Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 64.908454] ================================================================== [ 64.915486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 64.922862] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 64.930153] [ 64.931636] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 64.931690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.931707] Hardware name: WinLink E850-96 board (DT) [ 64.931728] Call trace: [ 64.931741] show_stack+0x20/0x38 (C) [ 64.931776] dump_stack_lvl+0x8c/0xd0 [ 64.931809] print_report+0x118/0x5d0 [ 64.931839] kasan_report+0xdc/0x128 [ 64.931866] __asan_report_load4_noabort+0x20/0x30 [ 64.931900] kasan_atomics_helper+0x40fc/0x4858 [ 64.931935] kasan_atomics+0x198/0x2e0 [ 64.931967] kunit_try_run_case+0x170/0x3f0 [ 64.932006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.932039] kthread+0x328/0x630 [ 64.932068] ret_from_fork+0x10/0x20 [ 64.932102] [ 64.999770] Allocated by task 349: [ 65.003158] kasan_save_stack+0x3c/0x68 [ 65.006975] kasan_save_track+0x20/0x40 [ 65.010795] kasan_save_alloc_info+0x40/0x58 [ 65.015048] __kasan_kmalloc+0xd4/0xd8 [ 65.018781] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.023294] kasan_atomics+0xb8/0x2e0 [ 65.026940] kunit_try_run_case+0x170/0x3f0 [ 65.031107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.036575] kthread+0x328/0x630 [ 65.039787] ret_from_fork+0x10/0x20 [ 65.043346] [ 65.044822] The buggy address belongs to the object at ffff000807848f80 [ 65.044822] which belongs to the cache kmalloc-64 of size 64 [ 65.057148] The buggy address is located 0 bytes to the right of [ 65.057148] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 65.069995] [ 65.071473] The buggy address belongs to the physical page: [ 65.077030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 65.085015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.091524] page_type: f5(slab) [ 65.094657] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.102380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.110099] page dumped because: kasan: bad access detected [ 65.115654] [ 65.117130] Memory state around the buggy address: [ 65.121909] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.129112] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.136319] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.143518] ^ [ 65.148296] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.155501] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.162702] ================================================================== [ 68.081146] ================================================================== [ 68.088180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 68.095471] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 68.102849] [ 68.104330] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 68.104381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.104398] Hardware name: WinLink E850-96 board (DT) [ 68.104416] Call trace: [ 68.104429] show_stack+0x20/0x38 (C) [ 68.104461] dump_stack_lvl+0x8c/0xd0 [ 68.104491] print_report+0x118/0x5d0 [ 68.104519] kasan_report+0xdc/0x128 [ 68.104547] kasan_check_range+0x100/0x1a8 [ 68.104578] __kasan_check_write+0x20/0x30 [ 68.104609] kasan_atomics_helper+0x760/0x4858 [ 68.104645] kasan_atomics+0x198/0x2e0 [ 68.104677] kunit_try_run_case+0x170/0x3f0 [ 68.104711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.104745] kthread+0x328/0x630 [ 68.104771] ret_from_fork+0x10/0x20 [ 68.104802] [ 68.175764] Allocated by task 349: [ 68.179150] kasan_save_stack+0x3c/0x68 [ 68.182969] kasan_save_track+0x20/0x40 [ 68.186789] kasan_save_alloc_info+0x40/0x58 [ 68.191042] __kasan_kmalloc+0xd4/0xd8 [ 68.194775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.199289] kasan_atomics+0xb8/0x2e0 [ 68.202934] kunit_try_run_case+0x170/0x3f0 [ 68.207101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.212570] kthread+0x328/0x630 [ 68.215781] ret_from_fork+0x10/0x20 [ 68.219340] [ 68.220816] The buggy address belongs to the object at ffff000807848f80 [ 68.220816] which belongs to the cache kmalloc-64 of size 64 [ 68.233143] The buggy address is located 0 bytes to the right of [ 68.233143] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 68.245989] [ 68.247465] The buggy address belongs to the physical page: [ 68.253021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 68.261006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.267517] page_type: f5(slab) [ 68.270649] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.278374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.286093] page dumped because: kasan: bad access detected [ 68.291648] [ 68.293124] Memory state around the buggy address: [ 68.297902] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.305107] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.312311] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.319512] ^ [ 68.324291] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.331495] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.338696] ================================================================== [ 70.988733] ================================================================== [ 70.995776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 71.003153] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 71.010444] [ 71.011924] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 71.011972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.011990] Hardware name: WinLink E850-96 board (DT) [ 71.012007] Call trace: [ 71.012019] show_stack+0x20/0x38 (C) [ 71.012051] dump_stack_lvl+0x8c/0xd0 [ 71.012082] print_report+0x118/0x5d0 [ 71.012111] kasan_report+0xdc/0x128 [ 71.012139] __asan_report_load4_noabort+0x20/0x30 [ 71.012172] kasan_atomics_helper+0x3dbc/0x4858 [ 71.012208] kasan_atomics+0x198/0x2e0 [ 71.012239] kunit_try_run_case+0x170/0x3f0 [ 71.012278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.012311] kthread+0x328/0x630 [ 71.012338] ret_from_fork+0x10/0x20 [ 71.012370] [ 71.080061] Allocated by task 349: [ 71.083447] kasan_save_stack+0x3c/0x68 [ 71.087266] kasan_save_track+0x20/0x40 [ 71.091086] kasan_save_alloc_info+0x40/0x58 [ 71.095339] __kasan_kmalloc+0xd4/0xd8 [ 71.099071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.103585] kasan_atomics+0xb8/0x2e0 [ 71.107231] kunit_try_run_case+0x170/0x3f0 [ 71.111398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.116866] kthread+0x328/0x630 [ 71.120078] ret_from_fork+0x10/0x20 [ 71.123637] [ 71.125113] The buggy address belongs to the object at ffff000807848f80 [ 71.125113] which belongs to the cache kmalloc-64 of size 64 [ 71.137439] The buggy address is located 0 bytes to the right of [ 71.137439] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 71.150286] [ 71.151762] The buggy address belongs to the physical page: [ 71.157318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 71.165305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.171813] page_type: f5(slab) [ 71.174946] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.182671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.190390] page dumped because: kasan: bad access detected [ 71.195945] [ 71.197420] Memory state around the buggy address: [ 71.202198] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.209403] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.216608] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.223809] ^ [ 71.228587] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.235792] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.242993] ================================================================== [ 64.114026] ================================================================== [ 64.121055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 64.128345] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 64.135634] [ 64.137120] CPU: 7 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 64.137181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.137196] Hardware name: WinLink E850-96 board (DT) [ 64.137219] Call trace: [ 64.137235] show_stack+0x20/0x38 (C) [ 64.137270] dump_stack_lvl+0x8c/0xd0 [ 64.137304] print_report+0x118/0x5d0 [ 64.137334] kasan_report+0xdc/0x128 [ 64.137361] kasan_check_range+0x100/0x1a8 [ 64.137393] __kasan_check_read+0x20/0x30 [ 64.137426] kasan_atomics_helper+0x1ec/0x4858 [ 64.137461] kasan_atomics+0x198/0x2e0 [ 64.137493] kunit_try_run_case+0x170/0x3f0 [ 64.137532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.137565] kthread+0x328/0x630 [ 64.137593] ret_from_fork+0x10/0x20 [ 64.137628] [ 64.208463] Allocated by task 349: [ 64.211851] kasan_save_stack+0x3c/0x68 [ 64.215668] kasan_save_track+0x20/0x40 [ 64.219487] kasan_save_alloc_info+0x40/0x58 [ 64.223741] __kasan_kmalloc+0xd4/0xd8 [ 64.227473] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.231987] kasan_atomics+0xb8/0x2e0 [ 64.235633] kunit_try_run_case+0x170/0x3f0 [ 64.239799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.245268] kthread+0x328/0x630 [ 64.248480] ret_from_fork+0x10/0x20 [ 64.252039] [ 64.253516] The buggy address belongs to the object at ffff000807848f80 [ 64.253516] which belongs to the cache kmalloc-64 of size 64 [ 64.265841] The buggy address is located 0 bytes to the right of [ 64.265841] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 64.278689] [ 64.280165] The buggy address belongs to the physical page: [ 64.285722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 64.293707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.300216] page_type: f5(slab) [ 64.303350] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.311072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.318791] page dumped because: kasan: bad access detected [ 64.324347] [ 64.325822] Memory state around the buggy address: [ 64.330603] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.337805] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.345010] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.352211] ^ [ 64.356990] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.364193] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.371394] ================================================================== [ 65.961763] ================================================================== [ 65.968771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 65.976058] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 65.983436] [ 65.984920] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 65.984973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.984989] Hardware name: WinLink E850-96 board (DT) [ 65.985008] Call trace: [ 65.985025] show_stack+0x20/0x38 (C) [ 65.985057] dump_stack_lvl+0x8c/0xd0 [ 65.985090] print_report+0x118/0x5d0 [ 65.985118] kasan_report+0xdc/0x128 [ 65.985146] kasan_check_range+0x100/0x1a8 [ 65.985177] __kasan_check_write+0x20/0x30 [ 65.985208] kasan_atomics_helper+0x414/0x4858 [ 65.985245] kasan_atomics+0x198/0x2e0 [ 65.985279] kunit_try_run_case+0x170/0x3f0 [ 65.985315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.985348] kthread+0x328/0x630 [ 65.985378] ret_from_fork+0x10/0x20 [ 65.985413] [ 66.056352] Allocated by task 349: [ 66.059737] kasan_save_stack+0x3c/0x68 [ 66.063557] kasan_save_track+0x20/0x40 [ 66.067376] kasan_save_alloc_info+0x40/0x58 [ 66.071630] __kasan_kmalloc+0xd4/0xd8 [ 66.075362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.079876] kasan_atomics+0xb8/0x2e0 [ 66.083522] kunit_try_run_case+0x170/0x3f0 [ 66.087688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.093157] kthread+0x328/0x630 [ 66.096368] ret_from_fork+0x10/0x20 [ 66.099928] [ 66.101403] The buggy address belongs to the object at ffff000807848f80 [ 66.101403] which belongs to the cache kmalloc-64 of size 64 [ 66.113730] The buggy address is located 0 bytes to the right of [ 66.113730] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 66.126576] [ 66.128054] The buggy address belongs to the physical page: [ 66.133610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 66.141597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.148104] page_type: f5(slab) [ 66.151238] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.158961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.166680] page dumped because: kasan: bad access detected [ 66.172235] [ 66.173711] Memory state around the buggy address: [ 66.178490] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.185694] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.192901] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.200100] ^ [ 66.204877] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.212083] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.219283] ================================================================== [ 75.207929] ================================================================== [ 75.214986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 75.222360] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 75.229738] [ 75.231219] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 75.231268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.231285] Hardware name: WinLink E850-96 board (DT) [ 75.231304] Call trace: [ 75.231317] show_stack+0x20/0x38 (C) [ 75.231348] dump_stack_lvl+0x8c/0xd0 [ 75.231377] print_report+0x118/0x5d0 [ 75.231407] kasan_report+0xdc/0x128 [ 75.231435] kasan_check_range+0x100/0x1a8 [ 75.231464] __kasan_check_write+0x20/0x30 [ 75.231496] kasan_atomics_helper+0x10c0/0x4858 [ 75.231531] kasan_atomics+0x198/0x2e0 [ 75.231565] kunit_try_run_case+0x170/0x3f0 [ 75.231603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.231635] kthread+0x328/0x630 [ 75.231662] ret_from_fork+0x10/0x20 [ 75.231693] [ 75.302741] Allocated by task 349: [ 75.306126] kasan_save_stack+0x3c/0x68 [ 75.309946] kasan_save_track+0x20/0x40 [ 75.313765] kasan_save_alloc_info+0x40/0x58 [ 75.318018] __kasan_kmalloc+0xd4/0xd8 [ 75.321751] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.326265] kasan_atomics+0xb8/0x2e0 [ 75.329911] kunit_try_run_case+0x170/0x3f0 [ 75.334077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.339546] kthread+0x328/0x630 [ 75.342758] ret_from_fork+0x10/0x20 [ 75.346317] [ 75.347792] The buggy address belongs to the object at ffff000807848f80 [ 75.347792] which belongs to the cache kmalloc-64 of size 64 [ 75.360119] The buggy address is located 0 bytes to the right of [ 