Date
July 10, 2025, 9:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.264606] ================================================================== [ 32.265329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 32.265384] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.265526] [ 32.265581] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.265790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.265827] Hardware name: linux,dummy-virt (DT) [ 32.266242] Call trace: [ 32.266272] show_stack+0x20/0x38 (C) [ 32.266411] dump_stack_lvl+0x8c/0xd0 [ 32.266936] print_report+0x118/0x5d0 [ 32.267276] kasan_report+0xdc/0x128 [ 32.267337] kasan_check_range+0x100/0x1a8 [ 32.267387] __kasan_check_write+0x20/0x30 [ 32.267435] kasan_atomics_helper+0xff0/0x4858 [ 32.267842] kasan_atomics+0x198/0x2e0 [ 32.268183] kunit_try_run_case+0x170/0x3f0 [ 32.268283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.268689] kthread+0x328/0x630 [ 32.268742] ret_from_fork+0x10/0x20 [ 32.268793] [ 32.269426] Allocated by task 296: [ 32.269610] kasan_save_stack+0x3c/0x68 [ 32.269863] kasan_save_track+0x20/0x40 [ 32.269909] kasan_save_alloc_info+0x40/0x58 [ 32.269952] __kasan_kmalloc+0xd4/0xd8 [ 32.270544] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.270601] kasan_atomics+0xb8/0x2e0 [ 32.271148] kunit_try_run_case+0x170/0x3f0 [ 32.271235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.271358] kthread+0x328/0x630 [ 32.271401] ret_from_fork+0x10/0x20 [ 32.271439] [ 32.271464] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.271464] which belongs to the cache kmalloc-64 of size 64 [ 32.271725] The buggy address is located 0 bytes to the right of [ 32.271725] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.271804] [ 32.271826] The buggy address belongs to the physical page: [ 32.271859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.271943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.272145] page_type: f5(slab) [ 32.272204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.272386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.272430] page dumped because: kasan: bad access detected [ 32.272513] [ 32.273034] Memory state around the buggy address: [ 32.273069] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273116] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273171] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.273214] ^ [ 32.273248] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273344] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273387] ================================================================== [ 32.288007] ================================================================== [ 32.288058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 32.288107] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.288170] [ 32.288201] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.288481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.288532] Hardware name: linux,dummy-virt (DT) [ 32.288865] Call trace: [ 32.288915] show_stack+0x20/0x38 (C) [ 32.288966] dump_stack_lvl+0x8c/0xd0 [ 32.289031] print_report+0x118/0x5d0 [ 32.289076] kasan_report+0xdc/0x128 [ 32.289122] kasan_check_range+0x100/0x1a8 [ 32.289180] __kasan_check_write+0x20/0x30 [ 32.289228] kasan_atomics_helper+0x1190/0x4858 [ 32.289283] kasan_atomics+0x198/0x2e0 [ 32.289334] kunit_try_run_case+0x170/0x3f0 [ 32.289387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.289447] kthread+0x328/0x630 [ 32.289491] ret_from_fork+0x10/0x20 [ 32.289540] [ 32.289569] Allocated by task 296: [ 32.289700] kasan_save_stack+0x3c/0x68 [ 32.289816] kasan_save_track+0x20/0x40 [ 32.289878] kasan_save_alloc_info+0x40/0x58 [ 32.290076] __kasan_kmalloc+0xd4/0xd8 [ 32.290276] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.290322] kasan_atomics+0xb8/0x2e0 [ 32.290369] kunit_try_run_case+0x170/0x3f0 [ 32.290462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.290577] kthread+0x328/0x630 [ 32.291017] ret_from_fork+0x10/0x20 [ 32.291526] [ 32.291554] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.291554] which belongs to the cache kmalloc-64 of size 64 [ 32.291687] The buggy address is located 0 bytes to the right of [ 32.291687] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.291849] [ 32.291873] The buggy address belongs to the physical page: [ 32.291962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.292033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.292122] page_type: f5(slab) [ 32.292225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.292524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.292732] page dumped because: kasan: bad access detected [ 32.292773] [ 32.292800] Memory state around the buggy address: [ 32.293095] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.293363] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.293418] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.293464] ^ [ 32.293661] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.293942] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.293994] ================================================================== [ 32.139954] ================================================================== [ 32.140161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 32.140370] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.140618] [ 32.140675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.140769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.140962] Hardware name: linux,dummy-virt (DT) [ 32.141251] Call trace: [ 32.141302] show_stack+0x20/0x38 (C) [ 32.141359] dump_stack_lvl+0x8c/0xd0 [ 32.141408] print_report+0x118/0x5d0 [ 32.141453] kasan_report+0xdc/0x128 [ 32.141648] kasan_check_range+0x100/0x1a8 [ 32.141894] __kasan_check_write+0x20/0x30 [ 32.142220] kasan_atomics_helper+0xb70/0x4858 [ 32.142313] kasan_atomics+0x198/0x2e0 [ 32.142535] kunit_try_run_case+0x170/0x3f0 [ 32.142602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.142980] kthread+0x328/0x630 [ 32.143107] ret_from_fork+0x10/0x20 [ 32.143213] [ 32.143349] Allocated by task 296: [ 32.143459] kasan_save_stack+0x3c/0x68 [ 32.143703] kasan_save_track+0x20/0x40 [ 32.143872] kasan_save_alloc_info+0x40/0x58 [ 32.144000] __kasan_kmalloc+0xd4/0xd8 [ 32.144079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.144238] kasan_atomics+0xb8/0x2e0 [ 32.144327] kunit_try_run_case+0x170/0x3f0 [ 32.144372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.144424] kthread+0x328/0x630 [ 32.144676] ret_from_fork+0x10/0x20 [ 32.144732] [ 32.144862] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.144862] which belongs to the cache kmalloc-64 of size 64 [ 32.144945] The buggy address is located 0 bytes to the right of [ 32.144945] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.145020] [ 32.145061] The buggy address belongs to the physical page: [ 32.145096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.145312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.145459] page_type: f5(slab) [ 32.146220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.146716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.146771] page dumped because: kasan: bad access detected [ 32.147057] [ 32.148317] ^ [ 32.150822] kasan_atomics_helper+0x3dbc/0x4858 [ 32.153050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.155387] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.161953] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.164687] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.166689] kasan_save_track+0x20/0x40 [ 32.169920] page_type: f5(slab) [ 32.170292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.171791] ^ [ 32.173896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 32.175306] kasan_report+0xdc/0x128 [ 32.177616] Allocated by task 296: [ 32.179762] [ 32.180396] page_type: f5(slab) [ 32.180498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.180567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.180612] page dumped because: kasan: bad access detected [ 32.180792] [ 32.181153] Memory state around the buggy address: [ 32.181225] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.181455] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.181535] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.181578] ^ [ 32.182024] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.182078] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.182120] ================================================================== [ 32.209251] ================================================================== [ 32.209358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 32.209485] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.209579] [ 32.209773] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.210006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.210036] Hardware name: linux,dummy-virt (DT) [ 32.210069] Call trace: [ 32.210092] show_stack+0x20/0x38 (C) [ 32.210157] dump_stack_lvl+0x8c/0xd0 [ 32.210204] print_report+0x118/0x5d0 [ 32.210250] kasan_report+0xdc/0x128 [ 32.211124] kasan_check_range+0x100/0x1a8 [ 32.211215] __kasan_check_read+0x20/0x30 [ 32.211416] kasan_atomics_helper+0xdd4/0x4858 [ 32.211717] kasan_atomics+0x198/0x2e0 [ 32.211778] kunit_try_run_case+0x170/0x3f0 [ 32.211829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.211894] kthread+0x328/0x630 [ 32.211938] ret_from_fork+0x10/0x20 [ 32.211988] [ 32.212008] Allocated by task 296: [ 32.212039] kasan_save_stack+0x3c/0x68 [ 32.212084] kasan_save_track+0x20/0x40 [ 32.212466] kasan_save_alloc_info+0x40/0x58 [ 32.212509] __kasan_kmalloc+0xd4/0xd8 [ 32.212731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.212972] kasan_atomics+0xb8/0x2e0 [ 32.213018] kunit_try_run_case+0x170/0x3f0 [ 32.213061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.213216] kthread+0x328/0x630 [ 32.213262] ret_from_fork+0x10/0x20 [ 32.213302] [ 32.213803] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.213803] which belongs to the cache kmalloc-64 of size 64 [ 32.214275] The buggy address is located 0 bytes to the right of [ 32.214275] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.214467] [ 32.214618] The buggy address belongs to the physical page: [ 32.214655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.214723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.215239] page_type: f5(slab) [ 32.215390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.215446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.215490] page dumped because: kasan: bad access detected [ 32.215773] [ 32.215798] Memory state around the buggy address: [ 32.215834] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.215881] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.215965] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.216007] ^ [ 32.216043] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.216271] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.216404] ================================================================== [ 32.192375] ================================================================== [ 32.192447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 32.192783] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.193104] [ 32.193623] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.193949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.193985] Hardware name: linux,dummy-virt (DT) [ 32.194019] Call trace: [ 32.194313] show_stack+0x20/0x38 (C) [ 32.194375] dump_stack_lvl+0x8c/0xd0 [ 32.194529] print_report+0x118/0x5d0 [ 32.194575] kasan_report+0xdc/0x128 [ 32.194812] kasan_check_range+0x100/0x1a8 [ 32.195027] __kasan_check_write+0x20/0x30 [ 32.195234] kasan_atomics_helper+0xd3c/0x4858 [ 32.195296] kasan_atomics+0x198/0x2e0 [ 32.195345] kunit_try_run_case+0x170/0x3f0 [ 32.195404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.195867] kthread+0x328/0x630 [ 32.196154] ret_from_fork+0x10/0x20 [ 32.196518] [ 32.196545] Allocated by task 296: [ 32.196578] kasan_save_stack+0x3c/0x68 [ 32.196625] kasan_save_track+0x20/0x40 [ 32.196751] kasan_save_alloc_info+0x40/0x58 [ 32.196792] __kasan_kmalloc+0xd4/0xd8 [ 32.197054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.197100] kasan_atomics+0xb8/0x2e0 [ 32.197150] kunit_try_run_case+0x170/0x3f0 [ 32.197455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.197681] kthread+0x328/0x630 [ 32.197717] ret_from_fork+0x10/0x20 [ 32.197754] [ 32.197784] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.197784] which belongs to the cache kmalloc-64 of size 64 [ 32.197987] The buggy address is located 0 bytes to the right of [ 32.197987] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.198264] [ 32.198288] The buggy address belongs to the physical page: [ 32.198322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.198565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.198772] page_type: f5(slab) [ 32.198970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.199031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.199076] page dumped because: kasan: bad access detected [ 32.199119] [ 32.199166] Memory state around the buggy address: [ 32.199206] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.199253] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.199298] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.199606] ^ [ 32.199649] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.199695] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.199969] ================================================================== [ 32.325160] ================================================================== [ 32.325463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 32.325516] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.325576] [ 32.325710] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.325904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.326036] Hardware name: linux,dummy-virt (DT) [ 32.326112] Call trace: [ 32.326186] show_stack+0x20/0x38 (C) [ 32.326265] dump_stack_lvl+0x8c/0xd0 [ 32.326312] print_report+0x118/0x5d0 [ 32.326364] kasan_report+0xdc/0x128 [ 32.326545] __asan_report_load8_noabort+0x20/0x30 [ 32.326595] kasan_atomics_helper+0x3f04/0x4858 [ 32.327068] kasan_atomics+0x198/0x2e0 [ 32.327433] kunit_try_run_case+0x170/0x3f0 [ 32.327565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.327761] kthread+0x328/0x630 [ 32.327809] ret_from_fork+0x10/0x20 [ 32.327910] [ 32.327934] Allocated by task 296: [ 32.328088] kasan_save_stack+0x3c/0x68 [ 32.328211] kasan_save_track+0x20/0x40 [ 32.328259] kasan_save_alloc_info+0x40/0x58 [ 32.328396] __kasan_kmalloc+0xd4/0xd8 [ 32.328826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.328912] kasan_atomics+0xb8/0x2e0 [ 32.328952] kunit_try_run_case+0x170/0x3f0 [ 32.328994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.329043] kthread+0x328/0x630 [ 32.329156] ret_from_fork+0x10/0x20 [ 32.329197] [ 32.329218] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.329218] which belongs to the cache kmalloc-64 of size 64 [ 32.329283] The buggy address is located 0 bytes to the right of [ 32.329283] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.329356] [ 32.329378] The buggy address belongs to the physical page: [ 32.329412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.329468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.329518] page_type: f5(slab) [ 32.329558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.329610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.329655] page dumped because: kasan: bad access detected [ 32.329690] [ 32.329711] Memory state around the buggy address: [ 32.329745] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329791] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329837] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.329877] ^ [ 32.329913] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.329959] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.330001] ================================================================== [ 32.096319] ================================================================== [ 32.096384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 32.096667] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.096747] [ 32.096898] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.097276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.097337] Hardware name: linux,dummy-virt (DT) [ 32.097372] Call trace: [ 32.097398] show_stack+0x20/0x38 (C) [ 32.097648] dump_stack_lvl+0x8c/0xd0 [ 32.097714] print_report+0x118/0x5d0 [ 32.097760] kasan_report+0xdc/0x128 [ 32.097806] kasan_check_range+0x100/0x1a8 [ 32.097993] __kasan_check_write+0x20/0x30 [ 32.098073] kasan_atomics_helper+0x99c/0x4858 [ 32.098565] kasan_atomics+0x198/0x2e0 [ 32.098736] kunit_try_run_case+0x170/0x3f0 [ 32.098832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.099021] kthread+0x328/0x630 [ 32.099069] ret_from_fork+0x10/0x20 [ 32.099118] [ 32.099149] Allocated by task 296: [ 32.099179] kasan_save_stack+0x3c/0x68 [ 32.099225] kasan_save_track+0x20/0x40 [ 32.099374] kasan_save_alloc_info+0x40/0x58 [ 32.099573] __kasan_kmalloc+0xd4/0xd8 [ 32.099644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.099990] kasan_atomics+0xb8/0x2e0 [ 32.100205] kunit_try_run_case+0x170/0x3f0 [ 32.100260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.100310] kthread+0x328/0x630 [ 32.100698] ret_from_fork+0x10/0x20 [ 32.101045] [ 32.101086] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.101086] which belongs to the cache kmalloc-64 of size 64 [ 32.101163] The buggy address is located 0 bytes to the right of [ 32.101163] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.101426] [ 32.101559] The buggy address belongs to the physical page: [ 32.101923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.101987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.102038] page_type: f5(slab) [ 32.102078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.102220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.102280] page dumped because: kasan: bad access detected [ 32.102317] [ 32.102348] Memory state around the buggy address: [ 32.102393] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.102450] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.102497] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.102539] ^ [ 32.102575] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.102622] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.102664] ================================================================== [ 32.183657] ================================================================== [ 32.183850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 32.183904] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.183958] [ 32.184419] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.184576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.184606] Hardware name: linux,dummy-virt (DT) [ 32.184902] Call trace: [ 32.184931] show_stack+0x20/0x38 (C) [ 32.184985] dump_stack_lvl+0x8c/0xd0 [ 32.185032] print_report+0x118/0x5d0 [ 32.185429] kasan_report+0xdc/0x128 [ 32.185493] __asan_report_load4_noabort+0x20/0x30 [ 32.185548] kasan_atomics_helper+0x3dd8/0x4858 [ 32.185611] kasan_atomics+0x198/0x2e0 [ 32.186079] kunit_try_run_case+0x170/0x3f0 [ 32.186162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.186377] kthread+0x328/0x630 [ 32.186435] ret_from_fork+0x10/0x20 [ 32.186487] [ 32.186518] Allocated by task 296: [ 32.186748] kasan_save_stack+0x3c/0x68 [ 32.186822] kasan_save_track+0x20/0x40 [ 32.186960] kasan_save_alloc_info+0x40/0x58 [ 32.187000] __kasan_kmalloc+0xd4/0xd8 [ 32.187038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.187234] kasan_atomics+0xb8/0x2e0 [ 32.187286] kunit_try_run_case+0x170/0x3f0 [ 32.187328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.187415] kthread+0x328/0x630 [ 32.187592] ret_from_fork+0x10/0x20 [ 32.187890] [ 32.187915] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.187915] which belongs to the cache kmalloc-64 of size 64 [ 32.187980] The buggy address is located 0 bytes to the right of [ 32.187980] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.188629] [ 32.188780] The buggy address belongs to the physical page: [ 32.188816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.189173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.189244] page_type: f5(slab) [ 32.189290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.189344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.189391] page dumped because: kasan: bad access detected [ 32.189423] [ 32.189445] Memory state around the buggy address: [ 32.189985] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.190537] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.190620] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.190763] ^ [ 32.190958] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.191147] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.191192] ================================================================== [ 32.374313] ================================================================== [ 32.374365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 32.374417] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.374469] [ 32.374499] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.374587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.374616] Hardware name: linux,dummy-virt (DT) [ 32.374649] Call trace: [ 32.374671] show_stack+0x20/0x38 (C) [ 32.374790] dump_stack_lvl+0x8c/0xd0 [ 32.374840] print_report+0x118/0x5d0 [ 32.375248] kasan_report+0xdc/0x128 [ 32.375844] __asan_report_load8_noabort+0x20/0x30 [ 32.375911] kasan_atomics_helper+0x3df4/0x4858 [ 32.376216] kasan_atomics+0x198/0x2e0 [ 32.376311] kunit_try_run_case+0x170/0x3f0 [ 32.376363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.376421] kthread+0x328/0x630 [ 32.376499] ret_from_fork+0x10/0x20 [ 32.376549] [ 32.376579] Allocated by task 296: [ 32.376634] kasan_save_stack+0x3c/0x68 [ 32.376678] kasan_save_track+0x20/0x40 [ 32.376718] kasan_save_alloc_info+0x40/0x58 [ 32.376759] __kasan_kmalloc+0xd4/0xd8 [ 32.376819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.377011] kasan_atomics+0xb8/0x2e0 [ 32.377057] kunit_try_run_case+0x170/0x3f0 [ 32.377517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.377936] kthread+0x328/0x630 [ 32.377973] ret_from_fork+0x10/0x20 [ 32.378162] [ 32.378191] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.378191] which belongs to the cache kmalloc-64 of size 64 [ 32.378256] The buggy address is located 0 bytes to the right of [ 32.378256] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.378326] [ 32.378348] The buggy address belongs to the physical page: [ 32.378638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.378809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.379243] page_type: f5(slab) [ 32.379288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.379614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.379663] page dumped because: kasan: bad access detected [ 32.379697] [ 32.379717] Memory state around the buggy address: [ 32.379750] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.379796] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.379890] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.379933] ^ [ 32.380203] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.380314] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.380391] ================================================================== [ 32.408050] ================================================================== [ 32.408274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 32.408325] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.408377] [ 32.408407] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.408568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.408603] Hardware name: linux,dummy-virt (DT) [ 32.408755] Call trace: [ 32.408788] show_stack+0x20/0x38 (C) [ 32.408902] dump_stack_lvl+0x8c/0xd0 [ 32.408949] print_report+0x118/0x5d0 [ 32.408992] kasan_report+0xdc/0x128 [ 32.409037] kasan_check_range+0x100/0x1a8 [ 32.411145] __kasan_check_write+0x20/0x30 [ 32.411498] kasan_atomics_helper+0x17ec/0x4858 [ 32.411557] kasan_atomics+0x198/0x2e0 [ 32.411613] kunit_try_run_case+0x170/0x3f0 [ 32.411664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.411722] kthread+0x328/0x630 [ 32.411766] ret_from_fork+0x10/0x20 [ 32.411815] [ 32.411837] Allocated by task 296: [ 32.411868] kasan_save_stack+0x3c/0x68 [ 32.411913] kasan_save_track+0x20/0x40 [ 32.411954] kasan_save_alloc_info+0x40/0x58 [ 32.411994] __kasan_kmalloc+0xd4/0xd8 [ 32.412033] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.412075] kasan_atomics+0xb8/0x2e0 [ 32.412114] kunit_try_run_case+0x170/0x3f0 [ 32.412170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.412218] kthread+0x328/0x630 [ 32.412254] ret_from_fork+0x10/0x20 [ 32.412292] [ 32.412315] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.412315] which belongs to the cache kmalloc-64 of size 64 [ 32.412377] The buggy address is located 0 bytes to the right of [ 32.412377] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.412445] [ 32.412468] The buggy address belongs to the physical page: [ 32.412501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.412555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.412606] page_type: f5(slab) [ 32.412645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.412696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.412741] page dumped because: kasan: bad access detected [ 32.412775] [ 32.412796] Memory state around the buggy address: [ 32.412830] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.412874] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.412921] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.412962] ^ [ 32.412997] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.413042] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.413084] ================================================================== [ 32.217501] ================================================================== [ 32.217555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 32.217607] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.217661] [ 32.217695] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.217785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.217816] Hardware name: linux,dummy-virt (DT) [ 32.217850] Call trace: [ 32.217873] show_stack+0x20/0x38 (C) [ 32.217923] dump_stack_lvl+0x8c/0xd0 [ 32.217971] print_report+0x118/0x5d0 [ 32.218016] kasan_report+0xdc/0x128 [ 32.218060] __asan_report_load8_noabort+0x20/0x30 [ 32.218111] kasan_atomics_helper+0x3f58/0x4858 [ 32.218178] kasan_atomics+0x198/0x2e0 [ 32.218227] kunit_try_run_case+0x170/0x3f0 [ 32.218278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.218334] kthread+0x328/0x630 [ 32.218750] ret_from_fork+0x10/0x20 [ 32.218818] [ 32.218841] Allocated by task 296: [ 32.218872] kasan_save_stack+0x3c/0x68 [ 32.219542] kasan_save_track+0x20/0x40 [ 32.219591] kasan_save_alloc_info+0x40/0x58 [ 32.219633] __kasan_kmalloc+0xd4/0xd8 [ 32.219681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.219724] kasan_atomics+0xb8/0x2e0 [ 32.219914] kunit_try_run_case+0x170/0x3f0 [ 32.219967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.220014] kthread+0x328/0x630 [ 32.220047] ret_from_fork+0x10/0x20 [ 32.220095] [ 32.220117] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.220117] which belongs to the cache kmalloc-64 of size 64 [ 32.220191] The buggy address is located 0 bytes to the right of [ 32.220191] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.220931] [ 32.220972] The buggy address belongs to the physical page: [ 32.221139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.221269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.221494] page_type: f5(slab) [ 32.221643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.221699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.222003] page dumped because: kasan: bad access detected [ 32.222273] [ 32.222343] Memory state around the buggy address: [ 32.222489] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.222537] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.222583] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.222625] ^ [ 32.223458] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.223769] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.224057] ================================================================== [ 32.224488] ================================================================== [ 32.224592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 32.224666] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.224719] [ 32.224753] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.224844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.224874] Hardware name: linux,dummy-virt (DT) [ 32.225354] Call trace: [ 32.225392] show_stack+0x20/0x38 (C) [ 32.225445] dump_stack_lvl+0x8c/0xd0 [ 32.225491] print_report+0x118/0x5d0 [ 32.225751] kasan_report+0xdc/0x128 [ 32.225807] kasan_check_range+0x100/0x1a8 [ 32.225855] __kasan_check_write+0x20/0x30 [ 32.225903] kasan_atomics_helper+0xe44/0x4858 [ 32.225952] kasan_atomics+0x198/0x2e0 [ 32.226416] kunit_try_run_case+0x170/0x3f0 [ 32.226488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.226546] kthread+0x328/0x630 [ 32.226662] ret_from_fork+0x10/0x20 [ 32.226807] [ 32.227196] Allocated by task 296: [ 32.227426] kasan_save_stack+0x3c/0x68 [ 32.227482] kasan_save_track+0x20/0x40 [ 32.227528] kasan_save_alloc_info+0x40/0x58 [ 32.227578] __kasan_kmalloc+0xd4/0xd8 [ 32.227641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.227684] kasan_atomics+0xb8/0x2e0 [ 32.228103] kunit_try_run_case+0x170/0x3f0 [ 32.228260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.228725] kthread+0x328/0x630 [ 32.228985] ret_from_fork+0x10/0x20 [ 32.229200] [ 32.229227] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.229227] which belongs to the cache kmalloc-64 of size 64 [ 32.229291] The buggy address is located 0 bytes to the right of [ 32.229291] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.229359] [ 32.229380] The buggy address belongs to the physical page: [ 32.229414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.229890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.229947] page_type: f5(slab) [ 32.229987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.230198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.230245] page dumped because: kasan: bad access detected [ 32.230732] [ 32.231061] Memory state around the buggy address: [ 32.231108] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.231169] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.231238] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.231285] ^ [ 32.231321] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.231367] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.231409] ================================================================== [ 32.303267] ================================================================== [ 32.303322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 32.303642] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.303989] [ 32.304026] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.304234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.304270] Hardware name: linux,dummy-virt (DT) [ 32.304333] Call trace: [ 32.304356] show_stack+0x20/0x38 (C) [ 32.304463] dump_stack_lvl+0x8c/0xd0 [ 32.304803] print_report+0x118/0x5d0 [ 32.304851] kasan_report+0xdc/0x128 [ 32.305111] kasan_check_range+0x100/0x1a8 [ 32.305255] __kasan_check_write+0x20/0x30 [ 32.305306] kasan_atomics_helper+0x126c/0x4858 [ 32.305661] kasan_atomics+0x198/0x2e0 [ 32.305808] kunit_try_run_case+0x170/0x3f0 [ 32.305859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.305915] kthread+0x328/0x630 [ 32.305958] ret_from_fork+0x10/0x20 [ 32.306457] [ 32.306573] Allocated by task 296: [ 32.306604] kasan_save_stack+0x3c/0x68 [ 32.307030] kasan_save_track+0x20/0x40 [ 32.307078] kasan_save_alloc_info+0x40/0x58 [ 32.307143] __kasan_kmalloc+0xd4/0xd8 [ 32.307185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.307227] kasan_atomics+0xb8/0x2e0 [ 32.307307] kunit_try_run_case+0x170/0x3f0 [ 32.307433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.307507] kthread+0x328/0x630 [ 32.307683] ret_from_fork+0x10/0x20 [ 32.307742] [ 32.307832] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.307832] which belongs to the cache kmalloc-64 of size 64 [ 32.307895] The buggy address is located 0 bytes to the right of [ 32.307895] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.308012] [ 32.308059] The buggy address belongs to the physical page: [ 32.308117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.308499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.308564] page_type: f5(slab) [ 32.308821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.309007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.309319] page dumped because: kasan: bad access detected [ 32.309361] [ 32.309381] Memory state around the buggy address: [ 32.309464] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309996] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.310143] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.310187] ^ [ 32.310224] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.310418] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.310521] ================================================================== [ 32.387752] ================================================================== [ 32.387858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 32.388008] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.388067] [ 32.388098] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.388212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.388307] Hardware name: linux,dummy-virt (DT) [ 32.388580] Call trace: [ 32.388722] show_stack+0x20/0x38 (C) [ 32.388775] dump_stack_lvl+0x8c/0xd0 [ 32.388823] print_report+0x118/0x5d0 [ 32.389066] kasan_report+0xdc/0x128 [ 32.389189] __asan_report_load8_noabort+0x20/0x30 [ 32.389243] kasan_atomics_helper+0x3e10/0x4858 [ 32.389300] kasan_atomics+0x198/0x2e0 [ 32.389458] kunit_try_run_case+0x170/0x3f0 [ 32.389572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.389706] kthread+0x328/0x630 [ 32.389851] ret_from_fork+0x10/0x20 [ 32.389900] [ 32.389928] Allocated by task 296: [ 32.390053] kasan_save_stack+0x3c/0x68 [ 32.390097] kasan_save_track+0x20/0x40 [ 32.390157] kasan_save_alloc_info+0x40/0x58 [ 32.390197] __kasan_kmalloc+0xd4/0xd8 [ 32.390236] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.390278] kasan_atomics+0xb8/0x2e0 [ 32.390601] kunit_try_run_case+0x170/0x3f0 [ 32.390645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.390692] kthread+0x328/0x630 [ 32.391985] ret_from_fork+0x10/0x20 [ 32.392043] [ 32.392100] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.392100] which belongs to the cache kmalloc-64 of size 64 [ 32.392307] The buggy address is located 0 bytes to the right of [ 32.392307] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.392391] [ 32.392416] The buggy address belongs to the physical page: [ 32.392450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.392512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.392945] page_type: f5(slab) [ 32.393333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.393543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.393589] page dumped because: kasan: bad access detected [ 32.393626] [ 32.393646] Memory state around the buggy address: [ 32.393680] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.393771] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.393985] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.394172] ^ [ 32.394270] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.394365] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.394408] ================================================================== [ 32.311520] ================================================================== [ 32.311687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 32.311739] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.311791] [ 32.311821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.311911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.311939] Hardware name: linux,dummy-virt (DT) [ 32.311971] Call trace: [ 32.312005] show_stack+0x20/0x38 (C) [ 32.312054] dump_stack_lvl+0x8c/0xd0 [ 32.312313] print_report+0x118/0x5d0 [ 32.312715] kasan_report+0xdc/0x128 [ 32.312978] kasan_check_range+0x100/0x1a8 [ 32.313065] __kasan_check_write+0x20/0x30 [ 32.313112] kasan_atomics_helper+0x12d8/0x4858 [ 32.313173] kasan_atomics+0x198/0x2e0 [ 32.313222] kunit_try_run_case+0x170/0x3f0 [ 32.313273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.313329] kthread+0x328/0x630 [ 32.313373] ret_from_fork+0x10/0x20 [ 32.313421] [ 32.313451] Allocated by task 296: [ 32.313588] kasan_save_stack+0x3c/0x68 [ 32.313646] kasan_save_track+0x20/0x40 [ 32.313752] kasan_save_alloc_info+0x40/0x58 [ 32.313935] __kasan_kmalloc+0xd4/0xd8 [ 32.314120] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.314171] kasan_atomics+0xb8/0x2e0 [ 32.314210] kunit_try_run_case+0x170/0x3f0 [ 32.314276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.314325] kthread+0x328/0x630 [ 32.314360] ret_from_fork+0x10/0x20 [ 32.314739] [ 32.314761] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.314761] which belongs to the cache kmalloc-64 of size 64 [ 32.315140] The buggy address is located 0 bytes to the right of [ 32.315140] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.315217] [ 32.315542] The buggy address belongs to the physical page: [ 32.315582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.315639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.315741] page_type: f5(slab) [ 32.315885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.315993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.316052] page dumped because: kasan: bad access detected [ 32.316095] [ 32.316115] Memory state around the buggy address: [ 32.316222] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316276] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316321] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.316434] ^ [ 32.316752] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.316927] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.317022] ================================================================== [ 32.361928] ================================================================== [ 32.362011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 32.362062] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.362114] [ 32.362156] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.362254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.362285] Hardware name: linux,dummy-virt (DT) [ 32.362316] Call trace: [ 32.362527] show_stack+0x20/0x38 (C) [ 32.362581] dump_stack_lvl+0x8c/0xd0 [ 32.362973] print_report+0x118/0x5d0 [ 32.363029] kasan_report+0xdc/0x128 [ 32.363073] __asan_report_load8_noabort+0x20/0x30 [ 32.363123] kasan_atomics_helper+0x3db0/0x4858 [ 32.363185] kasan_atomics+0x198/0x2e0 [ 32.363240] kunit_try_run_case+0x170/0x3f0 [ 32.363480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.363744] kthread+0x328/0x630 [ 32.363866] ret_from_fork+0x10/0x20 [ 32.363938] [ 32.363959] Allocated by task 296: [ 32.363988] kasan_save_stack+0x3c/0x68 [ 32.364031] kasan_save_track+0x20/0x40 [ 32.364078] kasan_save_alloc_info+0x40/0x58 [ 32.364165] __kasan_kmalloc+0xd4/0xd8 [ 32.364205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.364246] kasan_atomics+0xb8/0x2e0 [ 32.364335] kunit_try_run_case+0x170/0x3f0 [ 32.364811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.364872] kthread+0x328/0x630 [ 32.364908] ret_from_fork+0x10/0x20 [ 32.364946] [ 32.365162] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.365162] which belongs to the cache kmalloc-64 of size 64 [ 32.365429] The buggy address is located 0 bytes to the right of [ 32.365429] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.365567] [ 32.365634] The buggy address belongs to the physical page: [ 32.365669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.365725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.365773] page_type: f5(slab) [ 32.366038] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.366170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.366216] page dumped because: kasan: bad access detected [ 32.366251] [ 32.366270] Memory state around the buggy address: [ 32.366304] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.366725] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.366779] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.366820] ^ [ 32.367103] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.367166] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.367208] ================================================================== [ 32.367458] ================================================================== [ 32.367515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 32.367566] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.367618] [ 32.367649] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.367737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.367765] Hardware name: linux,dummy-virt (DT) [ 32.367798] Call trace: [ 32.367821] show_stack+0x20/0x38 (C) [ 32.368275] dump_stack_lvl+0x8c/0xd0 [ 32.368767] print_report+0x118/0x5d0 [ 32.368818] kasan_report+0xdc/0x128 [ 32.369426] kasan_check_range+0x100/0x1a8 [ 32.369654] __kasan_check_write+0x20/0x30 [ 32.369803] kasan_atomics_helper+0x1644/0x4858 [ 32.369909] kasan_atomics+0x198/0x2e0 [ 32.369957] kunit_try_run_case+0x170/0x3f0 [ 32.370008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.370064] kthread+0x328/0x630 [ 32.370118] ret_from_fork+0x10/0x20 [ 32.370369] [ 32.370392] Allocated by task 296: [ 32.370421] kasan_save_stack+0x3c/0x68 [ 32.370465] kasan_save_track+0x20/0x40 [ 32.370506] kasan_save_alloc_info+0x40/0x58 [ 32.370546] __kasan_kmalloc+0xd4/0xd8 [ 32.370586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.370630] kasan_atomics+0xb8/0x2e0 [ 32.370672] kunit_try_run_case+0x170/0x3f0 [ 32.370727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.370777] kthread+0x328/0x630 [ 32.371259] ret_from_fork+0x10/0x20 [ 32.371309] [ 32.371528] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.371528] which belongs to the cache kmalloc-64 of size 64 [ 32.371619] The buggy address is located 0 bytes to the right of [ 32.371619] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.371713] [ 32.371735] The buggy address belongs to the physical page: [ 32.371770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.371824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.371873] page_type: f5(slab) [ 32.371913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.371966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.372365] page dumped because: kasan: bad access detected [ 32.372406] [ 32.372447] Memory state around the buggy address: [ 32.372718] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.372877] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.372924] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.373045] ^ [ 32.373083] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.373142] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.373730] ================================================================== [ 