_run_case+0x1a5/0x480 [ 27.600138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.600160] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.600185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.600210] ? __kthread_parkme+0x82/0x180 [ 27.600232] ? preempt_count_sub+0x50/0x80 [ 27.600257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.600280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.600305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.600332] kthread+0x337/0x6f0 [ 27.600353] ? trace_preempt_on+0x20/0xc0 [ 27.600378] ? __pfx_kthread+0x10/0x10 [ 27.600400] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.600423] ? calculate_sigpending+0x7b/0xa0 [ 27.600449] ? __pfx_kthread+0x10/0x10 [ 27.600472] ret_from_fork+0x116/0x1d0 [ 27.600492] ? __pfx_kthread+0x10/0x10 [ 27.600516] ret_from_fork_asm+0x1a/0x30 [ 27.600551] </TASK> [ 27.600564] [ 27.610084] Allocated by task 315: [ 27.610260] kasan_save_stack+0x45/0x70 [ 27.610430] kasan_save_track+0x18/0x40 [ 27.610594] kasan_save_alloc_info+0x3b/0x50 [ 27.611193] __kasan_kmalloc+0xb7/0xc0 [ 27.611380] __kmalloc_cache_noprof+0x189/0x420 [ 27.611549] kasan_atomics+0x95/0x310 [ 27.611834] kunit_try_run_case+0x1a5/0x480 [ 27.612074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.612432] kthread+0x337/0x6f0 [ 27.612580] ret_from_fork+0x116/0x1d0 [ 27.613000] ret_from_fork_asm+0x1a/0x30 [ 27.613260] [ 27.613361] The buggy address belongs to the object at ffff8881058d6700 [ 27.613361] which belongs to the cache kmalloc-64 of size 64 [ 27.614048] The buggy address is located 0 bytes to the right of [ 27.614048] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.614624] [ 27.614723] The buggy address belongs to the physical page: [ 27.615199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.615597] flags: 0x200000000000000(node=0|zone=2) [ 27.615937] page_type: f5(slab) [ 27.616073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.616523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.616969] page dumped because: kasan: bad access detected [ 27.617230] [ 27.617388] Memory state around the buggy address: [ 27.617713] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.618106] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.618399] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.618685] ^ [ 27.619103] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.619462] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.619747] ================================================================== [ 27.032477] ================================================================== [ 27.032866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 27.033142] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.033362] [ 27.033444] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.033493] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.033507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.033531] Call Trace: [ 27.033549] <TASK> [ 27.033566] dump_stack_lvl+0x73/0xb0 [ 27.033610] print_report+0xd1/0x610 [ 27.033633] ? __virt_addr_valid+0x1db/0x2d0 [ 27.033658] ? kasan_atomics_helper+0xe78/0x5450 [ 27.033701] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.033728] ? kasan_atomics_helper+0xe78/0x5450 [ 27.033752] kasan_report+0x141/0x180 [ 27.033775] ? kasan_atomics_helper+0xe78/0x5450 [ 27.033821] kasan_check_range+0x10c/0x1c0 [ 27.033845] __kasan_check_write+0x18/0x20 [ 27.033869] kasan_atomics_helper+0xe78/0x5450 [ 27.033903] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.033926] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.033951] ? kasan_save_alloc_info+0x3b/0x50 [ 27.033980] kasan_atomics+0x1dc/0x310 [ 27.034012] ? __pfx_kasan_atomics+0x10/0x10 [ 27.034037] ? __pfx_read_tsc+0x10/0x10 [ 27.034060] ? ktime_get_ts64+0x86/0x230 [ 27.034097] kunit_try_run_case+0x1a5/0x480 [ 27.034120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.034143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.034171] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.034197] ? __kthread_parkme+0x82/0x180 [ 27.034220] ? preempt_count_sub+0x50/0x80 [ 27.034245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.034268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.034294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.034319] kthread+0x337/0x6f0 [ 27.034340] ? trace_preempt_on+0x20/0xc0 [ 27.034365] ? __pfx_kthread+0x10/0x10 [ 27.034387] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.034410] ? calculate_sigpending+0x7b/0xa0 [ 27.034435] ? __pfx_kthread+0x10/0x10 [ 27.034457] ret_from_fork+0x116/0x1d0 [ 27.034477] ? __pfx_kthread+0x10/0x10 [ 27.034499] ret_from_fork_asm+0x1a/0x30 [ 27.034531] </TASK> [ 27.034543] [ 27.041323] Allocated by task 315: [ 27.041502] kasan_save_stack+0x45/0x70 [ 27.041710] kasan_save_track+0x18/0x40 [ 27.042064] kasan_save_alloc_info+0x3b/0x50 [ 27.042274] __kasan_kmalloc+0xb7/0xc0 [ 27.042455] __kmalloc_cache_noprof+0x189/0x420 [ 27.042682] kasan_atomics+0x95/0x310 [ 27.043020] kunit_try_run_case+0x1a5/0x480 [ 27.043228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.043478] kthread+0x337/0x6f0 [ 27.043645] ret_from_fork+0x116/0x1d0 [ 27.043927] ret_from_fork_asm+0x1a/0x30 [ 27.044125] [ 27.044218] The buggy address belongs to the object at ffff8881058d6700 [ 27.044218] which belongs to the cache kmalloc-64 of size 64 [ 27.044572] The buggy address is located 0 bytes to the right of [ 27.044572] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.045480] [ 27.045572] The buggy address belongs to the physical page: [ 27.045760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.046988] flags: 0x200000000000000(node=0|zone=2) [ 27.047157] page_type: f5(slab) [ 27.047283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.047556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.048666] page dumped because: kasan: bad access detected [ 27.048865] [ 27.048934] Memory state around the buggy address: [ 27.049083] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.049359] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.049613] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.050213] ^ [ 27.050445] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.050829] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.051147] ================================================================== [ 27.407435] ================================================================== [ 27.407796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 27.408437] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.408784] [ 27.408899] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.408983] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.408999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.409024] Call Trace: [ 27.409046] <TASK> [ 27.409092] dump_stack_lvl+0x73/0xb0 [ 27.409137] print_report+0xd1/0x610 [ 27.409188] ? __virt_addr_valid+0x1db/0x2d0 [ 27.409225] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.409259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.409314] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.409349] kasan_report+0x141/0x180 [ 27.409382] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.409410] kasan_check_range+0x10c/0x1c0 [ 27.409434] __kasan_check_write+0x18/0x20 [ 27.409458] kasan_atomics_helper+0x16e7/0x5450 [ 27.409482] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.409505] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.409531] ? kasan_save_alloc_info+0x3b/0x50 [ 27.409560] kasan_atomics+0x1dc/0x310 [ 27.409584] ? __pfx_kasan_atomics+0x10/0x10 [ 27.409608] ? __pfx_read_tsc+0x10/0x10 [ 27.409633] ? ktime_get_ts64+0x86/0x230 [ 27.409660] kunit_try_run_case+0x1a5/0x480 [ 27.409684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.409714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.409740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.409765] ? __kthread_parkme+0x82/0x180 [ 27.409798] ? preempt_count_sub+0x50/0x80 [ 27.409824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.409847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.409873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.409913] kthread+0x337/0x6f0 [ 27.409934] ? trace_preempt_on+0x20/0xc0 [ 27.409960] ? __pfx_kthread+0x10/0x10 [ 27.409982] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.410004] ? calculate_sigpending+0x7b/0xa0 [ 27.410030] ? __pfx_kthread+0x10/0x10 [ 27.410053] ret_from_fork+0x116/0x1d0 [ 27.410074] ? __pfx_kthread+0x10/0x10 [ 27.410096] ret_from_fork_asm+0x1a/0x30 [ 27.410130] </TASK> [ 27.410144] [ 27.418259] Allocated by task 315: [ 27.418482] kasan_save_stack+0x45/0x70 [ 27.418648] kasan_save_track+0x18/0x40 [ 27.418890] kasan_save_alloc_info+0x3b/0x50 [ 27.419132] __kasan_kmalloc+0xb7/0xc0 [ 27.419263] __kmalloc_cache_noprof+0x189/0x420 [ 27.419415] kasan_atomics+0x95/0x310 [ 27.419544] kunit_try_run_case+0x1a5/0x480 [ 27.419760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.420138] kthread+0x337/0x6f0 [ 27.420322] ret_from_fork+0x116/0x1d0 [ 27.420559] ret_from_fork_asm+0x1a/0x30 [ 27.420890] [ 27.420977] The buggy address belongs to the object at ffff8881058d6700 [ 27.420977] which belongs to the cache kmalloc-64 of size 64 [ 27.421389] The buggy address is located 0 bytes to the right of [ 27.421389] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.421956] [ 27.422063] The buggy address belongs to the physical page: [ 27.422367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.422720] flags: 0x200000000000000(node=0|zone=2) [ 27.422880] page_type: f5(slab) [ 27.423082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.423408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.423629] page dumped because: kasan: bad access detected [ 27.423807] [ 27.423896] Memory state around the buggy address: [ 27.424193] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.424559] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.424886] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.425202] ^ [ 27.425362] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.425907] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.426179] ================================================================== [ 27.850192] ================================================================== [ 27.850598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 27.851384] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.851690] [ 27.851993] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.852052] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.852068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.852092] Call Trace: [ 27.852112] <TASK> [ 27.852133] dump_stack_lvl+0x73/0xb0 [ 27.852169] print_report+0xd1/0x610 [ 27.852195] ? __virt_addr_valid+0x1db/0x2d0 [ 27.852220] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.852243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.852271] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.852293] kasan_report+0x141/0x180 [ 27.852316] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.852343] __asan_report_load8_noabort+0x18/0x20 [ 27.852368] kasan_atomics_helper+0x4fa5/0x5450 [ 27.852392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.852416] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.852441] ? kasan_save_alloc_info+0x3b/0x50 [ 27.852470] kasan_atomics+0x1dc/0x310 [ 27.852494] ? __pfx_kasan_atomics+0x10/0x10 [ 27.852518] ? __pfx_read_tsc+0x10/0x10 [ 27.852541] ? ktime_get_ts64+0x86/0x230 [ 27.852568] kunit_try_run_case+0x1a5/0x480 [ 27.852590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.852612] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.852637] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.852662] ? __kthread_parkme+0x82/0x180 [ 27.852683] ? preempt_count_sub+0x50/0x80 [ 27.852721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.852744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.852769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.853210] kthread+0x337/0x6f0 [ 27.853234] ? trace_preempt_on+0x20/0xc0 [ 27.853261] ? __pfx_kthread+0x10/0x10 [ 27.853287] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.853351] ? calculate_sigpending+0x7b/0xa0 [ 27.853380] ? __pfx_kthread+0x10/0x10 [ 27.853404] ret_from_fork+0x116/0x1d0 [ 27.853425] ? __pfx_kthread+0x10/0x10 [ 27.853447] ret_from_fork_asm+0x1a/0x30 [ 27.853480] </TASK> [ 27.853494] [ 27.864532] Allocated by task 315: [ 27.864842] kasan_save_stack+0x45/0x70 [ 27.865216] kasan_save_track+0x18/0x40 [ 27.865502] kasan_save_alloc_info+0x3b/0x50 [ 27.865726] __kasan_kmalloc+0xb7/0xc0 [ 27.866222] __kmalloc_cache_noprof+0x189/0x420 [ 27.866467] kasan_atomics+0x95/0x310 [ 27.866782] kunit_try_run_case+0x1a5/0x480 [ 27.867109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.867348] kthread+0x337/0x6f0 [ 27.867495] ret_from_fork+0x116/0x1d0 [ 27.867667] ret_from_fork_asm+0x1a/0x30 [ 27.867822] [ 27.867894] The buggy address belongs to the object at ffff8881058d6700 [ 27.867894] which belongs to the cache kmalloc-64 of size 64 [ 27.868497] The buggy address is located 0 bytes to the right of [ 27.868497] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.869152] [ 27.869245] The buggy address belongs to the physical page: [ 27.869462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.869843] flags: 0x200000000000000(node=0|zone=2) [ 27.870059] page_type: f5(slab) [ 27.870226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.870531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.870898] page dumped because: kasan: bad access detected [ 27.871099] [ 27.871165] Memory state around the buggy address: [ 27.871311] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.871515] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.871867] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.872186] ^ [ 27.872431] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.873336] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.873714] ================================================================== [ 27.211598] ================================================================== [ 27.212525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 27.212972] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.213341] [ 27.213459] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.213514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.213530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.213656] Call Trace: [ 27.213681] <TASK> [ 27.213713] dump_stack_lvl+0x73/0xb0 [ 27.213747] print_report+0xd1/0x610 [ 27.213793] ? __virt_addr_valid+0x1db/0x2d0 [ 27.213821] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.213854] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.213881] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.213904] kasan_report+0x141/0x180 [ 27.213927] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.213954] __asan_report_load4_noabort+0x18/0x20 [ 27.213988] kasan_atomics_helper+0x49e8/0x5450 [ 27.214012] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.214035] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.214070] ? kasan_save_alloc_info+0x3b/0x50 [ 27.214099] kasan_atomics+0x1dc/0x310 [ 27.214122] ? __pfx_kasan_atomics+0x10/0x10 [ 27.214147] ? __pfx_read_tsc+0x10/0x10 [ 27.214171] ? ktime_get_ts64+0x86/0x230 [ 27.214197] kunit_try_run_case+0x1a5/0x480 [ 27.214221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.214243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.214268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.214293] ? __kthread_parkme+0x82/0x180 [ 27.214315] ? preempt_count_sub+0x50/0x80 [ 27.214350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.214372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.214398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.214435] kthread+0x337/0x6f0 [ 27.214455] ? trace_preempt_on+0x20/0xc0 [ 27.214482] ? __pfx_kthread+0x10/0x10 [ 27.214504] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.214527] ? calculate_sigpending+0x7b/0xa0 [ 27.214561] ? __pfx_kthread+0x10/0x10 [ 27.214584] ret_from_fork+0x116/0x1d0 [ 27.214605] ? __pfx_kthread+0x10/0x10 [ 27.214638] ret_from_fork_asm+0x1a/0x30 [ 27.214671] </TASK> [ 27.214683] [ 27.222414] Allocated by task 315: [ 27.222560] kasan_save_stack+0x45/0x70 [ 27.222716] kasan_save_track+0x18/0x40 [ 27.223055] kasan_save_alloc_info+0x3b/0x50 [ 27.223261] __kasan_kmalloc+0xb7/0xc0 [ 27.223452] __kmalloc_cache_noprof+0x189/0x420 [ 27.223606] kasan_atomics+0x95/0x310 [ 27.223768] kunit_try_run_case+0x1a5/0x480 [ 27.223980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.224246] kthread+0x337/0x6f0 [ 27.224445] ret_from_fork+0x116/0x1d0 [ 27.224631] ret_from_fork_asm+0x1a/0x30 [ 27.224782] [ 27.224851] The buggy address belongs to the object at ffff8881058d6700 [ 27.224851] which belongs to the cache kmalloc-64 of size 64 [ 27.225418] The buggy address is located 0 bytes to the right of [ 