75.360119] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 75.372965] [ 75.374441] The buggy address belongs to the physical page: [ 75.379998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 75.387983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.394493] page_type: f5(slab) [ 75.397627] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.405350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.413069] page dumped because: kasan: bad access detected [ 75.418624] [ 75.420100] Memory state around the buggy address: [ 75.424878] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.432083] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.439288] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.446489] ^ [ 75.451266] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.458471] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.465672] ================================================================== [ 76.798493] ================================================================== [ 76.805585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 76.812962] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 76.820340] [ 76.821819] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 76.821868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.821885] Hardware name: WinLink E850-96 board (DT) [ 76.821902] Call trace: [ 76.821915] show_stack+0x20/0x38 (C) [ 76.821948] dump_stack_lvl+0x8c/0xd0 [ 76.821979] print_report+0x118/0x5d0 [ 76.822006] kasan_report+0xdc/0x128 [ 76.822035] kasan_check_range+0x100/0x1a8 [ 76.822063] __kasan_check_write+0x20/0x30 [ 76.822095] kasan_atomics_helper+0x1384/0x4858 [ 76.822129] kasan_atomics+0x198/0x2e0 [ 76.822163] kunit_try_run_case+0x170/0x3f0 [ 76.822198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.822232] kthread+0x328/0x630 [ 76.822259] ret_from_fork+0x10/0x20 [ 76.822292] [ 76.893342] Allocated by task 349: [ 76.896727] kasan_save_stack+0x3c/0x68 [ 76.900547] kasan_save_track+0x20/0x40 [ 76.904366] kasan_save_alloc_info+0x40/0x58 [ 76.908619] __kasan_kmalloc+0xd4/0xd8 [ 76.912352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.916866] kasan_atomics+0xb8/0x2e0 [ 76.920512] kunit_try_run_case+0x170/0x3f0 [ 76.924678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.930147] kthread+0x328/0x630 [ 76.933359] ret_from_fork+0x10/0x20 [ 76.936918] [ 76.938393] The buggy address belongs to the object at ffff000807848f80 [ 76.938393] which belongs to the cache kmalloc-64 of size 64 [ 76.950720] The buggy address is located 0 bytes to the right of [ 76.950720] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 76.963567] [ 76.965042] The buggy address belongs to the physical page: [ 76.970598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 76.978584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.985094] page_type: f5(slab) [ 76.988227] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.995951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.003670] page dumped because: kasan: bad access detected [ 77.009225] [ 77.010701] Memory state around the buggy address: [ 77.015479] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.022684] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.029889] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.037090] ^ [ 77.041868] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.049073] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.056274] ================================================================== [ 69.932304] ================================================================== [ 69.939368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 69.946659] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 69.954037] [ 69.955516] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 69.955567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.955582] Hardware name: WinLink E850-96 board (DT) [ 69.955599] Call trace: [ 69.955611] show_stack+0x20/0x38 (C) [ 69.955641] dump_stack_lvl+0x8c/0xd0 [ 69.955673] print_report+0x118/0x5d0 [ 69.955699] kasan_report+0xdc/0x128 [ 69.955724] kasan_check_range+0x100/0x1a8 [ 69.955756] __kasan_check_write+0x20/0x30 [ 69.955787] kasan_atomics_helper+0xa6c/0x4858 [ 69.955823] kasan_atomics+0x198/0x2e0 [ 69.955857] kunit_try_run_case+0x170/0x3f0 [ 69.955890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.955923] kthread+0x328/0x630 [ 69.955949] ret_from_fork+0x10/0x20 [ 69.955982] [ 70.026952] Allocated by task 349: [ 70.030337] kasan_save_stack+0x3c/0x68 [ 70.034157] kasan_save_track+0x20/0x40 [ 70.037976] kasan_save_alloc_info+0x40/0x58 [ 70.042230] __kasan_kmalloc+0xd4/0xd8 [ 70.045962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.050476] kasan_atomics+0xb8/0x2e0 [ 70.054122] kunit_try_run_case+0x170/0x3f0 [ 70.058289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.063757] kthread+0x328/0x630 [ 70.066968] ret_from_fork+0x10/0x20 [ 70.070528] [ 70.072004] The buggy address belongs to the object at ffff000807848f80 [ 70.072004] which belongs to the cache kmalloc-64 of size 64 [ 70.084330] The buggy address is located 0 bytes to the right of [ 70.084330] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 70.097177] [ 70.098653] The buggy address belongs to the physical page: [ 70.104208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 70.112194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.118704] page_type: f5(slab) [ 70.121837] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.129561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.137280] page dumped because: kasan: bad access detected [ 70.142836] [ 70.144311] Memory state around the buggy address: [ 70.149089] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.156294] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.163499] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.170700] ^ [ 70.175478] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.182682] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.189884] ================================================================== [ 77.855473] ================================================================== [ 77.862513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 77.869890] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 77.877268] [ 77.878750] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 77.878800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.878815] Hardware name: WinLink E850-96 board (DT) [ 77.878835] Call trace: [ 77.878848] show_stack+0x20/0x38 (C) [ 77.878882] dump_stack_lvl+0x8c/0xd0 [ 77.878911] print_report+0x118/0x5d0 [ 77.878941] kasan_report+0xdc/0x128 [ 77.878969] kasan_check_range+0x100/0x1a8 [ 77.879001] __kasan_check_write+0x20/0x30 [ 77.879029] kasan_atomics_helper+0x14e4/0x4858 [ 77.879064] kasan_atomics+0x198/0x2e0 [ 77.879097] kunit_try_run_case+0x170/0x3f0 [ 77.879131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.879165] kthread+0x328/0x630 [ 77.879191] ret_from_fork+0x10/0x20 [ 77.879222] [ 77.950270] Allocated by task 349: [ 77.953656] kasan_save_stack+0x3c/0x68 [ 77.957475] kasan_save_track+0x20/0x40 [ 77.961295] kasan_save_alloc_info+0x40/0x58 [ 77.965548] __kasan_kmalloc+0xd4/0xd8 [ 77.969281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.973795] kasan_atomics+0xb8/0x2e0 [ 77.977440] kunit_try_run_case+0x170/0x3f0 [ 77.981607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.987076] kthread+0x328/0x630 [ 77.990287] ret_from_fork+0x10/0x20 [ 77.993846] [ 77.995322] The buggy address belongs to the object at ffff000807848f80 [ 77.995322] which belongs to the cache kmalloc-64 of size 64 [ 78.007649] The buggy address is located 0 bytes to the right of [ 78.007649] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 78.020495] [ 78.021973] The buggy address belongs to the physical page: [ 78.027527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 78.035513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.042023] page_type: f5(slab) [ 78.045157] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.052879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.060598] page dumped because: kasan: bad access detected [ 78.066154] [ 78.067630] Memory state around the buggy address: [ 78.072408] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.079613] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.086818] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.094018] ^ [ 78.098796] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.106001] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.113202] ================================================================== [ 63.583501] ================================================================== [ 63.597628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 63.605004] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 63.612293] [ 63.613777] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 63.613840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.613856] Hardware name: WinLink E850-96 board (DT) [ 63.613879] Call trace: [ 63.613894] show_stack+0x20/0x38 (C) [ 63.613930] dump_stack_lvl+0x8c/0xd0 [ 63.613964] print_report+0x118/0x5d0 [ 63.613995] kasan_report+0xdc/0x128 [ 63.614022] __asan_report_load4_noabort+0x20/0x30 [ 63.614059] kasan_atomics_helper+0x40a8/0x4858 [ 63.614095] kasan_atomics+0x198/0x2e0 [ 63.614127] kunit_try_run_case+0x170/0x3f0 [ 63.614168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.614203] kthread+0x328/0x630 [ 63.614233] ret_from_fork+0x10/0x20 [ 63.614270] [ 63.681910] Allocated by task 349: [ 63.685295] kasan_save_stack+0x3c/0x68 [ 63.689113] kasan_save_track+0x20/0x40 [ 63.692932] kasan_save_alloc_info+0x40/0x58 [ 63.697186] __kasan_kmalloc+0xd4/0xd8 [ 63.700920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.705432] kasan_atomics+0xb8/0x2e0 [ 63.709078] kunit_try_run_case+0x170/0x3f0 [ 63.713244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.718713] kthread+0x328/0x630 [ 63.721925] ret_from_fork+0x10/0x20 [ 63.725484] [ 63.726961] The buggy address belongs to the object at ffff000807848f80 [ 63.726961] which belongs to the cache kmalloc-64 of size 64 [ 63.739288] The buggy address is located 0 bytes to the right of [ 63.739288] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 63.752133] [ 63.753612] The buggy address belongs to the physical page: [ 63.759168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 63.767153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.773663] page_type: f5(slab) [ 63.776798] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.784517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.792238] page dumped because: kasan: bad access detected [ 63.797792] [ 63.799267] Memory state around the buggy address: [ 63.804049] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.811251] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.818457] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.825656] ^ [ 63.830435] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.837639] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.844843] ================================================================== [ 79.439102] ================================================================== [ 79.446170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 79.453547] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 79.460925] [ 79.462406] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 79.462457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.462474] Hardware name: WinLink E850-96 board (DT) [ 79.462494] Call trace: [ 79.462505] show_stack+0x20/0x38 (C) [ 79.462539] dump_stack_lvl+0x8c/0xd0 [ 79.462570] print_report+0x118/0x5d0 [ 79.462597] kasan_report+0xdc/0x128 [ 79.462625] kasan_check_range+0x100/0x1a8 [ 79.462655] __kasan_check_write+0x20/0x30 [ 79.462686] kasan_atomics_helper+0x16d0/0x4858 [ 79.462722] kasan_atomics+0x198/0x2e0 [ 79.462753] kunit_try_run_case+0x170/0x3f0 [ 79.462789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.462821] kthread+0x328/0x630 [ 79.462849] ret_from_fork+0x10/0x20 [ 79.462880] [ 79.533927] Allocated by task 349: [ 79.537313] kasan_save_stack+0x3c/0x68 [ 79.541132] kasan_save_track+0x20/0x40 [ 79.544952] kasan_save_alloc_info+0x40/0x58 [ 79.549205] __kasan_kmalloc+0xd4/0xd8 [ 79.552937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.557451] kasan_atomics+0xb8/0x2e0 [ 79.561097] kunit_try_run_case+0x170/0x3f0 [ 79.565264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.570732] kthread+0x328/0x630 [ 79.573944] ret_from_fork+0x10/0x20 [ 79.577503] [ 79.578979] The buggy address belongs to the object at ffff000807848f80 [ 79.578979] which belongs to the cache kmalloc-64 of size 64 [ 79.591306] The buggy address is located 0 bytes to the right of [ 79.591306] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 79.604152] [ 79.605630] The buggy address belongs to the physical page: [ 79.611184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 79.619170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.625680] page_type: f5(slab) [ 79.628814] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.636537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.644256] page dumped because: kasan: bad access detected [ 79.649811] [ 79.651287] Memory state around the buggy address: [ 79.656064] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.663269] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.670474] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.677675] ^ [ 79.682453] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.689658] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.696859] ================================================================== [ 69.137553] ================================================================== [ 69.144588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 69.151879] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 69.159257] [ 69.160738] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 69.160785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.160801] Hardware name: WinLink E850-96 board (DT) [ 69.160816] Call trace: [ 69.160830] show_stack+0x20/0x38 (C) [ 69.160863] dump_stack_lvl+0x8c/0xd0 [ 69.160893] print_report+0x118/0x5d0 [ 69.160920] kasan_report+0xdc/0x128 [ 69.160947] kasan_check_range+0x100/0x1a8 [ 69.160977] __kasan_check_write+0x20/0x30 [ 69.161008] kasan_atomics_helper+0x934/0x4858 [ 69.161043] kasan_atomics+0x198/0x2e0 [ 69.161076] kunit_try_run_case+0x170/0x3f0 [ 69.161113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.161145] kthread+0x328/0x630 [ 69.161172] ret_from_fork+0x10/0x20 [ 69.161203] [ 69.232172] Allocated by task 349: [ 69.235558] kasan_save_stack+0x3c/0x68 [ 69.239377] kasan_save_track+0x20/0x40 [ 69.243197] kasan_save_alloc_info+0x40/0x58 [ 69.247450] __kasan_kmalloc+0xd4/0xd8 [ 69.251183] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.255696] kasan_atomics+0xb8/0x2e0 [ 69.259342] kunit_try_run_case+0x170/0x3f0 [ 69.263508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.268977] kthread+0x328/0x630 [ 69.272189] ret_from_fork+0x10/0x20 [ 69.275748] [ 69.277224] The buggy address belongs to the object at ffff000807848f80 [ 69.277224] which belongs to the cache kmalloc-64 of size 64 [ 69.289550] The buggy address is located 0 bytes to the right of [ 69.289550] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 69.302397] [ 69.303873] The buggy address belongs to the physical page: [ 69.309429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 69.317416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.323924] page_type: f5(slab) [ 69.327059] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.334781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.342501] page dumped because: kasan: bad access detected [ 69.348056] [ 69.349531] Memory state around the buggy address: [ 69.354310] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.361515] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.368719] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.375920] ^ [ 69.380698] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.387902] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.395104] ================================================================== [ 68.346048] ================================================================== [ 68.353107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 68.360397] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 68.367776] [ 68.369255] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 68.369302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.369318] Hardware name: WinLink E850-96 board (DT) [ 68.369336] Call trace: [ 68.369349] show_stack+0x20/0x38 (C) [ 68.369380] dump_stack_lvl+0x8c/0xd0 [ 68.369411] print_report+0x118/0x5d0 [ 68.369437] kasan_report+0xdc/0x128 [ 68.369466] kasan_check_range+0x100/0x1a8 [ 68.369494] __kasan_check_write+0x20/0x30 [ 68.369524] kasan_atomics_helper+0x7cc/0x4858 [ 68.369559] kasan_atomics+0x198/0x2e0 [ 68.369592] kunit_try_run_case+0x170/0x3f0 [ 68.369627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.369659] kthread+0x328/0x630 [ 68.369686] ret_from_fork+0x10/0x20 [ 68.369716] [ 68.440691] Allocated by task 349: [ 68.444077] kasan_save_stack+0x3c/0x68 [ 68.447896] kasan_save_track+0x20/0x40 [ 68.451715] kasan_save_alloc_info+0x40/0x58 [ 68.455969] __kasan_kmalloc+0xd4/0xd8 [ 68.459701] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.464215] kasan_atomics+0xb8/0x2e0 [ 68.467861] kunit_try_run_case+0x170/0x3f0 [ 68.472027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.477496] kthread+0x328/0x630 [ 68.480708] ret_from_fork+0x10/0x20 [ 68.484267] [ 68.485742] The buggy address belongs to the object at ffff000807848f80 [ 68.485742] which belongs to the cache kmalloc-64 of size 64 [ 68.498069] The buggy address is located 0 bytes to the right of [ 68.498069] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 68.510916] [ 68.512391] The buggy address belongs to the physical page: [ 68.517947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 68.525933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.532443] page_type: f5(slab) [ 68.535578] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.543300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.551020] page dumped because: kasan: bad access detected [ 68.556575] [ 68.558050] Memory state around the buggy address: [ 68.562828] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.570033] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.577238] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.584439] ^ [ 68.589217] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.596421] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.603623] ================================================================== [ 71.250340] ================================================================== [ 71.257404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 71.264694] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 71.272072] [ 71.273551] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 71.273601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.273619] Hardware name: WinLink E850-96 board (DT) [ 71.273638] Call trace: [ 71.273653] show_stack+0x20/0x38 (C) [ 71.273686] dump_stack_lvl+0x8c/0xd0 [ 71.273716] print_report+0x118/0x5d0 [ 71.273746] kasan_report+0xdc/0x128 [ 71.273772] kasan_check_range+0x100/0x1a8 [ 71.273803] __kasan_check_write+0x20/0x30 [ 71.273835] kasan_atomics_helper+0xc08/0x4858 [ 71.273870] kasan_atomics+0x198/0x2e0 [ 71.273903] kunit_try_run_case+0x170/0x3f0 [ 71.273937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.273971] kthread+0x328/0x630 [ 71.273998] ret_from_fork+0x10/0x20 [ 71.274029] [ 71.344988] Allocated by task 349: [ 71.348373] kasan_save_stack+0x3c/0x68 [ 71.352192] kasan_save_track+0x20/0x40 [ 71.356012] kasan_save_alloc_info+0x40/0x58 [ 71.360266] __kasan_kmalloc+0xd4/0xd8 [ 71.363998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.368512] kasan_atomics+0xb8/0x2e0 [ 71.372157] kunit_try_run_case+0x170/0x3f0 [ 71.376324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.381793] kthread+0x328/0x630 [ 71.385005] ret_from_fork+0x10/0x20 [ 71.388564] [ 71.390039] The buggy address belongs to the object at ffff000807848f80 [ 71.390039] which belongs to the cache kmalloc-64 of size 64 [ 71.402366] The buggy address is located 0 bytes to the right of [ 71.402366] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 71.415212] [ 71.416688] The buggy address belongs to the physical page: [ 71.422244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 71.430230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.436740] page_type: f5(slab) [ 71.439873] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.447597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.455316] page dumped because: kasan: bad access detected [ 71.460871] [ 71.462347] Memory state around the buggy address: [ 71.467125] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.474330] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.481534] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.488735] ^ [ 71.493513] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.500718] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.507920] ================================================================== [ 78.650751] ================================================================== [ 78.657813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 78.665191] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 78.672482] [ 78.673962] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 78.674008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.674026] Hardware name: WinLink E850-96 board (DT) [ 78.674046] Call trace: [ 78.674056] show_stack+0x20/0x38 (C) [ 78.674091] dump_stack_lvl+0x8c/0xd0 [ 78.674119] print_report+0x118/0x5d0 [ 78.674147] kasan_report+0xdc/0x128 [ 78.674176] __asan_report_load8_noabort+0x20/0x30 [ 78.674208] kasan_atomics_helper+0x3db0/0x4858 [ 78.674243] kasan_atomics+0x198/0x2e0 [ 78.674277] kunit_try_run_case+0x170/0x3f0 [ 78.674312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.674345] kthread+0x328/0x630 [ 78.674372] ret_from_fork+0x10/0x20 [ 78.674404] [ 78.742099] Allocated by task 349: [ 78.745484] kasan_save_stack+0x3c/0x68 [ 78.749304] kasan_save_track+0x20/0x40 [ 78.753123] kasan_save_alloc_info+0x40/0x58 [ 78.757377] __kasan_kmalloc+0xd4/0xd8 [ 78.761109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.765623] kasan_atomics+0xb8/0x2e0 [ 78.769269] kunit_try_run_case+0x170/0x3f0 [ 78.773435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.778904] kthread+0x328/0x630 [ 78.782116] ret_from_fork+0x10/0x20 [ 78.785675] [ 78.787150] The buggy address belongs to the object at ffff000807848f80 [ 78.787150] which belongs to the cache kmalloc-64 of size 64 [ 78.799477] The buggy address is located 0 bytes to the right of [ 78.799477] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 78.812324] [ 78.813799] The buggy address belongs to the physical page: [ 78.819355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 78.827341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.833851] page_type: f5(slab) [ 78.836984] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.844708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.852427] page dumped because: kasan: bad access detected [ 78.857983] [ 78.859458] Memory state around the buggy address: [ 78.864236] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.871441] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.878646] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.885847] ^ [ 78.890625] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.897829] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.905031] ================================================================== [ 73.621310] ================================================================== [ 73.628376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 73.635752] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 73.643130] [ 73.644611] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 73.644660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.644677] Hardware name: WinLink E850-96 board (DT) [ 73.644695] Call trace: [ 73.644709] show_stack+0x20/0x38 (C) [ 73.644743] dump_stack_lvl+0x8c/0xd0 [ 73.644775] print_report+0x118/0x5d0 [ 73.644803] kasan_report+0xdc/0x128 [ 73.644830] __asan_report_store8_noabort+0x20/0x30 [ 73.644862] kasan_atomics_helper+0x3e5c/0x4858 [ 73.644897] kasan_atomics+0x198/0x2e0 [ 73.644931] kunit_try_run_case+0x170/0x3f0 [ 73.644966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.645000] kthread+0x328/0x630 [ 73.645028] ret_from_fork+0x10/0x20 [ 73.645059] [ 73.712834] Allocated by task 349: [ 73.716219] kasan_save_stack+0x3c/0x68 [ 73.720039] kasan_save_track+0x20/0x40 [ 73.723858] kasan_save_alloc_info+0x40/0x58 [ 73.728112] __kasan_kmalloc+0xd4/0xd8 [ 73.731844] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.736358] kasan_atomics+0xb8/0x2e0 [ 73.740004] kunit_try_run_case+0x170/0x3f0 [ 73.744171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.749639] kthread+0x328/0x630 [ 73.752851] ret_from_fork+0x10/0x20 [ 73.756410] [ 73.757886] The buggy address belongs to the object at ffff000807848f80 [ 73.757886] which belongs to the cache kmalloc-64 of size 64 [ 73.770212] The buggy address is located 0 bytes to the right of [ 73.770212] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 73.783059] [ 73.784535] The buggy address belongs to the physical page: [ 73.790090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 73.798076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.804586] page_type: f5(slab) [ 73.807723] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.815443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.823163] page dumped because: kasan: bad access detected [ 73.828718] [ 73.830194] Memory state around the buggy address: [ 73.834971] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.842176] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.849381] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.856582] ^ [ 73.861360] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.868565] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.875766] ================================================================== [ 78.120523] ================================================================== [ 78.127614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 78.134991] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 78.142369] [ 78.143848] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 78.143895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.143912] Hardware name: WinLink E850-96 board (DT) [ 78.143930] Call trace: [ 78.143944] show_stack+0x20/0x38 (C) [ 78.143979] dump_stack_lvl+0x8c/0xd0 [ 78.144007] print_report+0x118/0x5d0 [ 78.144038] kasan_report+0xdc/0x128 [ 78.144067] kasan_check_range+0x100/0x1a8 [ 78.144098] __kasan_check_write+0x20/0x30 [ 78.144129] kasan_atomics_helper+0x154c/0x4858 [ 78.144165] kasan_atomics+0x198/0x2e0 [ 78.144198] kunit_try_run_case+0x170/0x3f0 [ 78.144235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.144267] kthread+0x328/0x630 [ 78.144293] ret_from_fork+0x10/0x20 [ 78.144326] [ 78.215371] Allocated by task 349: [ 78.218757] kasan_save_stack+0x3c/0x68 [ 78.222575] kasan_save_track+0x20/0x40 [ 78.226395] kasan_save_alloc_info+0x40/0x58 [ 78.230648] __kasan_kmalloc+0xd4/0xd8 [ 78.234381] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.238895] kasan_atomics+0xb8/0x2e0 [ 78.242540] kunit_try_run_case+0x170/0x3f0 [ 78.246707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.252176] kthread+0x328/0x630 [ 78.255387] ret_from_fork+0x10/0x20 [ 78.258946] [ 78.260422] The buggy address belongs to the object at ffff000807848f80 [ 78.260422] which belongs to the cache kmalloc-64 of size 64 [ 78.272749] The buggy address is located 0 bytes to the right of [ 78.272749] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 78.285595] [ 78.287071] The buggy address belongs to the physical page: [ 78.292627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 78.300613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.307123] page_type: f5(slab) [ 78.310256] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.317980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.325699] page dumped because: kasan: bad access detected [ 78.331254] [ 78.332730] Memory state around the buggy address: [ 78.337508] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.344713] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.351917] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.359119] ^ [ 78.363897] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.371101] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.378302] ================================================================== [ 