32.201815] ================================================================== [ 32.201931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 32.201983] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.202037] [ 32.202069] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.202487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.202537] Hardware name: linux,dummy-virt (DT) [ 32.202585] Call trace: [ 32.202617] show_stack+0x20/0x38 (C) [ 32.203194] dump_stack_lvl+0x8c/0xd0 [ 32.203265] print_report+0x118/0x5d0 [ 32.203674] kasan_report+0xdc/0x128 [ 32.203742] __asan_report_load4_noabort+0x20/0x30 [ 32.203840] kasan_atomics_helper+0x3e04/0x4858 [ 32.203894] kasan_atomics+0x198/0x2e0 [ 32.203943] kunit_try_run_case+0x170/0x3f0 [ 32.203994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.204146] kthread+0x328/0x630 [ 32.204192] ret_from_fork+0x10/0x20 [ 32.204556] [ 32.204579] Allocated by task 296: [ 32.204609] kasan_save_stack+0x3c/0x68 [ 32.205000] kasan_save_track+0x20/0x40 [ 32.205052] kasan_save_alloc_info+0x40/0x58 [ 32.205092] __kasan_kmalloc+0xd4/0xd8 [ 32.205277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.205320] kasan_atomics+0xb8/0x2e0 [ 32.205358] kunit_try_run_case+0x170/0x3f0 [ 32.205513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.205563] kthread+0x328/0x630 [ 32.205850] ret_from_fork+0x10/0x20 [ 32.205897] [ 32.205919] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.205919] which belongs to the cache kmalloc-64 of size 64 [ 32.205989] The buggy address is located 0 bytes to the right of [ 32.205989] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.206117] [ 32.206320] The buggy address belongs to the physical page: [ 32.206355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.206411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.206828] page_type: f5(slab) [ 32.206874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.206928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.206980] page dumped because: kasan: bad access detected [ 32.207084] [ 32.207105] Memory state around the buggy address: [ 32.207148] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.207310] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.207373] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.207414] ^ [ 32.207451] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207605] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207648] ================================================================== [ 32.394661] ================================================================== [ 32.394904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 32.394967] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.395021] [ 32.395053] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.395153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.395181] Hardware name: linux,dummy-virt (DT) [ 32.395214] Call trace: [ 32.395237] show_stack+0x20/0x38 (C) [ 32.395287] dump_stack_lvl+0x8c/0xd0 [ 32.395784] print_report+0x118/0x5d0 [ 32.395841] kasan_report+0xdc/0x128 [ 32.395886] kasan_check_range+0x100/0x1a8 [ 32.396145] __kasan_check_write+0x20/0x30 [ 32.396250] kasan_atomics_helper+0x175c/0x4858 [ 32.396379] kasan_atomics+0x198/0x2e0 [ 32.396427] kunit_try_run_case+0x170/0x3f0 [ 32.396477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.396532] kthread+0x328/0x630 [ 32.396576] ret_from_fork+0x10/0x20 [ 32.396631] [ 32.396743] Allocated by task 296: [ 32.396817] kasan_save_stack+0x3c/0x68 [ 32.396936] kasan_save_track+0x20/0x40 [ 32.397027] kasan_save_alloc_info+0x40/0x58 [ 32.397101] __kasan_kmalloc+0xd4/0xd8 [ 32.397151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.397193] kasan_atomics+0xb8/0x2e0 [ 32.397233] kunit_try_run_case+0x170/0x3f0 [ 32.397274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.397699] kthread+0x328/0x630 [ 32.397752] ret_from_fork+0x10/0x20 [ 32.398276] [ 32.398335] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.398335] which belongs to the cache kmalloc-64 of size 64 [ 32.398402] The buggy address is located 0 bytes to the right of [ 32.398402] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.398474] [ 32.398497] The buggy address belongs to the physical page: [ 32.398735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.398822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.399370] page_type: f5(slab) [ 32.399410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.399702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.399883] page dumped because: kasan: bad access detected [ 32.399921] [ 32.400003] Memory state around the buggy address: [ 32.400222] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.400269] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.400316] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.400358] ^ [ 32.400393] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.400438] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.400480] ================================================================== [ 32.240677] ================================================================== [ 32.240763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 32.240814] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.240869] [ 32.240902] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.240993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.241022] Hardware name: linux,dummy-virt (DT) [ 32.241055] Call trace: [ 32.241078] show_stack+0x20/0x38 (C) [ 32.241138] dump_stack_lvl+0x8c/0xd0 [ 32.241556] print_report+0x118/0x5d0 [ 32.241620] kasan_report+0xdc/0x128 [ 32.241751] kasan_check_range+0x100/0x1a8 [ 32.242085] __kasan_check_write+0x20/0x30 [ 32.242281] kasan_atomics_helper+0xeb8/0x4858 [ 32.242501] kasan_atomics+0x198/0x2e0 [ 32.242551] kunit_try_run_case+0x170/0x3f0 [ 32.242601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.242657] kthread+0x328/0x630 [ 32.242701] ret_from_fork+0x10/0x20 [ 32.243170] [ 32.243197] Allocated by task 296: [ 32.243230] kasan_save_stack+0x3c/0x68 [ 32.243277] kasan_save_track+0x20/0x40 [ 32.243325] kasan_save_alloc_info+0x40/0x58 [ 32.243427] __kasan_kmalloc+0xd4/0xd8 [ 32.243527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.243634] kasan_atomics+0xb8/0x2e0 [ 32.243696] kunit_try_run_case+0x170/0x3f0 [ 32.243860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.244153] kthread+0x328/0x630 [ 32.244384] ret_from_fork+0x10/0x20 [ 32.244458] [ 32.244587] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.244587] which belongs to the cache kmalloc-64 of size 64 [ 32.244668] The buggy address is located 0 bytes to the right of [ 32.244668] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.244735] [ 32.245255] The buggy address belongs to the physical page: [ 32.245304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.245360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.245422] page_type: f5(slab) [ 32.245464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.245552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.245620] page dumped because: kasan: bad access detected [ 32.245957] [ 32.246066] Memory state around the buggy address: [ 32.246105] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.246162] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.246305] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.246589] ^ [ 32.246638] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.246684] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.246726] ================================================================== [ 32.279284] ================================================================== [ 32.279334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 32.279481] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.279556] [ 32.279592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.279841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.279869] Hardware name: linux,dummy-virt (DT) [ 32.279902] Call trace: [ 32.279925] show_stack+0x20/0x38 (C) [ 32.279973] dump_stack_lvl+0x8c/0xd0 [ 32.280119] print_report+0x118/0x5d0 [ 32.280173] kasan_report+0xdc/0x128 [ 32.280223] kasan_check_range+0x100/0x1a8 [ 32.280355] __kasan_check_write+0x20/0x30 [ 32.280449] kasan_atomics_helper+0x10c0/0x4858 [ 32.280643] kasan_atomics+0x198/0x2e0 [ 32.280691] kunit_try_run_case+0x170/0x3f0 [ 32.280742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.280798] kthread+0x328/0x630 [ 32.280840] ret_from_fork+0x10/0x20 [ 32.280889] [ 32.280909] Allocated by task 296: [ 32.280937] kasan_save_stack+0x3c/0x68 [ 32.280980] kasan_save_track+0x20/0x40 [ 32.281021] kasan_save_alloc_info+0x40/0x58 [ 32.281060] __kasan_kmalloc+0xd4/0xd8 [ 32.281099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.281150] kasan_atomics+0xb8/0x2e0 [ 32.281189] kunit_try_run_case+0x170/0x3f0 [ 32.281232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.281279] kthread+0x328/0x630 [ 32.281339] ret_from_fork+0x10/0x20 [ 32.281378] [ 32.281398] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.281398] which belongs to the cache kmalloc-64 of size 64 [ 32.281460] The buggy address is located 0 bytes to the right of [ 32.281460] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.281530] [ 32.281550] The buggy address belongs to the physical page: [ 32.281584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.281635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.281979] page_type: f5(slab) [ 32.282124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.282188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.282337] page dumped because: kasan: bad access detected [ 32.282422] [ 32.282442] Memory state around the buggy address: [ 32.282476] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.282521] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.282567] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.282608] ^ [ 32.282643] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.282688] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.282739] ================================================================== [ 32.121027] ================================================================== [ 32.121081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 32.121351] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.121722] [ 32.121900] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.122209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.122254] Hardware name: linux,dummy-virt (DT) [ 32.122421] Call trace: [ 32.122457] show_stack+0x20/0x38 (C) [ 32.122692] dump_stack_lvl+0x8c/0xd0 [ 32.122760] print_report+0x118/0x5d0 [ 32.123161] kasan_report+0xdc/0x128 [ 32.123266] kasan_check_range+0x100/0x1a8 [ 32.123323] __kasan_check_write+0x20/0x30 [ 32.123655] kasan_atomics_helper+0xad4/0x4858 [ 32.123752] kasan_atomics+0x198/0x2e0 [ 32.124106] kunit_try_run_case+0x170/0x3f0 [ 32.124221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.124383] kthread+0x328/0x630 [ 32.124470] ret_from_fork+0x10/0x20 [ 32.124782] [ 32.124931] Allocated by task 296: [ 32.125021] kasan_save_stack+0x3c/0x68 [ 32.125148] kasan_save_track+0x20/0x40 [ 32.125207] kasan_save_alloc_info+0x40/0x58 [ 32.125320] __kasan_kmalloc+0xd4/0xd8 [ 32.125362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.125435] kasan_atomics+0xb8/0x2e0 [ 32.125627] kunit_try_run_case+0x170/0x3f0 [ 32.125994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.126210] kthread+0x328/0x630 [ 32.126280] ret_from_fork+0x10/0x20 [ 32.126380] [ 32.126460] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.126460] which belongs to the cache kmalloc-64 of size 64 [ 32.126537] The buggy address is located 0 bytes to the right of [ 32.126537] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.126901] [ 32.126954] The buggy address belongs to the physical page: [ 32.127284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.127380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.127484] page_type: f5(slab) [ 32.127580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.127695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.127744] page dumped because: kasan: bad access detected [ 32.127778] [ 32.127800] Memory state around the buggy address: [ 32.127835] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.127880] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.128187] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.128519] ^ [ 32.128706] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.128821] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.128865] ================================================================== [ 32.077640] ================================================================== [ 32.077863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.077958] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.078110] [ 32.078157] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.078246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.078277] Hardware name: linux,dummy-virt (DT) [ 32.078311] Call trace: [ 32.078563] show_stack+0x20/0x38 (C) [ 32.079178] dump_stack_lvl+0x8c/0xd0 [ 32.079343] print_report+0x118/0x5d0 [ 32.079430] kasan_report+0xdc/0x128 [ 32.079675] __asan_report_load4_noabort+0x20/0x30 [ 32.079892] kasan_atomics_helper+0x42d8/0x4858 [ 32.079980] kasan_atomics+0x198/0x2e0 [ 32.080104] kunit_try_run_case+0x170/0x3f0 [ 32.080170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.080379] kthread+0x328/0x630 [ 32.081213] kasan_save_stack+0x3c/0x68 [ 32.082418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.083591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.083691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.084426] page dumped because: kasan: bad access detected [ 32.084628] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.087208] [ 32.088013] __kasan_check_write+0x20/0x30 [ 32.089593] [ 32.089688] kasan_save_stack+0x3c/0x68 [ 32.090022] kasan_save_track+0x20/0x40 [ 32.090078] kasan_save_alloc_info+0x40/0x58 [ 32.090245] __kasan_kmalloc+0xd4/0xd8 [ 32.090460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.090725] kasan_atomics+0xb8/0x2e0 [ 32.090870] kunit_try_run_case+0x170/0x3f0 [ 32.090918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.091068] kthread+0x328/0x630 [ 32.091110] ret_from_fork+0x10/0x20 [ 32.091162] [ 32.091404] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.091404] which belongs to the cache kmalloc-64 of size 64 [ 32.091779] The buggy address is located 0 bytes to the right of [ 32.091779] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.091960] [ 32.092009] The buggy address belongs to the physical page: [ 32.092044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.092419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.092507] page_type: f5(slab) [ 32.092969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.093186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.093461] page dumped because: kasan: bad access detected [ 32.093559] [ 32.093629] Memory state around the buggy address: [ 32.093875] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.094076] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.094140] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.094182] ^ [ 32.094220] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.094516] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.094804] ================================================================== [ 32.282933] ================================================================== [ 32.283006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 32.283172] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.283242] [ 32.283293] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.283567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.283608] Hardware name: linux,dummy-virt (DT) [ 32.283641] Call trace: [ 32.283698] show_stack+0x20/0x38 (C) [ 32.283791] dump_stack_lvl+0x8c/0xd0 [ 32.283995] print_report+0x118/0x5d0 [ 32.284145] kasan_report+0xdc/0x128 [ 32.284189] kasan_check_range+0x100/0x1a8 [ 32.284500] __kasan_check_write+0x20/0x30 [ 32.284705] kasan_atomics_helper+0x1128/0x4858 [ 32.284883] kasan_atomics+0x198/0x2e0 [ 32.284931] kunit_try_run_case+0x170/0x3f0 [ 32.284982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.285045] kthread+0x328/0x630 [ 32.285295] ret_from_fork+0x10/0x20 [ 32.285357] [ 32.285385] Allocated by task 296: [ 32.285521] kasan_save_stack+0x3c/0x68 [ 32.285573] kasan_save_track+0x20/0x40 [ 32.285742] kasan_save_alloc_info+0x40/0x58 [ 32.285844] __kasan_kmalloc+0xd4/0xd8 [ 32.285960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.286110] kasan_atomics+0xb8/0x2e0 [ 32.286158] kunit_try_run_case+0x170/0x3f0 [ 32.286199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.286246] kthread+0x328/0x630 [ 32.286282] ret_from_fork+0x10/0x20 [ 32.286320] [ 32.286341] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.286341] which belongs to the cache kmalloc-64 of size 64 [ 32.286599] The buggy address is located 0 bytes to the right of [ 32.286599] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.286676] [ 32.286720] The buggy address belongs to the physical page: [ 32.286756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.286904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.287095] page_type: f5(slab) [ 32.287144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.287197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.287254] page dumped because: kasan: bad access detected [ 32.287301] [ 32.287357] Memory state around the buggy address: [ 32.287390] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.287437] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.287591] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.287633] ^ [ 32.287668] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.287714] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.287755] ================================================================== [ 32.247560] ================================================================== [ 32.247615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 32.247885] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.247959] [ 32.248351] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.248673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.248704] Hardware name: linux,dummy-virt (DT) [ 32.248738] Call trace: [ 32.248764] show_stack+0x20/0x38 (C) [ 32.249102] dump_stack_lvl+0x8c/0xd0 [ 32.249390] print_report+0x118/0x5d0 [ 32.249452] kasan_report+0xdc/0x128 [ 32.249499] kasan_check_range+0x100/0x1a8 [ 32.249597] __kasan_check_write+0x20/0x30 [ 32.249696] kasan_atomics_helper+0xf20/0x4858 [ 32.250046] kasan_atomics+0x198/0x2e0 [ 32.250110] kunit_try_run_case+0x170/0x3f0 [ 32.250171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.250487] kthread+0x328/0x630 [ 32.250788] ret_from_fork+0x10/0x20 [ 32.250839] [ 32.251043] Allocated by task 296: [ 32.251074] kasan_save_stack+0x3c/0x68 [ 32.251212] kasan_save_track+0x20/0x40 [ 32.251272] kasan_save_alloc_info+0x40/0x58 [ 32.251313] __kasan_kmalloc+0xd4/0xd8 [ 32.251353] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.251827] kasan_atomics+0xb8/0x2e0 [ 32.251898] kunit_try_run_case+0x170/0x3f0 [ 32.251943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.252649] kthread+0x328/0x630 [ 32.252708] ret_from_fork+0x10/0x20 [ 32.252749] [ 32.252771] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.252771] which belongs to the cache kmalloc-64 of size 64 [ 32.252838] The buggy address is located 0 bytes to the right of [ 32.252838] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.253348] [ 32.253376] The buggy address belongs to the physical page: [ 32.253409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.253467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.253791] page_type: f5(slab) [ 32.253832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.253888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.253934] page dumped because: kasan: bad access detected [ 32.254511] [ 32.254536] Memory state around the buggy address: [ 32.254573] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.254621] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.254676] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.254794] ^ [ 32.255022] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255069] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255111] ================================================================== [ 32.400735] ================================================================== [ 32.400983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 32.401644] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.401704] [ 32.401906] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.402000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.402035] Hardware name: linux,dummy-virt (DT) [ 32.402199] Call trace: [ 32.402223] show_stack+0x20/0x38 (C) [ 32.402274] dump_stack_lvl+0x8c/0xd0 [ 32.402320] print_report+0x118/0x5d0 [ 32.402366] kasan_report+0xdc/0x128 [ 32.402409] __asan_report_load8_noabort+0x20/0x30 [ 32.402461] kasan_atomics_helper+0x3e20/0x4858 [ 32.402511] kasan_atomics+0x198/0x2e0 [ 32.402558] kunit_try_run_case+0x170/0x3f0 [ 32.402615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.403018] kthread+0x328/0x630 [ 32.403618] ret_from_fork+0x10/0x20 [ 32.403679] [ 32.403705] Allocated by task 296: [ 32.403736] kasan_save_stack+0x3c/0x68 [ 32.403780] kasan_save_track+0x20/0x40 [ 32.403821] kasan_save_alloc_info+0x40/0x58 [ 32.403862] __kasan_kmalloc+0xd4/0xd8 [ 32.403904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.403947] kasan_atomics+0xb8/0x2e0 [ 32.404139] kunit_try_run_case+0x170/0x3f0 [ 32.404494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.404582] kthread+0x328/0x630 [ 32.404618] ret_from_fork+0x10/0x20 [ 32.404656] [ 32.404678] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.404678] which belongs to the cache kmalloc-64 of size 64 [ 32.405057] The buggy address is located 0 bytes to the right of [ 32.405057] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.405145] [ 32.405168] The buggy address belongs to the physical page: [ 32.405208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.405459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.405833] page_type: f5(slab) [ 32.405873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.405926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.405997] page dumped because: kasan: bad access detected [ 32.406562] [ 32.406748] Memory state around the buggy address: [ 32.406786] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.406920] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.407077] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.407286] ^ [ 32.407341] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407387] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407430] ================================================================== [ 32.273664] ================================================================== [ 32.273715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 32.273764] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.273816] [ 32.273848] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.274211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.274350] Hardware name: linux,dummy-virt (DT) [ 32.274390] Call trace: [ 32.274624] show_stack+0x20/0x38 (C) [ 32.274863] dump_stack_lvl+0x8c/0xd0 [ 32.274922] print_report+0x118/0x5d0 [ 32.275101] kasan_report+0xdc/0x128 [ 32.275225] kasan_check_range+0x100/0x1a8 [ 32.275294] __kasan_check_write+0x20/0x30 [ 32.275433] kasan_atomics_helper+0x1058/0x4858 [ 32.275767] kasan_atomics+0x198/0x2e0 [ 32.275823] kunit_try_run_case+0x170/0x3f0 [ 32.275874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.275933] kthread+0x328/0x630 [ 32.276016] ret_from_fork+0x10/0x20 [ 32.276065] [ 32.276088] Allocated by task 296: [ 32.276119] kasan_save_stack+0x3c/0x68 [ 32.276173] kasan_save_track+0x20/0x40 [ 32.276214] kasan_save_alloc_info+0x40/0x58 [ 32.276262] __kasan_kmalloc+0xd4/0xd8 [ 32.276304] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.276346] kasan_atomics+0xb8/0x2e0 [ 32.276438] kunit_try_run_case+0x170/0x3f0 [ 32.276488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.276660] kthread+0x328/0x630 [ 32.276825] ret_from_fork+0x10/0x20 [ 32.276993] [ 32.277014] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.277014] which belongs to the cache kmalloc-64 of size 64 [ 32.277077] The buggy address is located 0 bytes to the right of [ 32.277077] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.277299] [ 32.277349] The buggy address belongs to the physical page: [ 32.277919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.278047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.278108] page_type: f5(slab) [ 32.278191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.278273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.278317] page dumped because: kasan: bad access detected [ 32.278350] [ 32.278371] Memory state around the buggy address: [ 32.278404] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.278450] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.278745] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.278790] ^ [ 32.278864] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.278909] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.279008] ================================================================== [ 32.232008] ================================================================== [ 32.232355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 32.232408] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.232461] [ 32.232492] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.233254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.233521] Hardware name: linux,dummy-virt (DT) [ 32.233633] Call trace: [ 32.233757] show_stack+0x20/0x38 (C) [ 32.233811] dump_stack_lvl+0x8c/0xd0 [ 32.234032] print_report+0x118/0x5d0 [ 32.234083] kasan_report+0xdc/0x128 [ 32.234141] __asan_report_store8_noabort+0x20/0x30 [ 32.234431] kasan_atomics_helper+0x3e5c/0x4858 [ 32.234646] kasan_atomics+0x198/0x2e0 [ 32.234696] kunit_try_run_case+0x170/0x3f0 [ 32.234782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.235067] kthread+0x328/0x630 [ 32.235402] ret_from_fork+0x10/0x20 [ 32.235490] [ 32.235515] Allocated by task 296: [ 32.235834] kasan_save_stack+0x3c/0x68 [ 32.235929] kasan_save_track+0x20/0x40 [ 32.235979] kasan_save_alloc_info+0x40/0x58 [ 32.236019] __kasan_kmalloc+0xd4/0xd8 [ 32.236356] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.236774] kasan_atomics+0xb8/0x2e0 [ 32.236818] kunit_try_run_case+0x170/0x3f0 [ 32.236860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.237057] kthread+0x328/0x630 [ 32.237101] ret_from_fork+0x10/0x20 [ 32.237410] [ 32.237436] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.237436] which belongs to the cache kmalloc-64 of size 64 [ 32.237654] The buggy address is located 0 bytes to the right of [ 32.237654] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.237730] [ 32.237832] The buggy address belongs to the physical page: [ 32.238089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.238202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.238363] page_type: f5(slab) [ 32.238470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.238525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.238787] page dumped because: kasan: bad access detected [ 32.238826] [ 32.238847] Memory state around the buggy address: [ 32.238882] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.238994] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.239193] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.239335] ^ [ 32.239376] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.239422] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.239471] ================================================================== [ 32.334233] ================================================================== [ 32.334283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 32.334330] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.334381] [ 32.334411] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.334499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.334529] Hardware name: linux,dummy-virt (DT) [ 32.334560] Call trace: [ 32.334585] show_stack+0x20/0x38 (C) [ 32.334632] dump_stack_lvl+0x8c/0xd0 [ 32.334678] print_report+0x118/0x5d0 [ 32.334734] kasan_report+0xdc/0x128 [ 32.334777] kasan_check_range+0x100/0x1a8 [ 32.334823] __kasan_check_write+0x20/0x30 [ 32.334938] kasan_atomics_helper+0x147c/0x4858 [ 32.335707] kasan_atomics+0x198/0x2e0 [ 32.335976] kunit_try_run_case+0x170/0x3f0 [ 32.336274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.336801] kthread+0x328/0x630 [ 32.336862] ret_from_fork+0x10/0x20 [ 32.336918] [ 32.337339] Allocated by task 296: [ 32.337560] kasan_save_stack+0x3c/0x68 [ 32.337680] kasan_save_track+0x20/0x40 [ 32.337760] kasan_save_alloc_info+0x40/0x58 [ 32.337806] __kasan_kmalloc+0xd4/0xd8 [ 32.337886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.337980] kasan_atomics+0xb8/0x2e0 [ 32.338040] kunit_try_run_case+0x170/0x3f0 [ 32.338599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.338737] kthread+0x328/0x630 [ 32.338918] ret_from_fork+0x10/0x20 [ 32.338962] [ 32.339110] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.339110] which belongs to the cache kmalloc-64 of size 64 [ 32.339195] The buggy address is located 0 bytes to the right of [ 32.339195] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.339433] [ 32.339562] The buggy address belongs to the physical page: [ 32.339603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.339658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.339709] page_type: f5(slab) [ 32.339798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.340012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.340082] page dumped because: kasan: bad access detected [ 32.340147] [ 32.340167] Memory state around the buggy address: [ 32.340210] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.340293] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.340372] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.340414] ^ [ 32.340566] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.340820] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.340865] ================================================================== [ 32.112536] ================================================================== [ 32.112590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 32.112639] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.112694] [ 32.112727] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.112828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.112857] Hardware name: linux,dummy-virt (DT) [ 32.112888] Call trace: [ 32.112921] show_stack+0x20/0x38 (C) [ 32.112980] dump_stack_lvl+0x8c/0xd0 [ 32.113027] print_report+0x118/0x5d0 [ 32.113071] kasan_report+0xdc/0x128 [ 32.113114] kasan_check_range+0x100/0x1a8 [ 32.113582] __kasan_check_write+0x20/0x30 [ 32.114001] kasan_atomics_helper+0xa6c/0x4858 [ 32.114068] kasan_atomics+0x198/0x2e0 [ 32.114146] kunit_try_run_case+0x170/0x3f0 [ 32.114199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.114256] kthread+0x328/0x630 [ 32.114306] ret_from_fork+0x10/0x20 [ 32.114781] [ 32.114843] Allocated by task 296: [ 32.114897] kasan_save_stack+0x3c/0x68 [ 32.115008] kasan_save_track+0x20/0x40 [ 32.115074] kasan_save_alloc_info+0x40/0x58 [ 32.115201] __kasan_kmalloc+0xd4/0xd8 [ 32.115290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.115560] kasan_atomics+0xb8/0x2e0 [ 32.115720] kunit_try_run_case+0x170/0x3f0 [ 32.115826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.115948] kthread+0x328/0x630 [ 32.116027] ret_from_fork+0x10/0x20 [ 32.116360] [ 32.116435] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.116435] which belongs to the cache kmalloc-64 of size 64 [ 32.116592] The buggy address is located 0 bytes to the right of [ 32.116592] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.116678] [ 32.116700] The buggy address belongs to the physical page: [ 32.116735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.117323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.117439] page_type: f5(slab) [ 32.117533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.117716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.117955] page dumped because: kasan: bad access detected [ 32.118019] [ 32.118385] Memory state around the buggy address: [ 32.118485] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.118553] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.118710] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.118926] ^ [ 32.119180] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.119349] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.119693] ================================================================== [ 32.380939] ================================================================== [ 32.380994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 32.381045] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.381382] [ 32.381433] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.381609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.381729] Hardware name: linux,dummy-virt (DT) [ 32.381762] Call trace: [ 32.381794] show_stack+0x20/0x38 (C) [ 32.381977] dump_stack_lvl+0x8c/0xd0 [ 32.382051] print_report+0x118/0x5d0 [ 32.382095] kasan_report+0xdc/0x128 [ 32.382151] kasan_check_range+0x100/0x1a8 [ 32.382198] __kasan_check_write+0x20/0x30 [ 32.382244] kasan_atomics_helper+0x16d0/0x4858 [ 32.382294] kasan_atomics+0x198/0x2e0 [ 32.382340] kunit_try_run_case+0x170/0x3f0 [ 32.382390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.382446] kthread+0x328/0x630 [ 32.382489] ret_from_fork+0x10/0x20 [ 32.382537] [ 32.382559] Allocated by task 296: [ 32.382588] kasan_save_stack+0x3c/0x68 [ 32.382630] kasan_save_track+0x20/0x40 [ 32.382679] kasan_save_alloc_info+0x40/0x58 [ 32.384816] __kasan_kmalloc+0xd4/0xd8 [ 32.384956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.384999] kasan_atomics+0xb8/0x2e0 [ 32.385039] kunit_try_run_case+0x170/0x3f0 [ 32.385081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.385138] kthread+0x328/0x630 [ 32.385526] ret_from_fork+0x10/0x20 [ 32.385576] [ 32.385600] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.385600] which belongs to the cache kmalloc-64 of size 64 [ 32.385663] The buggy address is located 0 bytes to the right of [ 32.385663] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.385745] [ 32.385767] The buggy address belongs to the physical page: [ 32.385802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.386157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.386218] page_type: f5(slab) [ 32.386257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.386310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.386356] page dumped because: kasan: bad access detected [ 32.386629] [ 32.386663] Memory state around the buggy address: [ 32.386803] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.386963] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.387008] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.387050] ^ [ 32.387085] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.387470] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.387574] ================================================================== [ 32.354790] ================================================================== [ 32.354996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 32.355047] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.355100] [ 32.355144] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.355233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.355274] Hardware name: linux,dummy-virt (DT) [ 32.355306] Call trace: [ 32.355331] show_stack+0x20/0x38 (C) [ 32.356029] dump_stack_lvl+0x8c/0xd0 [ 32.356203] print_report+0x118/0x5d0 [ 32.356257] kasan_report+0xdc/0x128 [ 32.356312] kasan_check_range+0x100/0x1a8 [ 32.356545] __kasan_check_write+0x20/0x30 [ 32.356607] kasan_atomics_helper+0x15b4/0x4858 [ 32.356659] kasan_atomics+0x198/0x2e0 [ 32.356708] kunit_try_run_case+0x170/0x3f0 [ 32.356758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.357040] kthread+0x328/0x630 [ 32.357289] ret_from_fork+0x10/0x20 [ 32.357339] [ 32.357571] Allocated by task 296: [ 32.357686] kasan_save_stack+0x3c/0x68 [ 32.357740] kasan_save_track+0x20/0x40 [ 32.357782] kasan_save_alloc_info+0x40/0x58 [ 32.357861] __kasan_kmalloc+0xd4/0xd8 [ 32.357921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.358095] kasan_atomics+0xb8/0x2e0 [ 32.358783] kunit_try_run_case+0x170/0x3f0 [ 32.359041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.359095] kthread+0x328/0x630 [ 32.359143] ret_from_fork+0x10/0x20 [ 32.359239] [ 32.359263] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.359263] which belongs to the cache kmalloc-64 of size 64 [ 32.359333] The buggy address is located 0 bytes to the right of [ 32.359333] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.359402] [ 32.359531] The buggy address belongs to the physical page: [ 32.359817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.359876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.359926] page_type: f5(slab) [ 32.359970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.360486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.360539] page dumped because: kasan: bad access detected [ 32.360803] [ 32.360850] Memory state around the buggy address: [ 32.360914] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.361027] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.361073] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.361114] ^ [ 32.361163] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.361208] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.361250] ================================================================== [ 32.130091] ================================================================== [ 32.130162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 32.130234] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.130291] [ 32.130323] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.130413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.130442] Hardware name: linux,dummy-virt (DT) [ 32.130476] Call trace: [ 32.130510] show_stack+0x20/0x38 (C) [ 32.130570] dump_stack_lvl+0x8c/0xd0 [ 32.130619] print_report+0x118/0x5d0 [ 32.130678] kasan_report+0xdc/0x128 [ 32.130998] __asan_report_load4_noabort+0x20/0x30 [ 32.131429] kasan_atomics_helper+0x3dcc/0x4858 [ 32.131523] kasan_atomics+0x198/0x2e0 [ 32.131595] kunit_try_run_case+0x170/0x3f0 [ 32.132019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.132279] kthread+0x328/0x630 [ 32.132457] ret_from_fork+0x10/0x20 [ 32.132874] [ 32.132915] Allocated by task 296: [ 32.133073] kasan_save_stack+0x3c/0x68 [ 32.133181] kasan_save_track+0x20/0x40 [ 32.133486] kasan_save_alloc_info+0x40/0x58 [ 32.133653] __kasan_kmalloc+0xd4/0xd8 [ 32.133722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.134135] kasan_atomics+0xb8/0x2e0 [ 32.134248] kunit_try_run_case+0x170/0x3f0 [ 32.134359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.134446] kthread+0x328/0x630 [ 32.134651] ret_from_fork+0x10/0x20 [ 32.134847] [ 32.134904] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.134904] which belongs to the cache kmalloc-64 of size 64 [ 32.135207] The buggy address is located 0 bytes to the right of [ 32.135207] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.135582] [ 32.135919] The buggy address belongs to the physical page: [ 32.136103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.136221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.136362] page_type: f5(slab) [ 32.136433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.136515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.136560] page dumped because: kasan: bad access detected [ 32.136749] [ 32.136942] Memory state around the buggy address: [ 32.137184] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.137425] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.137509] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.137612] ^ [ 32.137721] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.137788] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.137832] ================================================================== [ 32.348690] ================================================================== [ 32.348743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 32.348793] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.349535] [ 32.349640] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.349813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.349844] Hardware name: linux,dummy-virt (DT) [ 32.349876] Call trace: [ 32.349907] show_stack+0x20/0x38 (C) [ 32.350140] dump_stack_lvl+0x8c/0xd0 [ 32.350188] print_report+0x118/0x5d0 [ 32.350234] kasan_report+0xdc/0x128 [ 32.350755] kasan_check_range+0x100/0x1a8 [ 32.350961] __kasan_check_write+0x20/0x30 [ 32.351075] kasan_atomics_helper+0x154c/0x4858 [ 32.351208] kasan_atomics+0x198/0x2e0 [ 32.351259] kunit_try_run_case+0x170/0x3f0 [ 32.351310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.351367] kthread+0x328/0x630 [ 32.351411] ret_from_fork+0x10/0x20 [ 32.351482] [ 32.351509] Allocated by task 296: [ 32.351540] kasan_save_stack+0x3c/0x68 [ 32.351588] kasan_save_track+0x20/0x40 [ 32.351657] kasan_save_alloc_info+0x40/0x58 [ 32.351698] __kasan_kmalloc+0xd4/0xd8 [ 32.351779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.351983] kasan_atomics+0xb8/0x2e0 [ 32.352034] kunit_try_run_case+0x170/0x3f0 [ 32.352077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.352135] kthread+0x328/0x630 [ 32.352170] ret_from_fork+0x10/0x20 [ 32.352209] [ 32.352230] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.352230] which belongs to the cache kmalloc-64 of size 64 [ 32.352745] The buggy address is located 0 bytes to the right of [ 32.352745] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.352822] [ 32.352896] The buggy address belongs to the physical page: [ 32.353058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.353173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.353223] page_type: f5(slab) [ 32.353261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.353315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.353361] page dumped because: kasan: bad access detected [ 32.353395] [ 32.353418] Memory state around the buggy address: [ 32.353453] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.353500] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.353547] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.353588] ^ [ 32.353624] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.353669] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.353712] ================================================================== [ 32.255968] ================================================================== [ 32.256162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 32.256215] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.256599] [ 32.256667] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.256971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.257014] Hardware name: linux,dummy-virt (DT) [ 32.257225] Call trace: [ 32.257400] show_stack+0x20/0x38 (C) [ 32.257456] dump_stack_lvl+0x8c/0xd0 [ 32.257504] print_report+0x118/0x5d0 [ 32.257548] kasan_report+0xdc/0x128 [ 