27.225418] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.225999] [ 27.226072] The buggy address belongs to the physical page: [ 27.226294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.226645] flags: 0x200000000000000(node=0|zone=2) [ 27.226940] page_type: f5(slab) [ 27.227097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.227425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.227753] page dumped because: kasan: bad access detected [ 27.227959] [ 27.228026] Memory state around the buggy address: [ 27.228176] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.228389] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.228684] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.229003] ^ [ 27.229378] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.229701] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.230160] ================================================================== [ 27.387829] ================================================================== [ 27.388069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 27.388298] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.388831] [ 27.389097] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.389154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.389168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.389192] Call Trace: [ 27.389246] <TASK> [ 27.389278] dump_stack_lvl+0x73/0xb0 [ 27.389325] print_report+0xd1/0x610 [ 27.389377] ? __virt_addr_valid+0x1db/0x2d0 [ 27.389424] ? kasan_atomics_helper+0x164f/0x5450 [ 27.389448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.389501] ? kasan_atomics_helper+0x164f/0x5450 [ 27.389525] kasan_report+0x141/0x180 [ 27.389569] ? kasan_atomics_helper+0x164f/0x5450 [ 27.389596] kasan_check_range+0x10c/0x1c0 [ 27.389645] __kasan_check_write+0x18/0x20 [ 27.389669] kasan_atomics_helper+0x164f/0x5450 [ 27.389709] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.389733] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.389758] ? kasan_save_alloc_info+0x3b/0x50 [ 27.389799] kasan_atomics+0x1dc/0x310 [ 27.389823] ? __pfx_kasan_atomics+0x10/0x10 [ 27.389848] ? __pfx_read_tsc+0x10/0x10 [ 27.389872] ? ktime_get_ts64+0x86/0x230 [ 27.389900] kunit_try_run_case+0x1a5/0x480 [ 27.389924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.389945] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.389972] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.389997] ? __kthread_parkme+0x82/0x180 [ 27.390020] ? preempt_count_sub+0x50/0x80 [ 27.390044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.390068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.390095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.390120] kthread+0x337/0x6f0 [ 27.390141] ? trace_preempt_on+0x20/0xc0 [ 27.390166] ? __pfx_kthread+0x10/0x10 [ 27.390188] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.390212] ? calculate_sigpending+0x7b/0xa0 [ 27.390238] ? __pfx_kthread+0x10/0x10 [ 27.390261] ret_from_fork+0x116/0x1d0 [ 27.390281] ? __pfx_kthread+0x10/0x10 [ 27.390303] ret_from_fork_asm+0x1a/0x30 [ 27.390336] </TASK> [ 27.390349] [ 27.398150] Allocated by task 315: [ 27.398444] kasan_save_stack+0x45/0x70 [ 27.398716] kasan_save_track+0x18/0x40 [ 27.399097] kasan_save_alloc_info+0x3b/0x50 [ 27.399272] __kasan_kmalloc+0xb7/0xc0 [ 27.399401] __kmalloc_cache_noprof+0x189/0x420 [ 27.399665] kasan_atomics+0x95/0x310 [ 27.400073] kunit_try_run_case+0x1a5/0x480 [ 27.400328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.400543] kthread+0x337/0x6f0 [ 27.400664] ret_from_fork+0x116/0x1d0 [ 27.400981] ret_from_fork_asm+0x1a/0x30 [ 27.401256] [ 27.401388] The buggy address belongs to the object at ffff8881058d6700 [ 27.401388] which belongs to the cache kmalloc-64 of size 64 [ 27.401927] The buggy address is located 0 bytes to the right of [ 27.401927] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.402497] [ 27.402596] The buggy address belongs to the physical page: [ 27.402807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.403202] flags: 0x200000000000000(node=0|zone=2) [ 27.403487] page_type: f5(slab) [ 27.403644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.404022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.404305] page dumped because: kasan: bad access detected [ 27.404556] [ 27.404640] Memory state around the buggy address: [ 27.404890] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.405217] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.405480] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.405829] ^ [ 27.406037] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.406338] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.406564] ================================================================== [ 27.761118] ================================================================== [ 27.761503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 27.761906] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.762122] [ 27.762204] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.762256] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.762271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.762294] Call Trace: [ 27.762312] <TASK> [ 27.762331] dump_stack_lvl+0x73/0xb0 [ 27.762361] print_report+0xd1/0x610 [ 27.762384] ? __virt_addr_valid+0x1db/0x2d0 [ 27.762410] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.762432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.762460] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.762481] kasan_report+0x141/0x180 [ 27.762504] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.762530] __asan_report_load8_noabort+0x18/0x20 [ 27.762554] kasan_atomics_helper+0x4f98/0x5450 [ 27.762578] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.762601] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.762625] ? kasan_save_alloc_info+0x3b/0x50 [ 27.762654] kasan_atomics+0x1dc/0x310 [ 27.762678] ? __pfx_kasan_atomics+0x10/0x10 [ 27.762716] ? __pfx_read_tsc+0x10/0x10 [ 27.762740] ? ktime_get_ts64+0x86/0x230 [ 27.762790] kunit_try_run_case+0x1a5/0x480 [ 27.762814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.762849] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.762877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.762915] ? __kthread_parkme+0x82/0x180 [ 27.762950] ? preempt_count_sub+0x50/0x80 [ 27.762975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.763011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.763049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.763101] kthread+0x337/0x6f0 [ 27.763132] ? trace_preempt_on+0x20/0xc0 [ 27.763157] ? __pfx_kthread+0x10/0x10 [ 27.763180] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.763203] ? calculate_sigpending+0x7b/0xa0 [ 27.763230] ? __pfx_kthread+0x10/0x10 [ 27.763253] ret_from_fork+0x116/0x1d0 [ 27.763273] ? __pfx_kthread+0x10/0x10 [ 27.763296] ret_from_fork_asm+0x1a/0x30 [ 27.763329] </TASK> [ 27.763342] [ 27.772819] Allocated by task 315: [ 27.773122] kasan_save_stack+0x45/0x70 [ 27.773460] kasan_save_track+0x18/0x40 [ 27.773649] kasan_save_alloc_info+0x3b/0x50 [ 27.774130] __kasan_kmalloc+0xb7/0xc0 [ 27.774382] __kmalloc_cache_noprof+0x189/0x420 [ 27.774737] kasan_atomics+0x95/0x310 [ 27.775011] kunit_try_run_case+0x1a5/0x480 [ 27.775317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.775548] kthread+0x337/0x6f0 [ 27.775707] ret_from_fork+0x116/0x1d0 [ 27.775868] ret_from_fork_asm+0x1a/0x30 [ 27.776111] [ 27.776205] The buggy address belongs to the object at ffff8881058d6700 [ 27.776205] which belongs to the cache kmalloc-64 of size 64 [ 27.776639] The buggy address is located 0 bytes to the right of [ 27.776639] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.777301] [ 27.777400] The buggy address belongs to the physical page: [ 27.777631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.778012] flags: 0x200000000000000(node=0|zone=2) [ 27.778230] page_type: f5(slab) [ 27.778345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.778890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.779239] page dumped because: kasan: bad access detected [ 27.779481] [ 27.779574] Memory state around the buggy address: [ 27.779790] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.780130] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.780444] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.780726] ^ [ 27.781026] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.781269] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.781496] ================================================================== [ 