78.912400] ================================================================== [ 78.919442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 78.926819] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 78.934197] [ 78.935676] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 78.935725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.935741] Hardware name: WinLink E850-96 board (DT) [ 78.935758] Call trace: [ 78.935772] show_stack+0x20/0x38 (C) [ 78.935804] dump_stack_lvl+0x8c/0xd0 [ 78.935834] print_report+0x118/0x5d0 [ 78.935864] kasan_report+0xdc/0x128 [ 78.935891] kasan_check_range+0x100/0x1a8 [ 78.935922] __kasan_check_write+0x20/0x30 [ 78.935955] kasan_atomics_helper+0x1644/0x4858 [ 78.935989] kasan_atomics+0x198/0x2e0 [ 78.936021] kunit_try_run_case+0x170/0x3f0 [ 78.936056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.936088] kthread+0x328/0x630 [ 78.936116] ret_from_fork+0x10/0x20 [ 78.936149] [ 79.007199] Allocated by task 349: [ 79.010585] kasan_save_stack+0x3c/0x68 [ 79.014404] kasan_save_track+0x20/0x40 [ 79.018223] kasan_save_alloc_info+0x40/0x58 [ 79.022477] __kasan_kmalloc+0xd4/0xd8 [ 79.026209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.030723] kasan_atomics+0xb8/0x2e0 [ 79.034369] kunit_try_run_case+0x170/0x3f0 [ 79.038535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.044004] kthread+0x328/0x630 [ 79.047216] ret_from_fork+0x10/0x20 [ 79.050775] [ 79.052251] The buggy address belongs to the object at ffff000807848f80 [ 79.052251] which belongs to the cache kmalloc-64 of size 64 [ 79.064577] The buggy address is located 0 bytes to the right of [ 79.064577] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 79.077424] [ 79.078900] The buggy address belongs to the physical page: [ 79.084455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 79.092441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.098951] page_type: f5(slab) [ 79.102087] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.109808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.117527] page dumped because: kasan: bad access detected [ 79.123082] [ 79.124558] Memory state around the buggy address: [ 79.129336] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.136541] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.143746] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.150947] ^ [ 79.155725] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.162930] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.170131] ================================================================== [ 65.696840] ================================================================== [ 65.703844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 65.711132] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 65.718510] [ 65.719993] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 65.720046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.720061] Hardware name: WinLink E850-96 board (DT) [ 65.720082] Call trace: [ 65.720096] show_stack+0x20/0x38 (C) [ 65.720132] dump_stack_lvl+0x8c/0xd0 [ 65.720164] print_report+0x118/0x5d0 [ 65.720193] kasan_report+0xdc/0x128 [ 65.720221] kasan_check_range+0x100/0x1a8 [ 65.720251] __kasan_check_write+0x20/0x30 [ 65.720283] kasan_atomics_helper+0x3ac/0x4858 [ 65.720320] kasan_atomics+0x198/0x2e0 [ 65.720352] kunit_try_run_case+0x170/0x3f0 [ 65.720388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.720420] kthread+0x328/0x630 [ 65.720450] ret_from_fork+0x10/0x20 [ 65.720485] [ 65.791425] Allocated by task 349: [ 65.794811] kasan_save_stack+0x3c/0x68 [ 65.798630] kasan_save_track+0x20/0x40 [ 65.802449] kasan_save_alloc_info+0x40/0x58 [ 65.806703] __kasan_kmalloc+0xd4/0xd8 [ 65.810435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.814949] kasan_atomics+0xb8/0x2e0 [ 65.818595] kunit_try_run_case+0x170/0x3f0 [ 65.822762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.828230] kthread+0x328/0x630 [ 65.831442] ret_from_fork+0x10/0x20 [ 65.835001] [ 65.836477] The buggy address belongs to the object at ffff000807848f80 [ 65.836477] which belongs to the cache kmalloc-64 of size 64 [ 65.848803] The buggy address is located 0 bytes to the right of [ 65.848803] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 65.861650] [ 65.863127] The buggy address belongs to the physical page: [ 65.868683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 65.876671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.883178] page_type: f5(slab) [ 65.886313] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.894035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.901754] page dumped because: kasan: bad access detected [ 65.907309] [ 65.908784] Memory state around the buggy address: [ 65.913563] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.920767] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.927974] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.935173] ^ [ 65.939951] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.947156] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.954357] ================================================================== [ 68.611000] ================================================================== [ 68.618034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 68.625324] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 68.632702] [ 68.634183] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 68.634232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.634247] Hardware name: WinLink E850-96 board (DT) [ 68.634268] Call trace: [ 68.634280] show_stack+0x20/0x38 (C) [ 68.634311] dump_stack_lvl+0x8c/0xd0 [ 68.634343] print_report+0x118/0x5d0 [ 68.634371] kasan_report+0xdc/0x128 [ 68.634399] kasan_check_range+0x100/0x1a8 [ 68.634430] __kasan_check_write+0x20/0x30 [ 68.634461] kasan_atomics_helper+0x894/0x4858 [ 68.634496] kasan_atomics+0x198/0x2e0 [ 68.634529] kunit_try_run_case+0x170/0x3f0 [ 68.634562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.634594] kthread+0x328/0x630 [ 68.634624] ret_from_fork+0x10/0x20 [ 68.634656] [ 68.705617] Allocated by task 349: [ 68.709003] kasan_save_stack+0x3c/0x68 [ 68.712822] kasan_save_track+0x20/0x40 [ 68.716642] kasan_save_alloc_info+0x40/0x58 [ 68.720895] __kasan_kmalloc+0xd4/0xd8 [ 68.724628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.729142] kasan_atomics+0xb8/0x2e0 [ 68.732787] kunit_try_run_case+0x170/0x3f0 [ 68.736954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.742423] kthread+0x328/0x630 [ 68.745634] ret_from_fork+0x10/0x20 [ 68.749193] [ 68.750669] The buggy address belongs to the object at ffff000807848f80 [ 68.750669] which belongs to the cache kmalloc-64 of size 64 [ 68.762996] The buggy address is located 0 bytes to the right of [ 68.762996] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 68.775842] [ 68.777318] The buggy address belongs to the physical page: [ 68.782874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 68.790861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.797370] page_type: f5(slab) [ 68.800503] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.808227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.815946] page dumped because: kasan: bad access detected [ 68.821501] [ 68.822977] Memory state around the buggy address: [ 68.827755] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.834960] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.842165] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.849366] ^ [ 68.854143] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.861348] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.868549] ================================================================== [ 72.568401] ================================================================== [ 72.575440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 72.582817] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 72.590108] [ 72.591587] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 72.591639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.591657] Hardware name: WinLink E850-96 board (DT) [ 72.591676] Call trace: [ 72.591689] show_stack+0x20/0x38 (C) [ 72.591721] dump_stack_lvl+0x8c/0xd0 [ 72.591753] print_report+0x118/0x5d0 [ 72.591782] kasan_report+0xdc/0x128 [ 72.591810] __asan_report_load4_noabort+0x20/0x30 [ 72.591842] kasan_atomics_helper+0x3e04/0x4858 [ 72.591877] kasan_atomics+0x198/0x2e0 [ 72.591911] kunit_try_run_case+0x170/0x3f0 [ 72.591946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.591981] kthread+0x328/0x630 [ 72.592008] ret_from_fork+0x10/0x20 [ 72.592040] [ 72.659725] Allocated by task 349: [ 72.663110] kasan_save_stack+0x3c/0x68 [ 72.666930] kasan_save_track+0x20/0x40 [ 72.670749] kasan_save_alloc_info+0x40/0x58 [ 72.675003] __kasan_kmalloc+0xd4/0xd8 [ 72.678735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.683249] kasan_atomics+0xb8/0x2e0 [ 72.686895] kunit_try_run_case+0x170/0x3f0 [ 72.691061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.696530] kthread+0x328/0x630 [ 72.699742] ret_from_fork+0x10/0x20 [ 72.703301] [ 72.704776] The buggy address belongs to the object at ffff000807848f80 [ 72.704776] which belongs to the cache kmalloc-64 of size 64 [ 72.717103] The buggy address is located 0 bytes to the right of [ 72.717103] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 72.729950] [ 72.731426] The buggy address belongs to the physical page: [ 72.736982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 72.744967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.751477] page_type: f5(slab) [ 72.754610] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.762334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.770053] page dumped because: kasan: bad access detected [ 72.775609] [ 72.777084] Memory state around the buggy address: [ 72.781862] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.789067] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.796272] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.803473] ^ [ 72.808251] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.815455] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.822657] ================================================================== [ 67.286368] ================================================================== [ 67.293401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 67.300691] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 67.308071] [ 67.309553] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 67.309605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.309622] Hardware name: WinLink E850-96 board (DT) [ 67.309642] Call trace: [ 67.309652] show_stack+0x20/0x38 (C) [ 67.309684] dump_stack_lvl+0x8c/0xd0 [ 67.309716] print_report+0x118/0x5d0 [ 67.309745] kasan_report+0xdc/0x128 [ 67.309773] kasan_check_range+0x100/0x1a8 [ 67.309802] __kasan_check_write+0x20/0x30 [ 67.309833] kasan_atomics_helper+0x61c/0x4858 [ 67.309869] kasan_atomics+0x198/0x2e0 [ 67.309900] kunit_try_run_case+0x170/0x3f0 [ 67.309936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.309969] kthread+0x328/0x630 [ 67.309996] ret_from_fork+0x10/0x20 [ 67.310029] [ 67.380985] Allocated by task 349: [ 67.384370] kasan_save_stack+0x3c/0x68 [ 67.388190] kasan_save_track+0x20/0x40 [ 67.392009] kasan_save_alloc_info+0x40/0x58 [ 67.396262] __kasan_kmalloc+0xd4/0xd8 [ 67.399995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.404509] kasan_atomics+0xb8/0x2e0 [ 67.408155] kunit_try_run_case+0x170/0x3f0 [ 67.412321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.417790] kthread+0x328/0x630 [ 67.421002] ret_from_fork+0x10/0x20 [ 67.424561] [ 67.426036] The buggy address belongs to the object at ffff000807848f80 [ 67.426036] which belongs to the cache kmalloc-64 of size 64 [ 67.438363] The buggy address is located 0 bytes to the right of [ 67.438363] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 67.451209] [ 67.452686] The buggy address belongs to the physical page: [ 67.458241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 67.466228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.472737] page_type: f5(slab) [ 67.475871] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.483594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.491313] page dumped because: kasan: bad access detected [ 67.496869] [ 67.498344] Memory state around the buggy address: [ 67.503122] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.510327] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.517532] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.524732] ^ [ 67.529511] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.536715] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.543916] ================================================================== [ 70.197231] ================================================================== [ 70.204294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 70.211585] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 70.218963] [ 70.220445] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 70.220494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.220511] Hardware name: WinLink E850-96 board (DT) [ 70.220529] Call trace: [ 70.220540] show_stack+0x20/0x38 (C) [ 70.220572] dump_stack_lvl+0x8c/0xd0 [ 70.220602] print_report+0x118/0x5d0 [ 70.220630] kasan_report+0xdc/0x128 [ 70.220659] kasan_check_range+0x100/0x1a8 [ 70.220688] __kasan_check_write+0x20/0x30 [ 70.220720] kasan_atomics_helper+0xad4/0x4858 [ 70.220756] kasan_atomics+0x198/0x2e0 [ 70.220791] kunit_try_run_case+0x170/0x3f0 [ 70.220826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.220858] kthread+0x328/0x630 [ 70.220884] ret_from_fork+0x10/0x20 [ 70.220914] [ 70.291878] Allocated by task 349: [ 70.295264] kasan_save_stack+0x3c/0x68 [ 70.299084] kasan_save_track+0x20/0x40 [ 70.302903] kasan_save_alloc_info+0x40/0x58 [ 70.307156] __kasan_kmalloc+0xd4/0xd8 [ 70.310889] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.315403] kasan_atomics+0xb8/0x2e0 [ 70.319049] kunit_try_run_case+0x170/0x3f0 [ 70.323215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.328684] kthread+0x328/0x630 [ 70.331895] ret_from_fork+0x10/0x20 [ 70.335454] [ 70.336930] The buggy address belongs to the object at ffff000807848f80 [ 70.336930] which belongs to the cache kmalloc-64 of size 64 [ 70.349257] The buggy address is located 0 bytes