32.257594] kasan_check_range+0x100/0x1a8 [ 32.257641] __kasan_check_write+0x20/0x30 [ 32.258300] kasan_atomics_helper+0xf88/0x4858 [ 32.258371] kasan_atomics+0x198/0x2e0 [ 32.258420] kunit_try_run_case+0x170/0x3f0 [ 32.258715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.258835] kthread+0x328/0x630 [ 32.259012] ret_from_fork+0x10/0x20 [ 32.259187] [ 32.259676] Allocated by task 296: [ 32.260112] kasan_save_stack+0x3c/0x68 [ 32.260258] kasan_save_track+0x20/0x40 [ 32.260526] kasan_save_alloc_info+0x40/0x58 [ 32.260693] __kasan_kmalloc+0xd4/0xd8 [ 32.260735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.260992] kasan_atomics+0xb8/0x2e0 [ 32.261121] kunit_try_run_case+0x170/0x3f0 [ 32.261193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.261542] kthread+0x328/0x630 [ 32.261583] ret_from_fork+0x10/0x20 [ 32.261972] [ 32.262038] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.262038] which belongs to the cache kmalloc-64 of size 64 [ 32.262615] The buggy address is located 0 bytes to the right of [ 32.262615] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.262821] [ 32.262853] The buggy address belongs to the physical page: [ 32.262938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.262995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.263053] page_type: f5(slab) [ 32.263092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.263700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.263876] page dumped because: kasan: bad access detected [ 32.263924] [ 32.263999] Memory state around the buggy address: [ 32.264032] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.264204] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.264252] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.264293] ^ [ 32.264327] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.264373] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.264414] ================================================================== [ 32.317679] ================================================================== [ 32.318049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 32.318172] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.318346] [ 32.318416] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.318506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.318540] Hardware name: linux,dummy-virt (DT) [ 32.318691] Call trace: [ 32.318728] show_stack+0x20/0x38 (C) [ 32.318778] dump_stack_lvl+0x8c/0xd0 [ 32.318824] print_report+0x118/0x5d0 [ 32.318960] kasan_report+0xdc/0x128 [ 32.319493] kasan_check_range+0x100/0x1a8 [ 32.319604] __kasan_check_write+0x20/0x30 [ 32.319686] kasan_atomics_helper+0x1384/0x4858 [ 32.319738] kasan_atomics+0x198/0x2e0 [ 32.319786] kunit_try_run_case+0x170/0x3f0 [ 32.319968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.320027] kthread+0x328/0x630 [ 32.320293] ret_from_fork+0x10/0x20 [ 32.320460] [ 32.320485] Allocated by task 296: [ 32.320514] kasan_save_stack+0x3c/0x68 [ 32.320559] kasan_save_track+0x20/0x40 [ 32.320773] kasan_save_alloc_info+0x40/0x58 [ 32.320940] __kasan_kmalloc+0xd4/0xd8 [ 32.320982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.321025] kasan_atomics+0xb8/0x2e0 [ 32.321443] kunit_try_run_case+0x170/0x3f0 [ 32.321496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.321564] kthread+0x328/0x630 [ 32.321668] ret_from_fork+0x10/0x20 [ 32.321706] [ 32.321728] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.321728] which belongs to the cache kmalloc-64 of size 64 [ 32.321963] The buggy address is located 0 bytes to the right of [ 32.321963] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.322033] [ 32.322054] The buggy address belongs to the physical page: [ 32.322095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.322453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.322509] page_type: f5(slab) [ 32.322547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.322601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.323105] page dumped because: kasan: bad access detected [ 32.323156] [ 32.323177] Memory state around the buggy address: [ 32.323486] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.323670] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.323741] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.323796] ^ [ 32.323895] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.323940] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.323982] ================================================================== [ 32.341181] ================================================================== [ 32.341254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 32.341304] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.341538] [ 32.341954] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.342247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.342277] Hardware name: linux,dummy-virt (DT) [ 32.342309] Call trace: [ 32.342334] show_stack+0x20/0x38 (C) [ 32.342384] dump_stack_lvl+0x8c/0xd0 [ 32.342432] print_report+0x118/0x5d0 [ 32.342477] kasan_report+0xdc/0x128 [ 32.342520] kasan_check_range+0x100/0x1a8 [ 32.342565] __kasan_check_write+0x20/0x30 [ 32.342613] kasan_atomics_helper+0x14e4/0x4858 [ 32.342664] kasan_atomics+0x198/0x2e0 [ 32.342713] kunit_try_run_case+0x170/0x3f0 [ 32.342770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.342970] kthread+0x328/0x630 [ 32.343014] ret_from_fork+0x10/0x20 [ 32.343399] [ 32.343532] Allocated by task 296: [ 32.343565] kasan_save_stack+0x3c/0x68 [ 32.343952] kasan_save_track+0x20/0x40 [ 32.344120] kasan_save_alloc_info+0x40/0x58 [ 32.344346] __kasan_kmalloc+0xd4/0xd8 [ 32.344393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.344436] kasan_atomics+0xb8/0x2e0 [ 32.344477] kunit_try_run_case+0x170/0x3f0 [ 32.344520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.344567] kthread+0x328/0x630 [ 32.344893] ret_from_fork+0x10/0x20 [ 32.345406] [ 32.345548] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.345548] which belongs to the cache kmalloc-64 of size 64 [ 32.345614] The buggy address is located 0 bytes to the right of [ 32.345614] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.345684] [ 32.345712] The buggy address belongs to the physical page: [ 32.345866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.346099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.346175] page_type: f5(slab) [ 32.346215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.346363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.346462] page dumped because: kasan: bad access detected [ 32.346574] [ 32.346594] Memory state around the buggy address: [ 32.346629] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.346675] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.346721] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.346762] ^ [ 32.346799] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.346975] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.347325] ================================================================== [ 32.330860] ================================================================== [ 32.330987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 32.331053] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.331106] [ 32.331158] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.331384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.331444] Hardware name: linux,dummy-virt (DT) [ 32.331489] Call trace: [ 32.331517] show_stack+0x20/0x38 (C) [ 32.331569] dump_stack_lvl+0x8c/0xd0 [ 32.331614] print_report+0x118/0x5d0 [ 32.331660] kasan_report+0xdc/0x128 [ 32.331704] kasan_check_range+0x100/0x1a8 [ 32.331750] __kasan_check_write+0x20/0x30 [ 32.331796] kasan_atomics_helper+0x1414/0x4858 [ 32.331847] kasan_atomics+0x198/0x2e0 [ 32.331895] kunit_try_run_case+0x170/0x3f0 [ 32.331946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.332001] kthread+0x328/0x630 [ 32.332045] ret_from_fork+0x10/0x20 [ 32.332093] [ 32.332114] Allocated by task 296: [ 32.332151] kasan_save_stack+0x3c/0x68 [ 32.332195] kasan_save_track+0x20/0x40 [ 32.332272] kasan_save_alloc_info+0x40/0x58 [ 32.332353] __kasan_kmalloc+0xd4/0xd8 [ 32.332472] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.332515] kasan_atomics+0xb8/0x2e0 [ 32.332554] kunit_try_run_case+0x170/0x3f0 [ 32.332866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.332946] kthread+0x328/0x630 [ 32.332984] ret_from_fork+0x10/0x20 [ 32.333022] [ 32.333044] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.333044] which belongs to the cache kmalloc-64 of size 64 [ 32.333106] The buggy address is located 0 bytes to the right of [ 32.333106] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.333187] [ 32.333209] The buggy address belongs to the physical page: [ 32.333243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.333296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.333346] page_type: f5(slab) [ 32.333385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.333439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.333483] page dumped because: kasan: bad access detected [ 32.333517] [ 32.333536] Memory state around the buggy address: [ 32.333570] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.333615] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.333660] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.333702] ^ [ 32.333737] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.333783] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.333824] ================================================================== [ 32.294206] ================================================================== [ 32.294456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 32.294846] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.295340] [ 32.295376] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.295634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.295668] Hardware name: linux,dummy-virt (DT) [ 32.295884] Call trace: [ 32.296013] show_stack+0x20/0x38 (C) [ 32.296305] dump_stack_lvl+0x8c/0xd0 [ 32.296410] print_report+0x118/0x5d0 [ 32.296564] kasan_report+0xdc/0x128 [ 32.296635] kasan_check_range+0x100/0x1a8 [ 32.296684] __kasan_check_write+0x20/0x30 [ 32.296822] kasan_atomics_helper+0x11f8/0x4858 [ 32.296904] kasan_atomics+0x198/0x2e0 [ 32.296954] kunit_try_run_case+0x170/0x3f0 [ 32.297007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.297068] kthread+0x328/0x630 [ 32.297399] ret_from_fork+0x10/0x20 [ 32.297465] [ 32.297488] Allocated by task 296: [ 32.298157] kasan_save_stack+0x3c/0x68 [ 32.298499] kasan_save_track+0x20/0x40 [ 32.298544] kasan_save_alloc_info+0x40/0x58 [ 32.298719] __kasan_kmalloc+0xd4/0xd8 [ 32.298903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.299001] kasan_atomics+0xb8/0x2e0 [ 32.299045] kunit_try_run_case+0x170/0x3f0 [ 32.299089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.299239] kthread+0x328/0x630 [ 32.299445] ret_from_fork+0x10/0x20 [ 32.299585] [ 32.299608] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.299608] which belongs to the cache kmalloc-64 of size 64 [ 32.299677] The buggy address is located 0 bytes to the right of [ 32.299677] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.299746] [ 32.299768] The buggy address belongs to the physical page: [ 32.299988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.300490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.300549] page_type: f5(slab) [ 32.300770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.301300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.301434] page dumped because: kasan: bad access detected [ 32.301479] [ 32.301592] Memory state around the buggy address: [ 32.301629] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.301677] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.301912] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.302267] ^ [ 32.302347] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302396] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302437] ================================================================== [ 32.103789] ================================================================== [ 32.104211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 32.104384] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.104709] [ 32.104761] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.106207] kasan_atomics_helper+0xa04/0x4858 [ 32.107167] ret_from_fork+0x10/0x20 [ 32.109901] The buggy address is located 0 bytes to the right of [ 32.109901] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.110004] [ 32.110058] The buggy address belongs to the physical page: [ 32.110094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.110353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.110855] page_type: f5(slab) [ 32.110934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.111066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.111114] page dumped because: kasan: bad access detected [ 32.111261] [ 32.111287] Memory state around the buggy address: [ 32.111363] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.111610] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.111688] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.111757] ^ [ 32.111796] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.111854] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.111896] ==================================================================
[ 28.842720] ================================================================== [ 28.843498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 28.843797] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.844030] [ 28.844110] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.844159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.844173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.844195] Call Trace: [ 28.844211] <TASK> [ 28.844228] dump_stack_lvl+0x73/0xb0 [ 28.844256] print_report+0xd1/0x610 [ 28.844282] ? __virt_addr_valid+0x1db/0x2d0 [ 28.844308] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.844330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.844359] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.844383] kasan_report+0x141/0x180 [ 28.844407] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.844435] kasan_check_range+0x10c/0x1c0 [ 28.844460] __kasan_check_write+0x18/0x20 [ 28.844501] kasan_atomics_helper+0x1eaa/0x5450 [ 28.844526] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.844550] ? ret_from_fork_asm+0x1a/0x30 [ 28.844580] kasan_atomics+0x1dc/0x310 [ 28.844604] ? __pfx_kasan_atomics+0x10/0x10 [ 28.844630] ? __pfx_read_tsc+0x10/0x10 [ 28.844654] ? ktime_get_ts64+0x86/0x230 [ 28.844681] kunit_try_run_case+0x1a5/0x480 [ 28.844716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.844738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.844764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.844789] ? __kthread_parkme+0x82/0x180 [ 28.844812] ? preempt_count_sub+0x50/0x80 [ 28.844837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.844861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.844888] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.844915] kthread+0x337/0x6f0 [ 28.844937] ? trace_preempt_on+0x20/0xc0 [ 28.844962] ? __pfx_kthread+0x10/0x10 [ 28.844984] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.845007] ? calculate_sigpending+0x7b/0xa0 [ 28.845034] ? __pfx_kthread+0x10/0x10 [ 28.845057] ret_from_fork+0x116/0x1d0 [ 28.845080] ? __pfx_kthread+0x10/0x10 [ 28.845103] ret_from_fork_asm+0x1a/0x30 [ 28.845136] </TASK> [ 28.845150] [ 28.851964] Allocated by task 313: [ 28.852144] kasan_save_stack+0x45/0x70 [ 28.852343] kasan_save_track+0x18/0x40 [ 28.852600] kasan_save_alloc_info+0x3b/0x50 [ 28.852764] __kasan_kmalloc+0xb7/0xc0 [ 28.852938] __kmalloc_cache_noprof+0x189/0x420 [ 28.853155] kasan_atomics+0x95/0x310 [ 28.853321] kunit_try_run_case+0x1a5/0x480 [ 28.853464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.853742] kthread+0x337/0x6f0 [ 28.853912] ret_from_fork+0x116/0x1d0 [ 28.854084] ret_from_fork_asm+0x1a/0x30 [ 28.854246] [ 28.854338] The buggy address belongs to the object at ffff88810439e280 [ 28.854338] which belongs to the cache kmalloc-64 of size 64 [ 28.854835] The buggy address is located 0 bytes to the right of [ 28.854835] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.855248] [ 28.855317] The buggy address belongs to the physical page: [ 28.855487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.855874] flags: 0x200000000000000(node=0|zone=2) [ 28.856106] page_type: f5(slab) [ 28.856270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.856570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.856805] page dumped because: kasan: bad access detected [ 28.856973] [ 28.857039] Memory state around the buggy address: [ 28.857264] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.857695] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.858026] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.858346] ^ [ 28.858568] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.859139] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.859369] ================================================================== [ 28.604147] ================================================================== [ 28.604558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 28.604864] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.605202] [ 28.605333] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.605390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.605404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.605426] Call Trace: [ 28.605452] <TASK> [ 28.605468] dump_stack_lvl+0x73/0xb0 [ 28.605507] print_report+0xd1/0x610 [ 28.605532] ? __virt_addr_valid+0x1db/0x2d0 [ 28.605557] ? kasan_atomics_helper+0x1818/0x5450 [ 28.605579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.605606] ? kasan_atomics_helper+0x1818/0x5450 [ 28.605629] kasan_report+0x141/0x180 [ 28.605653] ? kasan_atomics_helper+0x1818/0x5450 [ 28.605680] kasan_check_range+0x10c/0x1c0 [ 28.605726] __kasan_check_write+0x18/0x20 [ 28.605750] kasan_atomics_helper+0x1818/0x5450 [ 28.605774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.605798] ? ret_from_fork_asm+0x1a/0x30 [ 28.605827] kasan_atomics+0x1dc/0x310 [ 28.605860] ? __pfx_kasan_atomics+0x10/0x10 [ 28.605885] ? __pfx_read_tsc+0x10/0x10 [ 28.605920] ? ktime_get_ts64+0x86/0x230 [ 28.605945] kunit_try_run_case+0x1a5/0x480 [ 28.605969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.605991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.606024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.606048] ? __kthread_parkme+0x82/0x180 [ 28.606070] ? preempt_count_sub+0x50/0x80 [ 28.606105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.606128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.606154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.606189] kthread+0x337/0x6f0 [ 28.606211] ? trace_preempt_on+0x20/0xc0 [ 28.606234] ? __pfx_kthread+0x10/0x10 [ 28.606267] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.606290] ? calculate_sigpending+0x7b/0xa0 [ 28.606315] ? __pfx_kthread+0x10/0x10 [ 28.606347] ret_from_fork+0x116/0x1d0 [ 28.606368] ? __pfx_kthread+0x10/0x10 [ 28.606390] ret_from_fork_asm+0x1a/0x30 [ 28.606431] </TASK> [ 28.606443] [ 28.617297] Allocated by task 313: [ 28.618116] kasan_save_stack+0x45/0x70 [ 28.618875] kasan_save_track+0x18/0x40 [ 28.619276] kasan_save_alloc_info+0x3b/0x50 [ 28.619438] __kasan_kmalloc+0xb7/0xc0 [ 28.619575] __kmalloc_cache_noprof+0x189/0x420 [ 28.619736] kasan_atomics+0x95/0x310 [ 28.619868] kunit_try_run_case+0x1a5/0x480 [ 28.620007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.620175] kthread+0x337/0x6f0 [ 28.620292] ret_from_fork+0x116/0x1d0 [ 28.620420] ret_from_fork_asm+0x1a/0x30 [ 28.620553] [ 28.620618] The buggy address belongs to the object at ffff88810439e280 [ 28.620618] which belongs to the cache kmalloc-64 of size 64 [ 28.623365] The buggy address is located 0 bytes to the right of [ 28.623365] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.624213] [ 28.624538] The buggy address belongs to the physical page: [ 28.624883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.625325] flags: 0x200000000000000(node=0|zone=2) [ 28.625690] page_type: f5(slab) [ 28.625872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.626343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.626865] page dumped because: kasan: bad access detected [ 28.627206] [ 28.627307] Memory state around the buggy address: [ 28.627732] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.628139] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.628517] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.628932] ^ [ 28.629184] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.629490] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.630050] ================================================================== [ 28.788634] ================================================================== [ 28.789089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 28.789343] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.789872] [ 28.789979] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.790027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.790041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.790064] Call Trace: [ 28.790080] <TASK> [ 28.790097] dump_stack_lvl+0x73/0xb0 [ 28.790125] print_report+0xd1/0x610 [ 28.790150] ? __virt_addr_valid+0x1db/0x2d0 [ 28.790175] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.790199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.790226] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.790250] kasan_report+0x141/0x180 [ 28.790274] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.790302] kasan_check_range+0x10c/0x1c0 [ 28.790328] __kasan_check_write+0x18/0x20 [ 28.790353] kasan_atomics_helper+0x1ce1/0x5450 [ 28.790377] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.790402] ? ret_from_fork_asm+0x1a/0x30 [ 28.790431] kasan_atomics+0x1dc/0x310 [ 28.790455] ? __pfx_kasan_atomics+0x10/0x10 [ 28.790481] ? __pfx_read_tsc+0x10/0x10 [ 28.790505] ? ktime_get_ts64+0x86/0x230 [ 28.790530] kunit_try_run_case+0x1a5/0x480 [ 28.790554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.790575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.790601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.790644] ? __kthread_parkme+0x82/0x180 [ 28.790666] ? preempt_count_sub+0x50/0x80 [ 28.790691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.790728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.790754] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.790782] kthread+0x337/0x6f0 [ 28.790803] ? trace_preempt_on+0x20/0xc0 [ 28.790828] ? __pfx_kthread+0x10/0x10 [ 28.790851] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.790874] ? calculate_sigpending+0x7b/0xa0 [ 28.790900] ? __pfx_kthread+0x10/0x10 [ 28.790923] ret_from_fork+0x116/0x1d0 [ 28.790945] ? __pfx_kthread+0x10/0x10 [ 28.790968] ret_from_fork_asm+0x1a/0x30 [ 28.790999] </TASK> [ 28.791012] [ 28.798438] Allocated by task 313: [ 28.798715] kasan_save_stack+0x45/0x70 [ 28.798858] kasan_save_track+0x18/0x40 [ 28.799038] kasan_save_alloc_info+0x3b/0x50 [ 28.799249] __kasan_kmalloc+0xb7/0xc0 [ 28.799437] __kmalloc_cache_noprof+0x189/0x420 [ 28.799776] kasan_atomics+0x95/0x310 [ 28.799915] kunit_try_run_case+0x1a5/0x480 [ 28.800057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.800263] kthread+0x337/0x6f0 [ 28.800425] ret_from_fork+0x116/0x1d0 [ 28.800608] ret_from_fork_asm+0x1a/0x30 [ 28.800811] [ 28.800903] The buggy address belongs to the object at ffff88810439e280 [ 28.800903] which belongs to the cache kmalloc-64 of size 64 [ 28.801272] The buggy address is located 0 bytes to the right of [ 28.801272] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.802145] [ 28.802230] The buggy address belongs to the physical page: [ 28.802480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.802813] flags: 0x200000000000000(node=0|zone=2) [ 28.803003] page_type: f5(slab) [ 28.803164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.803434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.803899] page dumped because: kasan: bad access detected [ 28.804083] [ 28.804153] Memory state around the buggy address: [ 28.804308] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.804523] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.804805] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.805121] ^ [ 28.805340] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.805655] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.806075] ================================================================== [ 29.050911] ================================================================== [ 29.051496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 29.051786] Read of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 29.052075] [ 29.052181] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 29.052230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.052244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.052268] Call Trace: [ 29.052286] <TASK> [ 29.052303] dump_stack_lvl+0x73/0xb0 [ 29.052331] print_report+0xd1/0x610 [ 29.052357] ? __virt_addr_valid+0x1db/0x2d0 [ 29.052383] ? kasan_atomics_helper+0x5115/0x5450 [ 29.052407] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.052436] ? kasan_atomics_helper+0x5115/0x5450 [ 29.052461] kasan_report+0x141/0x180 [ 29.052484] ? kasan_atomics_helper+0x5115/0x5450 [ 29.052511] __asan_report_load8_noabort+0x18/0x20 [ 29.052536] kasan_atomics_helper+0x5115/0x5450 [ 29.052559] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.052583] ? ret_from_fork_asm+0x1a/0x30 [ 29.052611] kasan_atomics+0x1dc/0x310 [ 29.052636] ? __pfx_kasan_atomics+0x10/0x10 [ 29.052661] ? __pfx_read_tsc+0x10/0x10 [ 29.052685] ? ktime_get_ts64+0x86/0x230 [ 29.052721] kunit_try_run_case+0x1a5/0x480 [ 29.052745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.052778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.052804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.052829] ? __kthread_parkme+0x82/0x180 [ 29.052851] ? preempt_count_sub+0x50/0x80 [ 29.052876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.052899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.052925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.052952] kthread+0x337/0x6f0 [ 29.052973] ? trace_preempt_on+0x20/0xc0 [ 29.052996] ? __pfx_kthread+0x10/0x10 [ 29.053019] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.053041] ? calculate_sigpending+0x7b/0xa0 [ 29.053066] ? __pfx_kthread+0x10/0x10 [ 29.053089] ret_from_fork+0x116/0x1d0 [ 29.053110] ? __pfx_kthread+0x10/0x10 [ 29.053132] ret_from_fork_asm+0x1a/0x30 [ 29.053164] </TASK> [ 29.053177] [ 29.060196] Allocated by task 313: [ 29.060368] kasan_save_stack+0x45/0x70 [ 29.060523] kasan_save_track+0x18/0x40 [ 29.060726] kasan_save_alloc_info+0x3b/0x50 [ 29.060920] __kasan_kmalloc+0xb7/0xc0 [ 29.061048] __kmalloc_cache_noprof+0x189/0x420 [ 29.061200] kasan_atomics+0x95/0x310 [ 29.061454] kunit_try_run_case+0x1a5/0x480 [ 29.061668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.061929] kthread+0x337/0x6f0 [ 29.062088] ret_from_fork+0x116/0x1d0 [ 29.062219] ret_from_fork_asm+0x1a/0x30 [ 29.062357] [ 29.062439] The buggy address belongs to the object at ffff88810439e280 [ 29.062439] which belongs to the cache kmalloc-64 of size 64 [ 29.063294] The buggy address is located 0 bytes to the right of [ 29.063294] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 29.063706] [ 29.063776] The buggy address belongs to the physical page: [ 29.063954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 29.064491] flags: 0x200000000000000(node=0|zone=2) [ 29.064726] page_type: f5(slab) [ 29.064890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.065228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.065502] page dumped because: kasan: bad access detected [ 29.065760] [ 29.065828] Memory state around the buggy address: [ 29.065980] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.066195] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.066525] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.066860] ^ [ 29.067054] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.067306] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.067636] ================================================================== [ 28.088632] ================================================================== [ 28.089183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 28.089493] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.090344] [ 28.090783] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.090840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.090855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.090941] Call Trace: [ 28.090961] <TASK> [ 28.091003] dump_stack_lvl+0x73/0xb0 [ 28.091036] print_report+0xd1/0x610 [ 28.091063] ? __virt_addr_valid+0x1db/0x2d0 [ 28.091089] ? kasan_atomics_helper+0xe78/0x5450 [ 28.091112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.091141] ? kasan_atomics_helper+0xe78/0x5450 [ 28.091163] kasan_report+0x141/0x180 [ 28.091186] ? kasan_atomics_helper+0xe78/0x5450 [ 28.091214] kasan_check_range+0x10c/0x1c0 [ 28.091832] __kasan_check_write+0x18/0x20 [ 28.091867] kasan_atomics_helper+0xe78/0x5450 [ 28.091893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.091918] ? ret_from_fork_asm+0x1a/0x30 [ 28.091948] kasan_atomics+0x1dc/0x310 [ 28.091973] ? __pfx_kasan_atomics+0x10/0x10 [ 28.091998] ? __pfx_read_tsc+0x10/0x10 [ 28.092023] ? ktime_get_ts64+0x86/0x230 [ 28.092050] kunit_try_run_case+0x1a5/0x480 [ 28.092075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.092097] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.092122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.092148] ? __kthread_parkme+0x82/0x180 [ 28.092170] ? preempt_count_sub+0x50/0x80 [ 28.092196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.092220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.092249] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.092277] kthread+0x337/0x6f0 [ 28.092299] ? trace_preempt_on+0x20/0xc0 [ 28.092324] ? __pfx_kthread+0x10/0x10 [ 28.092347] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.092370] ? calculate_sigpending+0x7b/0xa0 [ 28.092396] ? __pfx_kthread+0x10/0x10 [ 28.092419] ret_from_fork+0x116/0x1d0 [ 28.092440] ? __pfx_kthread+0x10/0x10 [ 28.092463] ret_from_fork_asm+0x1a/0x30 [ 28.092495] </TASK> [ 28.092508] [ 28.107173] Allocated by task 313: [ 28.107361] kasan_save_stack+0x45/0x70 [ 28.107791] kasan_save_track+0x18/0x40 [ 28.108282] kasan_save_alloc_info+0x3b/0x50 [ 28.108615] __kasan_kmalloc+0xb7/0xc0 [ 28.108949] __kmalloc_cache_noprof+0x189/0x420 [ 28.109356] kasan_atomics+0x95/0x310 [ 28.109788] kunit_try_run_case+0x1a5/0x480 [ 28.110163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.110414] kthread+0x337/0x6f0 [ 28.110739] ret_from_fork+0x116/0x1d0 [ 28.111174] ret_from_fork_asm+0x1a/0x30 [ 28.111443] [ 28.111678] The buggy address belongs to the object at ffff88810439e280 [ 28.111678] which belongs to the cache kmalloc-64 of size 64 [ 28.112719] The buggy address is located 0 bytes to the right of [ 28.112719] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.113734] [ 28.113955] The buggy address belongs to the physical page: [ 28.114303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.115220] flags: 0x200000000000000(node=0|zone=2) [ 28.115453] page_type: f5(slab) [ 28.115927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.116378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.117114] page dumped because: kasan: bad access detected [ 28.117361] [ 28.117450] Memory state around the buggy address: [ 28.118028] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.118347] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.119162] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.120059] ^ [ 28.120293] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.120954] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.121400] ================================================================== [ 28.012071] ================================================================== [ 28.012418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 28.012770] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.012993] [ 28.013091] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.013154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.013168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.013191] Call Trace: [ 28.013205] <TASK> [ 28.013223] dump_stack_lvl+0x73/0xb0 [ 28.013250] print_report+0xd1/0x610 [ 28.013275] ? __virt_addr_valid+0x1db/0x2d0 [ 28.013299] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.013322] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.013351] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.013373] kasan_report+0x141/0x180 [ 28.013397] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.013424] __asan_report_load4_noabort+0x18/0x20 [ 28.013450] kasan_atomics_helper+0x4a84/0x5450 [ 28.013474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.013516] ? ret_from_fork_asm+0x1a/0x30 [ 28.013545] kasan_atomics+0x1dc/0x310 [ 28.013569] ? __pfx_kasan_atomics+0x10/0x10 [ 28.013594] ? __pfx_read_tsc+0x10/0x10 [ 28.013618] ? ktime_get_ts64+0x86/0x230 [ 28.013644] kunit_try_run_case+0x1a5/0x480 [ 28.013668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.013689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.013726] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.013751] ? __kthread_parkme+0x82/0x180 [ 28.013773] ? preempt_count_sub+0x50/0x80 [ 28.013798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.013821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.013848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.013875] kthread+0x337/0x6f0 [ 28.013895] ? trace_preempt_on+0x20/0xc0 [ 28.013920] ? __pfx_kthread+0x10/0x10 [ 28.013943] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.013965] ? calculate_sigpending+0x7b/0xa0 [ 28.013990] ? __pfx_kthread+0x10/0x10 [ 28.014014] ret_from_fork+0x116/0x1d0 [ 28.014035] ? __pfx_kthread+0x10/0x10 [ 28.014057] ret_from_fork_asm+0x1a/0x30 [ 28.014088] </TASK> [ 28.014101] [ 28.025338] Allocated by task 313: [ 28.025967] kasan_save_stack+0x45/0x70 [ 28.026165] kasan_save_track+0x18/0x40 [ 28.026351] kasan_save_alloc_info+0x3b/0x50 [ 28.026883] __kasan_kmalloc+0xb7/0xc0 [ 28.027155] __kmalloc_cache_noprof+0x189/0x420 [ 28.027550] kasan_atomics+0x95/0x310 [ 28.027749] kunit_try_run_case+0x1a5/0x480 [ 28.028010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.028249] kthread+0x337/0x6f0 [ 28.028406] ret_from_fork+0x116/0x1d0 [ 28.029163] ret_from_fork_asm+0x1a/0x30 [ 28.029491] [ 28.029722] The buggy address belongs to the object at ffff88810439e280 [ 28.029722] which belongs to the cache kmalloc-64 of size 64 [ 28.030354] The buggy address is located 0 bytes to the right of [ 28.030354] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.031416] [ 28.031550] The buggy address belongs to the physical page: [ 28.031999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.032344] flags: 0x200000000000000(node=0|zone=2) [ 28.033103] page_type: f5(slab) [ 28.033305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.033906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.034217] page dumped because: kasan: bad access detected [ 28.034451] [ 28.034895] Memory state around the buggy address: [ 28.035305] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.035883] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.036383] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.037179] ^ [ 28.037623] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.038164] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.038469] ================================================================== [ 28.806535] ================================================================== [ 28.806955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 28.807365] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.807683] [ 28.807779] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.807831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.807852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.807874] Call Trace: [ 28.807890] <TASK> [ 28.807906] dump_stack_lvl+0x73/0xb0 [ 28.807935] print_report+0xd1/0x610 [ 28.807962] ? __virt_addr_valid+0x1db/0x2d0 [ 28.807988] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.808011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.808040] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.808063] kasan_report+0x141/0x180 [ 28.808087] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.808114] kasan_check_range+0x10c/0x1c0 [ 28.808140] __kasan_check_write+0x18/0x20 [ 28.808165] kasan_atomics_helper+0x1d7a/0x5450 [ 28.808189] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.808213] ? ret_from_fork_asm+0x1a/0x30 [ 28.808243] kasan_atomics+0x1dc/0x310 [ 28.808266] ? __pfx_kasan_atomics+0x10/0x10 [ 28.808293] ? __pfx_read_tsc+0x10/0x10 [ 28.808317] ? ktime_get_ts64+0x86/0x230 [ 28.808343] kunit_try_run_case+0x1a5/0x480 [ 28.808367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.808390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.808415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.808440] ? __kthread_parkme+0x82/0x180 [ 28.808463] ? preempt_count_sub+0x50/0x80 [ 28.808488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.808523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.808550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.808577] kthread+0x337/0x6f0 [ 28.808598] ? trace_preempt_on+0x20/0xc0 [ 28.808623] ? __pfx_kthread+0x10/0x10 [ 28.808646] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.808669] ? calculate_sigpending+0x7b/0xa0 [ 28.808695] ? __pfx_kthread+0x10/0x10 [ 28.808727] ret_from_fork+0x116/0x1d0 [ 28.808749] ? __pfx_kthread+0x10/0x10 [ 28.808772] ret_from_fork_asm+0x1a/0x30 [ 28.808805] </TASK> [ 28.808818] [ 28.815991] Allocated by task 313: [ 28.816146] kasan_save_stack+0x45/0x70 [ 28.816323] kasan_save_track+0x18/0x40 [ 28.816502] kasan_save_alloc_info+0x3b/0x50 [ 28.816686] __kasan_kmalloc+0xb7/0xc0 [ 28.816856] __kmalloc_cache_noprof+0x189/0x420 [ 28.817051] kasan_atomics+0x95/0x310 [ 28.817220] kunit_try_run_case+0x1a5/0x480 [ 28.817419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.817636] kthread+0x337/0x6f0 [ 28.817789] ret_from_fork+0x116/0x1d0 [ 28.817979] ret_from_fork_asm+0x1a/0x30 [ 28.818173] [ 28.818263] The buggy address belongs to the object at ffff88810439e280 [ 28.818263] which belongs to the cache kmalloc-64 of size 64 [ 28.818763] The buggy address is located 0 bytes to the right of [ 28.818763] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.819267] [ 28.819341] The buggy address belongs to the physical page: [ 28.819589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.819924] flags: 0x200000000000000(node=0|zone=2) [ 28.820156] page_type: f5(slab) [ 28.820274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.820512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.820957] page dumped because: kasan: bad access detected [ 28.821163] [ 28.821229] Memory state around the buggy address: [ 28.821442] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.821978] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.822260] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.822522] ^ [ 28.822727] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.823033] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.823304] ================================================================== [ 27.916744] ================================================================== [ 27.917062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 27.917294] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.917635] [ 27.917753] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.917801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.917814] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.917837] Call Trace: [ 27.917851] <TASK> [ 27.917867] dump_stack_lvl+0x73/0xb0 [ 27.917895] print_report+0xd1/0x610 [ 27.917919] ? __virt_addr_valid+0x1db/0x2d0 [ 27.917945] ? kasan_atomics_helper+0x992/0x5450 [ 27.917968] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.917996] ? kasan_atomics_helper+0x992/0x5450 [ 27.918018] kasan_report+0x141/0x180 [ 27.918042] ? kasan_atomics_helper+0x992/0x5450 [ 27.918069] kasan_check_range+0x10c/0x1c0 [ 27.918094] __kasan_check_write+0x18/0x20 [ 27.918119] kasan_atomics_helper+0x992/0x5450 [ 27.918143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.918166] ? ret_from_fork_asm+0x1a/0x30 [ 27.918197] kasan_atomics+0x1dc/0x310 [ 27.918221] ? __pfx_kasan_atomics+0x10/0x10 [ 27.918247] ? __pfx_read_tsc+0x10/0x10 [ 27.918270] ? ktime_get_ts64+0x86/0x230 [ 27.918296] kunit_try_run_case+0x1a5/0x480 [ 27.918320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.918342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.918368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.918393] ? __kthread_parkme+0x82/0x180 [ 27.918415] ? preempt_count_sub+0x50/0x80 [ 27.918440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.918464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.918509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.918537] kthread+0x337/0x6f0 [ 27.918559] ? trace_preempt_on+0x20/0xc0 [ 27.918583] ? __pfx_kthread+0x10/0x10 [ 27.918606] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.918629] ? calculate_sigpending+0x7b/0xa0 [ 27.918655] ? __pfx_kthread+0x10/0x10 [ 27.918678] ret_from_fork+0x116/0x1d0 [ 27.918711] ? __pfx_kthread+0x10/0x10 [ 27.918734] ret_from_fork_asm+0x1a/0x30 [ 27.918766] </TASK> [ 27.918778] [ 27.926899] Allocated by task 313: [ 27.927063] kasan_save_stack+0x45/0x70 [ 27.927232] kasan_save_track+0x18/0x40 [ 27.927369] kasan_save_alloc_info+0x3b/0x50 [ 27.927643] __kasan_kmalloc+0xb7/0xc0 [ 27.927957] __kmalloc_cache_noprof+0x189/0x420 [ 27.928183] kasan_atomics+0x95/0x310 [ 27.928360] kunit_try_run_case+0x1a5/0x480 [ 27.928573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.928975] kthread+0x337/0x6f0 [ 27.929137] ret_from_fork+0x116/0x1d0 [ 27.929309] ret_from_fork_asm+0x1a/0x30 [ 27.929486] [ 27.929589] The buggy address belongs to the object at ffff88810439e280 [ 27.929589] which belongs to the cache kmalloc-64 of size 64 [ 27.930120] The buggy address is located 0 bytes to the right of [ 27.930120] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.930630] [ 27.930710] The buggy address belongs to the physical page: [ 27.930880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.931115] flags: 0x200000000000000(node=0|zone=2) [ 27.931273] page_type: f5(slab) [ 27.931390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.931738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.932177] page dumped because: kasan: bad access detected [ 27.932432] [ 27.932543] Memory state around the buggy address: [ 27.932745] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.933154] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.933378] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.933849] ^ [ 27.934088] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.934415] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.934861] ================================================================== [ 28.330414] ================================================================== [ 28.330728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 