26.972529] ================================================================== [ 26.973177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 26.973519] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.973754] [ 26.973963] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.974024] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.974039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.974073] Call Trace: [ 26.974089] <TASK> [ 26.974106] dump_stack_lvl+0x73/0xb0 [ 26.974135] print_report+0xd1/0x610 [ 26.974159] ? __virt_addr_valid+0x1db/0x2d0 [ 26.974182] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.974204] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.974231] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.974254] kasan_report+0x141/0x180 [ 26.974276] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.974302] __asan_report_load4_noabort+0x18/0x20 [ 26.974327] kasan_atomics_helper+0x4a84/0x5450 [ 26.974350] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.974372] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.974397] ? kasan_save_alloc_info+0x3b/0x50 [ 26.974426] kasan_atomics+0x1dc/0x310 [ 26.974449] ? __pfx_kasan_atomics+0x10/0x10 [ 26.974474] ? __pfx_read_tsc+0x10/0x10 [ 26.974500] ? ktime_get_ts64+0x86/0x230 [ 26.974527] kunit_try_run_case+0x1a5/0x480 [ 26.974550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.974572] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.974597] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.974621] ? __kthread_parkme+0x82/0x180 [ 26.974650] ? preempt_count_sub+0x50/0x80 [ 26.974676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.974715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.974742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.974768] kthread+0x337/0x6f0 [ 26.974797] ? trace_preempt_on+0x20/0xc0 [ 26.974822] ? __pfx_kthread+0x10/0x10 [ 26.974844] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.974867] ? calculate_sigpending+0x7b/0xa0 [ 26.974892] ? __pfx_kthread+0x10/0x10 [ 26.974915] ret_from_fork+0x116/0x1d0 [ 26.974936] ? __pfx_kthread+0x10/0x10 [ 26.974957] ret_from_fork_asm+0x1a/0x30 [ 26.974990] </TASK> [ 26.975003] [ 26.982232] Allocated by task 315: [ 26.982406] kasan_save_stack+0x45/0x70 [ 26.982601] kasan_save_track+0x18/0x40 [ 26.983032] kasan_save_alloc_info+0x3b/0x50 [ 26.983259] __kasan_kmalloc+0xb7/0xc0 [ 26.983416] __kmalloc_cache_noprof+0x189/0x420 [ 26.983568] kasan_atomics+0x95/0x310 [ 26.983709] kunit_try_run_case+0x1a5/0x480 [ 26.985108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.985385] kthread+0x337/0x6f0 [ 26.985555] ret_from_fork+0x116/0x1d0 [ 26.986078] ret_from_fork_asm+0x1a/0x30 [ 26.986503] [ 26.986752] The buggy address belongs to the object at ffff8881058d6700 [ 26.986752] which belongs to the cache kmalloc-64 of size 64 [ 26.987285] The buggy address is located 0 bytes to the right of [ 26.987285] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.988023] [ 26.988276] The buggy address belongs to the physical page: [ 26.988537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.989156] flags: 0x200000000000000(node=0|zone=2) [ 26.989517] page_type: f5(slab) [ 26.989919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.990438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.991292] page dumped because: kasan: bad access detected [ 26.991927] [ 26.992171] Memory state around the buggy address: [ 26.992486] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.992982] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.993462] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.993981] ^ [ 26.994413] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.994974] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.995289] ================================================================== [ 27.782288] ================================================================== [ 27.782605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 27.782949] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.783340] [ 27.783431] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.783507] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.783523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.783563] Call Trace: [ 27.783583] <TASK> [ 27.783615] dump_stack_lvl+0x73/0xb0 [ 27.783661] print_report+0xd1/0x610 [ 27.783684] ? __virt_addr_valid+0x1db/0x2d0 [ 27.783721] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.783757] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.783784] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.783806] kasan_report+0x141/0x180 [ 27.783834] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.783861] kasan_check_range+0x10c/0x1c0 [ 27.783886] __kasan_check_write+0x18/0x20 [ 27.783909] kasan_atomics_helper+0x20c8/0x5450 [ 27.783932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.783956] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.783980] ? kasan_save_alloc_info+0x3b/0x50 [ 27.784010] kasan_atomics+0x1dc/0x310 [ 27.784035] ? __pfx_kasan_atomics+0x10/0x10 [ 27.784060] ? __pfx_read_tsc+0x10/0x10 [ 27.784094] ? ktime_get_ts64+0x86/0x230 [ 27.784122] kunit_try_run_case+0x1a5/0x480 [ 27.784145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.784167] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.784192] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.784217] ? __kthread_parkme+0x82/0x180 [ 27.784239] ? preempt_count_sub+0x50/0x80 [ 27.784263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.784286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.784313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.784339] kthread+0x337/0x6f0 [ 27.784359] ? trace_preempt_on+0x20/0xc0 [ 27.784383] ? __pfx_kthread+0x10/0x10 [ 27.784405] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.784447] ? calculate_sigpending+0x7b/0xa0 [ 27.784474] ? __pfx_kthread+0x10/0x10 [ 27.784496] ret_from_fork+0x116/0x1d0 [ 27.784517] ? __pfx_kthread+0x10/0x10 [ 27.784538] ret_from_fork_asm+0x1a/0x30 [ 27.784571] </TASK> [ 27.784584] [ 27.792747] Allocated by task 315: [ 27.793043] kasan_save_stack+0x45/0x70 [ 27.793226] kasan_save_track+0x18/0x40 [ 27.793399] kasan_save_alloc_info+0x3b/0x50 [ 27.793579] __kasan_kmalloc+0xb7/0xc0 [ 27.793756] __kmalloc_cache_noprof+0x189/0x420 [ 27.793952] kasan_atomics+0x95/0x310 [ 27.794122] kunit_try_run_case+0x1a5/0x480 [ 27.794302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.794524] kthread+0x337/0x6f0 [ 27.794670] ret_from_fork+0x116/0x1d0 [ 27.795869] ret_from_fork_asm+0x1a/0x30 [ 27.796295] [ 27.796372] The buggy address belongs to the object at ffff8881058d6700 [ 27.796372] which belongs to the cache kmalloc-64 of size 64 [ 27.796792] The buggy address is located 0 bytes to the right of [ 27.796792] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.798007] [ 27.798126] The buggy address belongs to the physical page: [ 27.798589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.799142] flags: 0x200000000000000(node=0|zone=2) [ 27.799357] page_type: f5(slab) [ 27.799524] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.800106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.800385] page dumped because: kasan: bad access detected [ 27.800611] [ 27.800712] Memory state around the buggy address: [ 27.801411] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.801955] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.802263] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.802557] ^ [ 27.802770] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.803349] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.803612] ================================================================== [ 26.530655] ================================================================== [ 26.531439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 26.532143] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.532889] [ 26.533048] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.533104] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.533119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.533144] Call Trace: [ 26.533158] <TASK> [ 26.533179] dump_stack_lvl+0x73/0xb0 [ 26.533214] print_report+0xd1/0x610 [ 26.533239] ? __virt_addr_valid+0x1db/0x2d0 [ 26.533265] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.533287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.533314] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.533336] kasan_report+0x141/0x180 [ 26.533359] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.533385] __asan_report_store4_noabort+0x1b/0x30 [ 26.533410] kasan_atomics_helper+0x4ba2/0x5450 [ 26.533434] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.533456] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.533482] ? kasan_save_alloc_info+0x3b/0x50 [ 26.533511] kasan_atomics+0x1dc/0x310 [ 26.533534] ? __pfx_kasan_atomics+0x10/0x10 [ 26.533559] ? __pfx_read_tsc+0x10/0x10 [ 26.533583] ? ktime_get_ts64+0x86/0x230 [ 26.533610] kunit_try_run_case+0x1a5/0x480 [ 26.533633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.533655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.533680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.533719] ? __kthread_parkme+0x82/0x180 [ 26.533742] ? preempt_count_sub+0x50/0x80 [ 26.533767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.533789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.533815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.533842] kthread+0x337/0x6f0 [ 26.533862] ? trace_preempt_on+0x20/0xc0 [ 26.533887] ? __pfx_kthread+0x10/0x10 [ 26.533909] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.533932] ? calculate_sigpending+0x7b/0xa0 [ 26.533957] ? __pfx_kthread+0x10/0x10 [ 26.533980] ret_from_fork+0x116/0x1d0 [ 26.534000] ? __pfx_kthread+0x10/0x10 [ 26.534021] ret_from_fork_asm+0x1a/0x30 [ 26.534054] </TASK> [ 26.534113] [ 26.544342] Allocated by task 315: [ 26.544519] kasan_save_stack+0x45/0x70 [ 26.544731] kasan_save_track+0x18/0x40 [ 26.544969] kasan_save_alloc_info+0x3b/0x50 [ 26.545112] __kasan_kmalloc+0xb7/0xc0 [ 26.545240] __kmalloc_cache_noprof+0x189/0x420 [ 26.545390] kasan_atomics+0x95/0x310 [ 26.545516] kunit_try_run_case+0x1a5/0x480 [ 26.545653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.545970] kthread+0x337/0x6f0 [ 26.546093] ret_from_fork+0x116/0x1d0 [ 26.546226] ret_from_fork_asm+0x1a/0x30 [ 26.546361] [ 26.546429] The buggy address belongs to the object at ffff8881058d6700 [ 26.546429] which belongs to the cache kmalloc-64 of size 64 [ 26.547133] The buggy address is located 0 bytes to the right of [ 26.547133] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.547719] [ 26.547790] The buggy address belongs to the physical page: [ 26.548113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.548405] flags: 0x200000000000000(node=0|zone=2) [ 26.548564] page_type: f5(slab) [ 26.548684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.549217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.549525] page dumped because: kasan: bad access detected [ 26.549734] [ 26.549800] Memory state around the buggy address: [ 26.549954] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.550386] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.550732] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.551052] ^ [ 26.551246] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.551457] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.551666] ================================================================== [ 27.231258] ================================================================== [ 27.231598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 27.231956] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.232337] [ 27.232447] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.232514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.232541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.232565] Call Trace: [ 27.232587] <TASK> [ 27.232611] dump_stack_lvl+0x73/0xb0 [ 27.232651] print_report+0xd1/0x610 [ 27.232674] ? __virt_addr_valid+0x1db/0x2d0 [ 27.232718] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.232740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.232767] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.232799] kasan_report+0x141/0x180 [ 27.232822] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.232858] kasan_check_range+0x10c/0x1c0 [ 27.232882] __kasan_check_write+0x18/0x20 [ 27.232906] kasan_atomics_helper+0x12e6/0x5450 [ 27.232940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.232963] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.232989] ? kasan_save_alloc_info+0x3b/0x50 [ 27.233028] kasan_atomics+0x1dc/0x310 [ 27.233052] ? __pfx_kasan_atomics+0x10/0x10 [ 27.233078] ? __pfx_read_tsc+0x10/0x10 [ 27.233114] ? ktime_get_ts64+0x86/0x230 [ 27.233142] kunit_try_run_case+0x1a5/0x480 [ 27.233166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.233196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.233222] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.233247] ? __kthread_parkme+0x82/0x180 [ 27.233280] ? preempt_count_sub+0x50/0x80 [ 27.233305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.233328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.233356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.233392] kthread+0x337/0x6f0 [ 27.233413] ? trace_preempt_on+0x20/0xc0 [ 27.233448] ? __pfx_kthread+0x10/0x10 [ 27.233471] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.233495] ? calculate_sigpending+0x7b/0xa0 [ 27.233521] ? __pfx_kthread+0x10/0x10 [ 27.233544] ret_from_fork+0x116/0x1d0 [ 27.233565] ? __pfx_kthread+0x10/0x10 [ 27.233590] ret_from_fork_asm+0x1a/0x30 [ 27.233625] </TASK> [ 27.233646] [ 27.241038] Allocated by task 315: [ 27.241169] kasan_save_stack+0x45/0x70 [ 27.241398] kasan_save_track+0x18/0x40 [ 27.241752] kasan_save_alloc_info+0x3b/0x50 [ 27.242212] __kasan_kmalloc+0xb7/0xc0 [ 27.242406] __kmalloc_cache_noprof+0x189/0x420 [ 27.242659] kasan_atomics+0x95/0x310 [ 27.243016] kunit_try_run_case+0x1a5/0x480 [ 27.243236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.243513] kthread+0x337/0x6f0 [ 27.243661] ret_from_fork+0x116/0x1d0 [ 27.243857] ret_from_fork_asm+0x1a/0x30 [ 27.244007] [ 27.244073] The buggy address belongs to the object at ffff8881058d6700 [ 27.244073] which belongs to the cache kmalloc-64 of size 64 [ 27.244414] The buggy address is located 0 bytes to the right of [ 27.244414] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.245183] [ 27.245279] The buggy address belongs to the physical page: [ 27.245538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.245975] flags: 0x200000000000000(node=0|zone=2) [ 27.246143] page_type: f5(slab) [ 27.246263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.246491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.246721] page dumped because: kasan: bad access detected [ 27.247226] [ 27.247317] Memory state around the buggy address: [ 27.247551] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.247924] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.248268] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.248545] ^ [ 27.248717] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.249298] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.249599] ================================================================== [ 27.271996] ================================================================== [ 27.272502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 27.272832] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.273284] [ 27.273408] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.273472] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.273488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.273523] Call Trace: [ 27.273545] <TASK> [ 27.273570] dump_stack_lvl+0x73/0xb0 [ 27.273603] print_report+0xd1/0x610 [ 27.273627] ? __virt_addr_valid+0x1db/0x2d0 [ 27.273653] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.273684] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.273723] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.273746] kasan_report+0x141/0x180 [ 27.273780] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.273817] kasan_check_range+0x10c/0x1c0 [ 27.273841] __kasan_check_read+0x15/0x20 [ 27.273865] kasan_atomics_helper+0x13b5/0x5450 [ 27.273888] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.273920] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.273946] ? kasan_save_alloc_info+0x3b/0x50 [ 27.273985] kasan_atomics+0x1dc/0x310 [ 27.274009] ? __pfx_kasan_atomics+0x10/0x10 [ 27.274033] ? __pfx_read_tsc+0x10/0x10 [ 27.274058] ? ktime_get_ts64+0x86/0x230 [ 27.274094] kunit_try_run_case+0x1a5/0x480 [ 27.274117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.274141] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.274177] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.274202] ? __kthread_parkme+0x82/0x180 [ 27.274225] ? preempt_count_sub+0x50/0x80 [ 27.274259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.274281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.274308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.274344] kthread+0x337/0x6f0 [ 27.274364] ? trace_preempt_on+0x20/0xc0 [ 27.274390] ? __pfx_kthread+0x10/0x10 [ 27.274412] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.274435] ? calculate_sigpending+0x7b/0xa0 [ 27.274462] ? __pfx_kthread+0x10/0x10 [ 27.274484] ret_from_fork+0x116/0x1d0 [ 27.274506] ? __pfx_kthread+0x10/0x10 [ 27.274527] ret_from_fork_asm+0x1a/0x30 [ 27.274561] </TASK> [ 27.274575] [ 27.282440] Allocated by task 315: [ 27.282611] kasan_save_stack+0x45/0x70 [ 27.282819] kasan_save_track+0x18/0x40 [ 27.282995] kasan_save_alloc_info+0x3b/0x50 [ 27.283142] __kasan_kmalloc+0xb7/0xc0 [ 27.283270] __kmalloc_cache_noprof+0x189/0x420 [ 27.283506] kasan_atomics+0x95/0x310 [ 27.283688] kunit_try_run_case+0x1a5/0x480 [ 27.283899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.284188] kthread+0x337/0x6f0 [ 27.284308] ret_from_fork+0x116/0x1d0 [ 27.284495] ret_from_fork_asm+0x1a/0x30 [ 27.284686] [ 27.284798] The buggy address belongs to the object at ffff8881058d6700 [ 27.284798] which belongs to the cache kmalloc-64 of size 64 [ 27.285291] The buggy address is located 0 bytes to the right of [ 27.285291] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.285830] [ 27.285944] The buggy address belongs to the physical page: [ 27.286182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.286512] flags: 0x200000000000000(node=0|zone=2) [ 27.286737] page_type: f5(slab) [ 27.286968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.287289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.287571] page dumped because: kasan: bad access detected [ 27.287752] [ 27.287823] Memory state around the buggy address: [ 27.287973] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.288184] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.288843] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.289158] ^ [ 27.289362] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.289572] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.289838] ================================================================== [ 27.333172] ================================================================== [ 27.333573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 27.333936] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.334172] [ 27.334255] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.334316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.334332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.334356] Call Trace: [ 27.334373] <TASK> [ 27.334402] dump_stack_lvl+0x73/0xb0 [ 27.334432] print_report+0xd1/0x610 [ 27.334456] ? __virt_addr_valid+0x1db/0x2d0 [ 27.334480] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.334502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.334528] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.334551] kasan_report+0x141/0x180 [ 27.334573] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.334599] __asan_report_store8_noabort+0x1b/0x30 [ 27.334624] kasan_atomics_helper+0x50d4/0x5450 [ 27.334647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.334670] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.334705] ? kasan_save_alloc_info+0x3b/0x50 [ 27.334734] kasan_atomics+0x1dc/0x310 [ 27.334756] ? __pfx_kasan_atomics+0x10/0x10 [ 27.334790] ? __pfx_read_tsc+0x10/0x10 [ 27.334814] ? ktime_get_ts64+0x86/0x230 [ 27.334841] kunit_try_run_case+0x1a5/0x480 [ 27.334887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.334908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.334945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.334969] ? __kthread_parkme+0x82/0x180 [ 27.335000] ? preempt_count_sub+0x50/0x80 [ 27.335025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.335057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.335083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.335108] kthread+0x337/0x6f0 [ 27.335129] ? trace_preempt_on+0x20/0xc0 [ 27.335154] ? __pfx_kthread+0x10/0x10 [ 27.335175] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.335198] ? calculate_sigpending+0x7b/0xa0 [ 27.335223] ? __pfx_kthread+0x10/0x10 [ 27.335245] ret_from_fork+0x116/0x1d0 [ 27.335266] ? __pfx_kthread+0x10/0x10 [ 27.335288] ret_from_fork_asm+0x1a/0x30 [ 27.335319] </TASK> [ 27.335331] [ 27.342918] Allocated by task 315: [ 27.343081] kasan_save_stack+0x45/0x70 [ 27.343257] kasan_save_track+0x18/0x40 [ 27.343390] kasan_save_alloc_info+0x3b/0x50 [ 27.343534] __kasan_kmalloc+0xb7/0xc0 [ 27.343661] __kmalloc_cache_noprof+0x189/0x420 [ 27.343892] kasan_atomics+0x95/0x310 [ 27.344103] kunit_try_run_case+0x1a5/0x480 [ 27.344307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.344526] kthread+0x337/0x6f0 [ 27.344644] ret_from_fork+0x116/0x1d0 [ 27.344784] ret_from_fork_asm+0x1a/0x30 [ 27.344920] [ 27.344987] The buggy address belongs to the object at ffff8881058d6700 [ 27.344987] which belongs to the cache kmalloc-64 of size 64 [ 27.345525] The buggy address is located 0 bytes to the right of [ 27.345525] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.346345] [ 27.346438] The buggy address belongs to the physical page: [ 27.346717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.347148] flags: 0x200000000000000(node=0|zone=2) [ 27.347361] page_type: f5(slab) [ 27.347504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.347871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.348188] page dumped because: kasan: bad access detected [ 27.348438] [ 27.348526] Memory state around the buggy address: [ 27.348748] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.349056] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.349371] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.349679] ^ [ 27.349921] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.350233] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.350479] ================================================================== [ 27.446618] ================================================================== [ 27.447153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 27.447826] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.448189] [ 27.448284] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.448364] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.448380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.448414] Call Trace: [ 27.448431] <TASK> [ 27.448450] dump_stack_lvl+0x73/0xb0 [ 27.448483] print_report+0xd1/0x610 [ 27.448507] ? __virt_addr_valid+0x1db/0x2d0 [ 27.448532] ? kasan_atomics_helper+0x1818/0x5450 [ 27.448554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.448581] ? kasan_atomics_helper+0x1818/0x5450 [ 27.448635] kasan_report+0x141/0x180 [ 27.448659] ? kasan_atomics_helper+0x1818/0x5450 [ 27.448717] kasan_check_range+0x10c/0x1c0 [ 27.448769] __kasan_check_write+0x18/0x20 [ 27.448805] kasan_atomics_helper+0x1818/0x5450 [ 27.448867] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.448890] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.448925] ? kasan_save_alloc_info+0x3b/0x50 [ 27.448955] kasan_atomics+0x1dc/0x310 [ 27.448978] ? __pfx_kasan_atomics+0x10/0x10 [ 27.449003] ? __pfx_read_tsc+0x10/0x10 [ 27.449028] ? ktime_get_ts64+0x86/0x230 [ 27.449053] kunit_try_run_case+0x1a5/0x480 [ 27.449076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.449098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.449123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.449149] ? __kthread_parkme+0x82/0x180 [ 27.449170] ? preempt_count_sub+0x50/0x80 [ 27.449195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.449218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.449244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.449271] kthread+0x337/0x6f0 [ 27.449320] ? trace_preempt_on+0x20/0xc0 [ 27.449346] ? __pfx_kthread+0x10/0x10 [ 27.449368] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.449429] ? calculate_sigpending+0x7b/0xa0 [ 27.449455] ? __pfx_kthread+0x10/0x10 [ 27.449488] ret_from_fork+0x116/0x1d0 [ 27.449509] ? __pfx_kthread+0x10/0x10 [ 27.449531] ret_from_fork_asm+0x1a/0x30 [ 27.449564] </TASK> [ 27.449577] [ 27.457846] Allocated by task 315: [ 27.458074] kasan_save_stack+0x45/0x70 [ 27.458274] kasan_save_track+0x18/0x40 [ 27.458437] kasan_save_alloc_info+0x3b/0x50 [ 27.458581] __kasan_kmalloc+0xb7/0xc0 [ 27.458814] __kmalloc_cache_noprof+0x189/0x420 [ 27.459033] kasan_atomics+0x95/0x310 [ 27.459202] kunit_try_run_case+0x1a5/0x480 [ 27.459345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.459560] kthread+0x337/0x6f0 [ 27.459735] ret_from_fork+0x116/0x1d0 [ 27.460126] ret_from_fork_asm+0x1a/0x30 [ 27.460327] [ 27.460398] The buggy address belongs to the object at ffff8881058d6700 [ 27.460398] which belongs to the cache kmalloc-64 of size 64 [ 27.460854] The buggy address is located 0 bytes to the right of [ 27.460854] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.461618] [ 27.461741] The buggy address belongs to the physical page: [ 27.461914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.462159] flags: 0x200000000000000(node=0|zone=2) [ 27.462489] page_type: f5(slab) [ 27.462720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.463060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.463296] page dumped because: kasan: bad access detected [ 27.463592] [ 27.463724] Memory state around the buggy address: [ 27.464008] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.464226] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.464438] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.464719] ^ [ 27.464993] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.465315] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.465713] ================================================================== [ 27.701219] ================================================================== [ 27.701563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 27.701986] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.702267] [ 27.702359] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.702407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.702421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.702444] Call Trace: [ 27.702460] <TASK> [ 27.702477] dump_stack_lvl+0x73/0xb0 [ 27.702508] print_report+0xd1/0x610 [ 27.702530] ? __virt_addr_valid+0x1db/0x2d0 [ 27.702556] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.702577] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.702604] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.702627] kasan_report+0x141/0x180 [ 27.702650] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.702677] kasan_check_range+0x10c/0x1c0 [ 27.702713] __kasan_check_write+0x18/0x20 [ 27.702736] kasan_atomics_helper+0x1f43/0x5450 [ 27.702759] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.702782] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.702806] ? kasan_save_alloc_info+0x3b/0x50 [ 27.702843] kasan_atomics+0x1dc/0x310 [ 27.702867] ? __pfx_kasan_atomics+0x10/0x10 [ 27.702891] ? __pfx_read_tsc+0x10/0x10 [ 27.702915] ? ktime_get_ts64+0x86/0x230 [ 27.702941] kunit_try_run_case+0x1a5/0x480 [ 27.702964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.702985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.703011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.703037] ? __kthread_parkme+0x82/0x180 [ 27.703058] ? preempt_count_sub+0x50/0x80 [ 27.703083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.703106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.703132] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.703157] kthread+0x337/0x6f0 [ 27.703178] ? trace_preempt_on+0x20/0xc0 [ 27.703202] ? __pfx_kthread+0x10/0x10 [ 27.703226] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.703248] ? calculate_sigpending+0x7b/0xa0 [ 27.703274] ? __pfx_kthread+0x10/0x10 [ 27.703297] ret_from_fork+0x116/0x1d0 [ 27.703318] ? __pfx_kthread+0x10/0x10 [ 27.703339] ret_from_fork_asm+0x1a/0x30 [ 27.703371] </TASK> [ 27.703383] [ 27.713582] Allocated by task 315: [ 27.713811] kasan_save_stack+0x45/0x70 [ 27.713991] kasan_save_track+0x18/0x40 [ 27.714126] kasan_save_alloc_info+0x3b/0x50 [ 27.714270] __kasan_kmalloc+0xb7/0xc0 [ 27.714447] __kmalloc_cache_noprof+0x189/0x420 [ 27.714666] kasan_atomics+0x95/0x310 [ 27.714897] kunit_try_run_case+0x1a5/0x480 [ 27.715129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.715489] kthread+0x337/0x6f0 [ 27.715686] ret_from_fork+0x116/0x1d0 [ 27.715914] ret_from_fork_asm+0x1a/0x30 [ 27.716053] [ 27.716120] The buggy address belongs to the object at ffff8881058d6700 [ 27.716120] which belongs to the cache kmalloc-64 of size 64 [ 27.716593] The buggy address is located 0 bytes to the right of [ 27.716593] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.717354] [ 27.717455] The buggy address belongs to the physical page: [ 27.717717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.718144] flags: 0x200000000000000(node=0|zone=2) [ 27.718331] page_type: f5(slab) [ 27.718498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.718937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.719278] page dumped because: kasan: bad access detected [ 27.719520] [ 27.719599] Memory state around the buggy address: [ 27.719774] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.720117] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.720450] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.720680] ^ [ 27.720941] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.721277] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.721538] ================================================================== [ 27.525180] ================================================================== [ 27.525529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 27.526072] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.526501] [ 27.526614] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.526713] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.526729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.526753] Call Trace: [ 27.526778] <TASK> [ 27.526801] dump_stack_lvl+0x73/0xb0 [ 27.526834] print_report+0xd1/0x610 [ 27.526859] ? __virt_addr_valid+0x1db/0x2d0 [ 27.526916] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.526961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.526987] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.527010] kasan_report+0x141/0x180 [ 27.527034] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.527061] kasan_check_range+0x10c/0x1c0 [ 27.527085] __kasan_check_write+0x18/0x20 [ 27.527109] kasan_atomics_helper+0x1a7f/0x5450 [ 27.527133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.527155] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.527181] ? kasan_save_alloc_info+0x3b/0x50 [ 27.527210] kasan_atomics+0x1dc/0x310 [ 27.527234] ? __pfx_kasan_atomics+0x10/0x10 [ 27.527259] ? __pfx_read_tsc+0x10/0x10 [ 27.527283] ? ktime_get_ts64+0x86/0x230 [ 27.527310] kunit_try_run_case+0x1a5/0x480 [ 27.527334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.527355] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.527381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.527406] ? __kthread_parkme+0x82/0x180 [ 27.527429] ? preempt_count_sub+0x50/0x80 [ 27.527454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.527477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.527503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.527559] kthread+0x337/0x6f0 [ 27.527581] ? trace_preempt_on+0x20/0xc0 [ 27.527617] ? __pfx_kthread+0x10/0x10 [ 27.527638] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.527661] ? calculate_sigpending+0x7b/0xa0 [ 27.527687] ? __pfx_kthread+0x10/0x10 [ 27.527719] ret_from_fork+0x116/0x1d0 [ 27.527740] ? __pfx_kthread+0x10/0x10 [ 27.527761] ret_from_fork_asm+0x1a/0x30 [ 27.527806] </TASK> [ 27.527826] [ 27.536027] Allocated by task 315: [ 27.536213] kasan_save_stack+0x45/0x70 [ 27.536418] kasan_save_track+0x18/0x40 [ 27.536612] kasan_save_alloc_info+0x3b/0x50 [ 27.536884] __kasan_kmalloc+0xb7/0xc0 [ 27.537085] __kmalloc_cache_noprof+0x189/0x420 [ 27.537284] kasan_atomics+0x95/0x310 [ 27.537505] kunit_try_run_case+0x1a5/0x480 [ 27.537686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.537992] kthread+0x337/0x6f0 [ 27.538114] ret_from_fork+0x116/0x1d0 [ 27.538267] ret_from_fork_asm+0x1a/0x30 [ 27.538497] [ 27.538606] The buggy address belongs to the object at ffff8881058d6700 [ 27.538606] which belongs to the cache kmalloc-64 of size 64 [ 27.539417] The buggy address is located 0 bytes to the right of [ 27.539417] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.540021] [ 27.540095] The buggy address belongs to the physical page: [ 