to the right of [ 70.349257] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 70.362103] [ 70.363579] The buggy address belongs to the physical page: [ 70.369135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 70.377122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.383631] page_type: f5(slab) [ 70.386765] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.394488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.402207] page dumped because: kasan: bad access detected [ 70.407762] [ 70.409238] Memory state around the buggy address: [ 70.414016] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.421221] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.428425] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.435626] ^ [ 70.440405] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.447609] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.454810] ================================================================== [ 72.829982] ================================================================== [ 72.837067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 72.844358] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 72.851649] [ 72.853129] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 72.853179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.853196] Hardware name: WinLink E850-96 board (DT) [ 72.853215] Call trace: [ 72.853227] show_stack+0x20/0x38 (C) [ 72.853260] dump_stack_lvl+0x8c/0xd0 [ 72.853293] print_report+0x118/0x5d0 [ 72.853322] kasan_report+0xdc/0x128 [ 72.853351] kasan_check_range+0x100/0x1a8 [ 72.853383] __kasan_check_read+0x20/0x30 [ 72.853413] kasan_atomics_helper+0xdd4/0x4858 [ 72.853448] kasan_atomics+0x198/0x2e0 [ 72.853479] kunit_try_run_case+0x170/0x3f0 [ 72.853515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.853549] kthread+0x328/0x630 [ 72.853577] ret_from_fork+0x10/0x20 [ 72.853610] [ 72.924478] Allocated by task 349: [ 72.927863] kasan_save_stack+0x3c/0x68 [ 72.931683] kasan_save_track+0x20/0x40 [ 72.935502] kasan_save_alloc_info+0x40/0x58 [ 72.939756] __kasan_kmalloc+0xd4/0xd8 [ 72.943488] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.948002] kasan_atomics+0xb8/0x2e0 [ 72.951648] kunit_try_run_case+0x170/0x3f0 [ 72.955814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.961283] kthread+0x328/0x630 [ 72.964495] ret_from_fork+0x10/0x20 [ 72.968054] [ 72.969529] The buggy address belongs to the object at ffff000807848f80 [ 72.969529] which belongs to the cache kmalloc-64 of size 64 [ 72.981856] The buggy address is located 0 bytes to the right of [ 72.981856] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 72.994703] [ 72.996178] The buggy address belongs to the physical page: [ 73.001734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 73.009720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.016230] page_type: f5(slab) [ 73.019363] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.027087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.034806] page dumped because: kasan: bad access detected [ 73.040362] [ 73.041837] Memory state around the buggy address: [ 73.046615] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.053820] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.061025] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.068226] ^ [ 73.073004] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.080208] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.087409] ================================================================== [ 75.473032] ================================================================== [ 75.480085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 75.487460] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 75.494839] [ 75.496319] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 75.496370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.496384] Hardware name: WinLink E850-96 board (DT) [ 75.496405] Call trace: [ 75.496418] show_stack+0x20/0x38 (C) [ 75.496449] dump_stack_lvl+0x8c/0xd0 [ 75.496481] print_report+0x118/0x5d0 [ 75.496510] kasan_report+0xdc/0x128 [ 75.496537] kasan_check_range+0x100/0x1a8 [ 75.496569] __kasan_check_write+0x20/0x30 [ 75.496600] kasan_atomics_helper+0x1128/0x4858 [ 75.496636] kasan_atomics+0x198/0x2e0 [ 75.496668] kunit_try_run_case+0x170/0x3f0 [ 75.496702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.496736] kthread+0x328/0x630 [ 75.496763] ret_from_fork+0x10/0x20 [ 75.496794] [ 75.567841] Allocated by task 349: [ 75.571226] kasan_save_stack+0x3c/0x68 [ 75.575046] kasan_save_track+0x20/0x40 [ 75.578865] kasan_save_alloc_info+0x40/0x58 [ 75.583119] __kasan_kmalloc+0xd4/0xd8 [ 75.586851] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.591365] kasan_atomics+0xb8/0x2e0 [ 75.595011] kunit_try_run_case+0x170/0x3f0 [ 75.599177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.604646] kthread+0x328/0x630 [ 75.607857] ret_from_fork+0x10/0x20 [ 75.611417] [ 75.612892] The buggy address belongs to the object at ffff000807848f80 [ 75.612892] which belongs to the cache kmalloc-64 of size 64 [ 75.625219] The buggy address is located 0 bytes to the right of [ 75.625219] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 75.638065] [ 75.639541] The buggy address belongs to the physical page: [ 75.645098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 75.653084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.659593] page_type: f5(slab) [ 75.662728] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.670450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.678169] page dumped because: kasan: bad access detected [ 75.683725] [ 75.685200] Memory state around the buggy address: [ 75.689978] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.697183] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.704388] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.711589] ^ [ 75.716367] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.723572] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.730773] ================================================================== [ 67.816194] ================================================================== [ 67.823254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 67.830544] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 67.837922] [ 67.839402] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 67.839450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.839466] Hardware name: WinLink E850-96 board (DT) [ 67.839485] Call trace: [ 67.839497] show_stack+0x20/0x38 (C) [ 67.839529] dump_stack_lvl+0x8c/0xd0 [ 67.839557] print_report+0x118/0x5d0 [ 67.839584] kasan_report+0xdc/0x128 [ 67.839612] kasan_check_range+0x100/0x1a8 [ 67.839641] __kasan_check_write+0x20/0x30 [ 67.839671] kasan_atomics_helper+0x6ec/0x4858 [ 67.839706] kasan_atomics+0x198/0x2e0 [ 67.839738] kunit_try_run_case+0x170/0x3f0 [ 67.839772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.839807] kthread+0x328/0x630 [ 67.839836] ret_from_fork+0x10/0x20 [ 67.839866] [ 67.910838] Allocated by task 349: [ 67.914223] kasan_save_stack+0x3c/0x68 [ 67.918043] kasan_save_track+0x20/0x40 [ 67.921862] kasan_save_alloc_info+0x40/0x58 [ 67.926116] __kasan_kmalloc+0xd4/0xd8 [ 67.929848] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.934362] kasan_atomics+0xb8/0x2e0 [ 67.938008] kunit_try_run_case+0x170/0x3f0 [ 67.942175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.947643] kthread+0x328/0x630 [ 67.950855] ret_from_fork+0x10/0x20 [ 67.954413] [ 67.955889] The buggy address belongs to the object at ffff000807848f80 [ 67.955889] which belongs to the cache kmalloc-64 of size 64 [ 67.968216] The buggy address is located 0 bytes to the right of [ 67.968216] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 67.981063] [ 67.982538] The buggy address belongs to the physical page: [ 67.988094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 67.996080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.002590] page_type: f5(slab) [ 68.005724] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.013447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.021166] page dumped because: kasan: bad access detected [ 68.026722] [ 68.028197] Memory state around the buggy address: [ 68.032975] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.040180] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.047385] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.054586] ^ [ 68.059364] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.066568] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.073770] ================================================================== [ 64.378838] ================================================================== [ 64.385808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 64.393097] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 64.400474] [ 64.401958] CPU: 7 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 64.402013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.402031] Hardware name: WinLink E850-96 board (DT) [ 64.402050] Call trace: [ 64.402066] show_stack+0x20/0x38 (C) [ 64.402102] dump_stack_lvl+0x8c/0xd0 [ 64.402135] print_report+0x118/0x5d0 [ 64.402168] kasan_report+0xdc/0x128 [ 64.402196] kasan_check_range+0x100/0x1a8 [ 64.402228] __kasan_check_write+0x20/0x30 [ 64.402260] kasan_atomics_helper+0x24c/0x4858 [ 64.402295] kasan_atomics+0x198/0x2e0 [ 64.402328] kunit_try_run_case+0x170/0x3f0 [ 64.402365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.402399] kthread+0x328/0x630 [ 64.402429] ret_from_fork+0x10/0x20 [ 64.402464] [ 64.473389] Allocated by task 349: [ 64.476776] kasan_save_stack+0x3c/0x68 [ 64.480594] kasan_save_track+0x20/0x40 [ 64.484414] kasan_save_alloc_info+0x40/0x58 [ 64.488667] __kasan_kmalloc+0xd4/0xd8 [ 64.492400] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.496913] kasan_atomics+0xb8/0x2e0 [ 64.500559] kunit_try_run_case+0x170/0x3f0 [ 64.504726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.510194] kthread+0x328/0x630 [ 64.513406] ret_from_fork+0x10/0x20 [ 64.516965] [ 64.518442] The buggy address belongs to the object at ffff000807848f80 [ 64.518442] which belongs to the cache kmalloc-64 of size 64 [ 64.530767] The buggy address is located 0 bytes to the right of [ 64.530767] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 64.543614] [ 64.545092] The buggy address belongs to the physical page: [ 64.550648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 64.558634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.565143] page_type: f5(slab) [ 64.568278] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.575999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.583718] page dumped because: kasan: bad access detected [ 64.589274] [ 64.590749] Memory state around the buggy address: [ 64.595530] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.602732] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.609938] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.617137] ^ [ 64.621917] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.629120] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.636323] ================================================================== [ 73.094757] ================================================================== [ 73.101820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 73.109198] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 73.116489] [ 73.117969] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 73.118016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.118033] Hardware name: WinLink E850-96 board (DT) [ 73.118052] Call trace: [ 73.118065] show_stack+0x20/0x38 (C) [ 73.118097] dump_stack_lvl+0x8c/0xd0 [ 73.118131] print_report+0x118/0x5d0 [ 73.118158] kasan_report+0xdc/0x128 [ 73.118186] __asan_report_load8_noabort+0x20/0x30 [ 73.118219] kasan_atomics_helper+0x3f58/0x4858 [ 73.118254] kasan_atomics+0x198/0x2e0 [ 73.118286] kunit_try_run_case+0x170/0x3f0 [ 73.118322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.118355] kthread+0x328/0x630 [ 73.118384] ret_from_fork+0x10/0x20 [ 73.118414] [ 73.186106] Allocated by task 349: [ 73.189491] kasan_save_stack+0x3c/0x68 [ 73.193311] kasan_save_track+0x20/0x40 [ 73.197130] kasan_save_alloc_info+0x40/0x58 [ 73.201384] __kasan_kmalloc+0xd4/0xd8 [ 73.205116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.209630] kasan_atomics+0xb8/0x2e0 [ 73.213276] kunit_try_run_case+0x170/0x3f0 [ 73.217442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.222911] kthread+0x328/0x630 [ 73.226123] ret_from_fork+0x10/0x20 [ 73.229682] [ 73.231157] The buggy address belongs to the object at ffff000807848f80 [ 73.231157] which belongs to the cache kmalloc-64 of size 64 [ 73.243484] The buggy address is located 0 bytes to the right of [ 73.243484] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 73.256331] [ 73.257806] The buggy address belongs to the physical page: [ 73.263362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 73.271348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.277858] page_type: f5(slab) [ 73.280991] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.288715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.296434] page dumped because: kasan: bad access detected [ 73.301989] [ 73.303465] Memory state around the buggy address: [ 73.308243] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.315448] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.322653] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.329854] ^ [ 73.334632] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.341837] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.349038] ================================================================== [ 66.756510] ================================================================== [ 66.763548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 66.770838] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 66.778216] [ 66.779699] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 66.779750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.779766] Hardware name: WinLink E850-96 board (DT) [ 66.779786] Call trace: [ 66.779798] show_stack+0x20/0x38 (C) [ 66.779832] dump_stack_lvl+0x8c/0xd0 [ 66.779864] print_report+0x118/0x5d0 [ 66.779890] kasan_report+0xdc/0x128 [ 66.779918] kasan_check_range+0x100/0x1a8 [ 66.779950] __kasan_check_write+0x20/0x30 [ 66.779980] kasan_atomics_helper+0x54c/0x4858 [ 