28.331276] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.331675] [ 28.331791] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.332096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.332112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.332136] Call Trace: [ 28.332153] <TASK> [ 28.332170] dump_stack_lvl+0x73/0xb0 [ 28.332200] print_report+0xd1/0x610 [ 28.332226] ? __virt_addr_valid+0x1db/0x2d0 [ 28.332252] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.332275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.332303] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.332326] kasan_report+0x141/0x180 [ 28.332349] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.332377] __asan_report_load4_noabort+0x18/0x20 [ 28.332402] kasan_atomics_helper+0x49e8/0x5450 [ 28.332426] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.332449] ? ret_from_fork_asm+0x1a/0x30 [ 28.332478] kasan_atomics+0x1dc/0x310 [ 28.332512] ? __pfx_kasan_atomics+0x10/0x10 [ 28.332537] ? __pfx_read_tsc+0x10/0x10 [ 28.332561] ? ktime_get_ts64+0x86/0x230 [ 28.332586] kunit_try_run_case+0x1a5/0x480 [ 28.332611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.332633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.332657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.332682] ? __kthread_parkme+0x82/0x180 [ 28.332718] ? preempt_count_sub+0x50/0x80 [ 28.332742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.332766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.332792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.332819] kthread+0x337/0x6f0 [ 28.332840] ? trace_preempt_on+0x20/0xc0 [ 28.332863] ? __pfx_kthread+0x10/0x10 [ 28.332886] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.332909] ? calculate_sigpending+0x7b/0xa0 [ 28.332934] ? __pfx_kthread+0x10/0x10 [ 28.332958] ret_from_fork+0x116/0x1d0 [ 28.332978] ? __pfx_kthread+0x10/0x10 [ 28.333001] ret_from_fork_asm+0x1a/0x30 [ 28.333032] </TASK> [ 28.333047] [ 28.342389] Allocated by task 313: [ 28.342686] kasan_save_stack+0x45/0x70 [ 28.342975] kasan_save_track+0x18/0x40 [ 28.343125] kasan_save_alloc_info+0x3b/0x50 [ 28.343332] __kasan_kmalloc+0xb7/0xc0 [ 28.343510] __kmalloc_cache_noprof+0x189/0x420 [ 28.343952] kasan_atomics+0x95/0x310 [ 28.344232] kunit_try_run_case+0x1a5/0x480 [ 28.344435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.344896] kthread+0x337/0x6f0 [ 28.345151] ret_from_fork+0x116/0x1d0 [ 28.345342] ret_from_fork_asm+0x1a/0x30 [ 28.345674] [ 28.345776] The buggy address belongs to the object at ffff88810439e280 [ 28.345776] which belongs to the cache kmalloc-64 of size 64 [ 28.346457] The buggy address is located 0 bytes to the right of [ 28.346457] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.347041] [ 28.347165] The buggy address belongs to the physical page: [ 28.347403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.347967] flags: 0x200000000000000(node=0|zone=2) [ 28.348262] page_type: f5(slab) [ 28.348394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.348876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.349175] page dumped because: kasan: bad access detected [ 28.349403] [ 28.349480] Memory state around the buggy address: [ 28.349937] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.350331] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.350709] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.351096] ^ [ 28.351369] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.351603] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.352524] ================================================================== [ 28.901852] ================================================================== [ 28.902246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 28.902657] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.903054] [ 28.903167] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.903216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.903229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.903253] Call Trace: [ 28.903268] <TASK> [ 28.903284] dump_stack_lvl+0x73/0xb0 [ 28.903312] print_report+0xd1/0x610 [ 28.903336] ? __virt_addr_valid+0x1db/0x2d0 [ 28.903361] ? kasan_atomics_helper+0x2006/0x5450 [ 28.903384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.903411] ? kasan_atomics_helper+0x2006/0x5450 [ 28.903456] kasan_report+0x141/0x180 [ 28.903501] ? kasan_atomics_helper+0x2006/0x5450 [ 28.903547] kasan_check_range+0x10c/0x1c0 [ 28.903573] __kasan_check_write+0x18/0x20 [ 28.903597] kasan_atomics_helper+0x2006/0x5450 [ 28.903638] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.903661] ? ret_from_fork_asm+0x1a/0x30 [ 28.903713] kasan_atomics+0x1dc/0x310 [ 28.903737] ? __pfx_kasan_atomics+0x10/0x10 [ 28.903762] ? __pfx_read_tsc+0x10/0x10 [ 28.903786] ? ktime_get_ts64+0x86/0x230 [ 28.903812] kunit_try_run_case+0x1a5/0x480 [ 28.903835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.903861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.903887] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.903912] ? __kthread_parkme+0x82/0x180 [ 28.903933] ? preempt_count_sub+0x50/0x80 [ 28.903959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.903982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.904029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.904056] kthread+0x337/0x6f0 [ 28.904077] ? trace_preempt_on+0x20/0xc0 [ 28.904101] ? __pfx_kthread+0x10/0x10 [ 28.904124] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.904147] ? calculate_sigpending+0x7b/0xa0 [ 28.904172] ? __pfx_kthread+0x10/0x10 [ 28.904194] ret_from_fork+0x116/0x1d0 [ 28.904216] ? __pfx_kthread+0x10/0x10 [ 28.904239] ret_from_fork_asm+0x1a/0x30 [ 28.904271] </TASK> [ 28.904283] [ 28.912114] Allocated by task 313: [ 28.912241] kasan_save_stack+0x45/0x70 [ 28.912380] kasan_save_track+0x18/0x40 [ 28.912539] kasan_save_alloc_info+0x3b/0x50 [ 28.912691] __kasan_kmalloc+0xb7/0xc0 [ 28.912888] __kmalloc_cache_noprof+0x189/0x420 [ 28.913128] kasan_atomics+0x95/0x310 [ 28.913333] kunit_try_run_case+0x1a5/0x480 [ 28.913603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.913877] kthread+0x337/0x6f0 [ 28.914071] ret_from_fork+0x116/0x1d0 [ 28.914310] ret_from_fork_asm+0x1a/0x30 [ 28.914569] [ 28.914662] The buggy address belongs to the object at ffff88810439e280 [ 28.914662] which belongs to the cache kmalloc-64 of size 64 [ 28.915086] The buggy address is located 0 bytes to the right of [ 28.915086] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.915586] [ 28.915684] The buggy address belongs to the physical page: [ 28.915978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.916400] flags: 0x200000000000000(node=0|zone=2) [ 28.916705] page_type: f5(slab) [ 28.916862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.917158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.917403] page dumped because: kasan: bad access detected [ 28.917715] [ 28.917811] Memory state around the buggy address: [ 28.918074] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.918379] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.918717] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.919035] ^ [ 28.919269] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.919672] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.920017] ================================================================== [ 28.920568] ================================================================== [ 28.920993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 28.921333] Read of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.921707] [ 28.921791] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.921838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.921851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.921873] Call Trace: [ 28.921890] <TASK> [ 28.921906] dump_stack_lvl+0x73/0xb0 [ 28.921934] print_report+0xd1/0x610 [ 28.921959] ? __virt_addr_valid+0x1db/0x2d0 [ 28.921983] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.922005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.922033] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.922057] kasan_report+0x141/0x180 [ 28.922080] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.922107] __asan_report_load8_noabort+0x18/0x20 [ 28.922156] kasan_atomics_helper+0x4f98/0x5450 [ 28.922179] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.922202] ? ret_from_fork_asm+0x1a/0x30 [ 28.922248] kasan_atomics+0x1dc/0x310 [ 28.922285] ? __pfx_kasan_atomics+0x10/0x10 [ 28.922324] ? __pfx_read_tsc+0x10/0x10 [ 28.922349] ? ktime_get_ts64+0x86/0x230 [ 28.922388] kunit_try_run_case+0x1a5/0x480 [ 28.922425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.922460] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.922506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.922531] ? __kthread_parkme+0x82/0x180 [ 28.922554] ? preempt_count_sub+0x50/0x80 [ 28.922579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.922602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.922628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.922655] kthread+0x337/0x6f0 [ 28.922676] ? trace_preempt_on+0x20/0xc0 [ 28.922707] ? __pfx_kthread+0x10/0x10 [ 28.922730] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.922753] ? calculate_sigpending+0x7b/0xa0 [ 28.922779] ? __pfx_kthread+0x10/0x10 [ 28.922802] ret_from_fork+0x116/0x1d0 [ 28.922823] ? __pfx_kthread+0x10/0x10 [ 28.922845] ret_from_fork_asm+0x1a/0x30 [ 28.922877] </TASK> [ 28.922889] [ 28.929910] Allocated by task 313: [ 28.930105] kasan_save_stack+0x45/0x70 [ 28.930340] kasan_save_track+0x18/0x40 [ 28.930579] kasan_save_alloc_info+0x3b/0x50 [ 28.930836] __kasan_kmalloc+0xb7/0xc0 [ 28.931041] __kmalloc_cache_noprof+0x189/0x420 [ 28.931266] kasan_atomics+0x95/0x310 [ 28.931447] kunit_try_run_case+0x1a5/0x480 [ 28.931817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.932085] kthread+0x337/0x6f0 [ 28.932252] ret_from_fork+0x116/0x1d0 [ 28.932436] ret_from_fork_asm+0x1a/0x30 [ 28.932663] [ 28.932767] The buggy address belongs to the object at ffff88810439e280 [ 28.932767] which belongs to the cache kmalloc-64 of size 64 [ 28.933304] The buggy address is located 0 bytes to the right of [ 28.933304] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.933722] [ 28.933855] The buggy address belongs to the physical page: [ 28.934110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.934519] flags: 0x200000000000000(node=0|zone=2) [ 28.934798] page_type: f5(slab) [ 28.934968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.935222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.935447] page dumped because: kasan: bad access detected [ 28.935764] [ 28.935863] Memory state around the buggy address: [ 28.936085] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.936400] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.936666] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.936948] ^ [ 28.937210] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.937596] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.937934] ================================================================== [ 28.305926] ================================================================== [ 28.306868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 28.307779] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.308688] [ 28.308981] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.309038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.309137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.309162] Call Trace: [ 28.309178] <TASK> [ 28.309196] dump_stack_lvl+0x73/0xb0 [ 28.309228] print_report+0xd1/0x610 [ 28.309255] ? __virt_addr_valid+0x1db/0x2d0 [ 28.309283] ? kasan_atomics_helper+0x1217/0x5450 [ 28.309305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.309333] ? kasan_atomics_helper+0x1217/0x5450 [ 28.309357] kasan_report+0x141/0x180 [ 28.309381] ? kasan_atomics_helper+0x1217/0x5450 [ 28.309409] kasan_check_range+0x10c/0x1c0 [ 28.309435] __kasan_check_write+0x18/0x20 [ 28.309459] kasan_atomics_helper+0x1217/0x5450 [ 28.309494] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.309518] ? ret_from_fork_asm+0x1a/0x30 [ 28.309548] kasan_atomics+0x1dc/0x310 [ 28.309572] ? __pfx_kasan_atomics+0x10/0x10 [ 28.309597] ? __pfx_read_tsc+0x10/0x10 [ 28.309621] ? ktime_get_ts64+0x86/0x230 [ 28.309647] kunit_try_run_case+0x1a5/0x480 [ 28.309672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.309694] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.309736] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.309761] ? __kthread_parkme+0x82/0x180 [ 28.309783] ? preempt_count_sub+0x50/0x80 [ 28.309810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.309833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.309860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.309887] kthread+0x337/0x6f0 [ 28.309908] ? trace_preempt_on+0x20/0xc0 [ 28.309933] ? __pfx_kthread+0x10/0x10 [ 28.309955] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.309978] ? calculate_sigpending+0x7b/0xa0 [ 28.310003] ? __pfx_kthread+0x10/0x10 [ 28.310026] ret_from_fork+0x116/0x1d0 [ 28.310047] ? __pfx_kthread+0x10/0x10 [ 28.310069] ret_from_fork_asm+0x1a/0x30 [ 28.310101] </TASK> [ 28.310114] [ 28.319999] Allocated by task 313: [ 28.320327] kasan_save_stack+0x45/0x70 [ 28.320628] kasan_save_track+0x18/0x40 [ 28.320855] kasan_save_alloc_info+0x3b/0x50 [ 28.321160] __kasan_kmalloc+0xb7/0xc0 [ 28.321422] __kmalloc_cache_noprof+0x189/0x420 [ 28.321669] kasan_atomics+0x95/0x310 [ 28.321831] kunit_try_run_case+0x1a5/0x480 [ 28.322036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.322265] kthread+0x337/0x6f0 [ 28.322420] ret_from_fork+0x116/0x1d0 [ 28.322899] ret_from_fork_asm+0x1a/0x30 [ 28.323078] [ 28.323152] The buggy address belongs to the object at ffff88810439e280 [ 28.323152] which belongs to the cache kmalloc-64 of size 64 [ 28.324101] The buggy address is located 0 bytes to the right of [ 28.324101] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.324773] [ 28.324877] The buggy address belongs to the physical page: [ 28.325252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.325707] flags: 0x200000000000000(node=0|zone=2) [ 28.325877] page_type: f5(slab) [ 28.326045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.326352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.326654] page dumped because: kasan: bad access detected [ 28.327213] [ 28.327305] Memory state around the buggy address: [ 28.327468] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.328094] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.328477] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.328912] ^ [ 28.329237] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.329568] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.329937] ================================================================== [ 28.210939] ================================================================== [ 28.211244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 28.212222] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.212877] [ 28.213077] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.213133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.213156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.213179] Call Trace: [ 28.213193] <TASK> [ 28.213212] dump_stack_lvl+0x73/0xb0 [ 28.213242] print_report+0xd1/0x610 [ 28.213269] ? __virt_addr_valid+0x1db/0x2d0 [ 28.213294] ? kasan_atomics_helper+0x1079/0x5450 [ 28.213316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.213344] ? kasan_atomics_helper+0x1079/0x5450 [ 28.213367] kasan_report+0x141/0x180 [ 28.213390] ? kasan_atomics_helper+0x1079/0x5450 [ 28.213418] kasan_check_range+0x10c/0x1c0 [ 28.213443] __kasan_check_write+0x18/0x20 [ 28.213467] kasan_atomics_helper+0x1079/0x5450 [ 28.213583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.213612] ? ret_from_fork_asm+0x1a/0x30 [ 28.213644] kasan_atomics+0x1dc/0x310 [ 28.213669] ? __pfx_kasan_atomics+0x10/0x10 [ 28.213694] ? __pfx_read_tsc+0x10/0x10 [ 28.213764] ? ktime_get_ts64+0x86/0x230 [ 28.213791] kunit_try_run_case+0x1a5/0x480 [ 28.213816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.213837] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.213864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.213890] ? __kthread_parkme+0x82/0x180 [ 28.213912] ? preempt_count_sub+0x50/0x80 [ 28.213937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.213961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.213987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.214014] kthread+0x337/0x6f0 [ 28.214036] ? trace_preempt_on+0x20/0xc0 [ 28.214060] ? __pfx_kthread+0x10/0x10 [ 28.214082] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.214105] ? calculate_sigpending+0x7b/0xa0 [ 28.214131] ? __pfx_kthread+0x10/0x10 [ 28.214154] ret_from_fork+0x116/0x1d0 [ 28.214175] ? __pfx_kthread+0x10/0x10 [ 28.214198] ret_from_fork_asm+0x1a/0x30 [ 28.214230] </TASK> [ 28.214243] [ 28.224768] Allocated by task 313: [ 28.224946] kasan_save_stack+0x45/0x70 [ 28.225139] kasan_save_track+0x18/0x40 [ 28.225316] kasan_save_alloc_info+0x3b/0x50 [ 28.225793] __kasan_kmalloc+0xb7/0xc0 [ 28.226017] __kmalloc_cache_noprof+0x189/0x420 [ 28.226359] kasan_atomics+0x95/0x310 [ 28.226671] kunit_try_run_case+0x1a5/0x480 [ 28.227016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.227253] kthread+0x337/0x6f0 [ 28.227406] ret_from_fork+0x116/0x1d0 [ 28.227848] ret_from_fork_asm+0x1a/0x30 [ 28.228166] [ 28.228381] The buggy address belongs to the object at ffff88810439e280 [ 28.228381] which belongs to the cache kmalloc-64 of size 64 [ 28.229255] The buggy address is located 0 bytes to the right of [ 28.229255] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.229996] [ 28.230100] The buggy address belongs to the physical page: [ 28.230331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.230912] flags: 0x200000000000000(node=0|zone=2) [ 28.231333] page_type: f5(slab) [ 28.231627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.232104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.232422] page dumped because: kasan: bad access detected [ 28.233060] [ 28.233158] Memory state around the buggy address: [ 28.233604] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.234098] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.234750] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.235186] ^ [ 28.235403] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.235995] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.236483] ================================================================== [ 28.280951] ================================================================== [ 28.281495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 28.281828] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.282384] [ 28.282488] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.282548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.282845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.282876] Call Trace: [ 28.282893] <TASK> [ 28.282911] dump_stack_lvl+0x73/0xb0 [ 28.282942] print_report+0xd1/0x610 [ 28.282966] ? __virt_addr_valid+0x1db/0x2d0 [ 28.282992] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.283014] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.283041] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.283065] kasan_report+0x141/0x180 [ 28.283087] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.283115] __asan_report_load4_noabort+0x18/0x20 [ 28.283140] kasan_atomics_helper+0x4a02/0x5450 [ 28.283165] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.283187] ? ret_from_fork_asm+0x1a/0x30 [ 28.283217] kasan_atomics+0x1dc/0x310 [ 28.283241] ? __pfx_kasan_atomics+0x10/0x10 [ 28.283267] ? __pfx_read_tsc+0x10/0x10 [ 28.283291] ? ktime_get_ts64+0x86/0x230 [ 28.283316] kunit_try_run_case+0x1a5/0x480 [ 28.283339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.283362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.283386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.283412] ? __kthread_parkme+0x82/0x180 [ 28.283434] ? preempt_count_sub+0x50/0x80 [ 28.283460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.283483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.283521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.283548] kthread+0x337/0x6f0 [ 28.283570] ? trace_preempt_on+0x20/0xc0 [ 28.283593] ? __pfx_kthread+0x10/0x10 [ 28.283618] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.283641] ? calculate_sigpending+0x7b/0xa0 [ 28.283666] ? __pfx_kthread+0x10/0x10 [ 28.283690] ret_from_fork+0x116/0x1d0 [ 28.283725] ? __pfx_kthread+0x10/0x10 [ 28.283748] ret_from_fork_asm+0x1a/0x30 [ 28.283780] </TASK> [ 28.283794] [ 28.293457] Allocated by task 313: [ 28.293623] kasan_save_stack+0x45/0x70 [ 28.294029] kasan_save_track+0x18/0x40 [ 28.294298] kasan_save_alloc_info+0x3b/0x50 [ 28.294602] __kasan_kmalloc+0xb7/0xc0 [ 28.294781] __kmalloc_cache_noprof+0x189/0x420 [ 28.295078] kasan_atomics+0x95/0x310 [ 28.295266] kunit_try_run_case+0x1a5/0x480 [ 28.295463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.295936] kthread+0x337/0x6f0 [ 28.296216] ret_from_fork+0x116/0x1d0 [ 28.296482] ret_from_fork_asm+0x1a/0x30 [ 28.296651] [ 28.296902] The buggy address belongs to the object at ffff88810439e280 [ 28.296902] which belongs to the cache kmalloc-64 of size 64 [ 28.297393] The buggy address is located 0 bytes to the right of [ 28.297393] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.298290] [ 28.298370] The buggy address belongs to the physical page: [ 28.298802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.299593] flags: 0x200000000000000(node=0|zone=2) [ 28.300042] page_type: f5(slab) [ 28.300174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.300410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.301150] page dumped because: kasan: bad access detected [ 28.301775] [ 28.302027] Memory state around the buggy address: [ 28.302539] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.303239] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.303467] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.304102] ^ [ 28.304714] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.305109] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.305333] ================================================================== [ 28.353004] ================================================================== [ 28.353242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 28.353473] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.353712] [ 28.353795] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.353843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.353856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.353878] Call Trace: [ 28.353892] <TASK> [ 28.353909] dump_stack_lvl+0x73/0xb0 [ 28.353936] print_report+0xd1/0x610 [ 28.353960] ? __virt_addr_valid+0x1db/0x2d0 [ 28.353983] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.354005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.354032] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.354054] kasan_report+0x141/0x180 [ 28.354077] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.354103] kasan_check_range+0x10c/0x1c0 [ 28.354126] __kasan_check_write+0x18/0x20 [ 28.354150] kasan_atomics_helper+0x12e6/0x5450 [ 28.354173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.354196] ? ret_from_fork_asm+0x1a/0x30 [ 28.354224] kasan_atomics+0x1dc/0x310 [ 28.354247] ? __pfx_kasan_atomics+0x10/0x10 [ 28.354272] ? __pfx_read_tsc+0x10/0x10 [ 28.354294] ? ktime_get_ts64+0x86/0x230 [ 28.354320] kunit_try_run_case+0x1a5/0x480 [ 28.354341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.354362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.354387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.354410] ? __kthread_parkme+0x82/0x180 [ 28.354431] ? preempt_count_sub+0x50/0x80 [ 28.354455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.354478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.354502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.354528] kthread+0x337/0x6f0 [ 28.354548] ? trace_preempt_on+0x20/0xc0 [ 28.354571] ? __pfx_kthread+0x10/0x10 [ 28.354593] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.354616] ? calculate_sigpending+0x7b/0xa0 [ 28.354642] ? __pfx_kthread+0x10/0x10 [ 28.354664] ret_from_fork+0x116/0x1d0 [ 28.354684] ? __pfx_kthread+0x10/0x10 [ 28.355236] ret_from_fork_asm+0x1a/0x30 [ 28.355277] </TASK> [ 28.355748] [ 28.373833] Allocated by task 313: [ 28.374075] kasan_save_stack+0x45/0x70 [ 28.374577] kasan_save_track+0x18/0x40 [ 28.375017] kasan_save_alloc_info+0x3b/0x50 [ 28.375598] __kasan_kmalloc+0xb7/0xc0 [ 28.375990] __kmalloc_cache_noprof+0x189/0x420 [ 28.376477] kasan_atomics+0x95/0x310 [ 28.376856] kunit_try_run_case+0x1a5/0x480 [ 28.377006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.377181] kthread+0x337/0x6f0 [ 28.377302] ret_from_fork+0x116/0x1d0 [ 28.377436] ret_from_fork_asm+0x1a/0x30 [ 28.377622] [ 28.377809] The buggy address belongs to the object at ffff88810439e280 [ 28.377809] which belongs to the cache kmalloc-64 of size 64 [ 28.378945] The buggy address is located 0 bytes to the right of [ 28.378945] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.380083] [ 28.380241] The buggy address belongs to the physical page: [ 28.380776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.381199] flags: 0x200000000000000(node=0|zone=2) [ 28.381362] page_type: f5(slab) [ 28.381483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.382176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.382835] page dumped because: kasan: bad access detected [ 28.383314] [ 28.383476] Memory state around the buggy address: [ 28.383807] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.384033] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.384247] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.384459] ^ [ 28.384933] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.385576] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.386327] ================================================================== [ 28.507930] ================================================================== [ 28.509114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 28.509832] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.510496] [ 28.510705] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.510755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.510768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.510790] Call Trace: [ 28.510816] <TASK> [ 28.510836] dump_stack_lvl+0x73/0xb0 [ 28.510864] print_report+0xd1/0x610 [ 28.510899] ? __virt_addr_valid+0x1db/0x2d0 [ 28.510923] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.510947] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.510973] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.510997] kasan_report+0x141/0x180 [ 28.511021] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.511048] kasan_check_range+0x10c/0x1c0 [ 28.511073] __kasan_check_write+0x18/0x20 [ 28.511098] kasan_atomics_helper+0x15b6/0x5450 [ 28.511122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.511146] ? ret_from_fork_asm+0x1a/0x30 [ 28.511175] kasan_atomics+0x1dc/0x310 [ 28.511209] ? __pfx_kasan_atomics+0x10/0x10 [ 28.511234] ? __pfx_read_tsc+0x10/0x10 [ 28.511258] ? ktime_get_ts64+0x86/0x230 [ 28.511295] kunit_try_run_case+0x1a5/0x480 [ 28.511319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.511341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.511374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.511400] ? __kthread_parkme+0x82/0x180 [ 28.511422] ? preempt_count_sub+0x50/0x80 [ 28.511456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.511479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.511515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.511542] kthread+0x337/0x6f0 [ 28.511572] ? trace_preempt_on+0x20/0xc0 [ 28.511597] ? __pfx_kthread+0x10/0x10 [ 28.511619] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.511654] ? calculate_sigpending+0x7b/0xa0 [ 28.511682] ? __pfx_kthread+0x10/0x10 [ 28.511714] ret_from_fork+0x116/0x1d0 [ 28.511735] ? __pfx_kthread+0x10/0x10 [ 28.511757] ret_from_fork_asm+0x1a/0x30 [ 28.511789] </TASK> [ 28.511801] [ 28.524814] Allocated by task 313: [ 28.524946] kasan_save_stack+0x45/0x70 [ 28.525088] kasan_save_track+0x18/0x40 [ 28.525221] kasan_save_alloc_info+0x3b/0x50 [ 28.525367] __kasan_kmalloc+0xb7/0xc0 [ 28.525512] __kmalloc_cache_noprof+0x189/0x420 [ 28.525956] kasan_atomics+0x95/0x310 [ 28.526298] kunit_try_run_case+0x1a5/0x480 [ 28.526750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.527226] kthread+0x337/0x6f0 [ 28.527557] ret_from_fork+0x116/0x1d0 [ 28.527924] ret_from_fork_asm+0x1a/0x30 [ 28.528292] [ 28.528467] The buggy address belongs to the object at ffff88810439e280 [ 28.528467] which belongs to the cache kmalloc-64 of size 64 [ 28.529769] The buggy address is located 0 bytes to the right of [ 28.529769] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.530815] [ 28.530890] The buggy address belongs to the physical page: [ 28.531287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.531552] flags: 0x200000000000000(node=0|zone=2) [ 28.531998] page_type: f5(slab) [ 28.532244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.532826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.533231] page dumped because: kasan: bad access detected [ 28.533402] [ 28.533467] Memory state around the buggy address: [ 28.533932] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.534566] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.535174] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.535781] ^ [ 28.535940] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.536155] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.536366] ================================================================== [ 28.237099] ================================================================== [ 28.237349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 28.237677] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.237988] [ 28.238158] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.238208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.238222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.238245] Call Trace: [ 28.238261] <TASK> [ 28.238277] dump_stack_lvl+0x73/0xb0 [ 28.238308] print_report+0xd1/0x610 [ 28.238331] ? __virt_addr_valid+0x1db/0x2d0 [ 28.238357] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.238379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.238407] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.238429] kasan_report+0x141/0x180 [ 28.238452] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.238480] __asan_report_load4_noabort+0x18/0x20 [ 28.238518] kasan_atomics_helper+0x4a1c/0x5450 [ 28.238543] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.238565] ? ret_from_fork_asm+0x1a/0x30 [ 28.238594] kasan_atomics+0x1dc/0x310 [ 28.238618] ? __pfx_kasan_atomics+0x10/0x10 [ 28.238643] ? __pfx_read_tsc+0x10/0x10 [ 28.238667] ? ktime_get_ts64+0x86/0x230 [ 28.238692] kunit_try_run_case+0x1a5/0x480 [ 28.238727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.238749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.238774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.238798] ? __kthread_parkme+0x82/0x180 [ 28.238821] ? preempt_count_sub+0x50/0x80 [ 28.238846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.238869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.238896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.238923] kthread+0x337/0x6f0 [ 28.238943] ? trace_preempt_on+0x20/0xc0 [ 28.238967] ? __pfx_kthread+0x10/0x10 [ 28.238990] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.239013] ? calculate_sigpending+0x7b/0xa0 [ 28.239038] ? __pfx_kthread+0x10/0x10 [ 28.239061] ret_from_fork+0x116/0x1d0 [ 28.239082] ? __pfx_kthread+0x10/0x10 [ 28.239104] ret_from_fork_asm+0x1a/0x30 [ 28.239136] </TASK> [ 28.239150] [ 28.245645] Allocated by task 313: [ 28.245948] kasan_save_stack+0x45/0x70 [ 28.246154] kasan_save_track+0x18/0x40 [ 28.246369] kasan_save_alloc_info+0x3b/0x50 [ 28.246725] __kasan_kmalloc+0xb7/0xc0 [ 28.247017] __kmalloc_cache_noprof+0x189/0x420 [ 28.247770] kasan_atomics+0x95/0x310 [ 28.248291] kunit_try_run_case+0x1a5/0x480 [ 28.248457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.249112] kthread+0x337/0x6f0 [ 28.249295] ret_from_fork+0x116/0x1d0 [ 28.249653] ret_from_fork_asm+0x1a/0x30 [ 28.250007] [ 28.250105] The buggy address belongs to the object at ffff88810439e280 [ 28.250105] which belongs to the cache kmalloc-64 of size 64 [ 28.250695] The buggy address is located 0 bytes to the right of [ 28.250695] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.251425] [ 28.251556] The buggy address belongs to the physical page: [ 28.251939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.252297] flags: 0x200000000000000(node=0|zone=2) [ 28.252651] page_type: f5(slab) [ 28.252946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.253279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.253686] page dumped because: kasan: bad access detected [ 28.254032] [ 28.254130] Memory state around the buggy address: [ 28.254347] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.254855] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.255222] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.255596] ^ [ 28.255934] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.256237] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.256487] ================================================================== [ 28.451503] ================================================================== [ 28.452110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 28.452456] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.452832] [ 28.452936] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.452983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.453007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.453030] Call Trace: [ 28.453046] <TASK> [ 28.453063] dump_stack_lvl+0x73/0xb0 [ 28.453103] print_report+0xd1/0x610 [ 28.453128] ? __virt_addr_valid+0x1db/0x2d0 [ 28.453152] ? kasan_atomics_helper+0x1467/0x5450 [ 28.453175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.453202] ? kasan_atomics_helper+0x1467/0x5450 [ 28.453225] kasan_report+0x141/0x180 [ 28.453249] ? kasan_atomics_helper+0x1467/0x5450 [ 28.453275] kasan_check_range+0x10c/0x1c0 [ 28.453300] __kasan_check_write+0x18/0x20 [ 28.453324] kasan_atomics_helper+0x1467/0x5450 [ 28.453348] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.453373] ? ret_from_fork_asm+0x1a/0x30 [ 28.453401] kasan_atomics+0x1dc/0x310 [ 28.453425] ? __pfx_kasan_atomics+0x10/0x10 [ 28.453450] ? __pfx_read_tsc+0x10/0x10 [ 28.453473] ? ktime_get_ts64+0x86/0x230 [ 28.453509] kunit_try_run_case+0x1a5/0x480 [ 28.453533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.453555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.453582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.453619] ? __kthread_parkme+0x82/0x180 [ 28.453641] ? preempt_count_sub+0x50/0x80 [ 28.453677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.453709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.453736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.453762] kthread+0x337/0x6f0 [ 28.453792] ? trace_preempt_on+0x20/0xc0 [ 28.453816] ? __pfx_kthread+0x10/0x10 [ 28.453838] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.453872] ? calculate_sigpending+0x7b/0xa0 [ 28.453897] ? __pfx_kthread+0x10/0x10 [ 28.453920] ret_from_fork+0x116/0x1d0 [ 28.453950] ? __pfx_kthread+0x10/0x10 [ 28.453972] ret_from_fork_asm+0x1a/0x30 [ 28.454004] </TASK> [ 28.454028] [ 28.461780] Allocated by task 313: [ 28.461967] kasan_save_stack+0x45/0x70 [ 28.462126] kasan_save_track+0x18/0x40 [ 28.462324] kasan_save_alloc_info+0x3b/0x50 [ 28.462560] __kasan_kmalloc+0xb7/0xc0 [ 28.462743] __kmalloc_cache_noprof+0x189/0x420 [ 28.462980] kasan_atomics+0x95/0x310 [ 28.463118] kunit_try_run_case+0x1a5/0x480 [ 28.463261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.463435] kthread+0x337/0x6f0 [ 28.463553] ret_from_fork+0x116/0x1d0 [ 28.463685] ret_from_fork_asm+0x1a/0x30 [ 28.464056] [ 28.464160] The buggy address belongs to the object at ffff88810439e280 [ 28.464160] which belongs to the cache kmalloc-64 of size 64 [ 28.464709] The buggy address is located 0 bytes to the right of [ 28.464709] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.465071] [ 28.465138] The buggy address belongs to the physical page: [ 28.465412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.466164] flags: 0x200000000000000(node=0|zone=2) [ 28.466419] page_type: f5(slab) [ 28.466600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.467003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.467226] page dumped because: kasan: bad access detected [ 28.467393] [ 28.467457] Memory state around the buggy address: [ 28.467881] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.468222] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.468598] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.468925] ^ [ 28.469111] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.469324] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.469666] ================================================================== [ 27.879058] ================================================================== [ 27.879364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 27.879756] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.880239] [ 27.880359] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.880409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.880424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.880448] Call Trace: [ 27.880463] <TASK> [ 27.880480] dump_stack_lvl+0x73/0xb0 [ 27.880511] print_report+0xd1/0x610 [ 27.880534] ? __virt_addr_valid+0x1db/0x2d0 [ 27.880560] ? kasan_atomics_helper+0x860/0x5450 [ 27.880582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.880610] ? kasan_atomics_helper+0x860/0x5450 [ 27.880632] kasan_report+0x141/0x180 [ 27.880757] ? kasan_atomics_helper+0x860/0x5450 [ 27.880793] kasan_check_range+0x10c/0x1c0 [ 27.880819] __kasan_check_write+0x18/0x20 [ 27.880845] kasan_atomics_helper+0x860/0x5450 [ 27.880929] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.880954] ? ret_from_fork_asm+0x1a/0x30 [ 27.880983] kasan_atomics+0x1dc/0x310 [ 27.881008] ? __pfx_kasan_atomics+0x10/0x10 [ 27.881033] ? __pfx_read_tsc+0x10/0x10 [ 27.881058] ? ktime_get_ts64+0x86/0x230 [ 27.881083] kunit_try_run_case+0x1a5/0x480 [ 27.881107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.881129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.881154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.881180] ? __kthread_parkme+0x82/0x180 [ 27.881203] ? preempt_count_sub+0x50/0x80 [ 27.881227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.881252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.881281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.881308] kthread+0x337/0x6f0 [ 27.881330] ? trace_preempt_on+0x20/0xc0 [ 27.881356] ? __pfx_kthread+0x10/0x10 [ 27.881380] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.881404] ? calculate_sigpending+0x7b/0xa0 [ 27.881430] ? __pfx_kthread+0x10/0x10 [ 27.881453] ret_from_fork+0x116/0x1d0 [ 27.881474] ? __pfx_kthread+0x10/0x10 [ 27.881506] ret_from_fork_asm+0x1a/0x30 [ 27.881537] </TASK> [ 27.881550] [ 27.888935] Allocated by task 313: [ 27.889063] kasan_save_stack+0x45/0x70 [ 27.889357] kasan_save_track+0x18/0x40 [ 27.889552] kasan_save_alloc_info+0x3b/0x50 [ 27.889928] __kasan_kmalloc+0xb7/0xc0 [ 27.890087] __kmalloc_cache_noprof+0x189/0x420 [ 27.890238] kasan_atomics+0x95/0x310 [ 27.890365] kunit_try_run_case+0x1a5/0x480 [ 27.890534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.890863] kthread+0x337/0x6f0 [ 27.891042] ret_from_fork+0x116/0x1d0 [ 27.891232] ret_from_fork_asm+0x1a/0x30 [ 27.891436] [ 27.891557] The buggy address belongs to the object at ffff88810439e280 [ 27.891557] which belongs to the cache kmalloc-64 of size 64 [ 27.892250] The buggy address is located 0 bytes to the right of [ 27.892250] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.892883] [ 27.892960] The buggy address belongs to the physical page: [ 27.893188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.893515] flags: 0x200000000000000(node=0|zone=2) [ 27.893682] page_type: f5(slab) [ 27.893978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.894270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.894582] page dumped because: kasan: bad access detected [ 27.894861] [ 27.894930] Memory state around the buggy address: [ 27.895153] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.895359] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.895562] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.895827] ^ [ 27.896219] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.896565] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.896971] ================================================================== [ 29.025071] ================================================================== [ 29.025455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 29.026129] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 29.026656] [ 29.026881] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 29.026945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.026960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.026984] Call Trace: [ 29.027001] <TASK> [ 29.027018] dump_stack_lvl+0x73/0xb0 [ 29.027049] print_report+0xd1/0x610 [ 29.027074] ? __virt_addr_valid+0x1db/0x2d0 [ 29.027099] ? kasan_atomics_helper+0x224c/0x5450 [ 29.027123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.027151] ? kasan_atomics_helper+0x224c/0x5450 [ 29.027174] kasan_report+0x141/0x180 [ 29.027198] ? kasan_atomics_helper+0x224c/0x5450 [ 29.027226] kasan_check_range+0x10c/0x1c0 [ 29.027251] __kasan_check_write+0x18/0x20 [ 29.027275] kasan_atomics_helper+0x224c/0x5450 [ 29.027298] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.027322] ? ret_from_fork_asm+0x1a/0x30 [ 29.027350] kasan_atomics+0x1dc/0x310 [ 29.027374] ? __pfx_kasan_atomics+0x10/0x10 [ 29.027400] ? __pfx_read_tsc+0x10/0x10 [ 29.027423] ? ktime_get_ts64+0x86/0x230 [ 29.027448] kunit_try_run_case+0x1a5/0x480 [ 29.027472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.027593] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.027623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.027648] ? __kthread_parkme+0x82/0x180 [ 29.027670] ? preempt_count_sub+0x50/0x80 [ 29.027733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.027760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.027787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.027814] kthread+0x337/0x6f0 [ 29.027836] ? trace_preempt_on+0x20/0xc0 [ 29.027868] ? __pfx_kthread+0x10/0x10 [ 29.027891] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.027914] ? calculate_sigpending+0x7b/0xa0 [ 29.027939] ? __pfx_kthread+0x10/0x10 [ 29.027962] ret_from_fork+0x116/0x1d0 [ 29.027985] ? __pfx_kthread+0x10/0x10 [ 29.028009] ret_from_fork_asm+0x1a/0x30 [ 29.028041] </TASK> [ 29.028055] [ 29.038832] Allocated by task 313: [ 29.039123] kasan_save_stack+0x45/0x70 [ 29.039501] kasan_save_track+0x18/0x40 [ 29.039808] kasan_save_alloc_info+0x3b/0x50 [ 29.040029] __kasan_kmalloc+0xb7/0xc0 [ 29.040207] __kmalloc_cache_noprof+0x189/0x420 [ 29.040413] kasan_atomics+0x95/0x310 [ 