27.540289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.540706] flags: 0x200000000000000(node=0|zone=2) [ 27.541026] page_type: f5(slab) [ 27.541258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.541571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.541892] page dumped because: kasan: bad access detected [ 27.542176] [ 27.542279] Memory state around the buggy address: [ 27.542506] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.542760] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.543123] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.543396] ^ [ 27.543548] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.543804] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.544140] ================================================================== [ 26.664037] ================================================================== [ 26.664289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 26.664578] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 26.665136] [ 26.665236] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.665288] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.665303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.665326] Call Trace: [ 26.665343] <TASK> [ 26.665360] dump_stack_lvl+0x73/0xb0 [ 26.665393] print_report+0xd1/0x610 [ 26.665416] ? __virt_addr_valid+0x1db/0x2d0 [ 26.665441] ? kasan_atomics_helper+0x565/0x5450 [ 26.665462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.665489] ? kasan_atomics_helper+0x565/0x5450 [ 26.665512] kasan_report+0x141/0x180 [ 26.665535] ? kasan_atomics_helper+0x565/0x5450 [ 26.665562] kasan_check_range+0x10c/0x1c0 [ 26.665586] __kasan_check_write+0x18/0x20 [ 26.665611] kasan_atomics_helper+0x565/0x5450 [ 26.665633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.665656] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.665680] ? kasan_save_alloc_info+0x3b/0x50 [ 26.665725] kasan_atomics+0x1dc/0x310 [ 26.665748] ? __pfx_kasan_atomics+0x10/0x10 [ 26.665773] ? __pfx_read_tsc+0x10/0x10 [ 26.665833] ? ktime_get_ts64+0x86/0x230 [ 26.665861] kunit_try_run_case+0x1a5/0x480 [ 26.665884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.665962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.665989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.666015] ? __kthread_parkme+0x82/0x180 [ 26.666060] ? preempt_count_sub+0x50/0x80 [ 26.666084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.666107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.666134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.666161] kthread+0x337/0x6f0 [ 26.666182] ? trace_preempt_on+0x20/0xc0 [ 26.666224] ? __pfx_kthread+0x10/0x10 [ 26.666246] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.666269] ? calculate_sigpending+0x7b/0xa0 [ 26.666294] ? __pfx_kthread+0x10/0x10 [ 26.666318] ret_from_fork+0x116/0x1d0 [ 26.666339] ? __pfx_kthread+0x10/0x10 [ 26.666361] ret_from_fork_asm+0x1a/0x30 [ 26.666392] </TASK> [ 26.666405] [ 26.675309] Allocated by task 315: [ 26.675451] kasan_save_stack+0x45/0x70 [ 26.675633] kasan_save_track+0x18/0x40 [ 26.675827] kasan_save_alloc_info+0x3b/0x50 [ 26.676421] __kasan_kmalloc+0xb7/0xc0 [ 26.676731] __kmalloc_cache_noprof+0x189/0x420 [ 26.677165] kasan_atomics+0x95/0x310 [ 26.677344] kunit_try_run_case+0x1a5/0x480 [ 26.677551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.678124] kthread+0x337/0x6f0 [ 26.678546] ret_from_fork+0x116/0x1d0 [ 26.678833] ret_from_fork_asm+0x1a/0x30 [ 26.679160] [ 26.679385] The buggy address belongs to the object at ffff8881058d6700 [ 26.679385] which belongs to the cache kmalloc-64 of size 64 [ 26.680415] The buggy address is located 0 bytes to the right of [ 26.680415] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 26.681219] [ 26.681312] The buggy address belongs to the physical page: [ 26.681793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 26.682313] flags: 0x200000000000000(node=0|zone=2) [ 26.682552] page_type: f5(slab) [ 26.682728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.683303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.683952] page dumped because: kasan: bad access detected [ 26.684209] [ 26.684296] Memory state around the buggy address: [ 26.684497] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.685110] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.685472] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.686120] ^ [ 26.686465] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.687214] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.687502] ================================================================== [ 27.169534] ================================================================== [ 27.169982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 27.170223] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315 [ 27.170596] [ 27.170735] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 27.170811] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.170827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.170851] Call Trace: [ 27.170879] <TASK> [ 27.170903] dump_stack_lvl+0x73/0xb0 [ 27.170936] print_report+0xd1/0x610 [ 27.170960] ? __virt_addr_valid+0x1db/0x2d0 [ 27.170986] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.171008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.171035] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.171057] kasan_report+0x141/0x180 [ 27.171080] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.171107] __asan_report_load4_noabort+0x18/0x20 [ 27.171132] kasan_atomics_helper+0x4a02/0x5450 [ 27.171155] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.171178] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.171203] ? kasan_save_alloc_info+0x3b/0x50 [ 27.171232] kasan_atomics+0x1dc/0x310 [ 27.171255] ? __pfx_kasan_atomics+0x10/0x10 [ 27.171280] ? __pfx_read_tsc+0x10/0x10 [ 27.171304] ? ktime_get_ts64+0x86/0x230 [ 27.171330] kunit_try_run_case+0x1a5/0x480 [ 27.171354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.171375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.171402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.171427] ? __kthread_parkme+0x82/0x180 [ 27.171450] ? preempt_count_sub+0x50/0x80 [ 27.171475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.171498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.171524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.171550] kthread+0x337/0x6f0 [ 27.171571] ? trace_preempt_on+0x20/0xc0 [ 27.171596] ? __pfx_kthread+0x10/0x10 [ 27.171618] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.171642] ? calculate_sigpending+0x7b/0xa0 [ 27.171668] ? __pfx_kthread+0x10/0x10 [ 27.171690] ret_from_fork+0x116/0x1d0 [ 27.171722] ? __pfx_kthread+0x10/0x10 [ 27.171744] ret_from_fork_asm+0x1a/0x30 [ 27.171777] </TASK> [ 27.171791] [ 27.179129] Allocated by task 315: [ 27.179316] kasan_save_stack+0x45/0x70 [ 27.179514] kasan_save_track+0x18/0x40 [ 27.179710] kasan_save_alloc_info+0x3b/0x50 [ 27.180117] __kasan_kmalloc+0xb7/0xc0 [ 27.180256] __kmalloc_cache_noprof+0x189/0x420 [ 27.180409] kasan_atomics+0x95/0x310 [ 27.180538] kunit_try_run_case+0x1a5/0x480 [ 27.180679] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.181181] kthread+0x337/0x6f0 [ 27.181360] ret_from_fork+0x116/0x1d0 [ 27.181574] ret_from_fork_asm+0x1a/0x30 [ 27.181797] [ 27.181889] The buggy address belongs to the object at ffff8881058d6700 [ 27.181889] which belongs to the cache kmalloc-64 of size 64 [ 27.182385] The buggy address is located 0 bytes to the right of [ 27.182385] allocated 48-byte region [ffff8881058d6700, ffff8881058d6730) [ 27.182949] [ 27.183037] The buggy address belongs to the physical page: [ 27.183292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6 [ 27.183640] flags: 0x200000000000000(node=0|zone=2) [ 27.183863] page_type: f5(slab) [ 27.184043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.184270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.184491] page dumped because: kasan: bad access detected [ 27.184658] [ 27.184748] Memory state around the buggy address: [ 27.185037] ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.185352] ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.185667] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.186112] ^ [ 27.186411] ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.186626] ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.186845] ==================================================================