66.780014] kasan_atomics+0x198/0x2e0 [ 66.780046] kunit_try_run_case+0x170/0x3f0 [ 66.780082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.780115] kthread+0x328/0x630 [ 66.780145] ret_from_fork+0x10/0x20 [ 66.780179] [ 66.851132] Allocated by task 349: [ 66.854517] kasan_save_stack+0x3c/0x68 [ 66.858337] kasan_save_track+0x20/0x40 [ 66.862156] kasan_save_alloc_info+0x40/0x58 [ 66.866409] __kasan_kmalloc+0xd4/0xd8 [ 66.870142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.874655] kasan_atomics+0xb8/0x2e0 [ 66.878301] kunit_try_run_case+0x170/0x3f0 [ 66.882468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.887936] kthread+0x328/0x630 [ 66.891148] ret_from_fork+0x10/0x20 [ 66.894708] [ 66.896183] The buggy address belongs to the object at ffff000807848f80 [ 66.896183] which belongs to the cache kmalloc-64 of size 64 [ 66.908510] The buggy address is located 0 bytes to the right of [ 66.908510] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 66.921356] [ 66.922832] The buggy address belongs to the physical page: [ 66.928388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 66.936375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.942884] page_type: f5(slab) [ 66.946018] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.953741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.961460] page dumped because: kasan: bad access detected [ 66.967015] [ 66.968491] Memory state around the buggy address: [ 66.973270] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.980473] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.987679] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.994879] ^ [ 66.999658] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.006862] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.014063] ================================================================== [ 79.177475] ================================================================== [ 79.184541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 79.191919] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 79.199210] [ 79.200691] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 79.200739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.200755] Hardware name: WinLink E850-96 board (DT) [ 79.200773] Call trace: [ 79.200787] show_stack+0x20/0x38 (C) [ 79.200820] dump_stack_lvl+0x8c/0xd0 [ 79.200852] print_report+0x118/0x5d0 [ 79.200882] kasan_report+0xdc/0x128 [ 79.200911] __asan_report_load8_noabort+0x20/0x30 [ 79.200944] kasan_atomics_helper+0x3df4/0x4858 [ 79.200980] kasan_atomics+0x198/0x2e0 [ 79.201012] kunit_try_run_case+0x170/0x3f0 [ 79.201047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.201081] kthread+0x328/0x630 [ 79.201108] ret_from_fork+0x10/0x20 [ 79.201139] [ 79.268827] Allocated by task 349: [ 79.272212] kasan_save_stack+0x3c/0x68 [ 79.276032] kasan_save_track+0x20/0x40 [ 79.279852] kasan_save_alloc_info+0x40/0x58 [ 79.284105] __kasan_kmalloc+0xd4/0xd8 [ 79.287837] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.292351] kasan_atomics+0xb8/0x2e0 [ 79.295997] kunit_try_run_case+0x170/0x3f0 [ 79.300163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.305632] kthread+0x328/0x630 [ 79.308844] ret_from_fork+0x10/0x20 [ 79.312403] [ 79.313879] The buggy address belongs to the object at ffff000807848f80 [ 79.313879] which belongs to the cache kmalloc-64 of size 64 [ 79.326205] The buggy address is located 0 bytes to the right of [ 79.326205] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 79.339052] [ 79.340527] The buggy address belongs to the physical page: [ 79.346083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 79.354069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.360579] page_type: f5(slab) [ 79.363714] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.371436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.379155] page dumped because: kasan: bad access detected [ 79.384711] [ 79.386186] Memory state around the buggy address: [ 79.390964] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.398169] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.405374] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.412575] ^ [ 79.417353] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.424557] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.431759] ================================================================== [ 79.965857] ================================================================== [ 79.972898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 79.980275] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 79.987653] [ 79.989134] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 79.989186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.989201] Hardware name: WinLink E850-96 board (DT) [ 79.989221] Call trace: [ 79.989234] show_stack+0x20/0x38 (C) [ 79.989266] dump_stack_lvl+0x8c/0xd0 [ 79.989296] print_report+0x118/0x5d0 [ 79.989326] kasan_report+0xdc/0x128 [ 79.989353] kasan_check_range+0x100/0x1a8 [ 79.989383] __kasan_check_write+0x20/0x30 [ 79.989414] kasan_atomics_helper+0x175c/0x4858 [ 79.989451] kasan_atomics+0x198/0x2e0 [ 79.989485] kunit_try_run_case+0x170/0x3f0 [ 79.989520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.989552] kthread+0x328/0x630 [ 79.989579] ret_from_fork+0x10/0x20 [ 79.989610] [ 80.060655] Allocated by task 349: [ 80.064041] kasan_save_stack+0x3c/0x68 [ 80.067860] kasan_save_track+0x20/0x40 [ 80.071680] kasan_save_alloc_info+0x40/0x58 [ 80.075933] __kasan_kmalloc+0xd4/0xd8 [ 80.079665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.084180] kasan_atomics+0xb8/0x2e0 [ 80.087825] kunit_try_run_case+0x170/0x3f0 [ 80.091992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.097461] kthread+0x328/0x630 [ 80.100673] ret_from_fork+0x10/0x20 [ 80.104231] [ 80.105707] The buggy address belongs to the object at ffff000807848f80 [ 80.105707] which belongs to the cache kmalloc-64 of size 64 [ 80.118034] The buggy address is located 0 bytes to the right of [ 80.118034] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 80.130880] [ 80.132356] The buggy address belongs to the physical page: [ 80.137912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 80.145897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.152408] page_type: f5(slab) [ 80.155542] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.163265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.170984] page dumped because: kasan: bad access detected [ 80.176539] [ 80.178015] Memory state around the buggy address: [ 80.182794] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.189998] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.197203] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.204403] ^ [ 80.209181] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.216386] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.223587] ================================================================== [ 71.515260] ================================================================== [ 71.522331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 71.529707] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 71.536999] [ 71.538481] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 71.538529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.538544] Hardware name: WinLink E850-96 board (DT) [ 71.538566] Call trace: [ 71.538579] show_stack+0x20/0x38 (C) [ 71.538609] dump_stack_lvl+0x8c/0xd0 [ 71.538643] print_report+0x118/0x5d0 [ 71.538671] kasan_report+0xdc/0x128 [ 71.538700] __asan_report_load4_noabort+0x20/0x30 [ 71.538733] kasan_atomics_helper+0x3de4/0x4858 [ 71.538770] kasan_atomics+0x198/0x2e0 [ 71.538805] kunit_try_run_case+0x170/0x3f0 [ 71.538838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.538870] kthread+0x328/0x630 [ 71.538898] ret_from_fork+0x10/0x20 [ 71.538928] [ 71.606615] Allocated by task 349: [ 71.610001] kasan_save_stack+0x3c/0x68 [ 71.613820] kasan_save_track+0x20/0x40 [ 71.617640] kasan_save_alloc_info+0x40/0x58 [ 71.621893] __kasan_kmalloc+0xd4/0xd8 [ 71.625626] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.630140] kasan_atomics+0xb8/0x2e0 [ 71.633786] kunit_try_run_case+0x170/0x3f0 [ 71.637952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.643421] kthread+0x328/0x630 [ 71.646633] ret_from_fork+0x10/0x20 [ 71.650191] [ 71.651667] The buggy address belongs to the object at ffff000807848f80 [ 71.651667] which belongs to the cache kmalloc-64 of size 64 [ 71.663994] The buggy address is located 0 bytes to the right of [ 71.663994] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 71.676840] [ 71.678316] The buggy address belongs to the physical page: [ 71.683874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 71.691858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.698368] page_type: f5(slab) [ 71.701502] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.709225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.716944] page dumped because: kasan: bad access detected [ 71.722499] [ 71.723975] Memory state around the buggy address: [ 71.728753] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.735958] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.743163] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.750364] ^ [ 71.755142] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.762346] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.769547] ================================================================== [ 77.590346] ================================================================== [ 77.597413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 77.604790] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 77.612168] [ 77.613650] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 77.613698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.613715] Hardware name: WinLink E850-96 board (DT) [ 77.613734] Call trace: [ 77.613749] show_stack+0x20/0x38 (C) [ 77.613779] dump_stack_lvl+0x8c/0xd0 [ 77.613808] print_report+0x118/0x5d0 [ 77.613837] kasan_report+0xdc/0x128 [ 77.613865] kasan_check_range+0x100/0x1a8 [ 77.613894] __kasan_check_write+0x20/0x30 [ 77.613925] kasan_atomics_helper+0x147c/0x4858 [ 77.613960] kasan_atomics+0x198/0x2e0 [ 77.613993] kunit_try_run_case+0x170/0x3f0 [ 77.614027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.614059] kthread+0x328/0x630 [ 77.614084] ret_from_fork+0x10/0x20 [ 77.614119] [ 77.685170] Allocated by task 349: [ 77.688556] kasan_save_stack+0x3c/0x68 [ 77.692375] kasan_save_track+0x20/0x40 [ 77.696194] kasan_save_alloc_info+0x40/0x58 [ 77.700448] __kasan_kmalloc+0xd4/0xd8 [ 77.704180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.708694] kasan_atomics+0xb8/0x2e0 [ 77.712340] kunit_try_run_case+0x170/0x3f0 [ 77.716507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.721975] kthread+0x328/0x630 [ 77.725187] ret_from_fork+0x10/0x20 [ 77.728746] [ 77.730222] The buggy address belongs to the object at ffff000807848f80 [ 77.730222] which belongs to the cache kmalloc-64 of size 64 [ 77.742548] The buggy address is located 0 bytes to the right of [ 77.742548] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 77.755395] [ 77.756871] The buggy address belongs to the physical page: [ 77.762427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 77.770412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.776923] page_type: f5(slab) [ 77.780055] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.787780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.795498] page dumped because: kasan: bad access detected [ 77.801054] [ 77.802529] Memory state around the buggy address: [ 77.807308] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.814513] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.821717] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.828918] ^ [ 77.833696] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.840901] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.848102] ================================================================== [ 68.875868] ================================================================== [ 68.882960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 68.890337] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 68.897629] [ 68.899108] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 68.899153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.899170] Hardware name: WinLink E850-96 board (DT) [ 68.899189] Call trace: [ 68.899201] show_stack+0x20/0x38 (C) [ 68.899234] dump_stack_lvl+0x8c/0xd0 [ 68.899265] print_report+0x118/0x5d0 [ 68.899293] kasan_report+0xdc/0x128 [ 68.899322] __asan_report_load4_noabort+0x20/0x30 [ 68.899354] kasan_atomics_helper+0x42d8/0x4858 [ 68.899389] kasan_atomics+0x198/0x2e0 [ 68.899423] kunit_try_run_case+0x170/0x3f0 [ 68.899457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.899491] kthread+0x328/0x630 [ 68.899519] ret_from_fork+0x10/0x20 [ 68.899550] [ 68.967246] Allocated by task 349: [ 68.970631] kasan_save_stack+0x3c/0x68 [ 68.974451] kasan_save_track+0x20/0x40 [ 68.978270] kasan_save_alloc_info+0x40/0x58 [ 68.982523] __kasan_kmalloc+0xd4/0xd8 [ 68.986256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.990770] kasan_atomics+0xb8/0x2e0 [ 68.994415] kunit_try_run_case+0x170/0x3f0 [ 68.998582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.004050] kthread+0x328/0x630 [ 69.007262] ret_from_fork+0x10/0x20 [ 69.010821] [ 69.012297] The buggy address belongs to the object at ffff000807848f80 [ 69.012297] which belongs to the cache kmalloc-64 of size 64 [ 69.024624] The buggy address is located 0 bytes to the right of [ 69.024624] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 69.037471] [ 69.038946] The buggy address belongs to the physical page: [ 69.044502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 69.052488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.058998] page_type: f5(slab) [ 69.062132] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.069855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.077574] page dumped because: kasan: bad access detected [ 69.083129] [ 69.084605] Memory state around the buggy address: [ 69.089383] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.096588] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.103793] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.110994] ^ [ 