29.040948] kunit_try_run_case+0x1a5/0x480 [ 29.041210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.041659] kthread+0x337/0x6f0 [ 29.041956] ret_from_fork+0x116/0x1d0 [ 29.042319] ret_from_fork_asm+0x1a/0x30 [ 29.042654] [ 29.042785] The buggy address belongs to the object at ffff88810439e280 [ 29.042785] which belongs to the cache kmalloc-64 of size 64 [ 29.043269] The buggy address is located 0 bytes to the right of [ 29.043269] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 29.044241] [ 29.044353] The buggy address belongs to the physical page: [ 29.044971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 29.045323] flags: 0x200000000000000(node=0|zone=2) [ 29.045764] page_type: f5(slab) [ 29.046007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.046331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.046999] page dumped because: kasan: bad access detected [ 29.047273] [ 29.047504] Memory state around the buggy address: [ 29.047870] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.048438] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.048966] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.049412] ^ [ 29.049870] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.050189] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.050477] ================================================================== [ 28.884132] ================================================================== [ 28.884383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 28.884790] Read of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.885130] [ 28.885245] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.885308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.885336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.885358] Call Trace: [ 28.885375] <TASK> [ 28.885391] dump_stack_lvl+0x73/0xb0 [ 28.885420] print_report+0xd1/0x610 [ 28.885444] ? __virt_addr_valid+0x1db/0x2d0 [ 28.885469] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.885514] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.885541] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.885565] kasan_report+0x141/0x180 [ 28.885587] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.885614] __asan_report_load8_noabort+0x18/0x20 [ 28.885639] kasan_atomics_helper+0x4f71/0x5450 [ 28.885663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.885686] ? ret_from_fork_asm+0x1a/0x30 [ 28.885723] kasan_atomics+0x1dc/0x310 [ 28.885768] ? __pfx_kasan_atomics+0x10/0x10 [ 28.885794] ? __pfx_read_tsc+0x10/0x10 [ 28.885834] ? ktime_get_ts64+0x86/0x230 [ 28.885861] kunit_try_run_case+0x1a5/0x480 [ 28.885885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.885907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.885933] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.885958] ? __kthread_parkme+0x82/0x180 [ 28.885980] ? preempt_count_sub+0x50/0x80 [ 28.886004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.886027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.886054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.886099] kthread+0x337/0x6f0 [ 28.886119] ? trace_preempt_on+0x20/0xc0 [ 28.886143] ? __pfx_kthread+0x10/0x10 [ 28.886166] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.886189] ? calculate_sigpending+0x7b/0xa0 [ 28.886213] ? __pfx_kthread+0x10/0x10 [ 28.886252] ret_from_fork+0x116/0x1d0 [ 28.886273] ? __pfx_kthread+0x10/0x10 [ 28.886295] ret_from_fork_asm+0x1a/0x30 [ 28.886327] </TASK> [ 28.886341] [ 28.893843] Allocated by task 313: [ 28.894045] kasan_save_stack+0x45/0x70 [ 28.894233] kasan_save_track+0x18/0x40 [ 28.894469] kasan_save_alloc_info+0x3b/0x50 [ 28.894708] __kasan_kmalloc+0xb7/0xc0 [ 28.894893] __kmalloc_cache_noprof+0x189/0x420 [ 28.895112] kasan_atomics+0x95/0x310 [ 28.895295] kunit_try_run_case+0x1a5/0x480 [ 28.895526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.895808] kthread+0x337/0x6f0 [ 28.895938] ret_from_fork+0x116/0x1d0 [ 28.896124] ret_from_fork_asm+0x1a/0x30 [ 28.896335] [ 28.896432] The buggy address belongs to the object at ffff88810439e280 [ 28.896432] which belongs to the cache kmalloc-64 of size 64 [ 28.896917] The buggy address is located 0 bytes to the right of [ 28.896917] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.897466] [ 28.897580] The buggy address belongs to the physical page: [ 28.897826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.898197] flags: 0x200000000000000(node=0|zone=2) [ 28.898365] page_type: f5(slab) [ 28.898560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.898895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.899120] page dumped because: kasan: bad access detected [ 28.899288] [ 28.899354] Memory state around the buggy address: [ 28.899619] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.899988] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.900338] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.900606] ^ [ 28.900774] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.900986] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.901194] ================================================================== [ 27.823292] ================================================================== [ 27.824178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 27.824436] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.825102] [ 27.825293] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.825347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.825361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.825386] Call Trace: [ 27.825407] <TASK> [ 27.825427] dump_stack_lvl+0x73/0xb0 [ 27.825461] print_report+0xd1/0x610 [ 27.825486] ? __virt_addr_valid+0x1db/0x2d0 [ 27.825514] ? kasan_atomics_helper+0x72f/0x5450 [ 27.825537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.825564] ? kasan_atomics_helper+0x72f/0x5450 [ 27.825589] kasan_report+0x141/0x180 [ 27.825612] ? kasan_atomics_helper+0x72f/0x5450 [ 27.825640] kasan_check_range+0x10c/0x1c0 [ 27.825677] __kasan_check_write+0x18/0x20 [ 27.825715] kasan_atomics_helper+0x72f/0x5450 [ 27.825740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.825764] ? ret_from_fork_asm+0x1a/0x30 [ 27.825847] kasan_atomics+0x1dc/0x310 [ 27.825873] ? __pfx_kasan_atomics+0x10/0x10 [ 27.825901] ? __pfx_read_tsc+0x10/0x10 [ 27.825928] ? ktime_get_ts64+0x86/0x230 [ 27.825955] kunit_try_run_case+0x1a5/0x480 [ 27.825979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.826001] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.826028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.826054] ? __kthread_parkme+0x82/0x180 [ 27.826077] ? preempt_count_sub+0x50/0x80 [ 27.826102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.826126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.826155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.826181] kthread+0x337/0x6f0 [ 27.826203] ? trace_preempt_on+0x20/0xc0 [ 27.826228] ? __pfx_kthread+0x10/0x10 [ 27.826250] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.826273] ? calculate_sigpending+0x7b/0xa0 [ 27.826298] ? __pfx_kthread+0x10/0x10 [ 27.826322] ret_from_fork+0x116/0x1d0 [ 27.826344] ? __pfx_kthread+0x10/0x10 [ 27.826366] ret_from_fork_asm+0x1a/0x30 [ 27.826399] </TASK> [ 27.826413] [ 27.841468] Allocated by task 313: [ 27.841616] kasan_save_stack+0x45/0x70 [ 27.842198] kasan_save_track+0x18/0x40 [ 27.842610] kasan_save_alloc_info+0x3b/0x50 [ 27.843098] __kasan_kmalloc+0xb7/0xc0 [ 27.843507] __kmalloc_cache_noprof+0x189/0x420 [ 27.844041] kasan_atomics+0x95/0x310 [ 27.844377] kunit_try_run_case+0x1a5/0x480 [ 27.844839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.845038] kthread+0x337/0x6f0 [ 27.845231] ret_from_fork+0x116/0x1d0 [ 27.845405] ret_from_fork_asm+0x1a/0x30 [ 27.845626] [ 27.845724] The buggy address belongs to the object at ffff88810439e280 [ 27.845724] which belongs to the cache kmalloc-64 of size 64 [ 27.846286] The buggy address is located 0 bytes to the right of [ 27.846286] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.846944] [ 27.847048] The buggy address belongs to the physical page: [ 27.847290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.847668] flags: 0x200000000000000(node=0|zone=2) [ 27.848135] page_type: f5(slab) [ 27.848303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.848629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.849077] page dumped because: kasan: bad access detected [ 27.849325] [ 27.849418] Memory state around the buggy address: [ 27.849678] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.850091] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.850407] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.850826] ^ [ 27.851084] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.851365] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.851686] ================================================================== [ 28.536872] ================================================================== [ 28.537379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 28.537771] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.538154] [ 28.538239] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.538287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.538300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.538357] Call Trace: [ 28.538374] <TASK> [ 28.538391] dump_stack_lvl+0x73/0xb0 [ 28.538432] print_report+0xd1/0x610 [ 28.538456] ? __virt_addr_valid+0x1db/0x2d0 [ 28.538518] ? kasan_atomics_helper+0x164f/0x5450 [ 28.538543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.538581] ? kasan_atomics_helper+0x164f/0x5450 [ 28.538604] kasan_report+0x141/0x180 [ 28.538629] ? kasan_atomics_helper+0x164f/0x5450 [ 28.538656] kasan_check_range+0x10c/0x1c0 [ 28.538716] __kasan_check_write+0x18/0x20 [ 28.538740] kasan_atomics_helper+0x164f/0x5450 [ 28.538774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.538798] ? ret_from_fork_asm+0x1a/0x30 [ 28.538828] kasan_atomics+0x1dc/0x310 [ 28.538878] ? __pfx_kasan_atomics+0x10/0x10 [ 28.538905] ? __pfx_read_tsc+0x10/0x10 [ 28.538930] ? ktime_get_ts64+0x86/0x230 [ 28.538967] kunit_try_run_case+0x1a5/0x480 [ 28.538991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.539013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.539049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.539074] ? __kthread_parkme+0x82/0x180 [ 28.539097] ? preempt_count_sub+0x50/0x80 [ 28.539121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.539144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.539171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.539198] kthread+0x337/0x6f0 [ 28.539218] ? trace_preempt_on+0x20/0xc0 [ 28.539242] ? __pfx_kthread+0x10/0x10 [ 28.539265] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.539289] ? calculate_sigpending+0x7b/0xa0 [ 28.539314] ? __pfx_kthread+0x10/0x10 [ 28.539337] ret_from_fork+0x116/0x1d0 [ 28.539358] ? __pfx_kthread+0x10/0x10 [ 28.539381] ret_from_fork_asm+0x1a/0x30 [ 28.539412] </TASK> [ 28.539425] [ 28.552414] Allocated by task 313: [ 28.552779] kasan_save_stack+0x45/0x70 [ 28.553165] kasan_save_track+0x18/0x40 [ 28.553302] kasan_save_alloc_info+0x3b/0x50 [ 28.553449] __kasan_kmalloc+0xb7/0xc0 [ 28.553813] __kmalloc_cache_noprof+0x189/0x420 [ 28.554249] kasan_atomics+0x95/0x310 [ 28.554608] kunit_try_run_case+0x1a5/0x480 [ 28.555006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.555500] kthread+0x337/0x6f0 [ 28.555830] ret_from_fork+0x116/0x1d0 [ 28.555968] ret_from_fork_asm+0x1a/0x30 [ 28.556106] [ 28.556172] The buggy address belongs to the object at ffff88810439e280 [ 28.556172] which belongs to the cache kmalloc-64 of size 64 [ 28.556554] The buggy address is located 0 bytes to the right of [ 28.556554] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.557224] [ 28.557331] The buggy address belongs to the physical page: [ 28.557584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.557900] flags: 0x200000000000000(node=0|zone=2) [ 28.558088] page_type: f5(slab) [ 28.558257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.558640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.558953] page dumped because: kasan: bad access detected [ 28.559216] [ 28.559304] Memory state around the buggy address: [ 28.559519] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.559850] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.560174] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.560465] ^ [ 28.560683] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.560965] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.561219] ================================================================== [ 28.957302] ================================================================== [ 28.957756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 28.958118] Read of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.958445] [ 28.958591] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.958641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.958687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.958719] Call Trace: [ 28.958734] <TASK> [ 28.958751] dump_stack_lvl+0x73/0xb0 [ 28.958810] print_report+0xd1/0x610 [ 28.958835] ? __virt_addr_valid+0x1db/0x2d0 [ 28.958858] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.958880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.958930] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.958953] kasan_report+0x141/0x180 [ 28.958977] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.959004] __asan_report_load8_noabort+0x18/0x20 [ 28.959029] kasan_atomics_helper+0x4fb2/0x5450 [ 28.959053] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.959076] ? ret_from_fork_asm+0x1a/0x30 [ 28.959105] kasan_atomics+0x1dc/0x310 [ 28.959129] ? __pfx_kasan_atomics+0x10/0x10 [ 28.959154] ? __pfx_read_tsc+0x10/0x10 [ 28.959177] ? ktime_get_ts64+0x86/0x230 [ 28.959202] kunit_try_run_case+0x1a5/0x480 [ 28.959226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.959248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.959273] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.959297] ? __kthread_parkme+0x82/0x180 [ 28.959319] ? preempt_count_sub+0x50/0x80 [ 28.959343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.959366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.959392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.959419] kthread+0x337/0x6f0 [ 28.959440] ? trace_preempt_on+0x20/0xc0 [ 28.959464] ? __pfx_kthread+0x10/0x10 [ 28.959526] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.959550] ? calculate_sigpending+0x7b/0xa0 [ 28.959574] ? __pfx_kthread+0x10/0x10 [ 28.959597] ret_from_fork+0x116/0x1d0 [ 28.959618] ? __pfx_kthread+0x10/0x10 [ 28.959642] ret_from_fork_asm+0x1a/0x30 [ 28.959675] </TASK> [ 28.959688] [ 28.967062] Allocated by task 313: [ 28.967235] kasan_save_stack+0x45/0x70 [ 28.967411] kasan_save_track+0x18/0x40 [ 28.967570] kasan_save_alloc_info+0x3b/0x50 [ 28.967814] __kasan_kmalloc+0xb7/0xc0 [ 28.968012] __kmalloc_cache_noprof+0x189/0x420 [ 28.968201] kasan_atomics+0x95/0x310 [ 28.968396] kunit_try_run_case+0x1a5/0x480 [ 28.968619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.968882] kthread+0x337/0x6f0 [ 28.969088] ret_from_fork+0x116/0x1d0 [ 28.969286] ret_from_fork_asm+0x1a/0x30 [ 28.969497] [ 28.969581] The buggy address belongs to the object at ffff88810439e280 [ 28.969581] which belongs to the cache kmalloc-64 of size 64 [ 28.970055] The buggy address is located 0 bytes to the right of [ 28.970055] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.970577] [ 28.970671] The buggy address belongs to the physical page: [ 28.970894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.971257] flags: 0x200000000000000(node=0|zone=2) [ 28.971514] page_type: f5(slab) [ 28.971723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.972072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.972406] page dumped because: kasan: bad access detected [ 28.972657] [ 28.972733] Memory state around the buggy address: [ 28.972913] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.973254] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.973582] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.973889] ^ [ 28.974092] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.974427] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.974747] ================================================================== [ 28.433566] ================================================================== [ 28.434072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 28.434466] Read of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.434854] [ 28.434982] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.435029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.435043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.435065] Call Trace: [ 28.435081] <TASK> [ 28.435096] dump_stack_lvl+0x73/0xb0 [ 28.435124] print_report+0xd1/0x610 [ 28.435149] ? __virt_addr_valid+0x1db/0x2d0 [ 28.435173] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.435195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.435223] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.435246] kasan_report+0x141/0x180 [ 28.435269] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.435296] __asan_report_load8_noabort+0x18/0x20 [ 28.435321] kasan_atomics_helper+0x4eae/0x5450 [ 28.435356] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.435379] ? ret_from_fork_asm+0x1a/0x30 [ 28.435409] kasan_atomics+0x1dc/0x310 [ 28.435444] ? __pfx_kasan_atomics+0x10/0x10 [ 28.435470] ? __pfx_read_tsc+0x10/0x10 [ 28.435503] ? ktime_get_ts64+0x86/0x230 [ 28.435537] kunit_try_run_case+0x1a5/0x480 [ 28.435561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.435582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.435618] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.435642] ? __kthread_parkme+0x82/0x180 [ 28.435664] ? preempt_count_sub+0x50/0x80 [ 28.435688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.435723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.435749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.435776] kthread+0x337/0x6f0 [ 28.435798] ? trace_preempt_on+0x20/0xc0 [ 28.435823] ? __pfx_kthread+0x10/0x10 [ 28.435851] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.435882] ? calculate_sigpending+0x7b/0xa0 [ 28.435908] ? __pfx_kthread+0x10/0x10 [ 28.435931] ret_from_fork+0x116/0x1d0 [ 28.435964] ? __pfx_kthread+0x10/0x10 [ 28.435986] ret_from_fork_asm+0x1a/0x30 [ 28.436017] </TASK> [ 28.436031] [ 28.443617] Allocated by task 313: [ 28.443801] kasan_save_stack+0x45/0x70 [ 28.443996] kasan_save_track+0x18/0x40 [ 28.444217] kasan_save_alloc_info+0x3b/0x50 [ 28.444442] __kasan_kmalloc+0xb7/0xc0 [ 28.444641] __kmalloc_cache_noprof+0x189/0x420 [ 28.444867] kasan_atomics+0x95/0x310 [ 28.445049] kunit_try_run_case+0x1a5/0x480 [ 28.445237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.445475] kthread+0x337/0x6f0 [ 28.445669] ret_from_fork+0x116/0x1d0 [ 28.445853] ret_from_fork_asm+0x1a/0x30 [ 28.445990] [ 28.446089] The buggy address belongs to the object at ffff88810439e280 [ 28.446089] which belongs to the cache kmalloc-64 of size 64 [ 28.446614] The buggy address is located 0 bytes to the right of [ 28.446614] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.446994] [ 28.447062] The buggy address belongs to the physical page: [ 28.447231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.447470] flags: 0x200000000000000(node=0|zone=2) [ 28.447627] page_type: f5(slab) [ 28.447829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.448186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.448556] page dumped because: kasan: bad access detected [ 28.448814] [ 28.448902] Memory state around the buggy address: [ 28.449121] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.449439] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.449950] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.450163] ^ [ 28.450317] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.450529] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.450749] ================================================================== [ 28.066743] ================================================================== [ 28.067160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 28.067476] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.068349] [ 28.068455] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.068516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.068531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.068555] Call Trace: [ 28.068570] <TASK> [ 28.068588] dump_stack_lvl+0x73/0xb0 [ 28.068619] print_report+0xd1/0x610 [ 28.068645] ? __virt_addr_valid+0x1db/0x2d0 [ 28.068673] ? kasan_atomics_helper+0xde0/0x5450 [ 28.068695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.068735] ? kasan_atomics_helper+0xde0/0x5450 [ 28.068759] kasan_report+0x141/0x180 [ 28.068782] ? kasan_atomics_helper+0xde0/0x5450 [ 28.068809] kasan_check_range+0x10c/0x1c0 [ 28.068834] __kasan_check_write+0x18/0x20 [ 28.068859] kasan_atomics_helper+0xde0/0x5450 [ 28.068883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.068907] ? ret_from_fork_asm+0x1a/0x30 [ 28.068936] kasan_atomics+0x1dc/0x310 [ 28.068960] ? __pfx_kasan_atomics+0x10/0x10 [ 28.068986] ? __pfx_read_tsc+0x10/0x10 [ 28.069010] ? ktime_get_ts64+0x86/0x230 [ 28.069037] kunit_try_run_case+0x1a5/0x480 [ 28.069061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.069083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.069108] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.069133] ? __kthread_parkme+0x82/0x180 [ 28.069155] ? preempt_count_sub+0x50/0x80 [ 28.069181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.069204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.069231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.069258] kthread+0x337/0x6f0 [ 28.069279] ? trace_preempt_on+0x20/0xc0 [ 28.069303] ? __pfx_kthread+0x10/0x10 [ 28.069326] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.069348] ? calculate_sigpending+0x7b/0xa0 [ 28.069374] ? __pfx_kthread+0x10/0x10 [ 28.069397] ret_from_fork+0x116/0x1d0 [ 28.069418] ? __pfx_kthread+0x10/0x10 [ 28.069440] ret_from_fork_asm+0x1a/0x30 [ 28.069471] </TASK> [ 28.069484] [ 28.077998] Allocated by task 313: [ 28.078154] kasan_save_stack+0x45/0x70 [ 28.078355] kasan_save_track+0x18/0x40 [ 28.078539] kasan_save_alloc_info+0x3b/0x50 [ 28.079267] __kasan_kmalloc+0xb7/0xc0 [ 28.079441] __kmalloc_cache_noprof+0x189/0x420 [ 28.079853] kasan_atomics+0x95/0x310 [ 28.080116] kunit_try_run_case+0x1a5/0x480 [ 28.080452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.080809] kthread+0x337/0x6f0 [ 28.081117] ret_from_fork+0x116/0x1d0 [ 28.081325] ret_from_fork_asm+0x1a/0x30 [ 28.081490] [ 28.081590] The buggy address belongs to the object at ffff88810439e280 [ 28.081590] which belongs to the cache kmalloc-64 of size 64 [ 28.082141] The buggy address is located 0 bytes to the right of [ 28.082141] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.082772] [ 28.082904] The buggy address belongs to the physical page: [ 28.083081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.083412] flags: 0x200000000000000(node=0|zone=2) [ 28.083624] page_type: f5(slab) [ 28.083801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.084189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.084468] page dumped because: kasan: bad access detected [ 28.084746] [ 28.084885] Memory state around the buggy address: [ 28.085113] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.085401] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.085758] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.086734] ^ [ 28.087123] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.087456] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.087984] ================================================================== [ 28.694371] ================================================================== [ 28.695075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 28.695402] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.695971] [ 28.696190] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.696247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.696262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.696285] Call Trace: [ 28.696401] <TASK> [ 28.696420] dump_stack_lvl+0x73/0xb0 [ 28.696452] print_report+0xd1/0x610 [ 28.696479] ? __virt_addr_valid+0x1db/0x2d0 [ 28.696513] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.696546] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.696573] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.696597] kasan_report+0x141/0x180 [ 28.696620] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.696648] kasan_check_range+0x10c/0x1c0 [ 28.696673] __kasan_check_write+0x18/0x20 [ 28.696709] kasan_atomics_helper+0x1a7f/0x5450 [ 28.696733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.696757] ? ret_from_fork_asm+0x1a/0x30 [ 28.696786] kasan_atomics+0x1dc/0x310 [ 28.696810] ? __pfx_kasan_atomics+0x10/0x10 [ 28.696836] ? __pfx_read_tsc+0x10/0x10 [ 28.696859] ? ktime_get_ts64+0x86/0x230 [ 28.696885] kunit_try_run_case+0x1a5/0x480 [ 28.696908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.696930] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.696956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.696981] ? __kthread_parkme+0x82/0x180 [ 28.697003] ? preempt_count_sub+0x50/0x80 [ 28.697027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.697050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.697075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.697103] kthread+0x337/0x6f0 [ 28.697125] ? trace_preempt_on+0x20/0xc0 [ 28.697150] ? __pfx_kthread+0x10/0x10 [ 28.697173] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.697196] ? calculate_sigpending+0x7b/0xa0 [ 28.697222] ? __pfx_kthread+0x10/0x10 [ 28.697244] ret_from_fork+0x116/0x1d0 [ 28.697267] ? __pfx_kthread+0x10/0x10 [ 28.697289] ret_from_fork_asm+0x1a/0x30 [ 28.697321] </TASK> [ 28.697334] [ 28.704570] Allocated by task 313: [ 28.704763] kasan_save_stack+0x45/0x70 [ 28.704965] kasan_save_track+0x18/0x40 [ 28.705157] kasan_save_alloc_info+0x3b/0x50 [ 28.705456] __kasan_kmalloc+0xb7/0xc0 [ 28.705720] __kmalloc_cache_noprof+0x189/0x420 [ 28.705875] kasan_atomics+0x95/0x310 [ 28.706060] kunit_try_run_case+0x1a5/0x480 [ 28.706264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.706445] kthread+0x337/0x6f0 [ 28.706707] ret_from_fork+0x116/0x1d0 [ 28.706909] ret_from_fork_asm+0x1a/0x30 [ 28.707090] [ 28.707176] The buggy address belongs to the object at ffff88810439e280 [ 28.707176] which belongs to the cache kmalloc-64 of size 64 [ 28.707676] The buggy address is located 0 bytes to the right of [ 28.707676] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.708207] [ 28.708331] The buggy address belongs to the physical page: [ 28.708499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.708745] flags: 0x200000000000000(node=0|zone=2) [ 28.708903] page_type: f5(slab) [ 28.709081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.709416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.709910] page dumped because: kasan: bad access detected [ 28.710079] [ 28.710144] Memory state around the buggy address: [ 28.710296] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.710509] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.711065] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.711379] ^ [ 28.711763] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.712085] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.712319] ================================================================== [ 27.852381] ================================================================== [ 27.852687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 27.852983] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.853399] [ 27.853532] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.853586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.853602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.853628] Call Trace: [ 27.853656] <TASK> [ 27.853674] dump_stack_lvl+0x73/0xb0 [ 27.853725] print_report+0xd1/0x610 [ 27.853759] ? __virt_addr_valid+0x1db/0x2d0 [ 27.853785] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.853806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.853845] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.853868] kasan_report+0x141/0x180 [ 27.853948] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.853981] kasan_check_range+0x10c/0x1c0 [ 27.854018] __kasan_check_write+0x18/0x20 [ 27.854042] kasan_atomics_helper+0x7c7/0x5450 [ 27.854066] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.854101] ? ret_from_fork_asm+0x1a/0x30 [ 27.854130] kasan_atomics+0x1dc/0x310 [ 27.854154] ? __pfx_kasan_atomics+0x10/0x10 [ 27.854190] ? __pfx_read_tsc+0x10/0x10 [ 27.854214] ? ktime_get_ts64+0x86/0x230 [ 27.854241] kunit_try_run_case+0x1a5/0x480 [ 27.854264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.854285] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.854311] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.854344] ? __kthread_parkme+0x82/0x180 [ 27.854367] ? preempt_count_sub+0x50/0x80 [ 27.854391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.854425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.854451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.854477] kthread+0x337/0x6f0 [ 27.854510] ? trace_preempt_on+0x20/0xc0 [ 27.854544] ? __pfx_kthread+0x10/0x10 [ 27.854565] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.854588] ? calculate_sigpending+0x7b/0xa0 [ 27.854624] ? __pfx_kthread+0x10/0x10 [ 27.854648] ret_from_fork+0x116/0x1d0 [ 27.854668] ? __pfx_kthread+0x10/0x10 [ 27.854690] ret_from_fork_asm+0x1a/0x30 [ 27.854731] </TASK> [ 27.854744] [ 27.867588] Allocated by task 313: [ 27.867986] kasan_save_stack+0x45/0x70 [ 27.868458] kasan_save_track+0x18/0x40 [ 27.868772] kasan_save_alloc_info+0x3b/0x50 [ 27.869093] __kasan_kmalloc+0xb7/0xc0 [ 27.869375] __kmalloc_cache_noprof+0x189/0x420 [ 27.869707] kasan_atomics+0x95/0x310 [ 27.870004] kunit_try_run_case+0x1a5/0x480 [ 27.870305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.870752] kthread+0x337/0x6f0 [ 27.871116] ret_from_fork+0x116/0x1d0 [ 27.871435] ret_from_fork_asm+0x1a/0x30 [ 27.871665] [ 27.871775] The buggy address belongs to the object at ffff88810439e280 [ 27.871775] which belongs to the cache kmalloc-64 of size 64 [ 27.872485] The buggy address is located 0 bytes to the right of [ 27.872485] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.873349] [ 27.873458] The buggy address belongs to the physical page: [ 27.873780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.874161] flags: 0x200000000000000(node=0|zone=2) [ 27.874481] page_type: f5(slab) [ 27.874712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.874999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.875364] page dumped because: kasan: bad access detected [ 27.875567] [ 27.875797] Memory state around the buggy address: [ 27.876223] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.876547] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.877005] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.877326] ^ [ 27.877562] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.877970] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.878350] ================================================================== [ 28.975640] ================================================================== [ 28.976230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 28.976468] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.976766] [ 28.976872] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.976922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.976936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.976958] Call Trace: [ 28.976974] <TASK> [ 28.976990] dump_stack_lvl+0x73/0xb0 [ 28.977018] print_report+0xd1/0x610 [ 28.977043] ? __virt_addr_valid+0x1db/0x2d0 [ 28.977068] ? kasan_atomics_helper+0x218a/0x5450 [ 28.977091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.977118] ? kasan_atomics_helper+0x218a/0x5450 [ 28.977141] kasan_report+0x141/0x180 [ 28.977165] ? kasan_atomics_helper+0x218a/0x5450 [ 28.977191] kasan_check_range+0x10c/0x1c0 [ 28.977215] __kasan_check_write+0x18/0x20 [ 28.977240] kasan_atomics_helper+0x218a/0x5450 [ 28.977263] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.977286] ? ret_from_fork_asm+0x1a/0x30 [ 28.977316] kasan_atomics+0x1dc/0x310 [ 28.977339] ? __pfx_kasan_atomics+0x10/0x10 [ 28.977364] ? __pfx_read_tsc+0x10/0x10 [ 28.977388] ? ktime_get_ts64+0x86/0x230 [ 28.977438] kunit_try_run_case+0x1a5/0x480 [ 28.977463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.977484] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.977509] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.977533] ? __kthread_parkme+0x82/0x180 [ 28.977555] ? preempt_count_sub+0x50/0x80 [ 28.977581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.977605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.977631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.977657] kthread+0x337/0x6f0 [ 28.977679] ? trace_preempt_on+0x20/0xc0 [ 28.977712] ? __pfx_kthread+0x10/0x10 [ 28.977734] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.977757] ? calculate_sigpending+0x7b/0xa0 [ 28.977800] ? __pfx_kthread+0x10/0x10 [ 28.977836] ret_from_fork+0x116/0x1d0 [ 28.977857] ? __pfx_kthread+0x10/0x10 [ 28.977892] ret_from_fork_asm+0x1a/0x30 [ 28.977939] </TASK> [ 28.977951] [ 28.989289] Allocated by task 313: [ 28.989426] kasan_save_stack+0x45/0x70 [ 28.989645] kasan_save_track+0x18/0x40 [ 28.989850] kasan_save_alloc_info+0x3b/0x50 [ 28.990064] __kasan_kmalloc+0xb7/0xc0 [ 28.990248] __kmalloc_cache_noprof+0x189/0x420 [ 28.990474] kasan_atomics+0x95/0x310 [ 28.990622] kunit_try_run_case+0x1a5/0x480 [ 28.990838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.991113] kthread+0x337/0x6f0 [ 28.991290] ret_from_fork+0x116/0x1d0 [ 28.991487] ret_from_fork_asm+0x1a/0x30 [ 28.991680] [ 28.991813] The buggy address belongs to the object at ffff88810439e280 [ 28.991813] which belongs to the cache kmalloc-64 of size 64 [ 28.992249] The buggy address is located 0 bytes to the right of [ 28.992249] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.992798] [ 28.992895] The buggy address belongs to the physical page: [ 28.993169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.993494] flags: 0x200000000000000(node=0|zone=2) [ 28.993758] page_type: f5(slab) [ 28.993895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.994217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.994677] page dumped because: kasan: bad access detected [ 28.994907] [ 28.994974] Memory state around the buggy address: [ 28.995128] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.995408] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.995946] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.996202] ^ [ 28.996355] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.996608] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.997104] ================================================================== [ 28.561744] ================================================================== [ 28.562175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 28.562484] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.562787] [ 28.562903] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.562952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.562976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.562998] Call Trace: [ 28.563013] <TASK> [ 28.563029] dump_stack_lvl+0x73/0xb0 [ 28.563059] print_report+0xd1/0x610 [ 28.563084] ? __virt_addr_valid+0x1db/0x2d0 [ 28.563109] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.563131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.563158] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.563180] kasan_report+0x141/0x180 [ 28.563204] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.563231] kasan_check_range+0x10c/0x1c0 [ 28.563266] __kasan_check_write+0x18/0x20 [ 28.563290] kasan_atomics_helper+0x16e7/0x5450 [ 28.563314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.563343] ? ret_from_fork_asm+0x1a/0x30 [ 28.563372] kasan_atomics+0x1dc/0x310 [ 28.563396] ? __pfx_kasan_atomics+0x10/0x10 [ 28.563421] ? __pfx_read_tsc+0x10/0x10 [ 28.563445] ? ktime_get_ts64+0x86/0x230 [ 28.563471] kunit_try_run_case+0x1a5/0x480 [ 28.563509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.563531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.563556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.563580] ? __kthread_parkme+0x82/0x180 [ 28.563602] ? preempt_count_sub+0x50/0x80 [ 28.563627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.563651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.563677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.563713] kthread+0x337/0x6f0 [ 28.563735] ? trace_preempt_on+0x20/0xc0 [ 28.563759] ? __pfx_kthread+0x10/0x10 [ 28.563781] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.563804] ? calculate_sigpending+0x7b/0xa0 [ 28.563829] ? __pfx_kthread+0x10/0x10 [ 28.563855] ret_from_fork+0x116/0x1d0 [ 28.563877] ? __pfx_kthread+0x10/0x10 [ 28.563899] ret_from_fork_asm+0x1a/0x30 [ 28.563931] </TASK> [ 28.563943] [ 28.573685] Allocated by task 313: [ 28.574025] kasan_save_stack+0x45/0x70 [ 28.574225] kasan_save_track+0x18/0x40 [ 28.574397] kasan_save_alloc_info+0x3b/0x50 [ 28.575011] __kasan_kmalloc+0xb7/0xc0 [ 28.575287] __kmalloc_cache_noprof+0x189/0x420 [ 28.575639] kasan_atomics+0x95/0x310 [ 28.575841] kunit_try_run_case+0x1a5/0x480 [ 28.576036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.576271] kthread+0x337/0x6f0 [ 28.576427] ret_from_fork+0x116/0x1d0 [ 28.577074] ret_from_fork_asm+0x1a/0x30 [ 28.577372] [ 28.577602] The buggy address belongs to the object at ffff88810439e280 [ 28.577602] which belongs to the cache kmalloc-64 of size 64 [ 28.578531] The buggy address is located 0 bytes to the right of [ 28.578531] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.579130] [ 28.579226] The buggy address belongs to the physical page: [ 28.579463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.580053] flags: 0x200000000000000(node=0|zone=2) [ 28.580502] page_type: f5(slab) [ 28.580676] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.581007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.581317] page dumped because: kasan: bad access detected [ 28.581787] [ 28.582026] Memory state around the buggy address: [ 28.582390] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.583159] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.583610] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.584120] ^ [ 28.584746] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.585212] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.585915] ================================================================== [ 27.721918] ================================================================== [ 27.722212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 27.722708] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.722978] [ 27.723063] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.723159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.723176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.723200] Call Trace: [ 27.723219] <TASK> [ 27.723237] dump_stack_lvl+0x73/0xb0 [ 27.723269] print_report+0xd1/0x610 [ 27.723292] ? __virt_addr_valid+0x1db/0x2d0 [ 27.723318] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.723340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.723368] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.723391] kasan_report+0x141/0x180 [ 27.723414] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.723441] __asan_report_store4_noabort+0x1b/0x30 [ 27.723467] kasan_atomics_helper+0x4b3a/0x5450 [ 27.723491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.723514] ? ret_from_fork_asm+0x1a/0x30 [ 27.723543] kasan_atomics+0x1dc/0x310 [ 27.723568] ? __pfx_kasan_atomics+0x10/0x10 [ 27.723593] ? __pfx_read_tsc+0x10/0x10 [ 27.723617] ? ktime_get_ts64+0x86/0x230 [ 27.723642] kunit_try_run_case+0x1a5/0x480 [ 27.723666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.723688] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.723725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.723750] ? __kthread_parkme+0x82/0x180 [ 27.723772] ? preempt_count_sub+0x50/0x80 [ 27.723798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.723821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.723855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.723883] kthread+0x337/0x6f0 [ 27.723945] ? trace_preempt_on+0x20/0xc0 [ 27.723970] ? __pfx_kthread+0x10/0x10 [ 27.723992] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.724016] ? calculate_sigpending+0x7b/0xa0 [ 27.724041] ? __pfx_kthread+0x10/0x10 [ 27.724065] ret_from_fork+0x116/0x1d0 [ 27.724087] ? __pfx_kthread+0x10/0x10 [ 27.724110] ret_from_fork_asm+0x1a/0x30 [ 27.724142] </TASK> [ 27.724154] [ 27.732045] Allocated by task 313: [ 27.732234] kasan_save_stack+0x45/0x70 [ 27.732410] kasan_save_track+0x18/0x40 [ 27.732553] kasan_save_alloc_info+0x3b/0x50 [ 27.732788] __kasan_kmalloc+0xb7/0xc0 [ 27.733033] __kmalloc_cache_noprof+0x189/0x420 [ 27.733200] kasan_atomics+0x95/0x310 [ 27.733330] kunit_try_run_case+0x1a5/0x480 [ 27.733530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.733823] kthread+0x337/0x6f0 [ 27.734138] ret_from_fork+0x116/0x1d0 [ 27.734339] ret_from_fork_asm+0x1a/0x30 [ 27.734547] [ 27.734617] The buggy address belongs to the object at ffff88810439e280 [ 27.734617] which belongs to the cache kmalloc-64 of size 64 [ 27.734987] The buggy address is located 0 bytes to the right of [ 27.734987] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.735476] [ 27.735570] The buggy address belongs to the physical page: [ 27.735829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.736482] flags: 0x200000000000000(node=0|zone=2) [ 27.736651] page_type: f5(slab) [ 27.736784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.737022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.737671] page dumped because: kasan: bad access detected [ 27.738349] [ 27.738456] Memory state around the buggy address: [ 27.738881] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.739105] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.739426] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.739661] ^ [ 27.739829] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.740380] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.740733] ================================================================== [ 28.488231] ================================================================== [ 28.488597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 28.488935] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.489162] [ 28.489247] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.489296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.489312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.489334] Call Trace: [ 28.489351] <TASK> [ 28.489367] dump_stack_lvl+0x73/0xb0 [ 28.489396] print_report+0xd1/0x610 [ 28.489421] ? __virt_addr_valid+0x1db/0x2d0 [ 28.489446] ? kasan_atomics_helper+0x151d/0x5450 [ 28.489469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.489498] ? kasan_atomics_helper+0x151d/0x5450 [ 28.489521] kasan_report+0x141/0x180 [ 28.489545] ? kasan_atomics_helper+0x151d/0x5450 [ 28.489574] kasan_check_range+0x10c/0x1c0 [ 28.489600] __kasan_check_write+0x18/0x20 [ 