69.115771] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.122976] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.130177] ================================================================== [ 77.063623] ================================================================== [ 77.070685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 77.078062] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 77.085353] [ 77.086832] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 77.086881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.086897] Hardware name: WinLink E850-96 board (DT) [ 77.086916] Call trace: [ 77.086929] show_stack+0x20/0x38 (C) [ 77.086961] dump_stack_lvl+0x8c/0xd0 [ 77.086991] print_report+0x118/0x5d0 [ 77.087019] kasan_report+0xdc/0x128 [ 77.087047] __asan_report_load8_noabort+0x20/0x30 [ 77.087079] kasan_atomics_helper+0x3f04/0x4858 [ 77.087115] kasan_atomics+0x198/0x2e0 [ 77.087149] kunit_try_run_case+0x170/0x3f0 [ 77.087187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.087219] kthread+0x328/0x630 [ 77.087245] ret_from_fork+0x10/0x20 [ 77.087279] [ 77.154970] Allocated by task 349: [ 77.158355] kasan_save_stack+0x3c/0x68 [ 77.162175] kasan_save_track+0x20/0x40 [ 77.165994] kasan_save_alloc_info+0x40/0x58 [ 77.170247] __kasan_kmalloc+0xd4/0xd8 [ 77.173980] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.178494] kasan_atomics+0xb8/0x2e0 [ 77.182140] kunit_try_run_case+0x170/0x3f0 [ 77.186306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.191775] kthread+0x328/0x630 [ 77.194987] ret_from_fork+0x10/0x20 [ 77.198546] [ 77.200021] The buggy address belongs to the object at ffff000807848f80 [ 77.200021] which belongs to the cache kmalloc-64 of size 64 [ 77.212348] The buggy address is located 0 bytes to the right of [ 77.212348] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 77.225195] [ 77.226670] The buggy address belongs to the physical page: [ 77.232229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 77.240212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.246722] page_type: f5(slab) [ 77.249855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.257579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.265298] page dumped because: kasan: bad access detected [ 77.270854] [ 77.272329] Memory state around the buggy address: [ 77.277107] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.284312] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.291517] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.298718] ^ [ 77.303496] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.310700] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.317902] ================================================================== [ 65.170085] ================================================================== [ 65.177113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 65.184405] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 65.191781] [ 65.193265] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 65.193316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.193333] Hardware name: WinLink E850-96 board (DT) [ 65.193354] Call trace: [ 65.193368] show_stack+0x20/0x38 (C) [ 65.193404] dump_stack_lvl+0x8c/0xd0 [ 65.193438] print_report+0x118/0x5d0 [ 65.193466] kasan_report+0xdc/0x128 [ 65.193492] kasan_check_range+0x100/0x1a8 [ 65.193524] __kasan_check_write+0x20/0x30 [ 65.193554] kasan_atomics_helper+0x32c/0x4858 [ 65.193587] kasan_atomics+0x198/0x2e0 [ 65.193623] kunit_try_run_case+0x170/0x3f0 [ 65.193659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.193691] kthread+0x328/0x630 [ 65.193721] ret_from_fork+0x10/0x20 [ 65.193756] [ 65.264697] Allocated by task 349: [ 65.268083] kasan_save_stack+0x3c/0x68 [ 65.271902] kasan_save_track+0x20/0x40 [ 65.275721] kasan_save_alloc_info+0x40/0x58 [ 65.279975] __kasan_kmalloc+0xd4/0xd8 [ 65.283707] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.288221] kasan_atomics+0xb8/0x2e0 [ 65.291867] kunit_try_run_case+0x170/0x3f0 [ 65.296033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.301502] kthread+0x328/0x630 [ 65.304714] ret_from_fork+0x10/0x20 [ 65.308273] [ 65.309749] The buggy address belongs to the object at ffff000807848f80 [ 65.309749] which belongs to the cache kmalloc-64 of size 64 [ 65.322075] The buggy address is located 0 bytes to the right of [ 65.322075] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 65.334922] [ 65.336399] The buggy address belongs to the physical page: [ 65.341955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 65.349941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.356449] page_type: f5(slab) [ 65.359585] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.367306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.375025] page dumped because: kasan: bad access detected [ 65.380581] [ 65.382056] Memory state around the buggy address: [ 65.386835] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.394039] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.401244] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.408445] ^ [ 65.413223] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.420427] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.427629] ================================================================== [ 67.021420] ================================================================== [ 67.028474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 67.035765] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 67.043143] [ 67.044624] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 67.044674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.044690] Hardware name: WinLink E850-96 board (DT) [ 67.044710] Call trace: [ 67.044722] show_stack+0x20/0x38 (C) [ 67.044753] dump_stack_lvl+0x8c/0xd0 [ 67.044786] print_report+0x118/0x5d0 [ 67.044814] kasan_report+0xdc/0x128 [ 67.044842] kasan_check_range+0x100/0x1a8 [ 67.044872] __kasan_check_write+0x20/0x30 [ 67.044905] kasan_atomics_helper+0x5b4/0x4858 [ 67.044940] kasan_atomics+0x198/0x2e0 [ 67.044973] kunit_try_run_case+0x170/0x3f0 [ 67.045008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.045040] kthread+0x328/0x630 [ 67.045068] ret_from_fork+0x10/0x20 [ 67.045099] [ 67.116058] Allocated by task 349: [ 67.119444] kasan_save_stack+0x3c/0x68 [ 67.123263] kasan_save_track+0x20/0x40 [ 67.127082] kasan_save_alloc_info+0x40/0x58 [ 67.131336] __kasan_kmalloc+0xd4/0xd8 [ 67.135068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.139583] kasan_atomics+0xb8/0x2e0 [ 67.143228] kunit_try_run_case+0x170/0x3f0 [ 67.147394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.152863] kthread+0x328/0x630 [ 67.156075] ret_from_fork+0x10/0x20 [ 67.159634] [ 67.161110] The buggy address belongs to the object at ffff000807848f80 [ 67.161110] which belongs to the cache kmalloc-64 of size 64 [ 67.173436] The buggy address is located 0 bytes to the right of [ 67.173436] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 67.186283] [ 67.187759] The buggy address belongs to the physical page: [ 67.193315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 67.201300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.207810] page_type: f5(slab) [ 67.210945] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.218667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.226386] page dumped because: kasan: bad access detected [ 67.231942] [ 67.233417] Memory state around the buggy address: [ 67.238195] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.245400] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.252605] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.259806] ^ [ 67.264584] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.271789] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.278990] ================================================================== [ 70.723788] ================================================================== [ 70.730850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 70.738139] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 70.745518] [ 70.746997] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 70.747046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.747063] Hardware name: WinLink E850-96 board (DT) [ 70.747081] Call trace: [ 70.747094] show_stack+0x20/0x38 (C) [ 70.747124] dump_stack_lvl+0x8c/0xd0 [ 70.747155] print_report+0x118/0x5d0 [ 70.747181] kasan_report+0xdc/0x128 [ 70.747210] kasan_check_range+0x100/0x1a8 [ 70.747241] __kasan_check_write+0x20/0x30 [ 70.747270] kasan_atomics_helper+0xb70/0x4858 [ 70.747305] kasan_atomics+0x198/0x2e0 [ 70.747337] kunit_try_run_case+0x170/0x3f0 [ 70.747374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.747407] kthread+0x328/0x630 [ 70.747433] ret_from_fork+0x10/0x20 [ 70.747464] [ 70.818433] Allocated by task 349: [ 70.821819] kasan_save_stack+0x3c/0x68 [ 70.825638] kasan_save_track+0x20/0x40 [ 70.829457] kasan_save_alloc_info+0x40/0x58 [ 70.833711] __kasan_kmalloc+0xd4/0xd8 [ 70.837443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.841957] kasan_atomics+0xb8/0x2e0 [ 70.845603] kunit_try_run_case+0x170/0x3f0 [ 70.849770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.855238] kthread+0x328/0x630 [ 70.858450] ret_from_fork+0x10/0x20 [ 70.862008] [ 70.863484] The buggy address belongs to the object at ffff000807848f80 [ 70.863484] which belongs to the cache kmalloc-64 of size 64 [ 70.875811] The buggy address is located 0 bytes to the right of [ 70.875811] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 70.888658] [ 70.890134] The buggy address belongs to the physical page: [ 70.895691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 70.903675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.910185] page_type: f5(slab) [ 70.913318] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.921042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.928762] page dumped because: kasan: bad access detected [ 70.934317] [ 70.935792] Memory state around the buggy address: [ 70.940570] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.947775] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.954980] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.962181] ^ [ 70.966959] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.974164] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.981365] ================================================================== [ 77.325273] ================================================================== [ 77.332313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 77.339690] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 77.347068] [ 77.348547] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 77.348599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.348614] Hardware name: WinLink E850-96 board (DT) [ 77.348633] Call trace: [ 77.348647] show_stack+0x20/0x38 (C) [ 77.348677] dump_stack_lvl+0x8c/0xd0 [ 77.348707] print_report+0x118/0x5d0 [ 77.348735] kasan_report+0xdc/0x128 [ 77.348764] kasan_check_range+0x100/0x1a8 [ 77.348797] __kasan_check_write+0x20/0x30 [ 77.348826] kasan_atomics_helper+0x1414/0x4858 [ 77.348861] kasan_atomics+0x198/0x2e0 [ 77.348894] kunit_try_run_case+0x170/0x3f0 [ 77.348931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.348965] kthread+0x328/0x630 [ 77.348991] ret_from_fork+0x10/0x20 [ 77.349025] [ 77.420070] Allocated by task 349: [ 77.423456] kasan_save_stack+0x3c/0x68 [ 77.427275] kasan_save_track+0x20/0x40 [ 77.431094] kasan_save_alloc_info+0x40/0x58 [ 77.435348] __kasan_kmalloc+0xd4/0xd8 [ 77.439080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.443594] kasan_atomics+0xb8/0x2e0 [ 77.447240] kunit_try_run_case+0x170/0x3f0 [ 77.451407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.456875] kthread+0x328/0x630 [ 77.460087] ret_from_fork+0x10/0x20 [ 77.463646] [ 77.465122] The buggy address belongs to the object at ffff000807848f80 [ 77.465122] which belongs to the cache kmalloc-64 of size 64 [ 77.477448] The buggy address is located 0 bytes to the right of [ 77.477448] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 77.490295] [ 77.491771] The buggy address belongs to the physical page: [ 77.497328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 77.505314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.511823] page_type: f5(slab) [ 77.514957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.522680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.530398] page dumped because: kasan: bad access detected [ 77.535954] [ 77.537429] Memory state around the buggy address: [ 77.542207] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.549412] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.556617] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.563818] ^ [ 77.568596] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.575801] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.583002] ================================================================== [ 71.776921] ================================================================== [ 71.783960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 71.791249] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 71.798627] [ 71.800107] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 71.800155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.800171] Hardware name: WinLink E850-96 board (DT) [ 71.800189] Call trace: [ 71.800202] show_stack+0x20/0x38 (C) [ 71.800234] dump_stack_lvl+0x8c/0xd0 [ 71.800266] print_report+0x118/0x5d0 [ 71.800295] kasan_report+0xdc/0x128 [ 71.800324] kasan_check_range+0x100/0x1a8 [ 71.800354] __kasan_check_write+0x20/0x30 [ 71.800385] kasan_atomics_helper+0xca0/0x4858 [ 71.800418] kasan_atomics+0x198/0x2e0 [ 71.800451] kunit_try_run_case+0x170/0x3f0 [ 71.800487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.800520] kthread+0x328/0x630 [ 71.800547] ret_from_fork+0x10/0x20 [ 71.800579] [ 71.871542] Allocated by task 349: [ 71.874928] kasan_save_stack+0x3c/0x68 [ 71.878748] kasan_save_track+0x20/0x40 [ 71.882566] kasan_save_alloc_info+0x40/0x58 [ 71.886820] __kasan_kmalloc+0xd4/0xd8 [ 71.890552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.895066] kasan_atomics+0xb8/0x2e0 [ 71.898712] kunit_try_run_case+0x170/0x3f0 [ 71.902879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.908348] kthread+0x328/0x630 [ 71.911559] ret_from_fork+0x10/0x20 [ 71.915118] [ 71.916594] The buggy address belongs to the object at ffff000807848f80 [ 71.916594] which belongs to the cache kmalloc-64 of size 64 [ 71.928920] The buggy