28.489624] kasan_atomics_helper+0x151d/0x5450 [ 28.489649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.489673] ? ret_from_fork_asm+0x1a/0x30 [ 28.489714] kasan_atomics+0x1dc/0x310 [ 28.489739] ? __pfx_kasan_atomics+0x10/0x10 [ 28.489764] ? __pfx_read_tsc+0x10/0x10 [ 28.489788] ? ktime_get_ts64+0x86/0x230 [ 28.489814] kunit_try_run_case+0x1a5/0x480 [ 28.489837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.489860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.489906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.489931] ? __kthread_parkme+0x82/0x180 [ 28.489953] ? preempt_count_sub+0x50/0x80 [ 28.489989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.490013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.490040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.490067] kthread+0x337/0x6f0 [ 28.490088] ? trace_preempt_on+0x20/0xc0 [ 28.490113] ? __pfx_kthread+0x10/0x10 [ 28.490135] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.490159] ? calculate_sigpending+0x7b/0xa0 [ 28.490184] ? __pfx_kthread+0x10/0x10 [ 28.490208] ret_from_fork+0x116/0x1d0 [ 28.490229] ? __pfx_kthread+0x10/0x10 [ 28.490252] ret_from_fork_asm+0x1a/0x30 [ 28.490284] </TASK> [ 28.490297] [ 28.498335] Allocated by task 313: [ 28.498566] kasan_save_stack+0x45/0x70 [ 28.498745] kasan_save_track+0x18/0x40 [ 28.498944] kasan_save_alloc_info+0x3b/0x50 [ 28.499140] __kasan_kmalloc+0xb7/0xc0 [ 28.499271] __kmalloc_cache_noprof+0x189/0x420 [ 28.499422] kasan_atomics+0x95/0x310 [ 28.499729] kunit_try_run_case+0x1a5/0x480 [ 28.499941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.500195] kthread+0x337/0x6f0 [ 28.500316] ret_from_fork+0x116/0x1d0 [ 28.500447] ret_from_fork_asm+0x1a/0x30 [ 28.500858] [ 28.500950] The buggy address belongs to the object at ffff88810439e280 [ 28.500950] which belongs to the cache kmalloc-64 of size 64 [ 28.501523] The buggy address is located 0 bytes to the right of [ 28.501523] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.501941] [ 28.502035] The buggy address belongs to the physical page: [ 28.502308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.502665] flags: 0x200000000000000(node=0|zone=2) [ 28.502879] page_type: f5(slab) [ 28.503057] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.503377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.503738] page dumped because: kasan: bad access detected [ 28.504000] [ 28.504096] Memory state around the buggy address: [ 28.504306] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.504610] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.504928] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.505240] ^ [ 28.505447] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.505957] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.506170] ================================================================== [ 27.683047] ================================================================== [ 27.683358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 27.683734] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.684045] [ 27.684136] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.684184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.684199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.684224] Call Trace: [ 27.684243] <TASK> [ 27.684261] dump_stack_lvl+0x73/0xb0 [ 27.684292] print_report+0xd1/0x610 [ 27.684315] ? __virt_addr_valid+0x1db/0x2d0 [ 27.684342] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.684365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.684392] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.684415] kasan_report+0x141/0x180 [ 27.684438] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.684465] __asan_report_load4_noabort+0x18/0x20 [ 27.684492] kasan_atomics_helper+0x4b54/0x5450 [ 27.684515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.684539] ? ret_from_fork_asm+0x1a/0x30 [ 27.684578] kasan_atomics+0x1dc/0x310 [ 27.684602] ? __pfx_kasan_atomics+0x10/0x10 [ 27.684628] ? __pfx_read_tsc+0x10/0x10 [ 27.684652] ? ktime_get_ts64+0x86/0x230 [ 27.684679] kunit_try_run_case+0x1a5/0x480 [ 27.684715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.684737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.684762] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.684786] ? __kthread_parkme+0x82/0x180 [ 27.684808] ? preempt_count_sub+0x50/0x80 [ 27.684834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.684857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.684885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.685057] kthread+0x337/0x6f0 [ 27.685080] ? trace_preempt_on+0x20/0xc0 [ 27.685106] ? __pfx_kthread+0x10/0x10 [ 27.685129] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.685152] ? calculate_sigpending+0x7b/0xa0 [ 27.685179] ? __pfx_kthread+0x10/0x10 [ 27.685202] ret_from_fork+0x116/0x1d0 [ 27.685224] ? __pfx_kthread+0x10/0x10 [ 27.685246] ret_from_fork_asm+0x1a/0x30 [ 27.685279] </TASK> [ 27.685292] [ 27.692921] Allocated by task 313: [ 27.693056] kasan_save_stack+0x45/0x70 [ 27.693559] kasan_save_track+0x18/0x40 [ 27.693785] kasan_save_alloc_info+0x3b/0x50 [ 27.694070] __kasan_kmalloc+0xb7/0xc0 [ 27.694265] __kmalloc_cache_noprof+0x189/0x420 [ 27.694486] kasan_atomics+0x95/0x310 [ 27.694673] kunit_try_run_case+0x1a5/0x480 [ 27.694832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.695008] kthread+0x337/0x6f0 [ 27.695154] ret_from_fork+0x116/0x1d0 [ 27.695408] ret_from_fork_asm+0x1a/0x30 [ 27.695630] [ 27.695763] The buggy address belongs to the object at ffff88810439e280 [ 27.695763] which belongs to the cache kmalloc-64 of size 64 [ 27.696390] The buggy address is located 0 bytes to the right of [ 27.696390] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.696884] [ 27.696956] The buggy address belongs to the physical page: [ 27.697211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.697833] flags: 0x200000000000000(node=0|zone=2) [ 27.698040] page_type: f5(slab) [ 27.698209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.698543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.698790] page dumped because: kasan: bad access detected [ 27.699022] [ 27.699114] Memory state around the buggy address: [ 27.699296] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.699510] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.699732] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.700439] ^ [ 27.700780] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.701175] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.701683] ================================================================== [ 28.387325] ================================================================== [ 28.388128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 28.389197] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.389664] [ 28.389919] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.389973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.389988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.390021] Call Trace: [ 28.390039] <TASK> [ 28.390058] dump_stack_lvl+0x73/0xb0 [ 28.390101] print_report+0xd1/0x610 [ 28.390127] ? __virt_addr_valid+0x1db/0x2d0 [ 28.390154] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.390177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.390204] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.390228] kasan_report+0x141/0x180 [ 28.390252] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.390279] __asan_report_load4_noabort+0x18/0x20 [ 28.390304] kasan_atomics_helper+0x49ce/0x5450 [ 28.390328] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.390352] ? ret_from_fork_asm+0x1a/0x30 [ 28.390381] kasan_atomics+0x1dc/0x310 [ 28.390405] ? __pfx_kasan_atomics+0x10/0x10 [ 28.390430] ? __pfx_read_tsc+0x10/0x10 [ 28.390454] ? ktime_get_ts64+0x86/0x230 [ 28.390480] kunit_try_run_case+0x1a5/0x480 [ 28.390517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.390538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.390564] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.390589] ? __kthread_parkme+0x82/0x180 [ 28.390611] ? preempt_count_sub+0x50/0x80 [ 28.390636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.390659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.390686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.390722] kthread+0x337/0x6f0 [ 28.390743] ? trace_preempt_on+0x20/0xc0 [ 28.390768] ? __pfx_kthread+0x10/0x10 [ 28.390790] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.390813] ? calculate_sigpending+0x7b/0xa0 [ 28.390838] ? __pfx_kthread+0x10/0x10 [ 28.390860] ret_from_fork+0x116/0x1d0 [ 28.390882] ? __pfx_kthread+0x10/0x10 [ 28.390903] ret_from_fork_asm+0x1a/0x30 [ 28.390937] </TASK> [ 28.390949] [ 28.402320] Allocated by task 313: [ 28.402445] kasan_save_stack+0x45/0x70 [ 28.402828] kasan_save_track+0x18/0x40 [ 28.403185] kasan_save_alloc_info+0x3b/0x50 [ 28.403608] __kasan_kmalloc+0xb7/0xc0 [ 28.403973] __kmalloc_cache_noprof+0x189/0x420 [ 28.404385] kasan_atomics+0x95/0x310 [ 28.404739] kunit_try_run_case+0x1a5/0x480 [ 28.405135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.405509] kthread+0x337/0x6f0 [ 28.405751] ret_from_fork+0x116/0x1d0 [ 28.406002] ret_from_fork_asm+0x1a/0x30 [ 28.406249] [ 28.406318] The buggy address belongs to the object at ffff88810439e280 [ 28.406318] which belongs to the cache kmalloc-64 of size 64 [ 28.406935] The buggy address is located 0 bytes to the right of [ 28.406935] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.407514] [ 28.407584] The buggy address belongs to the physical page: [ 28.408052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.408297] flags: 0x200000000000000(node=0|zone=2) [ 28.408460] page_type: f5(slab) [ 28.408615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.409135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.409361] page dumped because: kasan: bad access detected [ 28.409639] [ 28.409817] Memory state around the buggy address: [ 28.410268] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.410936] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.411625] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.412089] ^ [ 28.412249] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.412473] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.413107] ================================================================== [ 28.823885] ================================================================== [ 28.824207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 28.824467] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.824816] [ 28.824910] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.824972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.824986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.825009] Call Trace: [ 28.825024] <TASK> [ 28.825040] dump_stack_lvl+0x73/0xb0 [ 28.825068] print_report+0xd1/0x610 [ 28.825094] ? __virt_addr_valid+0x1db/0x2d0 [ 28.825119] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.825142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.825170] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.825193] kasan_report+0x141/0x180 [ 28.825216] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.825244] kasan_check_range+0x10c/0x1c0 [ 28.825270] __kasan_check_write+0x18/0x20 [ 28.825294] kasan_atomics_helper+0x1e12/0x5450 [ 28.825319] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.825342] ? ret_from_fork_asm+0x1a/0x30 [ 28.825371] kasan_atomics+0x1dc/0x310 [ 28.825396] ? __pfx_kasan_atomics+0x10/0x10 [ 28.825421] ? __pfx_read_tsc+0x10/0x10 [ 28.825445] ? ktime_get_ts64+0x86/0x230 [ 28.825470] kunit_try_run_case+0x1a5/0x480 [ 28.825503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.825526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.825551] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.825576] ? __kthread_parkme+0x82/0x180 [ 28.825599] ? preempt_count_sub+0x50/0x80 [ 28.825624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.825647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.825674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.825711] kthread+0x337/0x6f0 [ 28.825733] ? trace_preempt_on+0x20/0xc0 [ 28.825757] ? __pfx_kthread+0x10/0x10 [ 28.825780] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.825802] ? calculate_sigpending+0x7b/0xa0 [ 28.825827] ? __pfx_kthread+0x10/0x10 [ 28.825850] ret_from_fork+0x116/0x1d0 [ 28.825872] ? __pfx_kthread+0x10/0x10 [ 28.825894] ret_from_fork_asm+0x1a/0x30 [ 28.825926] </TASK> [ 28.825939] [ 28.832928] Allocated by task 313: [ 28.833104] kasan_save_stack+0x45/0x70 [ 28.833298] kasan_save_track+0x18/0x40 [ 28.833431] kasan_save_alloc_info+0x3b/0x50 [ 28.833675] __kasan_kmalloc+0xb7/0xc0 [ 28.833939] __kmalloc_cache_noprof+0x189/0x420 [ 28.834091] kasan_atomics+0x95/0x310 [ 28.834219] kunit_try_run_case+0x1a5/0x480 [ 28.834360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.834534] kthread+0x337/0x6f0 [ 28.834652] ret_from_fork+0x116/0x1d0 [ 28.834792] ret_from_fork_asm+0x1a/0x30 [ 28.834930] [ 28.834995] The buggy address belongs to the object at ffff88810439e280 [ 28.834995] which belongs to the cache kmalloc-64 of size 64 [ 28.835404] The buggy address is located 0 bytes to the right of [ 28.835404] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.835965] [ 28.836059] The buggy address belongs to the physical page: [ 28.836305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.836656] flags: 0x200000000000000(node=0|zone=2) [ 28.836967] page_type: f5(slab) [ 28.837132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.837709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.838026] page dumped because: kasan: bad access detected [ 28.838194] [ 28.838261] Memory state around the buggy address: [ 28.838411] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.838982] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.839299] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.839798] ^ [ 28.840025] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.840327] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.841020] ================================================================== [ 28.122326] ================================================================== [ 28.123298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 28.123949] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.124272] [ 28.124377] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.124428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.124443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.124468] Call Trace: [ 28.124485] <TASK> [ 28.124878] dump_stack_lvl+0x73/0xb0 [ 28.124913] print_report+0xd1/0x610 [ 28.124940] ? __virt_addr_valid+0x1db/0x2d0 [ 28.125005] ? kasan_atomics_helper+0xf10/0x5450 [ 28.125028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.125056] ? kasan_atomics_helper+0xf10/0x5450 [ 28.125079] kasan_report+0x141/0x180 [ 28.125104] ? kasan_atomics_helper+0xf10/0x5450 [ 28.125132] kasan_check_range+0x10c/0x1c0 [ 28.125158] __kasan_check_write+0x18/0x20 [ 28.125182] kasan_atomics_helper+0xf10/0x5450 [ 28.125207] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.125230] ? ret_from_fork_asm+0x1a/0x30 [ 28.125259] kasan_atomics+0x1dc/0x310 [ 28.125284] ? __pfx_kasan_atomics+0x10/0x10 [ 28.125310] ? __pfx_read_tsc+0x10/0x10 [ 28.125334] ? ktime_get_ts64+0x86/0x230 [ 28.125359] kunit_try_run_case+0x1a5/0x480 [ 28.125383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.125405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.125431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.125456] ? __kthread_parkme+0x82/0x180 [ 28.125479] ? preempt_count_sub+0x50/0x80 [ 28.125517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.125541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.125567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.125593] kthread+0x337/0x6f0 [ 28.125615] ? trace_preempt_on+0x20/0xc0 [ 28.125639] ? __pfx_kthread+0x10/0x10 [ 28.125662] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.125685] ? calculate_sigpending+0x7b/0xa0 [ 28.125722] ? __pfx_kthread+0x10/0x10 [ 28.125745] ret_from_fork+0x116/0x1d0 [ 28.125767] ? __pfx_kthread+0x10/0x10 [ 28.125866] ret_from_fork_asm+0x1a/0x30 [ 28.125899] </TASK> [ 28.125913] [ 28.138651] Allocated by task 313: [ 28.138860] kasan_save_stack+0x45/0x70 [ 28.139222] kasan_save_track+0x18/0x40 [ 28.139401] kasan_save_alloc_info+0x3b/0x50 [ 28.139947] __kasan_kmalloc+0xb7/0xc0 [ 28.140208] __kmalloc_cache_noprof+0x189/0x420 [ 28.140673] kasan_atomics+0x95/0x310 [ 28.141041] kunit_try_run_case+0x1a5/0x480 [ 28.141242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.141469] kthread+0x337/0x6f0 [ 28.141931] ret_from_fork+0x116/0x1d0 [ 28.142264] ret_from_fork_asm+0x1a/0x30 [ 28.142663] [ 28.142917] The buggy address belongs to the object at ffff88810439e280 [ 28.142917] which belongs to the cache kmalloc-64 of size 64 [ 28.143596] The buggy address is located 0 bytes to the right of [ 28.143596] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.144571] [ 28.144815] The buggy address belongs to the physical page: [ 28.145284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.145743] flags: 0x200000000000000(node=0|zone=2) [ 28.145980] page_type: f5(slab) [ 28.146135] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.146441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.147544] page dumped because: kasan: bad access detected [ 28.148015] [ 28.148118] Memory state around the buggy address: [ 28.148330] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.148741] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.149565] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.150302] ^ [ 28.150661] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.151153] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.151455] ================================================================== [ 27.791565] ================================================================== [ 27.792340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 27.792966] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.793299] [ 27.793419] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.793471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.793486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.793788] Call Trace: [ 27.793811] <TASK> [ 27.793831] dump_stack_lvl+0x73/0xb0 [ 27.793865] print_report+0xd1/0x610 [ 27.793891] ? __virt_addr_valid+0x1db/0x2d0 [ 27.793917] ? kasan_atomics_helper+0x697/0x5450 [ 27.793939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.793967] ? kasan_atomics_helper+0x697/0x5450 [ 27.793990] kasan_report+0x141/0x180 [ 27.794014] ? kasan_atomics_helper+0x697/0x5450 [ 27.794040] kasan_check_range+0x10c/0x1c0 [ 27.794066] __kasan_check_write+0x18/0x20 [ 27.794090] kasan_atomics_helper+0x697/0x5450 [ 27.794114] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.794137] ? ret_from_fork_asm+0x1a/0x30 [ 27.794166] kasan_atomics+0x1dc/0x310 [ 27.794191] ? __pfx_kasan_atomics+0x10/0x10 [ 27.794215] ? __pfx_read_tsc+0x10/0x10 [ 27.794240] ? ktime_get_ts64+0x86/0x230 [ 27.794266] kunit_try_run_case+0x1a5/0x480 [ 27.794290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.794312] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.794337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.794362] ? __kthread_parkme+0x82/0x180 [ 27.794385] ? preempt_count_sub+0x50/0x80 [ 27.794409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.794433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.794459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.794486] kthread+0x337/0x6f0 [ 27.794717] ? trace_preempt_on+0x20/0xc0 [ 27.794743] ? __pfx_kthread+0x10/0x10 [ 27.794766] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.794841] ? calculate_sigpending+0x7b/0xa0 [ 27.794868] ? __pfx_kthread+0x10/0x10 [ 27.794892] ret_from_fork+0x116/0x1d0 [ 27.794914] ? __pfx_kthread+0x10/0x10 [ 27.794937] ret_from_fork_asm+0x1a/0x30 [ 27.794970] </TASK> [ 27.794984] [ 27.808621] Allocated by task 313: [ 27.808831] kasan_save_stack+0x45/0x70 [ 27.809207] kasan_save_track+0x18/0x40 [ 27.809548] kasan_save_alloc_info+0x3b/0x50 [ 27.810021] __kasan_kmalloc+0xb7/0xc0 [ 27.810427] __kmalloc_cache_noprof+0x189/0x420 [ 27.810784] kasan_atomics+0x95/0x310 [ 27.810946] kunit_try_run_case+0x1a5/0x480 [ 27.811094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.811269] kthread+0x337/0x6f0 [ 27.811389] ret_from_fork+0x116/0x1d0 [ 27.811673] ret_from_fork_asm+0x1a/0x30 [ 27.812134] [ 27.812299] The buggy address belongs to the object at ffff88810439e280 [ 27.812299] which belongs to the cache kmalloc-64 of size 64 [ 27.813602] The buggy address is located 0 bytes to the right of [ 27.813602] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.815107] [ 27.815281] The buggy address belongs to the physical page: [ 27.815823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.816335] flags: 0x200000000000000(node=0|zone=2) [ 27.816548] page_type: f5(slab) [ 27.816919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.817585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.818373] page dumped because: kasan: bad access detected [ 27.818693] [ 27.819050] Memory state around the buggy address: [ 27.819310] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.819557] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.820224] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.821045] ^ [ 27.821509] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.821859] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.822522] ================================================================== [ 27.993347] ================================================================== [ 27.993775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 27.994094] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.994401] [ 27.994498] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.994546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.994560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.994582] Call Trace: [ 27.994598] <TASK> [ 27.994615] dump_stack_lvl+0x73/0xb0 [ 27.994641] print_report+0xd1/0x610 [ 27.994665] ? __virt_addr_valid+0x1db/0x2d0 [ 27.994690] ? kasan_atomics_helper+0xc70/0x5450 [ 27.994723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.994750] ? kasan_atomics_helper+0xc70/0x5450 [ 27.994772] kasan_report+0x141/0x180 [ 27.994796] ? kasan_atomics_helper+0xc70/0x5450 [ 27.994823] kasan_check_range+0x10c/0x1c0 [ 27.994848] __kasan_check_write+0x18/0x20 [ 27.994872] kasan_atomics_helper+0xc70/0x5450 [ 27.994896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.994970] ? ret_from_fork_asm+0x1a/0x30 [ 27.995002] kasan_atomics+0x1dc/0x310 [ 27.995027] ? __pfx_kasan_atomics+0x10/0x10 [ 27.995052] ? __pfx_read_tsc+0x10/0x10 [ 27.995077] ? ktime_get_ts64+0x86/0x230 [ 27.995103] kunit_try_run_case+0x1a5/0x480 [ 27.995126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.995147] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.995172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.995197] ? __kthread_parkme+0x82/0x180 [ 27.995219] ? preempt_count_sub+0x50/0x80 [ 27.995243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.995266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.995293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.995318] kthread+0x337/0x6f0 [ 27.995339] ? trace_preempt_on+0x20/0xc0 [ 27.995363] ? __pfx_kthread+0x10/0x10 [ 27.995385] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.995407] ? calculate_sigpending+0x7b/0xa0 [ 27.995432] ? __pfx_kthread+0x10/0x10 [ 27.995456] ret_from_fork+0x116/0x1d0 [ 27.995477] ? __pfx_kthread+0x10/0x10 [ 27.995500] ret_from_fork_asm+0x1a/0x30 [ 27.995532] </TASK> [ 27.995546] [ 28.003379] Allocated by task 313: [ 28.003509] kasan_save_stack+0x45/0x70 [ 28.003653] kasan_save_track+0x18/0x40 [ 28.003800] kasan_save_alloc_info+0x3b/0x50 [ 28.003954] __kasan_kmalloc+0xb7/0xc0 [ 28.004085] __kmalloc_cache_noprof+0x189/0x420 [ 28.004545] kasan_atomics+0x95/0x310 [ 28.004753] kunit_try_run_case+0x1a5/0x480 [ 28.004978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.005236] kthread+0x337/0x6f0 [ 28.005404] ret_from_fork+0x116/0x1d0 [ 28.005801] ret_from_fork_asm+0x1a/0x30 [ 28.006015] [ 28.006111] The buggy address belongs to the object at ffff88810439e280 [ 28.006111] which belongs to the cache kmalloc-64 of size 64 [ 28.006622] The buggy address is located 0 bytes to the right of [ 28.006622] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.007004] [ 28.007123] The buggy address belongs to the physical page: [ 28.007388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.007756] flags: 0x200000000000000(node=0|zone=2) [ 28.007999] page_type: f5(slab) [ 28.008360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.008803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.009099] page dumped because: kasan: bad access detected [ 28.009383] [ 28.009453] Memory state around the buggy address: [ 28.009607] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.009918] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.010236] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.010523] ^ [ 28.010677] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.010902] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.011114] ================================================================== [ 28.257409] ================================================================== [ 28.258046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 28.258359] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.258890] [ 28.258989] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.259039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.259054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.259260] Call Trace: [ 28.259278] <TASK> [ 28.259296] dump_stack_lvl+0x73/0xb0 [ 28.259328] print_report+0xd1/0x610 [ 28.259353] ? __virt_addr_valid+0x1db/0x2d0 [ 28.259379] ? kasan_atomics_helper+0x1148/0x5450 [ 28.259402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.259430] ? kasan_atomics_helper+0x1148/0x5450 [ 28.259453] kasan_report+0x141/0x180 [ 28.259476] ? kasan_atomics_helper+0x1148/0x5450 [ 28.259514] kasan_check_range+0x10c/0x1c0 [ 28.259541] __kasan_check_write+0x18/0x20 [ 28.259565] kasan_atomics_helper+0x1148/0x5450 [ 28.259589] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.259613] ? ret_from_fork_asm+0x1a/0x30 [ 28.259642] kasan_atomics+0x1dc/0x310 [ 28.259667] ? __pfx_kasan_atomics+0x10/0x10 [ 28.259692] ? __pfx_read_tsc+0x10/0x10 [ 28.259730] ? ktime_get_ts64+0x86/0x230 [ 28.259757] kunit_try_run_case+0x1a5/0x480 [ 28.259780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.259802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.259827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.259858] ? __kthread_parkme+0x82/0x180 [ 28.259880] ? preempt_count_sub+0x50/0x80 [ 28.259905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.259928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.259955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.259984] kthread+0x337/0x6f0 [ 28.260011] ? trace_preempt_on+0x20/0xc0 [ 28.260035] ? __pfx_kthread+0x10/0x10 [ 28.260057] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.260080] ? calculate_sigpending+0x7b/0xa0 [ 28.260106] ? __pfx_kthread+0x10/0x10 [ 28.260128] ret_from_fork+0x116/0x1d0 [ 28.260149] ? __pfx_kthread+0x10/0x10 [ 28.260173] ret_from_fork_asm+0x1a/0x30 [ 28.260205] </TASK> [ 28.260218] [ 28.269932] Allocated by task 313: [ 28.270106] kasan_save_stack+0x45/0x70 [ 28.270299] kasan_save_track+0x18/0x40 [ 28.270461] kasan_save_alloc_info+0x3b/0x50 [ 28.271071] __kasan_kmalloc+0xb7/0xc0 [ 28.271256] __kmalloc_cache_noprof+0x189/0x420 [ 28.271435] kasan_atomics+0x95/0x310 [ 28.271816] kunit_try_run_case+0x1a5/0x480 [ 28.272119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.272429] kthread+0x337/0x6f0 [ 28.272586] ret_from_fork+0x116/0x1d0 [ 28.272924] ret_from_fork_asm+0x1a/0x30 [ 28.273119] [ 28.273350] The buggy address belongs to the object at ffff88810439e280 [ 28.273350] which belongs to the cache kmalloc-64 of size 64 [ 28.274069] The buggy address is located 0 bytes to the right of [ 28.274069] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.274795] [ 28.274896] The buggy address belongs to the physical page: [ 28.275094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.275439] flags: 0x200000000000000(node=0|zone=2) [ 28.275953] page_type: f5(slab) [ 28.276207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.276653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.277097] page dumped because: kasan: bad access detected [ 28.277406] [ 28.277483] Memory state around the buggy address: [ 28.277942] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.278317] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.278783] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.279185] ^ [ 28.279470] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.279855] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.280209] ================================================================== [ 28.470215] ================================================================== [ 28.470596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 28.470838] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.471060] [ 28.471229] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.471277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.471293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.471317] Call Trace: [ 28.471333] <TASK> [ 28.471348] dump_stack_lvl+0x73/0xb0 [ 28.471377] print_report+0xd1/0x610 [ 28.471402] ? __virt_addr_valid+0x1db/0x2d0 [ 28.471428] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.471451] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.471479] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.471503] kasan_report+0x141/0x180 [ 28.471538] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.471567] __asan_report_store8_noabort+0x1b/0x30 [ 28.471605] kasan_atomics_helper+0x50d4/0x5450 [ 28.471630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.471653] ? ret_from_fork_asm+0x1a/0x30 [ 28.471683] kasan_atomics+0x1dc/0x310 [ 28.471716] ? __pfx_kasan_atomics+0x10/0x10 [ 28.471741] ? __pfx_read_tsc+0x10/0x10 [ 28.471765] ? ktime_get_ts64+0x86/0x230 [ 28.471790] kunit_try_run_case+0x1a5/0x480 [ 28.471814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.471849] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.471874] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.471910] ? __kthread_parkme+0x82/0x180 [ 28.471932] ? preempt_count_sub+0x50/0x80 [ 28.471957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.471981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.472016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.472042] kthread+0x337/0x6f0 [ 28.472074] ? trace_preempt_on+0x20/0xc0 [ 28.472098] ? __pfx_kthread+0x10/0x10 [ 28.472120] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.472142] ? calculate_sigpending+0x7b/0xa0 [ 28.472176] ? __pfx_kthread+0x10/0x10 [ 28.472199] ret_from_fork+0x116/0x1d0 [ 28.472220] ? __pfx_kthread+0x10/0x10 [ 28.472252] ret_from_fork_asm+0x1a/0x30 [ 28.472284] </TASK> [ 28.472297] [ 28.479920] Allocated by task 313: [ 28.480110] kasan_save_stack+0x45/0x70 [ 28.480307] kasan_save_track+0x18/0x40 [ 28.480491] kasan_save_alloc_info+0x3b/0x50 [ 28.480707] __kasan_kmalloc+0xb7/0xc0 [ 28.481001] __kmalloc_cache_noprof+0x189/0x420 [ 28.481157] kasan_atomics+0x95/0x310 [ 28.481289] kunit_try_run_case+0x1a5/0x480 [ 28.481430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.481651] kthread+0x337/0x6f0 [ 28.481860] ret_from_fork+0x116/0x1d0 [ 28.482065] ret_from_fork_asm+0x1a/0x30 [ 28.482298] [ 28.482389] The buggy address belongs to the object at ffff88810439e280 [ 28.482389] which belongs to the cache kmalloc-64 of size 64 [ 28.482979] The buggy address is located 0 bytes to the right of [ 28.482979] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.483526] [ 28.483621] The buggy address belongs to the physical page: [ 28.483868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.484178] flags: 0x200000000000000(node=0|zone=2) [ 28.484409] page_type: f5(slab) [ 28.484615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.484961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.485281] page dumped because: kasan: bad access detected [ 28.485516] [ 28.485635] Memory state around the buggy address: [ 28.485868] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.486171] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.486486] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.486803] ^ [ 28.487004] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.487307] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.487645] ================================================================== [ 27.954449] ================================================================== [ 27.954874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 27.955192] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.956062] [ 27.956184] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.956234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.956248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.956271] Call Trace: [ 27.956288] <TASK> [ 27.956305] dump_stack_lvl+0x73/0xb0 [ 27.956336] print_report+0xd1/0x610 [ 27.956360] ? __virt_addr_valid+0x1db/0x2d0 [ 27.956386] ? kasan_atomics_helper+0xac7/0x5450 [ 27.956408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.956436] ? kasan_atomics_helper+0xac7/0x5450 [ 27.956459] kasan_report+0x141/0x180 [ 27.956482] ? kasan_atomics_helper+0xac7/0x5450 [ 27.956509] kasan_check_range+0x10c/0x1c0 [ 27.956534] __kasan_check_write+0x18/0x20 [ 27.956559] kasan_atomics_helper+0xac7/0x5450 [ 27.956583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.956609] ? ret_from_fork_asm+0x1a/0x30 [ 27.956638] kasan_atomics+0x1dc/0x310 [ 27.956661] ? __pfx_kasan_atomics+0x10/0x10 [ 27.956687] ? __pfx_read_tsc+0x10/0x10 [ 27.956722] ? ktime_get_ts64+0x86/0x230 [ 27.956747] kunit_try_run_case+0x1a5/0x480 [ 27.956770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.956792] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.956818] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.956843] ? __kthread_parkme+0x82/0x180 [ 27.956864] ? preempt_count_sub+0x50/0x80 [ 27.956889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.956912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.956939] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.956965] kthread+0x337/0x6f0 [ 27.956987] ? trace_preempt_on+0x20/0xc0 [ 27.957010] ? __pfx_kthread+0x10/0x10 [ 27.957033] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.957055] ? calculate_sigpending+0x7b/0xa0 [ 27.957080] ? __pfx_kthread+0x10/0x10 [ 27.957104] ret_from_fork+0x116/0x1d0 [ 27.957125] ? __pfx_kthread+0x10/0x10 [ 27.957147] ret_from_fork_asm+0x1a/0x30 [ 27.957179] </TASK> [ 27.957193] [ 27.965180] Allocated by task 313: [ 27.965369] kasan_save_stack+0x45/0x70 [ 27.965581] kasan_save_track+0x18/0x40 [ 27.965960] kasan_save_alloc_info+0x3b/0x50 [ 27.966169] __kasan_kmalloc+0xb7/0xc0 [ 27.966334] __kmalloc_cache_noprof+0x189/0x420 [ 27.966522] kasan_atomics+0x95/0x310 [ 27.966651] kunit_try_run_case+0x1a5/0x480 [ 27.966809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.967066] kthread+0x337/0x6f0 [ 27.967236] ret_from_fork+0x116/0x1d0 [ 27.967425] ret_from_fork_asm+0x1a/0x30 [ 27.967632] [ 27.967711] The buggy address belongs to the object at ffff88810439e280 [ 27.967711] which belongs to the cache kmalloc-64 of size 64 [ 27.968130] The buggy address is located 0 bytes to the right of [ 27.968130] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.968943] [ 27.969095] The buggy address belongs to the physical page: [ 27.969268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.969506] flags: 0x200000000000000(node=0|zone=2) [ 27.969675] page_type: f5(slab) [ 27.970161] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.970519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.970888] page dumped because: kasan: bad access detected [ 27.971057] [ 27.971124] Memory state around the buggy address: [ 27.971464] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.971865] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.972206] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.972487] ^ [ 27.972677] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.973192] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.973434] ================================================================== [ 28.413979] ================================================================== [ 28.414772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 28.415452] Read of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.415908] [ 28.416097] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.416149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.416162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.416196] Call Trace: [ 28.416212] <TASK> [ 28.416229] dump_stack_lvl+0x73/0xb0 [ 28.416258] print_report+0xd1/0x610 [ 28.416292] ? __virt_addr_valid+0x1db/0x2d0 [ 28.416316] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.416350] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.416377] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.416400] kasan_report+0x141/0x180 [ 28.416423] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.416451] kasan_check_range+0x10c/0x1c0 [ 28.416475] __kasan_check_read+0x15/0x20 [ 28.416508] kasan_atomics_helper+0x13b5/0x5450 [ 28.416532] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.416555] ? ret_from_fork_asm+0x1a/0x30 [ 28.416584] kasan_atomics+0x1dc/0x310 [ 28.416608] ? __pfx_kasan_atomics+0x10/0x10 [ 28.416633] ? __pfx_read_tsc+0x10/0x10 [ 28.416658] ? ktime_get_ts64+0x86/0x230 [ 28.416684] kunit_try_run_case+0x1a5/0x480 [ 28.416716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.416738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.416763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.416787] ? __kthread_parkme+0x82/0x180 [ 28.416809] ? preempt_count_sub+0x50/0x80 [ 28.416833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.416856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.416883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.416909] kthread+0x337/0x6f0 [ 28.416929] ? trace_preempt_on+0x20/0xc0 [ 28.416953] ? __pfx_kthread+0x10/0x10 [ 28.416975] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.416997] ? calculate_sigpending+0x7b/0xa0 [ 28.417021] ? __pfx_kthread+0x10/0x10 [ 28.417044] ret_from_fork+0x116/0x1d0 [ 28.417065] ? __pfx_kthread+0x10/0x10 [ 28.417088] ret_from_fork_asm+0x1a/0x30 [ 28.417119] </TASK> [ 28.417131] [ 28.425749] Allocated by task 313: [ 28.425926] kasan_save_stack+0x45/0x70 [ 28.426123] kasan_save_track+0x18/0x40 [ 28.426307] kasan_save_alloc_info+0x3b/0x50 [ 28.426535] __kasan_kmalloc+0xb7/0xc0 [ 28.426684] __kmalloc_cache_noprof+0x189/0x420 [ 28.426918] kasan_atomics+0x95/0x310 [ 28.427115] kunit_try_run_case+0x1a5/0x480 [ 28.427298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.427522] kthread+0x337/0x6f0 [ 28.427643] ret_from_fork+0x116/0x1d0 [ 28.427787] ret_from_fork_asm+0x1a/0x30 [ 28.428055] [ 28.428211] The buggy address belongs to the object at ffff88810439e280 [ 28.428211] which belongs to the cache kmalloc-64 of size 64 [ 28.428776] The buggy address is located 0 bytes to the right of [ 28.428776] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.429189] [ 28.429280] The buggy address belongs to the physical page: [ 28.429553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.429902] flags: 0x200000000000000(node=0|zone=2) [ 28.430129] page_type: f5(slab) [ 28.430265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.430634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.430981] page dumped because: kasan: bad access detected [ 28.431178] [ 28.431244] Memory state around the buggy address: [ 28.431396] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.431610] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.432049] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.432362] ^ [ 28.432644] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.432990] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.433201] ================================================================== [ 28.768984] ================================================================== [ 28.769282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 28.769752] Read of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.770235] [ 28.770355] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.770407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.770422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.770445] Call Trace: [ 28.770462] <TASK> [ 28.770481] dump_stack_lvl+0x73/0xb0 [ 28.770526] print_report+0xd1/0x610 [ 28.770551] ? __virt_addr_valid+0x1db/0x2d0 [ 28.770577] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.770621] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.770649] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.770672] kasan_report+0x141/0x180 [ 28.770708] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.770736] __asan_report_load8_noabort+0x18/0x20 [ 28.770762] kasan_atomics_helper+0x4f30/0x5450 [ 28.770786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.770810] ? ret_from_fork_asm+0x1a/0x30 [ 28.770840] kasan_atomics+0x1dc/0x310 [ 28.770863] ? __pfx_kasan_atomics+0x10/0x10 [ 28.770889] ? __pfx_read_tsc+0x10/0x10 [ 28.770913] ? ktime_get_ts64+0x86/0x230 [ 28.770958] kunit_try_run_case+0x1a5/0x480 [ 28.770983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.771005] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.771031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.771057] ? __kthread_parkme+0x82/0x180 [ 28.771081] ? preempt_count_sub+0x50/0x80 [ 28.771106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.771130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.771158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.771203] kthread+0x337/0x6f0 [ 28.771224] ? trace_preempt_on+0x20/0xc0 [ 28.771249] ? __pfx_kthread+0x10/0x10 [ 28.771272] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.771295] ? calculate_sigpending+0x7b/0xa0 [ 28.771321] ? __pfx_kthread+0x10/0x10 [ 28.771345] ret_from_fork+0x116/0x1d0 [ 28.771384] ? __pfx_kthread+0x10/0x10 [ 28.771407] ret_from_fork_asm+0x1a/0x30 [ 28.771439] </TASK> [ 28.771453] [ 28.779110] Allocated by task 313: [ 28.779267] kasan_save_stack+0x45/0x70 [ 28.779472] kasan_save_track+0x18/0x40 [ 28.779653] kasan_save_alloc_info+0x3b/0x50 [ 28.779885] __kasan_kmalloc+0xb7/0xc0 [ 28.780087] __kmalloc_cache_noprof+0x189/0x420 [ 28.780293] kasan_atomics+0x95/0x310 [ 28.780462] kunit_try_run_case+0x1a5/0x480 [ 28.780665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.781008] kthread+0x337/0x6f0 [ 28.781183] ret_from_fork+0x116/0x1d0 [ 28.781405] ret_from_fork_asm+0x1a/0x30 [ 28.781765] [ 28.781921] The buggy address belongs to the object at ffff88810439e280 [ 28.781921] which belongs to the cache kmalloc-64 of size 64 [ 28.782290] The buggy address is located 0 bytes to the right of [ 28.782290] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.783140] [ 28.783234] The buggy address belongs to the physical page: [ 28.783493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.783850] flags: 0x200000000000000(node=0|zone=2) [ 28.784043] page_type: f5(slab) [ 28.784228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.784610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.784928] page dumped because: kasan: bad access detected [ 28.785124] [ 28.785231] Memory state around the buggy address: [ 28.785457] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.785835] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.786160] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.786371] ^ [ 28.786611] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.786937] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.787264] ================================================================== [ 28.182088] ================================================================== [ 28.182407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 28.183534] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.184100] [ 28.184327] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.184383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.184492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.184537] Call Trace: [ 28.184554] <TASK> [ 28.184572] dump_stack_lvl+0x73/0xb0 [ 28.184603] print_report+0xd1/0x610 [ 28.184664] ? __virt_addr_valid+0x1db/0x2d0 [ 28.184692] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.184728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.184757] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.184858] kasan_report+0x141/0x180 [ 28.184887] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.184915] __asan_report_load4_noabort+0x18/0x20 [ 28.184941] kasan_atomics_helper+0x4a36/0x5450 [ 28.184965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.184989] ? ret_from_fork_asm+0x1a/0x30 [ 28.185018] kasan_atomics+0x1dc/0x310 [ 28.185042] ? __pfx_kasan_atomics+0x10/0x10 [ 28.185068] ? __pfx_read_tsc+0x10/0x10 [ 28.185092] ? ktime_get_ts64+0x86/0x230 [ 28.185118] kunit_try_run_case+0x1a5/0x480 [ 28.185141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.185163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.185188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.185214] ? __kthread_parkme+0x82/0x180 [ 28.185236] ? preempt_count_sub+0x50/0x80 [ 28.185261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.185284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.185311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.185338] kthread+0x337/0x6f0 [ 28.185359] ? trace_preempt_on+0x20/0xc0 [ 28.185383] ? __pfx_kthread+0x10/0x10 [ 28.185406] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.185429] ? calculate_sigpending+0x7b/0xa0 [ 28.185455] ? __pfx_kthread+0x10/0x10 [ 28.185478] ret_from_fork+0x116/0x1d0 [ 28.185500] ? __pfx_kthread+0x10/0x10 [ 28.185523] ret_from_fork_asm+0x1a/0x30 [ 28.185554] </TASK> [ 28.185567] [ 28.198348] Allocated by task 313: [ 28.198829] kasan_save_stack+0x45/0x70 [ 28.199053] kasan_save_track+0x18/0x40 [ 28.199334] kasan_save_alloc_info+0x3b/0x50 [ 28.199689] __kasan_kmalloc+0xb7/0xc0 [ 28.199852] __kmalloc_cache_noprof+0x189/0x420 [ 28.200079] kasan_atomics+0x95/0x310 [ 28.200211] kunit_try_run_case+0x1a5/0x480 [ 28.200353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.200529] kthread+0x337/0x6f0 [ 28.200648] ret_from_fork+0x116/0x1d0 [ 28.200792] ret_from_fork_asm+0x1a/0x30 [ 28.200932] [ 28.201001] The buggy address belongs to the object at ffff88810439e280 [ 28.201001] which belongs to the cache kmalloc-64 of size 64 [ 28.201908] The buggy address is located 0 bytes to the right of [ 28.201908] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.202472] [ 28.202722] The buggy address belongs to the physical page: [ 28.203406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.204088] flags: 0x200000000000000(node=0|zone=2) [ 28.204509] page_type: f5(slab) [ 28.204825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.205389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.205964] page dumped because: kasan: bad access detected [ 28.206218] [ 28.206306] Memory state around the buggy address: [ 28.206726] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.207376] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.208056] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.208504] ^ [ 28.208850] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.209290] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.209818] ================================================================== [ 28.040025] ================================================================== [ 28.040305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 28.040623] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.040956] [ 28.041038] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.041100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.041114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.041138] Call Trace: [ 28.041156] <TASK> [ 28.041174] dump_stack_lvl+0x73/0xb0 [ 28.041202] print_report+0xd1/0x610 [ 28.041226] ? __virt_addr_valid+0x1db/0x2d0 [ 28.041252] ? kasan_atomics_helper+0xd47/0x5450 [ 28.041275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.041302] ? kasan_atomics_helper+0xd47/0x5450 [ 28.041325] kasan_report+0x141/0x180 [ 28.041349] ? kasan_atomics_helper+0xd47/0x5450 [ 28.041376] kasan_check_range+0x10c/0x1c0 [ 28.041401] __kasan_check_write+0x18/0x20 [ 28.041425] kasan_atomics_helper+0xd47/0x5450 [ 28.041449] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.041473] ? ret_from_fork_asm+0x1a/0x30 [ 28.041503] kasan_atomics+0x1dc/0x310 [ 28.041527] ? __pfx_kasan_atomics+0x10/0x10 [ 28.041567] ? __pfx_read_tsc+0x10/0x10 [ 28.041591] ? ktime_get_ts64+0x86/0x230 [ 28.041615] kunit_try_run_case+0x1a5/0x480 [ 28.041639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.041660] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.041685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.041722] ? __kthread_parkme+0x82/0x180 [ 28.041745] ? preempt_count_sub+0x50/0x80 [ 28.041769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.041804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.041832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.041858] kthread+0x337/0x6f0 [ 28.041880] ? trace_preempt_on+0x20/0xc0 [ 28.041905] ? __pfx_kthread+0x10/0x10 [ 28.041927] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.041950] ? calculate_sigpending+0x7b/0xa0 [ 28.041976] ? __pfx_kthread+0x10/0x10 [ 28.042000] ret_from_fork+0x116/0x1d0 [ 28.042021] ? __pfx_kthread+0x10/0x10 [ 28.042043] ret_from_fork_asm+0x1a/0x30 [ 28.042075] </TASK> [ 28.042088] [ 28.051823] Allocated by task 313: [ 28.052422] kasan_save_stack+0x45/0x70 [ 28.052770] kasan_save_track+0x18/0x40 [ 28.053213] kasan_save_alloc_info+0x3b/0x50 [ 28.053572] __kasan_kmalloc+0xb7/0xc0 [ 28.053990] __kmalloc_cache_noprof+0x189/0x420 [ 28.054274] kasan_atomics+0x95/0x310 [ 28.054461] kunit_try_run_case+0x1a5/0x480 [ 28.054960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.055228] kthread+0x337/0x6f0 [ 28.055389] ret_from_fork+0x116/0x1d0 [ 28.055974] ret_from_fork_asm+0x1a/0x30 [ 28.056241] [ 28.056457] The buggy address belongs to the object at ffff88810439e280 [ 28.056457] which belongs to the cache kmalloc-64 of size 64 [ 28.057313] The buggy address is located 0 bytes to the right of [ 28.057313] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.058317] [ 28.058572] The buggy address belongs to the physical page: [ 28.059006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.059343] flags: 0x200000000000000(node=0|zone=2) [ 28.059761] page_type: f5(slab) [ 28.060246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.060713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.061380] page dumped because: kasan: bad access detected [ 28.061979] [ 28.062219] Memory state around the buggy address: [ 28.062440] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.063182] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.063628] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.064240] ^ [ 28.064494] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.065123] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.065419] ================================================================== [ 27.897356] ================================================================== [ 27.897670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 27.898204] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.898500] [ 27.898613] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.898663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.898677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.898712] Call Trace: [ 27.898727] <TASK> [ 27.898744] dump_stack_lvl+0x73/0xb0 [ 27.898773] print_report+0xd1/0x610 [ 27.898797] ? __virt_addr_valid+0x1db/0x2d0 [ 27.898822] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.898844] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.898872] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.898895] kasan_report+0x141/0x180 [ 27.898918] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.898946] kasan_check_range+0x10c/0x1c0 [ 27.898971] __kasan_check_write+0x18/0x20 [ 27.898995] kasan_atomics_helper+0x8f9/0x5450 [ 27.899020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.899043] ? ret_from_fork_asm+0x1a/0x30 [ 27.899072] kasan_atomics+0x1dc/0x310 [ 27.899096] ? __pfx_kasan_atomics+0x10/0x10 [ 27.899120] ? __pfx_read_tsc+0x10/0x10 [ 27.899145] ? ktime_get_ts64+0x86/0x230 [ 27.899170] kunit_try_run_case+0x1a5/0x480 [ 27.899193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.899217] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.899242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.899268] ? __kthread_parkme+0x82/0x180 [ 27.899289] ? preempt_count_sub+0x50/0x80 [ 27.899314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.899336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.899364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.899391] kthread+0x337/0x6f0 [ 27.899412] ? trace_preempt_on+0x20/0xc0 [ 27.899435] ? __pfx_kthread+0x10/0x10 [ 27.899458] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.899480] ? calculate_sigpending+0x7b/0xa0 [ 27.899570] ? __pfx_kthread+0x10/0x10 [ 27.899594] ret_from_fork+0x116/0x1d0 [ 27.899615] ? __pfx_kthread+0x10/0x10 [ 27.899638] ret_from_fork_asm+0x1a/0x30 [ 27.899669] </TASK> [ 27.899682] [ 27.908182] Allocated by task 313: [ 27.908355] kasan_save_stack+0x45/0x70 [ 27.908560] kasan_save_track+0x18/0x40 [ 27.908695] kasan_save_alloc_info+0x3b/0x50 [ 27.909123] __kasan_kmalloc+0xb7/0xc0 [ 27.909276] __kmalloc_cache_noprof+0x189/0x420 [ 27.909508] kasan_atomics+0x95/0x310 [ 27.909665] kunit_try_run_case+0x1a5/0x480 [ 27.909917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.910134] kthread+0x337/0x6f0 [ 27.910254] ret_from_fork+0x116/0x1d0 [ 27.910441] ret_from_fork_asm+0x1a/0x30 [ 27.910767] [ 27.910872] The buggy address belongs to the object at ffff88810439e280 [ 27.910872] which belongs to the cache kmalloc-64 of size 64 [ 27.911310] The buggy address is located 0 bytes to the right of [ 27.911310] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.911798] [ 27.912091] The buggy address belongs to the physical page: [ 27.912366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.912680] flags: 0x200000000000000(node=0|zone=2) [ 27.912859] page_type: f5(slab) [ 27.912981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.913211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.913547] page dumped because: kasan: bad access detected [ 27.913805] [ 27.913926] Memory state around the buggy address: [ 27.914229] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.914484] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.914872] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.915169] ^ [ 27.915361] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.915640] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.916262] ================================================================== [ 28.741898] ================================================================== [ 28.743137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 28.743389] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.744270] [ 28.744606] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.744664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.744680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.744713] Call Trace: [ 28.744731] <TASK> [ 28.744749] dump_stack_lvl+0x73/0xb0 [ 28.744781] print_report+0xd1/0x610 [ 28.744809] ? __virt_addr_valid+0x1db/0x2d0 [ 28.744837] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.744989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.745033] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.745058] kasan_report+0x141/0x180 [ 28.745083] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.745145] kasan_check_range+0x10c/0x1c0 [ 28.745173] __kasan_check_write+0x18/0x20 [ 28.745197] kasan_atomics_helper+0x1c18/0x5450 [ 28.745222] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.745246] ? ret_from_fork_asm+0x1a/0x30 [ 28.745276] kasan_atomics+0x1dc/0x310 [ 28.745301] ? __pfx_kasan_atomics+0x10/0x10 [ 28.745326] ? __pfx_read_tsc+0x10/0x10 [ 28.745351] ? ktime_get_ts64+0x86/0x230 [ 28.745378] kunit_try_run_case+0x1a5/0x480 [ 28.745401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.745424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.745451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.745476] ? __kthread_parkme+0x82/0x180 [ 28.745513] ? preempt_count_sub+0x50/0x80 [ 28.745538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.745562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.745589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.745616] kthread+0x337/0x6f0 [ 28.745638] ? trace_preempt_on+0x20/0xc0 [ 28.745662] ? __pfx_kthread+0x10/0x10 [ 28.745686] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.745720] ? calculate_sigpending+0x7b/0xa0 [ 28.745745] ? __pfx_kthread+0x10/0x10 [ 28.745767] ret_from_fork+0x116/0x1d0 [ 28.745789] ? __pfx_kthread+0x10/0x10 [ 28.745811] ret_from_fork_asm+0x1a/0x30 [ 28.745843] </TASK> [ 28.745857] [ 28.758647] Allocated by task 313: [ 28.758796] kasan_save_stack+0x45/0x70 [ 28.759111] kasan_save_track+0x18/0x40 [ 28.759307] kasan_save_alloc_info+0x3b/0x50 [ 28.759475] __kasan_kmalloc+0xb7/0xc0 [ 28.759714] __kmalloc_cache_noprof+0x189/0x420 [ 28.759919] kasan_atomics+0x95/0x310 [ 28.760137] kunit_try_run_case+0x1a5/0x480 [ 28.760371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.760670] kthread+0x337/0x6f0 [ 28.760803] ret_from_fork+0x116/0x1d0 [ 28.760937] ret_from_fork_asm+0x1a/0x30 [ 28.761140] [ 28.761278] The buggy address belongs to the object at ffff88810439e280 [ 28.761278] which belongs to the cache kmalloc-64 of size 64 [ 28.762181] The buggy address is located 0 bytes to the right of [ 28.762181] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.763211] [ 28.763296] The buggy address belongs to the physical page: [ 28.763475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.764334] flags: 0x200000000000000(node=0|zone=2) [ 28.764952] page_type: f5(slab) [ 28.765264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.765611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.766269] page dumped because: kasan: bad access detected [ 28.766727] [ 28.766797] Memory state around the buggy address: [ 28.766955] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.767171] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.767387] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.767623] ^ [ 28.767867] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.768177] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.768412] ================================================================== [ 28.861040] ================================================================== [ 28.861321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 28.861825] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.862108] [ 28.862195] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.862243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.862257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.862280] Call Trace: [ 28.862295] <TASK> [ 28.862311] dump_stack_lvl+0x73/0xb0 [ 28.862340] print_report+0xd1/0x610 [ 28.862364] ? __virt_addr_valid+0x1db/0x2d0 [ 28.862389] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.862411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.862439] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.862462] kasan_report+0x141/0x180 [ 28.862486] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.862856] kasan_check_range+0x10c/0x1c0 [ 28.862886] __kasan_check_write+0x18/0x20 [ 28.862913] kasan_atomics_helper+0x1f43/0x5450 [ 28.862939] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.862963] ? ret_from_fork_asm+0x1a/0x30 [ 28.862993] kasan_atomics+0x1dc/0x310 [ 28.863018] ? __pfx_kasan_atomics+0x10/0x10 [ 28.863043] ? __pfx_read_tsc+0x10/0x10 [ 28.863068] ? ktime_get_ts64+0x86/0x230 [ 28.863093] kunit_try_run_case+0x1a5/0x480 [ 28.863116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.863139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.863163] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.863188] ? __kthread_parkme+0x82/0x180 [ 28.863211] ? preempt_count_sub+0x50/0x80 [ 28.863236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.863259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.863286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.863313] kthread+0x337/0x6f0 [ 28.863335] ? trace_preempt_on+0x20/0xc0 [ 28.863360] ? __pfx_kthread+0x10/0x10 [ 28.863383] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.863406] ? calculate_sigpending+0x7b/0xa0 [ 28.863431] ? __pfx_kthread+0x10/0x10 [ 28.863454] ret_from_fork+0x116/0x1d0 [ 28.863476] ? __pfx_kthread+0x10/0x10 [ 28.863512] ret_from_fork_asm+0x1a/0x30 [ 28.863544] </TASK> [ 28.863556] [ 28.871789] Allocated by task 313: [ 28.873280] kasan_save_stack+0x45/0x70 [ 28.873818] kasan_save_track+0x18/0x40 [ 28.874360] kasan_save_alloc_info+0x3b/0x50 [ 28.874844] __kasan_kmalloc+0xb7/0xc0 [ 28.874993] __kmalloc_cache_noprof+0x189/0x420 [ 28.875150] kasan_atomics+0x95/0x310 [ 28.875278] kunit_try_run_case+0x1a5/0x480 [ 28.875421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.875594] kthread+0x337/0x6f0 [ 28.876067] ret_from_fork+0x116/0x1d0 [ 28.876597] ret_from_fork_asm+0x1a/0x30 [ 28.877193] [ 28.877548] The buggy address belongs to the object at ffff88810439e280 [ 28.877548] which belongs to the cache kmalloc-64 of size 64 [ 28.878173] The buggy address is located 0 bytes to the right of [ 28.878173] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.879238] [ 28.879355] The buggy address belongs to the physical page: [ 28.879619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.880011] flags: 0x200000000000000(node=0|zone=2) [ 28.880237] page_type: f5(slab) [ 28.880367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.880690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.881009] page dumped because: kasan: bad access detected [ 28.881179] [ 28.881297] Memory state around the buggy address: [ 28.881551] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.881908] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.882213] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.882554] ^ [ 28.882791] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.883110] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.883397] ================================================================== [ 28.653313] ================================================================== [ 28.653725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 28.654051] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.654355] [ 28.654453] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.654505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.654520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.654787] Call Trace: [ 28.654805] <TASK> [ 28.654823] dump_stack_lvl+0x73/0xb0 [ 28.654950] print_report+0xd1/0x610 [ 28.654976] ? __virt_addr_valid+0x1db/0x2d0 [ 28.655003] ? kasan_atomics_helper+0x194a/0x5450 [ 28.655025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.655054] ? kasan_atomics_helper+0x194a/0x5450 [ 28.655077] kasan_report+0x141/0x180 [ 28.655100] ? kasan_atomics_helper+0x194a/0x5450 [ 28.655128] kasan_check_range+0x10c/0x1c0 [ 28.655153] __kasan_check_write+0x18/0x20 [ 28.655178] kasan_atomics_helper+0x194a/0x5450 [ 28.655202] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.655226] ? ret_from_fork_asm+0x1a/0x30 [ 28.655255] kasan_atomics+0x1dc/0x310 [ 28.655279] ? __pfx_kasan_atomics+0x10/0x10 [ 28.655305] ? __pfx_read_tsc+0x10/0x10 [ 28.655328] ? ktime_get_ts64+0x86/0x230 [ 28.655354] kunit_try_run_case+0x1a5/0x480 [ 28.655378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.655400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.655424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.655450] ? __kthread_parkme+0x82/0x180 [ 28.655473] ? preempt_count_sub+0x50/0x80 [ 28.655512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.655536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.655561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.655588] kthread+0x337/0x6f0 [ 28.655610] ? trace_preempt_on+0x20/0xc0 [ 28.655634] ? __pfx_kthread+0x10/0x10 [ 28.655656] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.655679] ? calculate_sigpending+0x7b/0xa0 [ 28.655714] ? __pfx_kthread+0x10/0x10 [ 28.655738] ret_from_fork+0x116/0x1d0 [ 28.655759] ? __pfx_kthread+0x10/0x10 [ 28.655781] ret_from_fork_asm+0x1a/0x30 [ 28.655813] </TASK> [ 28.655827] [ 28.665144] Allocated by task 313: [ 28.665319] kasan_save_stack+0x45/0x70 [ 28.665672] kasan_save_track+0x18/0x40 [ 28.665881] kasan_save_alloc_info+0x3b/0x50 [ 28.666140] __kasan_kmalloc+0xb7/0xc0 [ 28.666298] __kmalloc_cache_noprof+0x189/0x420 [ 28.666522] kasan_atomics+0x95/0x310 [ 28.666794] kunit_try_run_case+0x1a5/0x480 [ 28.666970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.667215] kthread+0x337/0x6f0 [ 28.667363] ret_from_fork+0x116/0x1d0 [ 28.667535] ret_from_fork_asm+0x1a/0x30 [ 28.668074] [ 28.668171] The buggy address belongs to the object at ffff88810439e280 [ 28.668171] which belongs to the cache kmalloc-64 of size 64 [ 28.668782] The buggy address is located 0 bytes to the right of [ 28.668782] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.669376] [ 28.669586] The buggy address belongs to the physical page: [ 28.669889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.670294] flags: 0x200000000000000(node=0|zone=2) [ 28.670510] page_type: f5(slab) [ 28.670773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.671139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.671548] page dumped because: kasan: bad access detected [ 28.671807] [ 28.671890] Memory state around the buggy address: [ 28.672100] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.672397] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.673018] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.673308] ^ [ 28.673528] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.673961] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.674315] ================================================================== [ 28.631350] ================================================================== [ 28.631957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 28.632264] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.632571] [ 28.632864] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.632918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.632934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.632957] Call Trace: [ 28.632976] <TASK> [ 28.632994] dump_stack_lvl+0x73/0xb0 [ 28.633023] print_report+0xd1/0x610 [ 28.633049] ? __virt_addr_valid+0x1db/0x2d0 [ 28.633074] ? kasan_atomics_helper+0x18b1/0x5450 [ 28.633096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.633124] ? kasan_atomics_helper+0x18b1/0x5450 [ 28.633147] kasan_report+0x141/0x180 [ 28.633172] ? kasan_atomics_helper+0x18b1/0x5450 [ 28.633198] kasan_check_range+0x10c/0x1c0 [ 28.633223] __kasan_check_write+0x18/0x20 [ 28.633248] kasan_atomics_helper+0x18b1/0x5450 [ 28.633271] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.633295] ? ret_from_fork_asm+0x1a/0x30 [ 28.633324] kasan_atomics+0x1dc/0x310 [ 28.633348] ? __pfx_kasan_atomics+0x10/0x10 [ 28.633373] ? __pfx_read_tsc+0x10/0x10 [ 28.633398] ? ktime_get_ts64+0x86/0x230 [ 28.633424] kunit_try_run_case+0x1a5/0x480 [ 28.633448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.633469] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.633650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.633680] ? __kthread_parkme+0x82/0x180 [ 28.633715] ? preempt_count_sub+0x50/0x80 [ 28.633741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.633765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.633792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.633818] kthread+0x337/0x6f0 [ 28.633840] ? trace_preempt_on+0x20/0xc0 [ 28.633863] ? __pfx_kthread+0x10/0x10 [ 28.633886] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.633909] ? calculate_sigpending+0x7b/0xa0 [ 28.633934] ? __pfx_kthread+0x10/0x10 [ 28.633957] ret_from_fork+0x116/0x1d0 [ 28.633979] ? __pfx_kthread+0x10/0x10 [ 28.634001] ret_from_fork_asm+0x1a/0x30 [ 28.634033] </TASK> [ 28.634045] [ 28.643206] Allocated by task 313: [ 28.643365] kasan_save_stack+0x45/0x70 [ 28.643707] kasan_save_track+0x18/0x40 [ 28.644018] kasan_save_alloc_info+0x3b/0x50 [ 28.644215] __kasan_kmalloc+0xb7/0xc0 [ 28.644550] __kmalloc_cache_noprof+0x189/0x420 [ 28.644858] kasan_atomics+0x95/0x310 [ 28.645089] kunit_try_run_case+0x1a5/0x480 [ 28.645286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.645740] kthread+0x337/0x6f0 [ 28.645914] ret_from_fork+0x116/0x1d0 [ 28.646199] ret_from_fork_asm+0x1a/0x30 [ 28.646376] [ 28.646458] The buggy address belongs to the object at ffff88810439e280 [ 28.646458] which belongs to the cache kmalloc-64 of size 64 [ 28.647080] The buggy address is located 0 bytes to the right of [ 28.647080] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.647774] [ 28.647869] The buggy address belongs to the physical page: [ 28.648110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.648598] flags: 0x200000000000000(node=0|zone=2) [ 28.648893] page_type: f5(slab) [ 28.649022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.649432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.649808] page dumped because: kasan: bad access detected [ 28.650161] [ 28.650318] Memory state around the buggy address: [ 28.650739] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.650957] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.651166] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.651369] ^ [ 28.651534] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.651810] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.652127] ================================================================== [ 27.541997] ================================================================== [ 27.542633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 27.543198] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.543489] [ 27.543605] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.543658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.543671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.543695] Call Trace: [ 27.543720] <TASK> [ 27.543740] dump_stack_lvl+0x73/0xb0 [ 27.543773] print_report+0xd1/0x610 [ 27.543797] ? __virt_addr_valid+0x1db/0x2d0 [ 27.543823] ? kasan_atomics_helper+0x4bbc/0x5450 [ 27.543853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.543880] ? kasan_atomics_helper+0x4bbc/0x5450 [ 27.543902] kasan_report+0x141/0x180 [ 27.543924] ? kasan_atomics_helper+0x4bbc/0x5450 [ 27.543951] __asan_report_load4_noabort+0x18/0x20 [ 27.543976] kasan_atomics_helper+0x4bbc/0x5450 [ 27.543999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.544021] ? ret_from_fork_asm+0x1a/0x30 [ 27.544051] kasan_atomics+0x1dc/0x310 [ 27.544074] ? __pfx_kasan_atomics+0x10/0x10 [ 27.544099] ? __pfx_read_tsc+0x10/0x10 [ 27.544190] ? ktime_get_ts64+0x86/0x230 [ 27.544221] kunit_try_run_case+0x1a5/0x480 [ 27.544246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.544266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.544291] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.544314] ? __kthread_parkme+0x82/0x180 [ 27.544336] ? preempt_count_sub+0x50/0x80 [ 27.544361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.544384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.544409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.544434] kthread+0x337/0x6f0 [ 27.544455] ? trace_preempt_on+0x20/0xc0 [ 27.544480] ? __pfx_kthread+0x10/0x10 [ 27.544514] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.544535] ? calculate_sigpending+0x7b/0xa0 [ 27.544562] ? __pfx_kthread+0x10/0x10 [ 27.544584] ret_from_fork+0x116/0x1d0 [ 27.544604] ? __pfx_kthread+0x10/0x10 [ 27.544624] ret_from_fork_asm+0x1a/0x30 [ 27.544655] </TASK> [ 27.544668] [ 27.554883] Allocated by task 313: [ 27.555284] kasan_save_stack+0x45/0x70 [ 27.555485] kasan_save_track+0x18/0x40 [ 27.555853] kasan_save_alloc_info+0x3b/0x50 [ 27.556020] __kasan_kmalloc+0xb7/0xc0 [ 27.556550] __kmalloc_cache_noprof+0x189/0x420 [ 27.556890] kasan_atomics+0x95/0x310 [ 27.557256] kunit_try_run_case+0x1a5/0x480 [ 27.557553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.557930] kthread+0x337/0x6f0 [ 27.558230] ret_from_fork+0x116/0x1d0 [ 27.558423] ret_from_fork_asm+0x1a/0x30 [ 27.558784] [ 27.559003] The buggy address belongs to the object at ffff88810439e280 [ 27.559003] which belongs to the cache kmalloc-64 of size 64 [ 27.559663] The buggy address is located 0 bytes to the right of [ 27.559663] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.560267] [ 27.560361] The buggy address belongs to the physical page: [ 27.560973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.561360] flags: 0x200000000000000(node=0|zone=2) [ 27.561800] page_type: f5(slab) [ 27.562200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.562660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.563173] page dumped because: kasan: bad access detected [ 27.563408] [ 27.563677] Memory state around the buggy address: [ 27.564079] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.564378] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.564923] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.565392] ^ [ 27.565761] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.566260] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.566743] ================================================================== [ 27.632038] ================================================================== [ 27.632641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 27.633445] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.634127] [ 27.634335] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.634463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.634478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.634502] Call Trace: [ 27.634523] <TASK> [ 27.634542] dump_stack_lvl+0x73/0xb0 [ 27.634573] print_report+0xd1/0x610 [ 27.634598] ? __virt_addr_valid+0x1db/0x2d0 [ 27.634625] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.634647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.634675] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.634710] kasan_report+0x141/0x180 [ 27.634734] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.634761] __asan_report_store4_noabort+0x1b/0x30 [ 27.634799] kasan_atomics_helper+0x4b6e/0x5450 [ 27.634823] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.634846] ? ret_from_fork_asm+0x1a/0x30 [ 27.634876] kasan_atomics+0x1dc/0x310 [ 27.634901] ? __pfx_kasan_atomics+0x10/0x10 [ 27.634927] ? __pfx_read_tsc+0x10/0x10 [ 27.634951] ? ktime_get_ts64+0x86/0x230 [ 27.634978] kunit_try_run_case+0x1a5/0x480 [ 27.635003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.635025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.635050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.635075] ? __kthread_parkme+0x82/0x180 [ 27.635098] ? preempt_count_sub+0x50/0x80 [ 27.635123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.635147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.635175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.635202] kthread+0x337/0x6f0 [ 27.635225] ? trace_preempt_on+0x20/0xc0 [ 27.635250] ? __pfx_kthread+0x10/0x10 [ 27.635273] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.635296] ? calculate_sigpending+0x7b/0xa0 [ 27.635322] ? __pfx_kthread+0x10/0x10 [ 27.635345] ret_from_fork+0x116/0x1d0 [ 27.635366] ? __pfx_kthread+0x10/0x10 [ 27.635388] ret_from_fork_asm+0x1a/0x30 [ 27.635421] </TASK> [ 27.635434] [ 27.647160] Allocated by task 313: [ 27.647470] kasan_save_stack+0x45/0x70 [ 27.647875] kasan_save_track+0x18/0x40 [ 27.648320] kasan_save_alloc_info+0x3b/0x50 [ 27.648864] __kasan_kmalloc+0xb7/0xc0 [ 27.649363] __kmalloc_cache_noprof+0x189/0x420 [ 27.649665] kasan_atomics+0x95/0x310 [ 27.650114] kunit_try_run_case+0x1a5/0x480 [ 27.650261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.650433] kthread+0x337/0x6f0 [ 27.650689] ret_from_fork+0x116/0x1d0 [ 27.651037] ret_from_fork_asm+0x1a/0x30 [ 27.651449] [ 27.651664] The buggy address belongs to the object at ffff88810439e280 [ 27.651664] which belongs to the cache kmalloc-64 of size 64 [ 27.652842] The buggy address is located 0 bytes to the right of [ 27.652842] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.653758] [ 27.653939] The buggy address belongs to the physical page: [ 27.654407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.655291] flags: 0x200000000000000(node=0|zone=2) [ 27.655677] page_type: f5(slab) [ 27.655829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.656507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.656749] page dumped because: kasan: bad access detected [ 27.657108] [ 27.657279] Memory state around the buggy address: [ 27.657785] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.658463] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.659225] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.659892] ^ [ 27.660061] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.660270] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.660473] ================================================================== [ 28.586475] ================================================================== [ 28.586768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 28.587090] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.587434] [ 28.587573] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.587622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.587636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.587662] Call Trace: [ 28.587678] <TASK> [ 28.587706] dump_stack_lvl+0x73/0xb0 [ 28.587733] print_report+0xd1/0x610 [ 28.587768] ? __virt_addr_valid+0x1db/0x2d0 [ 28.587794] ? kasan_atomics_helper+0x177f/0x5450 [ 28.587818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.587869] ? kasan_atomics_helper+0x177f/0x5450 [ 28.587892] kasan_report+0x141/0x180 [ 28.587915] ? kasan_atomics_helper+0x177f/0x5450 [ 28.587953] kasan_check_range+0x10c/0x1c0 [ 28.587979] __kasan_check_write+0x18/0x20 [ 28.588003] kasan_atomics_helper+0x177f/0x5450 [ 28.588027] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.588050] ? ret_from_fork_asm+0x1a/0x30 [ 28.588081] kasan_atomics+0x1dc/0x310 [ 28.588104] ? __pfx_kasan_atomics+0x10/0x10 [ 28.588130] ? __pfx_read_tsc+0x10/0x10 [ 28.588163] ? ktime_get_ts64+0x86/0x230 [ 28.588189] kunit_try_run_case+0x1a5/0x480 [ 28.588213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.588245] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.588270] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.588295] ? __kthread_parkme+0x82/0x180 [ 28.588316] ? preempt_count_sub+0x50/0x80 [ 28.588350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.588373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.588400] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.588436] kthread+0x337/0x6f0 [ 28.588457] ? trace_preempt_on+0x20/0xc0 [ 28.588482] ? __pfx_kthread+0x10/0x10 [ 28.588504] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.588526] ? calculate_sigpending+0x7b/0xa0 [ 28.588552] ? __pfx_kthread+0x10/0x10 [ 28.588575] ret_from_fork+0x116/0x1d0 [ 28.588597] ? __pfx_kthread+0x10/0x10 [ 28.588619] ret_from_fork_asm+0x1a/0x30 [ 28.588652] </TASK> [ 28.588666] [ 28.596197] Allocated by task 313: [ 28.596407] kasan_save_stack+0x45/0x70 [ 28.596595] kasan_save_track+0x18/0x40 [ 28.596793] kasan_save_alloc_info+0x3b/0x50 [ 28.596940] __kasan_kmalloc+0xb7/0xc0 [ 28.597146] __kmalloc_cache_noprof+0x189/0x420 [ 28.597367] kasan_atomics+0x95/0x310 [ 28.597535] kunit_try_run_case+0x1a5/0x480 [ 28.597678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.597993] kthread+0x337/0x6f0 [ 28.598167] ret_from_fork+0x116/0x1d0 [ 28.598360] ret_from_fork_asm+0x1a/0x30 [ 28.598638] [ 28.598714] The buggy address belongs to the object at ffff88810439e280 [ 28.598714] which belongs to the cache kmalloc-64 of size 64 [ 28.599062] The buggy address is located 0 bytes to the right of [ 28.599062] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.599629] [ 28.599740] The buggy address belongs to the physical page: [ 28.599920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.600157] flags: 0x200000000000000(node=0|zone=2) [ 28.600400] page_type: f5(slab) [ 28.600650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.601034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.601397] page dumped because: kasan: bad access detected [ 28.601709] [ 28.601789] Memory state around the buggy address: [ 28.601999] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.602322] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.602653] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.602961] ^ [ 28.603114] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.603330] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.603671] ================================================================== [ 28.152273] ================================================================== [ 28.152669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 28.153295] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.154155] [ 28.154411] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.154469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.154495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.154519] Call Trace: [ 28.154534] <TASK> [ 28.154586] dump_stack_lvl+0x73/0xb0 [ 28.154620] print_report+0xd1/0x610 [ 28.154646] ? __virt_addr_valid+0x1db/0x2d0 [ 28.154672] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.154695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.154731] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.154754] kasan_report+0x141/0x180 [ 28.154777] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.154995] kasan_check_range+0x10c/0x1c0 [ 28.155026] __kasan_check_write+0x18/0x20 [ 28.155051] kasan_atomics_helper+0xfa9/0x5450 [ 28.155075] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.155099] ? ret_from_fork_asm+0x1a/0x30 [ 28.155129] kasan_atomics+0x1dc/0x310 [ 28.155153] ? __pfx_kasan_atomics+0x10/0x10 [ 28.155179] ? __pfx_read_tsc+0x10/0x10 [ 28.155203] ? ktime_get_ts64+0x86/0x230 [ 28.155229] kunit_try_run_case+0x1a5/0x480 [ 28.155253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.155276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.155301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.155326] ? __kthread_parkme+0x82/0x180 [ 28.155348] ? preempt_count_sub+0x50/0x80 [ 28.155373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.155397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.155422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.155449] kthread+0x337/0x6f0 [ 28.155471] ? trace_preempt_on+0x20/0xc0 [ 28.155496] ? __pfx_kthread+0x10/0x10 [ 28.155518] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.155541] ? calculate_sigpending+0x7b/0xa0 [ 28.155566] ? __pfx_kthread+0x10/0x10 [ 28.155589] ret_from_fork+0x116/0x1d0 [ 28.155610] ? __pfx_kthread+0x10/0x10 [ 28.155633] ret_from_fork_asm+0x1a/0x30 [ 28.155665] </TASK> [ 28.155679] [ 28.168429] Allocated by task 313: [ 28.168915] kasan_save_stack+0x45/0x70 [ 28.169220] kasan_save_track+0x18/0x40 [ 28.169418] kasan_save_alloc_info+0x3b/0x50 [ 28.169791] __kasan_kmalloc+0xb7/0xc0 [ 28.170166] __kmalloc_cache_noprof+0x189/0x420 [ 28.170386] kasan_atomics+0x95/0x310 [ 28.170826] kunit_try_run_case+0x1a5/0x480 [ 28.171318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.171784] kthread+0x337/0x6f0 [ 28.171981] ret_from_fork+0x116/0x1d0 [ 28.172160] ret_from_fork_asm+0x1a/0x30 [ 28.172340] [ 28.172428] The buggy address belongs to the object at ffff88810439e280 [ 28.172428] which belongs to the cache kmalloc-64 of size 64 [ 28.173571] The buggy address is located 0 bytes to the right of [ 28.173571] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.174308] [ 28.174406] The buggy address belongs to the physical page: [ 28.175325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.175916] flags: 0x200000000000000(node=0|zone=2) [ 28.176215] page_type: f5(slab) [ 28.176372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.177005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.177551] page dumped because: kasan: bad access detected [ 28.177871] [ 28.177967] Memory state around the buggy address: [ 28.178176] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.178468] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.179465] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.180018] ^ [ 28.180237] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.180795] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.181318] ================================================================== [ 27.661373] ================================================================== [ 27.662120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 27.662832] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.663588] [ 27.663798] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.663903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.663921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.663945] Call Trace: [ 27.663966] <TASK> [ 27.663986] dump_stack_lvl+0x73/0xb0 [ 27.664017] print_report+0xd1/0x610 [ 27.664043] ? __virt_addr_valid+0x1db/0x2d0 [ 27.664070] ? kasan_atomics_helper+0x3df/0x5450 [ 27.664092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.664121] ? kasan_atomics_helper+0x3df/0x5450 [ 27.664144] kasan_report+0x141/0x180 [ 27.664167] ? kasan_atomics_helper+0x3df/0x5450 [ 27.664194] kasan_check_range+0x10c/0x1c0 [ 27.664220] __kasan_check_read+0x15/0x20 [ 27.664244] kasan_atomics_helper+0x3df/0x5450 [ 27.664268] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.664292] ? ret_from_fork_asm+0x1a/0x30 [ 27.664321] kasan_atomics+0x1dc/0x310 [ 27.664346] ? __pfx_kasan_atomics+0x10/0x10 [ 27.664371] ? __pfx_read_tsc+0x10/0x10 [ 27.664395] ? ktime_get_ts64+0x86/0x230 [ 27.664422] kunit_try_run_case+0x1a5/0x480 [ 27.664447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.664470] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.664504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.664529] ? __kthread_parkme+0x82/0x180 [ 27.664553] ? preempt_count_sub+0x50/0x80 [ 27.664578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.664602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.664629] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.664656] kthread+0x337/0x6f0 [ 27.664678] ? trace_preempt_on+0x20/0xc0 [ 27.664715] ? __pfx_kthread+0x10/0x10 [ 27.664739] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.664761] ? calculate_sigpending+0x7b/0xa0 [ 27.664916] ? __pfx_kthread+0x10/0x10 [ 27.664943] ret_from_fork+0x116/0x1d0 [ 27.664967] ? __pfx_kthread+0x10/0x10 [ 27.664990] ret_from_fork_asm+0x1a/0x30 [ 27.665024] </TASK> [ 27.665039] [ 27.674238] Allocated by task 313: [ 27.674401] kasan_save_stack+0x45/0x70 [ 27.674628] kasan_save_track+0x18/0x40 [ 27.674774] kasan_save_alloc_info+0x3b/0x50 [ 27.674922] __kasan_kmalloc+0xb7/0xc0 [ 27.675161] __kmalloc_cache_noprof+0x189/0x420 [ 27.675395] kasan_atomics+0x95/0x310 [ 27.675579] kunit_try_run_case+0x1a5/0x480 [ 27.675764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.675943] kthread+0x337/0x6f0 [ 27.676168] ret_from_fork+0x116/0x1d0 [ 27.676356] ret_from_fork_asm+0x1a/0x30 [ 27.676619] [ 27.676723] The buggy address belongs to the object at ffff88810439e280 [ 27.676723] which belongs to the cache kmalloc-64 of size 64 [ 27.677282] The buggy address is located 0 bytes to the right of [ 27.677282] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.677817] [ 27.677914] The buggy address belongs to the physical page: [ 27.678218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.678458] flags: 0x200000000000000(node=0|zone=2) [ 27.678620] page_type: f5(slab) [ 27.678751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.679594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.679910] page dumped because: kasan: bad access detected [ 27.680082] [ 27.680149] Memory state around the buggy address: [ 27.680439] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.681025] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.681279] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.681492] ^ [ 27.681647] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.681966] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.682394] ================================================================== [ 28.675111] ================================================================== [ 28.675572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 28.675982] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.676444] [ 28.676533] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.676596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.676611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.676634] Call Trace: [ 28.676650] <TASK> [ 28.676667] dump_stack_lvl+0x73/0xb0 [ 28.676711] print_report+0xd1/0x610 [ 28.676737] ? __virt_addr_valid+0x1db/0x2d0 [ 28.676762] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.676786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.676815] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.676838] kasan_report+0x141/0x180 [ 28.676862] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.676890] kasan_check_range+0x10c/0x1c0 [ 28.676915] __kasan_check_write+0x18/0x20 [ 28.676940] kasan_atomics_helper+0x19e3/0x5450 [ 28.676964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.676988] ? ret_from_fork_asm+0x1a/0x30 [ 28.677018] kasan_atomics+0x1dc/0x310 [ 28.677042] ? __pfx_kasan_atomics+0x10/0x10 [ 28.677068] ? __pfx_read_tsc+0x10/0x10 [ 28.677092] ? ktime_get_ts64+0x86/0x230 [ 28.677119] kunit_try_run_case+0x1a5/0x480 [ 28.677142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.677164] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.677189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.677213] ? __kthread_parkme+0x82/0x180 [ 28.677236] ? preempt_count_sub+0x50/0x80 [ 28.677262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.677284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.677311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.677339] kthread+0x337/0x6f0 [ 28.677362] ? trace_preempt_on+0x20/0xc0 [ 28.677387] ? __pfx_kthread+0x10/0x10 [ 28.677409] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.677432] ? calculate_sigpending+0x7b/0xa0 [ 28.677457] ? __pfx_kthread+0x10/0x10 [ 28.677482] ret_from_fork+0x116/0x1d0 [ 28.677513] ? __pfx_kthread+0x10/0x10 [ 28.677535] ret_from_fork_asm+0x1a/0x30 [ 28.677568] </TASK> [ 28.677580] [ 28.684678] Allocated by task 313: [ 28.684865] kasan_save_stack+0x45/0x70 [ 28.685143] kasan_save_track+0x18/0x40 [ 28.685279] kasan_save_alloc_info+0x3b/0x50 [ 28.685426] __kasan_kmalloc+0xb7/0xc0 [ 28.685554] __kmalloc_cache_noprof+0x189/0x420 [ 28.685837] kasan_atomics+0x95/0x310 [ 28.686168] kunit_try_run_case+0x1a5/0x480 [ 28.686376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.686603] kthread+0x337/0x6f0 [ 28.686769] ret_from_fork+0x116/0x1d0 [ 28.686945] ret_from_fork_asm+0x1a/0x30 [ 28.687116] [ 28.687210] The buggy address belongs to the object at ffff88810439e280 [ 28.687210] which belongs to the cache kmalloc-64 of size 64 [ 28.687712] The buggy address is located 0 bytes to the right of [ 28.687712] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.688109] [ 28.688178] The buggy address belongs to the physical page: [ 28.688349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.688651] flags: 0x200000000000000(node=0|zone=2) [ 28.688904] page_type: f5(slab) [ 28.689069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.689400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.690457] page dumped because: kasan: bad access detected [ 28.690679] [ 28.690759] Memory state around the buggy address: [ 28.690915] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.691130] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.691381] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.692076] ^ [ 28.692507] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.693018] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.693523] ================================================================== [ 27.935233] ================================================================== [ 27.935493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 27.935914] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.936166] [ 27.936247] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.936292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.936306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.936328] Call Trace: [ 27.936342] <TASK> [ 27.936359] dump_stack_lvl+0x73/0xb0 [ 27.936387] print_report+0xd1/0x610 [ 27.936412] ? __virt_addr_valid+0x1db/0x2d0 [ 27.936437] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.936459] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.936500] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.936523] kasan_report+0x141/0x180 [ 27.936546] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.936573] kasan_check_range+0x10c/0x1c0 [ 27.936598] __kasan_check_write+0x18/0x20 [ 27.936622] kasan_atomics_helper+0xa2b/0x5450 [ 27.936646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.936669] ? ret_from_fork_asm+0x1a/0x30 [ 27.936710] kasan_atomics+0x1dc/0x310 [ 27.936734] ? __pfx_kasan_atomics+0x10/0x10 [ 27.936759] ? __pfx_read_tsc+0x10/0x10 [ 27.936945] ? ktime_get_ts64+0x86/0x230 [ 27.936982] kunit_try_run_case+0x1a5/0x480 [ 27.937007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.937029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.937054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.937079] ? __kthread_parkme+0x82/0x180 [ 27.937101] ? preempt_count_sub+0x50/0x80 [ 27.937125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.937149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.937175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.937203] kthread+0x337/0x6f0 [ 27.937223] ? trace_preempt_on+0x20/0xc0 [ 27.937247] ? __pfx_kthread+0x10/0x10 [ 27.937269] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.937293] ? calculate_sigpending+0x7b/0xa0 [ 27.937317] ? __pfx_kthread+0x10/0x10 [ 27.937341] ret_from_fork+0x116/0x1d0 [ 27.937362] ? __pfx_kthread+0x10/0x10 [ 27.937384] ret_from_fork_asm+0x1a/0x30 [ 27.937416] </TASK> [ 27.937429] [ 27.945615] Allocated by task 313: [ 27.945815] kasan_save_stack+0x45/0x70 [ 27.946098] kasan_save_track+0x18/0x40 [ 27.946231] kasan_save_alloc_info+0x3b/0x50 [ 27.946376] __kasan_kmalloc+0xb7/0xc0 [ 27.946503] __kmalloc_cache_noprof+0x189/0x420 [ 27.946852] kasan_atomics+0x95/0x310 [ 27.947055] kunit_try_run_case+0x1a5/0x480 [ 27.947262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.947561] kthread+0x337/0x6f0 [ 27.947753] ret_from_fork+0x116/0x1d0 [ 27.948154] ret_from_fork_asm+0x1a/0x30 [ 27.948359] [ 27.948447] The buggy address belongs to the object at ffff88810439e280 [ 27.948447] which belongs to the cache kmalloc-64 of size 64 [ 27.949270] The buggy address is located 0 bytes to the right of [ 27.949270] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.949844] [ 27.949942] The buggy address belongs to the physical page: [ 27.950165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.950457] flags: 0x200000000000000(node=0|zone=2) [ 27.950622] page_type: f5(slab) [ 27.950853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.951229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.951650] page dumped because: kasan: bad access detected [ 27.952030] [ 27.952103] Memory state around the buggy address: [ 27.952310] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.952565] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.952895] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.953182] ^ [ 27.953336] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.953549] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.953963] ================================================================== [ 28.938615] ================================================================== [ 28.939012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 28.939379] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.939754] [ 28.939863] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.939913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.939926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.939948] Call Trace: [ 28.939963] <TASK> [ 28.939978] dump_stack_lvl+0x73/0xb0 [ 28.940006] print_report+0xd1/0x610 [ 28.940031] ? __virt_addr_valid+0x1db/0x2d0 [ 28.940055] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.940077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.940104] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.940128] kasan_report+0x141/0x180 [ 28.940150] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.940177] kasan_check_range+0x10c/0x1c0 [ 28.940201] __kasan_check_write+0x18/0x20 [ 28.940226] kasan_atomics_helper+0x20c8/0x5450 [ 28.940251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.940274] ? ret_from_fork_asm+0x1a/0x30 [ 28.940303] kasan_atomics+0x1dc/0x310 [ 28.940327] ? __pfx_kasan_atomics+0x10/0x10 [ 28.940352] ? __pfx_read_tsc+0x10/0x10 [ 28.940375] ? ktime_get_ts64+0x86/0x230 [ 28.940400] kunit_try_run_case+0x1a5/0x480 [ 28.940425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.940447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.940526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.940555] ? __kthread_parkme+0x82/0x180 [ 28.940579] ? preempt_count_sub+0x50/0x80 [ 28.940603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.940628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.940655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.940682] kthread+0x337/0x6f0 [ 28.940712] ? trace_preempt_on+0x20/0xc0 [ 28.940737] ? __pfx_kthread+0x10/0x10 [ 28.940760] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.940782] ? calculate_sigpending+0x7b/0xa0 [ 28.940807] ? __pfx_kthread+0x10/0x10 [ 28.940831] ret_from_fork+0x116/0x1d0 [ 28.940852] ? __pfx_kthread+0x10/0x10 [ 28.940874] ret_from_fork_asm+0x1a/0x30 [ 28.940905] </TASK> [ 28.940918] [ 28.948705] Allocated by task 313: [ 28.948893] kasan_save_stack+0x45/0x70 [ 28.949095] kasan_save_track+0x18/0x40 [ 28.949286] kasan_save_alloc_info+0x3b/0x50 [ 28.949456] __kasan_kmalloc+0xb7/0xc0 [ 28.949706] __kmalloc_cache_noprof+0x189/0x420 [ 28.949928] kasan_atomics+0x95/0x310 [ 28.950058] kunit_try_run_case+0x1a5/0x480 [ 28.950229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.950544] kthread+0x337/0x6f0 [ 28.950754] ret_from_fork+0x116/0x1d0 [ 28.950979] ret_from_fork_asm+0x1a/0x30 [ 28.951183] [ 28.951275] The buggy address belongs to the object at ffff88810439e280 [ 28.951275] which belongs to the cache kmalloc-64 of size 64 [ 28.951858] The buggy address is located 0 bytes to the right of [ 28.951858] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.952414] [ 28.952538] The buggy address belongs to the physical page: [ 28.952826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.953187] flags: 0x200000000000000(node=0|zone=2) [ 28.953427] page_type: f5(slab) [ 28.953644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.953989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.954353] page dumped because: kasan: bad access detected [ 28.954645] [ 28.954747] Memory state around the buggy address: [ 28.954921] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.955134] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.955416] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.955795] ^ [ 28.956064] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.956385] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.956684] ================================================================== [ 27.567522] ================================================================== [ 27.567860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 27.568215] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.568592] [ 27.568738] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.568789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.568802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.568825] Call Trace: [ 27.568839] <TASK> [ 27.568855] dump_stack_lvl+0x73/0xb0 [ 27.568885] print_report+0xd1/0x610 [ 27.568908] ? __virt_addr_valid+0x1db/0x2d0 [ 27.568933] ? kasan_atomics_helper+0x4ba2/0x5450 [ 27.568955] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.568993] ? kasan_atomics_helper+0x4ba2/0x5450 [ 27.569017] kasan_report+0x141/0x180 [ 27.569041] ? kasan_atomics_helper+0x4ba2/0x5450 [ 27.569069] __asan_report_store4_noabort+0x1b/0x30 [ 27.569094] kasan_atomics_helper+0x4ba2/0x5450 [ 27.569116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.569139] ? ret_from_fork_asm+0x1a/0x30 [ 27.569167] kasan_atomics+0x1dc/0x310 [ 27.569190] ? __pfx_kasan_atomics+0x10/0x10 [ 27.569215] ? __pfx_read_tsc+0x10/0x10 [ 27.569239] ? ktime_get_ts64+0x86/0x230 [ 27.569265] kunit_try_run_case+0x1a5/0x480 [ 27.569287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.569308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.569333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.569356] ? __kthread_parkme+0x82/0x180 [ 27.569377] ? preempt_count_sub+0x50/0x80 [ 27.569402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.569424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.569449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.569475] kthread+0x337/0x6f0 [ 27.569505] ? trace_preempt_on+0x20/0xc0 [ 27.569527] ? __pfx_kthread+0x10/0x10 [ 27.569549] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.569570] ? calculate_sigpending+0x7b/0xa0 [ 27.569593] ? __pfx_kthread+0x10/0x10 [ 27.569616] ret_from_fork+0x116/0x1d0 [ 27.569636] ? __pfx_kthread+0x10/0x10 [ 27.569656] ret_from_fork_asm+0x1a/0x30 [ 27.569686] </TASK> [ 27.569709] [ 27.583743] Allocated by task 313: [ 27.584270] kasan_save_stack+0x45/0x70 [ 27.585176] kasan_save_track+0x18/0x40 [ 27.585821] kasan_save_alloc_info+0x3b/0x50 [ 27.586328] __kasan_kmalloc+0xb7/0xc0 [ 27.586470] __kmalloc_cache_noprof+0x189/0x420 [ 27.587209] kasan_atomics+0x95/0x310 [ 27.587708] kunit_try_run_case+0x1a5/0x480 [ 27.588360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.588773] kthread+0x337/0x6f0 [ 27.589186] ret_from_fork+0x116/0x1d0 [ 27.589334] ret_from_fork_asm+0x1a/0x30 [ 27.589472] [ 27.589637] The buggy address belongs to the object at ffff88810439e280 [ 27.589637] which belongs to the cache kmalloc-64 of size 64 [ 27.591320] The buggy address is located 0 bytes to the right of [ 27.591320] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.592449] [ 27.592694] The buggy address belongs to the physical page: [ 27.593286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.594019] flags: 0x200000000000000(node=0|zone=2) [ 27.594193] page_type: f5(slab) [ 27.594319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.594642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.595506] page dumped because: kasan: bad access detected [ 27.596091] [ 27.596293] Memory state around the buggy address: [ 27.596738] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.596954] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.597164] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.597377] ^ [ 27.597670] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.598485] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.599298] ================================================================== [ 27.600481] ================================================================== [ 27.601283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 27.602179] Read of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.602933] [ 27.603073] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.603130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.603183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.603209] Call Trace: [ 27.603230] <TASK> [ 27.603285] dump_stack_lvl+0x73/0xb0 [ 27.603318] print_report+0xd1/0x610 [ 27.603354] ? __virt_addr_valid+0x1db/0x2d0 [ 27.603381] ? kasan_atomics_helper+0x4b88/0x5450 [ 27.603404] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.603431] ? kasan_atomics_helper+0x4b88/0x5450 [ 27.603454] kasan_report+0x141/0x180 [ 27.603478] ? kasan_atomics_helper+0x4b88/0x5450 [ 27.603516] __asan_report_load4_noabort+0x18/0x20 [ 27.603542] kasan_atomics_helper+0x4b88/0x5450 [ 27.603566] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.603590] ? ret_from_fork_asm+0x1a/0x30 [ 27.603620] kasan_atomics+0x1dc/0x310 [ 27.603645] ? __pfx_kasan_atomics+0x10/0x10 [ 27.603671] ? __pfx_read_tsc+0x10/0x10 [ 27.603694] ? ktime_get_ts64+0x86/0x230 [ 27.603732] kunit_try_run_case+0x1a5/0x480 [ 27.603756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.603964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.604001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.604027] ? __kthread_parkme+0x82/0x180 [ 27.604050] ? preempt_count_sub+0x50/0x80 [ 27.604076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.604099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.604127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.604154] kthread+0x337/0x6f0 [ 27.604176] ? trace_preempt_on+0x20/0xc0 [ 27.604200] ? __pfx_kthread+0x10/0x10 [ 27.604222] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.604245] ? calculate_sigpending+0x7b/0xa0 [ 27.604270] ? __pfx_kthread+0x10/0x10 [ 27.604293] ret_from_fork+0x116/0x1d0 [ 27.604314] ? __pfx_kthread+0x10/0x10 [ 27.604336] ret_from_fork_asm+0x1a/0x30 [ 27.604368] </TASK> [ 27.604381] [ 27.617882] Allocated by task 313: [ 27.618326] kasan_save_stack+0x45/0x70 [ 27.618747] kasan_save_track+0x18/0x40 [ 27.619093] kasan_save_alloc_info+0x3b/0x50 [ 27.619248] __kasan_kmalloc+0xb7/0xc0 [ 27.619378] __kmalloc_cache_noprof+0x189/0x420 [ 27.619563] kasan_atomics+0x95/0x310 [ 27.619935] kunit_try_run_case+0x1a5/0x480 [ 27.620556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.621191] kthread+0x337/0x6f0 [ 27.621518] ret_from_fork+0x116/0x1d0 [ 27.621948] ret_from_fork_asm+0x1a/0x30 [ 27.622327] [ 27.622503] The buggy address belongs to the object at ffff88810439e280 [ 27.622503] which belongs to the cache kmalloc-64 of size 64 [ 27.623291] The buggy address is located 0 bytes to the right of [ 27.623291] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.624188] [ 27.624371] The buggy address belongs to the physical page: [ 27.624964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.625688] flags: 0x200000000000000(node=0|zone=2) [ 27.626224] page_type: f5(slab) [ 27.626361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.626616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.627063] page dumped because: kasan: bad access detected [ 27.627593] [ 27.627757] Memory state around the buggy address: [ 27.628178] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.628739] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.629242] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.629459] ^ [ 27.629899] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.630602] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.631242] ================================================================== [ 28.712868] ================================================================== [ 28.713585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 28.713866] Write of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.714168] [ 28.714248] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.714296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.714310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.714332] Call Trace: [ 28.714348] <TASK> [ 28.714365] dump_stack_lvl+0x73/0xb0 [ 28.714392] print_report+0xd1/0x610 [ 28.714417] ? __virt_addr_valid+0x1db/0x2d0 [ 28.714441] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.714464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.714502] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.714526] kasan_report+0x141/0x180 [ 28.714549] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.714577] kasan_check_range+0x10c/0x1c0 [ 28.714602] __kasan_check_write+0x18/0x20 [ 28.714627] kasan_atomics_helper+0x1b22/0x5450 [ 28.714652] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.714675] ? ret_from_fork_asm+0x1a/0x30 [ 28.714716] kasan_atomics+0x1dc/0x310 [ 28.714741] ? __pfx_kasan_atomics+0x10/0x10 [ 28.714767] ? __pfx_read_tsc+0x10/0x10 [ 28.714791] ? ktime_get_ts64+0x86/0x230 [ 28.714817] kunit_try_run_case+0x1a5/0x480 [ 28.714840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.714863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.714888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.714913] ? __kthread_parkme+0x82/0x180 [ 28.714936] ? preempt_count_sub+0x50/0x80 [ 28.714961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.714985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.715013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.715039] kthread+0x337/0x6f0 [ 28.715059] ? trace_preempt_on+0x20/0xc0 [ 28.715083] ? __pfx_kthread+0x10/0x10 [ 28.715105] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.715128] ? calculate_sigpending+0x7b/0xa0 [ 28.715153] ? __pfx_kthread+0x10/0x10 [ 28.715176] ret_from_fork+0x116/0x1d0 [ 28.715197] ? __pfx_kthread+0x10/0x10 [ 28.715219] ret_from_fork_asm+0x1a/0x30 [ 28.715251] </TASK> [ 28.715264] [ 28.723728] Allocated by task 313: [ 28.724336] kasan_save_stack+0x45/0x70 [ 28.724990] kasan_save_track+0x18/0x40 [ 28.725603] kasan_save_alloc_info+0x3b/0x50 [ 28.726270] __kasan_kmalloc+0xb7/0xc0 [ 28.726898] __kmalloc_cache_noprof+0x189/0x420 [ 28.727070] kasan_atomics+0x95/0x310 [ 28.727205] kunit_try_run_case+0x1a5/0x480 [ 28.727349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.727952] kthread+0x337/0x6f0 [ 28.728526] ret_from_fork+0x116/0x1d0 [ 28.729105] ret_from_fork_asm+0x1a/0x30 [ 28.729820] [ 28.730028] The buggy address belongs to the object at ffff88810439e280 [ 28.730028] which belongs to the cache kmalloc-64 of size 64 [ 28.731128] The buggy address is located 0 bytes to the right of [ 28.731128] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 28.731763] [ 28.732013] The buggy address belongs to the physical page: [ 28.732801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 28.733848] flags: 0x200000000000000(node=0|zone=2) [ 28.734367] page_type: f5(slab) [ 28.734648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.735509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.736257] page dumped because: kasan: bad access detected [ 28.736729] [ 28.736807] Memory state around the buggy address: [ 28.736965] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.737182] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.737399] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.738291] ^ [ 28.739023] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.739864] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.740718] ================================================================== [ 27.973861] ================================================================== [ 27.974203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 27.974500] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.975002] [ 27.975089] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.975137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.975151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.975174] Call Trace: [ 27.975189] <TASK> [ 27.975206] dump_stack_lvl+0x73/0xb0 [ 27.975234] print_report+0xd1/0x610 [ 27.975260] ? __virt_addr_valid+0x1db/0x2d0 [ 27.975285] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.975307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.975335] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.975358] kasan_report+0x141/0x180 [ 27.975381] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.975408] kasan_check_range+0x10c/0x1c0 [ 27.975432] __kasan_check_write+0x18/0x20 [ 27.975457] kasan_atomics_helper+0xb6a/0x5450 [ 27.975481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.975504] ? ret_from_fork_asm+0x1a/0x30 [ 27.975533] kasan_atomics+0x1dc/0x310 [ 27.975557] ? __pfx_kasan_atomics+0x10/0x10 [ 27.975758] ? __pfx_read_tsc+0x10/0x10 [ 27.975842] ? ktime_get_ts64+0x86/0x230 [ 27.975879] kunit_try_run_case+0x1a5/0x480 [ 27.975906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.975928] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.975954] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.975979] ? __kthread_parkme+0x82/0x180 [ 27.976001] ? preempt_count_sub+0x50/0x80 [ 27.976027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.976051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.976077] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.976105] kthread+0x337/0x6f0 [ 27.976126] ? trace_preempt_on+0x20/0xc0 [ 27.976150] ? __pfx_kthread+0x10/0x10 [ 27.976172] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.976196] ? calculate_sigpending+0x7b/0xa0 [ 27.976221] ? __pfx_kthread+0x10/0x10 [ 27.976244] ret_from_fork+0x116/0x1d0 [ 27.976265] ? __pfx_kthread+0x10/0x10 [ 27.976287] ret_from_fork_asm+0x1a/0x30 [ 27.976319] </TASK> [ 27.976333] [ 27.984245] Allocated by task 313: [ 27.984375] kasan_save_stack+0x45/0x70 [ 27.984677] kasan_save_track+0x18/0x40 [ 27.985064] kasan_save_alloc_info+0x3b/0x50 [ 27.985282] __kasan_kmalloc+0xb7/0xc0 [ 27.985474] __kmalloc_cache_noprof+0x189/0x420 [ 27.985763] kasan_atomics+0x95/0x310 [ 27.985981] kunit_try_run_case+0x1a5/0x480 [ 27.986180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.986412] kthread+0x337/0x6f0 [ 27.986579] ret_from_fork+0x116/0x1d0 [ 27.986773] ret_from_fork_asm+0x1a/0x30 [ 27.986937] [ 27.987032] The buggy address belongs to the object at ffff88810439e280 [ 27.987032] which belongs to the cache kmalloc-64 of size 64 [ 27.987418] The buggy address is located 0 bytes to the right of [ 27.987418] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.987970] [ 27.988253] The buggy address belongs to the physical page: [ 27.988510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.988781] flags: 0x200000000000000(node=0|zone=2) [ 27.989127] page_type: f5(slab) [ 27.989304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.989647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.989971] page dumped because: kasan: bad access detected [ 27.990290] [ 27.990376] Memory state around the buggy address: [ 27.990629] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.991053] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.991354] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.991668] ^ [ 27.992093] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.992352] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.992827] ================================================================== [ 27.762292] ================================================================== [ 27.762727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 27.763796] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.764432] [ 27.764695] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.764765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.764780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.764804] Call Trace: [ 27.764888] <TASK> [ 27.764909] dump_stack_lvl+0x73/0xb0 [ 27.764941] print_report+0xd1/0x610 [ 27.764969] ? __virt_addr_valid+0x1db/0x2d0 [ 27.764995] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.765018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.765046] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.765069] kasan_report+0x141/0x180 [ 27.765092] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.765119] kasan_check_range+0x10c/0x1c0 [ 27.765144] __kasan_check_write+0x18/0x20 [ 27.765169] kasan_atomics_helper+0x5fe/0x5450 [ 27.765192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.765216] ? ret_from_fork_asm+0x1a/0x30 [ 27.765247] kasan_atomics+0x1dc/0x310 [ 27.765271] ? __pfx_kasan_atomics+0x10/0x10 [ 27.765297] ? __pfx_read_tsc+0x10/0x10 [ 27.765321] ? ktime_get_ts64+0x86/0x230 [ 27.765347] kunit_try_run_case+0x1a5/0x480 [ 27.765371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.765393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.765419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.765443] ? __kthread_parkme+0x82/0x180 [ 27.765466] ? preempt_count_sub+0x50/0x80 [ 27.765491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.765515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.765541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.765568] kthread+0x337/0x6f0 [ 27.765590] ? trace_preempt_on+0x20/0xc0 [ 27.765615] ? __pfx_kthread+0x10/0x10 [ 27.765639] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.765663] ? calculate_sigpending+0x7b/0xa0 [ 27.765690] ? __pfx_kthread+0x10/0x10 [ 27.765727] ret_from_fork+0x116/0x1d0 [ 27.765750] ? __pfx_kthread+0x10/0x10 [ 27.765789] ret_from_fork_asm+0x1a/0x30 [ 27.765833] </TASK> [ 27.765847] [ 27.778428] Allocated by task 313: [ 27.778919] kasan_save_stack+0x45/0x70 [ 27.779244] kasan_save_track+0x18/0x40 [ 27.779533] kasan_save_alloc_info+0x3b/0x50 [ 27.779937] __kasan_kmalloc+0xb7/0xc0 [ 27.780088] __kmalloc_cache_noprof+0x189/0x420 [ 27.780480] kasan_atomics+0x95/0x310 [ 27.780847] kunit_try_run_case+0x1a5/0x480 [ 27.781157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.781412] kthread+0x337/0x6f0 [ 27.781731] ret_from_fork+0x116/0x1d0 [ 27.782350] ret_from_fork_asm+0x1a/0x30 [ 27.782617] [ 27.782711] The buggy address belongs to the object at ffff88810439e280 [ 27.782711] which belongs to the cache kmalloc-64 of size 64 [ 27.783651] The buggy address is located 0 bytes to the right of [ 27.783651] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.784675] [ 27.784838] The buggy address belongs to the physical page: [ 27.785131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.785452] flags: 0x200000000000000(node=0|zone=2) [ 27.786004] page_type: f5(slab) [ 27.786276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.786794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.787228] page dumped because: kasan: bad access detected [ 27.787547] [ 27.787651] Memory state around the buggy address: [ 27.788060] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.788468] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.788999] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.789296] ^ [ 27.789956] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.790246] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.790752] ================================================================== [ 27.702202] ================================================================== [ 27.702497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 27.703031] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.703347] [ 27.703437] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.703487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.703567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.703591] Call Trace: [ 27.703611] <TASK> [ 27.703630] dump_stack_lvl+0x73/0xb0 [ 27.703658] print_report+0xd1/0x610 [ 27.703684] ? __virt_addr_valid+0x1db/0x2d0 [ 27.703721] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.703743] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.703772] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.703892] kasan_report+0x141/0x180 [ 27.703916] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.703944] kasan_check_range+0x10c/0x1c0 [ 27.703969] __kasan_check_write+0x18/0x20 [ 27.703994] kasan_atomics_helper+0x4a0/0x5450 [ 27.704018] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.704042] ? ret_from_fork_asm+0x1a/0x30 [ 27.704071] kasan_atomics+0x1dc/0x310 [ 27.704095] ? __pfx_kasan_atomics+0x10/0x10 [ 27.704121] ? __pfx_read_tsc+0x10/0x10 [ 27.704145] ? ktime_get_ts64+0x86/0x230 [ 27.704172] kunit_try_run_case+0x1a5/0x480 [ 27.704195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.704217] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.704243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.704268] ? __kthread_parkme+0x82/0x180 [ 27.704291] ? preempt_count_sub+0x50/0x80 [ 27.704317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.704340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.704367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.704394] kthread+0x337/0x6f0 [ 27.704415] ? trace_preempt_on+0x20/0xc0 [ 27.704440] ? __pfx_kthread+0x10/0x10 [ 27.704463] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.704485] ? calculate_sigpending+0x7b/0xa0 [ 27.704511] ? __pfx_kthread+0x10/0x10 [ 27.704534] ret_from_fork+0x116/0x1d0 [ 27.704556] ? __pfx_kthread+0x10/0x10 [ 27.704578] ret_from_fork_asm+0x1a/0x30 [ 27.704611] </TASK> [ 27.704624] [ 27.712717] Allocated by task 313: [ 27.713058] kasan_save_stack+0x45/0x70 [ 27.713271] kasan_save_track+0x18/0x40 [ 27.713423] kasan_save_alloc_info+0x3b/0x50 [ 27.713653] __kasan_kmalloc+0xb7/0xc0 [ 27.713835] __kmalloc_cache_noprof+0x189/0x420 [ 27.713993] kasan_atomics+0x95/0x310 [ 27.714124] kunit_try_run_case+0x1a5/0x480 [ 27.714615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.715077] kthread+0x337/0x6f0 [ 27.715301] ret_from_fork+0x116/0x1d0 [ 27.715437] ret_from_fork_asm+0x1a/0x30 [ 27.715786] [ 27.715939] The buggy address belongs to the object at ffff88810439e280 [ 27.715939] which belongs to the cache kmalloc-64 of size 64 [ 27.716409] The buggy address is located 0 bytes to the right of [ 27.716409] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.716932] [ 27.717006] The buggy address belongs to the physical page: [ 27.717179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.717538] flags: 0x200000000000000(node=0|zone=2) [ 27.717832] page_type: f5(slab) [ 27.718329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.718669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.719057] page dumped because: kasan: bad access detected [ 27.719254] [ 27.719325] Memory state around the buggy address: [ 27.719603] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.719944] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.720164] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.720379] ^ [ 27.720762] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.721141] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.721467] ================================================================== [ 28.997591] ================================================================== [ 28.998197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 28.998836] Read of size 8 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 28.999312] [ 28.999423] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 28.999476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.000006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.000037] Call Trace: [ 29.000054] <TASK> [ 29.000071] dump_stack_lvl+0x73/0xb0 [ 29.000105] print_report+0xd1/0x610 [ 29.000132] ? __virt_addr_valid+0x1db/0x2d0 [ 29.000158] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.000181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.000209] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.000232] kasan_report+0x141/0x180 [ 29.000256] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.000283] __asan_report_load8_noabort+0x18/0x20 [ 29.000312] kasan_atomics_helper+0x4fa5/0x5450 [ 29.000336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.000360] ? ret_from_fork_asm+0x1a/0x30 [ 29.000389] kasan_atomics+0x1dc/0x310 [ 29.000412] ? __pfx_kasan_atomics+0x10/0x10 [ 29.000438] ? __pfx_read_tsc+0x10/0x10 [ 29.000461] ? ktime_get_ts64+0x86/0x230 [ 29.000569] kunit_try_run_case+0x1a5/0x480 [ 29.000605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.000629] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.000655] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.000680] ? __kthread_parkme+0x82/0x180 [ 29.000749] ? preempt_count_sub+0x50/0x80 [ 29.000776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.000800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.000827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.000854] kthread+0x337/0x6f0 [ 29.000874] ? trace_preempt_on+0x20/0xc0 [ 29.000899] ? __pfx_kthread+0x10/0x10 [ 29.000920] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.000943] ? calculate_sigpending+0x7b/0xa0 [ 29.000968] ? __pfx_kthread+0x10/0x10 [ 29.000991] ret_from_fork+0x116/0x1d0 [ 29.001012] ? __pfx_kthread+0x10/0x10 [ 29.001034] ret_from_fork_asm+0x1a/0x30 [ 29.001066] </TASK> [ 29.001079] [ 29.012348] Allocated by task 313: [ 29.012799] kasan_save_stack+0x45/0x70 [ 29.013051] kasan_save_track+0x18/0x40 [ 29.013343] kasan_save_alloc_info+0x3b/0x50 [ 29.013676] __kasan_kmalloc+0xb7/0xc0 [ 29.013868] __kmalloc_cache_noprof+0x189/0x420 [ 29.014072] kasan_atomics+0x95/0x310 [ 29.014238] kunit_try_run_case+0x1a5/0x480 [ 29.014424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.015027] kthread+0x337/0x6f0 [ 29.015305] ret_from_fork+0x116/0x1d0 [ 29.015693] ret_from_fork_asm+0x1a/0x30 [ 29.016018] [ 29.016233] The buggy address belongs to the object at ffff88810439e280 [ 29.016233] which belongs to the cache kmalloc-64 of size 64 [ 29.017152] The buggy address is located 0 bytes to the right of [ 29.017152] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 29.017899] [ 29.018123] The buggy address belongs to the physical page: [ 29.018474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 29.018926] flags: 0x200000000000000(node=0|zone=2) [ 29.019145] page_type: f5(slab) [ 29.019300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.020010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.020423] page dumped because: kasan: bad access detected [ 29.020924] [ 29.021036] Memory state around the buggy address: [ 29.021418] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.021983] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.022479] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.022799] ^ [ 29.023007] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.023292] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.023817] ================================================================== [ 27.741276] ================================================================== [ 27.741739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 27.742274] Write of size 4 at addr ffff88810439e2b0 by task kunit_try_catch/313 [ 27.742610] [ 27.742727] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.742778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.742867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.742896] Call Trace: [ 27.742915] <TASK> [ 27.742932] dump_stack_lvl+0x73/0xb0 [ 27.742962] print_report+0xd1/0x610 [ 27.742986] ? __virt_addr_valid+0x1db/0x2d0 [ 27.743011] ? kasan_atomics_helper+0x565/0x5450 [ 27.743034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.743062] ? kasan_atomics_helper+0x565/0x5450 [ 27.743086] kasan_report+0x141/0x180 [ 27.743109] ? kasan_atomics_helper+0x565/0x5450 [ 27.743136] kasan_check_range+0x10c/0x1c0 [ 27.743161] __kasan_check_write+0x18/0x20 [ 27.743186] kasan_atomics_helper+0x565/0x5450 [ 27.743209] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.743233] ? ret_from_fork_asm+0x1a/0x30 [ 27.743263] kasan_atomics+0x1dc/0x310 [ 27.743287] ? __pfx_kasan_atomics+0x10/0x10 [ 27.743312] ? __pfx_read_tsc+0x10/0x10 [ 27.743336] ? ktime_get_ts64+0x86/0x230 [ 27.743361] kunit_try_run_case+0x1a5/0x480 [ 27.743384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.743406] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.743431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.743456] ? __kthread_parkme+0x82/0x180 [ 27.743478] ? preempt_count_sub+0x50/0x80 [ 27.743513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.743537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.743563] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.743590] kthread+0x337/0x6f0 [ 27.743611] ? trace_preempt_on+0x20/0xc0 [ 27.743634] ? __pfx_kthread+0x10/0x10 [ 27.743657] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.743681] ? calculate_sigpending+0x7b/0xa0 [ 27.743720] ? __pfx_kthread+0x10/0x10 [ 27.743743] ret_from_fork+0x116/0x1d0 [ 27.743765] ? __pfx_kthread+0x10/0x10 [ 27.743840] ret_from_fork_asm+0x1a/0x30 [ 27.743880] </TASK> [ 27.743894] [ 27.751931] Allocated by task 313: [ 27.752106] kasan_save_stack+0x45/0x70 [ 27.752330] kasan_save_track+0x18/0x40 [ 27.752547] kasan_save_alloc_info+0x3b/0x50 [ 27.752860] __kasan_kmalloc+0xb7/0xc0 [ 27.753038] __kmalloc_cache_noprof+0x189/0x420 [ 27.753284] kasan_atomics+0x95/0x310 [ 27.753536] kunit_try_run_case+0x1a5/0x480 [ 27.753750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.754242] kthread+0x337/0x6f0 [ 27.754412] ret_from_fork+0x116/0x1d0 [ 27.754630] ret_from_fork_asm+0x1a/0x30 [ 27.754962] [ 27.755063] The buggy address belongs to the object at ffff88810439e280 [ 27.755063] which belongs to the cache kmalloc-64 of size 64 [ 27.755508] The buggy address is located 0 bytes to the right of [ 27.755508] allocated 48-byte region [ffff88810439e280, ffff88810439e2b0) [ 27.756200] [ 27.756276] The buggy address belongs to the physical page: [ 27.756445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10439e [ 27.756811] flags: 0x200000000000000(node=0|zone=2) [ 27.757054] page_type: f5(slab) [ 27.757224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.757496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.758034] page dumped because: kasan: bad access detected [ 27.758212] [ 27.758280] Memory state around the buggy address: [ 27.758432] ffff88810439e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.758909] ffff88810439e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.759263] >ffff88810439e280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.759647] ^ [ 27.759967] ffff88810439e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.760246] ffff88810439e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.760613] ==================================================================