address is located 0 bytes to the right of [ 71.928920] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 71.941767] [ 71.943243] The buggy address belongs to the physical page: [ 71.948799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 71.956786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.963295] page_type: f5(slab) [ 71.966428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.974152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.981871] page dumped because: kasan: bad access detected [ 71.987426] [ 71.988901] Memory state around the buggy address: [ 71.993679] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.000884] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.008089] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.015290] ^ [ 72.020068] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.027273] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.034474] ================================================================== [ 74.413031] ================================================================== [ 74.420030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 74.427320] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 74.434698] [ 74.436180] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 74.436230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.436244] Hardware name: WinLink E850-96 board (DT) [ 74.436262] Call trace: [ 74.436276] show_stack+0x20/0x38 (C) [ 74.436308] dump_stack_lvl+0x8c/0xd0 [ 74.436339] print_report+0x118/0x5d0 [ 74.436369] kasan_report+0xdc/0x128 [ 74.436397] kasan_check_range+0x100/0x1a8 [ 74.436428] __kasan_check_write+0x20/0x30 [ 74.436458] kasan_atomics_helper+0xf88/0x4858 [ 74.436493] kasan_atomics+0x198/0x2e0 [ 74.436528] kunit_try_run_case+0x170/0x3f0 [ 74.436566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.436597] kthread+0x328/0x630 [ 74.436625] ret_from_fork+0x10/0x20 [ 74.436657] [ 74.507614] Allocated by task 349: [ 74.510999] kasan_save_stack+0x3c/0x68 [ 74.514819] kasan_save_track+0x20/0x40 [ 74.518638] kasan_save_alloc_info+0x40/0x58 [ 74.522891] __kasan_kmalloc+0xd4/0xd8 [ 74.526624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.531138] kasan_atomics+0xb8/0x2e0 [ 74.534784] kunit_try_run_case+0x170/0x3f0 [ 74.538950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.544419] kthread+0x328/0x630 [ 74.547631] ret_from_fork+0x10/0x20 [ 74.551190] [ 74.552665] The buggy address belongs to the object at ffff000807848f80 [ 74.552665] which belongs to the cache kmalloc-64 of size 64 [ 74.564992] The buggy address is located 0 bytes to the right of [ 74.564992] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 74.577839] [ 74.579316] The buggy address belongs to the physical page: [ 74.584870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 74.592857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.599366] page_type: f5(slab) [ 74.602501] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.610223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.617942] page dumped because: kasan: bad access detected [ 74.623497] [ 74.624973] Memory state around the buggy address: [ 74.629751] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.636956] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.644161] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.651362] ^ [ 74.656141] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.663344] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.670546] ================================================================== [ 76.268317] ================================================================== [ 76.275384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 76.282761] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 76.290139] [ 76.291619] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 76.291666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.291681] Hardware name: WinLink E850-96 board (DT) [ 76.291699] Call trace: [ 76.291712] show_stack+0x20/0x38 (C) [ 76.291745] dump_stack_lvl+0x8c/0xd0 [ 76.291775] print_report+0x118/0x5d0 [ 76.291803] kasan_report+0xdc/0x128 [ 76.291831] kasan_check_range+0x100/0x1a8 [ 76.291860] __kasan_check_write+0x20/0x30 [ 76.291893] kasan_atomics_helper+0x126c/0x4858 [ 76.291928] kasan_atomics+0x198/0x2e0 [ 76.291961] kunit_try_run_case+0x170/0x3f0 [ 76.291995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.292029] kthread+0x328/0x630 [ 76.292056] ret_from_fork+0x10/0x20 [ 76.292087] [ 76.363141] Allocated by task 349: [ 76.366527] kasan_save_stack+0x3c/0x68 [ 76.370346] kasan_save_track+0x20/0x40 [ 76.374166] kasan_save_alloc_info+0x40/0x58 [ 76.378419] __kasan_kmalloc+0xd4/0xd8 [ 76.382152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.386666] kasan_atomics+0xb8/0x2e0 [ 76.390311] kunit_try_run_case+0x170/0x3f0 [ 76.394478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.399947] kthread+0x328/0x630 [ 76.403159] ret_from_fork+0x10/0x20 [ 76.406717] [ 76.408193] The buggy address belongs to the object at ffff000807848f80 [ 76.408193] which belongs to the cache kmalloc-64 of size 64 [ 76.420520] The buggy address is located 0 bytes to the right of [ 76.420520] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 76.433366] [ 76.434842] The buggy address belongs to the physical page: [ 76.440398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 76.448383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.454894] page_type: f5(slab) [ 76.458026] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.465751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.473470] page dumped because: kasan: bad access detected [ 76.479025] [ 76.480501] Memory state around the buggy address: [ 76.485279] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.492484] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.499688] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.506889] ^ [ 76.511667] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.518872] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.526073] ================================================================== [ 76.003242] ================================================================== [ 76.010284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 76.017661] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 76.025039] [ 76.026521] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 76.026573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.026590] Hardware name: WinLink E850-96 board (DT) [ 76.026608] Call trace: [ 76.026621] show_stack+0x20/0x38 (C) [ 76.026653] dump_stack_lvl+0x8c/0xd0 [ 76.026684] print_report+0x118/0x5d0 [ 76.026713] kasan_report+0xdc/0x128 [ 76.026740] kasan_check_range+0x100/0x1a8 [ 76.026772] __kasan_check_write+0x20/0x30 [ 76.026804] kasan_atomics_helper+0x11f8/0x4858 [ 76.026839] kasan_atomics+0x198/0x2e0 [ 76.026872] kunit_try_run_case+0x170/0x3f0 [ 76.026909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.026941] kthread+0x328/0x630 [ 76.026970] ret_from_fork+0x10/0x20 [ 76.027002] [ 76.098041] Allocated by task 349: [ 76.101426] kasan_save_stack+0x3c/0x68 [ 76.105246] kasan_save_track+0x20/0x40 [ 76.109066] kasan_save_alloc_info+0x40/0x58 [ 76.113319] __kasan_kmalloc+0xd4/0xd8 [ 76.117051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.121565] kasan_atomics+0xb8/0x2e0 [ 76.125211] kunit_try_run_case+0x170/0x3f0 [ 76.129378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.134847] kthread+0x328/0x630 [ 76.138058] ret_from_fork+0x10/0x20 [ 76.141617] [ 76.143093] The buggy address belongs to the object at ffff000807848f80 [ 76.143093] which belongs to the cache kmalloc-64 of size 64 [ 76.155420] The buggy address is located 0 bytes to the right of [ 76.155420] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 76.168266] [ 76.169742] The buggy address belongs to the physical page: [ 76.175298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 76.183285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.189793] page_type: f5(slab) [ 76.192926] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.200651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.208370] page dumped because: kasan: bad access detected [ 76.213925] [ 76.215401] Memory state around the buggy address: [ 76.220179] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.227384] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.234588] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.241789] ^ [ 76.246567] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.253772] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.260973] ================================================================== [ 72.303453] ================================================================== [ 72.310513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 72.317803] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 72.325181] [ 72.326661] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 72.326712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.326727] Hardware name: WinLink E850-96 board (DT) [ 72.326746] Call trace: [ 72.326758] show_stack+0x20/0x38 (C) [ 72.326790] dump_stack_lvl+0x8c/0xd0 [ 72.326824] print_report+0x118/0x5d0 [ 72.326852] kasan_report+0xdc/0x128 [ 72.326880] kasan_check_range+0x100/0x1a8 [ 72.326913] __kasan_check_write+0x20/0x30 [ 72.326943] kasan_atomics_helper+0xd3c/0x4858 [ 72.326977] kasan_atomics+0x198/0x2e0 [ 72.327010] kunit_try_run_case+0x170/0x3f0 [ 72.327046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.327080] kthread+0x328/0x630 [ 72.327106] ret_from_fork+0x10/0x20 [ 72.327138] [ 72.398097] Allocated by task 349: [ 72.401482] kasan_save_stack+0x3c/0x68 [ 72.405302] kasan_save_track+0x20/0x40 [ 72.409121] kasan_save_alloc_info+0x40/0x58 [ 72.413374] __kasan_kmalloc+0xd4/0xd8 [ 72.417107] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.421621] kasan_atomics+0xb8/0x2e0 [ 72.425267] kunit_try_run_case+0x170/0x3f0 [ 72.429433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.434902] kthread+0x328/0x630 [ 72.438113] ret_from_fork+0x10/0x20 [ 72.441673] [ 72.443148] The buggy address belongs to the object at ffff000807848f80 [ 72.443148] which belongs to the cache kmalloc-64 of size 64 [ 72.455475] The buggy address is located 0 bytes to the right of [ 72.455475] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 72.468322] [ 72.469798] The buggy address belongs to the physical page: [ 72.475353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 72.483339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.489849] page_type: f5(slab) [ 72.492982] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.500706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.508425] page dumped because: kasan: bad access detected [ 72.513980] [ 72.515456] Memory state around the buggy address: [ 72.520234] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.527439] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.534644] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.541845] ^ [ 72.546623] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.553827] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.561029] ================================================================== [ 63.852187] ================================================================== [ 63.859254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 63.866628] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 63.874007] [ 63.875492] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 63.875554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.875569] Hardware name: WinLink E850-96 board (DT) [ 63.875591] Call trace: [ 63.875606] show_stack+0x20/0x38 (C) [ 63.875643] dump_stack_lvl+0x8c/0xd0 [ 63.875677] print_report+0x118/0x5d0 [ 63.875706] kasan_report+0xdc/0x128 [ 63.875732] __asan_report_store4_noabort+0x20/0x30 [ 63.875768] kasan_atomics_helper+0x3f7c/0x4858 [ 63.875806] kasan_atomics+0x198/0x2e0 [ 63.875839] kunit_try_run_case+0x170/0x3f0 [ 63.875877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.875910] kthread+0x328/0x630 [ 63.875943] ret_from_fork+0x10/0x20 [ 63.875978] [ 63.943710] Allocated by task 349: [ 63.947099] kasan_save_stack+0x3c/0x68 [ 63.950915] kasan_save_track+0x20/0x40 [ 63.954734] kasan_save_alloc_info+0x40/0x58 [ 63.958987] __kasan_kmalloc+0xd4/0xd8 [ 63.962720] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.967234] kasan_atomics+0xb8/0x2e0 [ 63.970880] kunit_try_run_case+0x170/0x3f0 [ 63.975046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.980515] kthread+0x328/0x630 [ 63.983727] ret_from_fork+0x10/0x20 [ 63.987286] [ 63.988763] The buggy address belongs to the object at ffff000807848f80 [ 63.988763] which belongs to the cache kmalloc-64 of size 64 [ 64.001088] The buggy address is located 0 bytes to the right of [ 64.001088] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 64.013935] [ 64.015412] The buggy address belongs to the physical page: [ 64.020969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 64.028956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.035462] page_type: f5(slab) [ 64.038597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.046319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.054040] page dumped because: kasan: bad access detected [ 64.059594] [ 64.061069] Memory state around the buggy address: [ 64.065849] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.073052] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.080260] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.087458] ^ [ 64.092237] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.099441] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.106642] ================================================================== [ 78.385676] ================================================================== [ 78.392714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 78.400090] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 78.407469] [ 78.408950] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 78.409000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.409016] Hardware name: WinLink E850-96 board (DT) [ 78.409035] Call trace: [ 78.409048] show_stack+0x20/0x38 (C) [ 78.409078] dump_stack_lvl+0x8c/0xd0 [ 78.409108] print_report+0x118/0x5d0 [ 78.409136] kasan_report+0xdc/0x128 [ 78.409167] kasan_check_range+0x100/0x1a8 [ 78.409197] __kasan_check_write+0x20/0x30 [ 78.409228] kasan_atomics_helper+0x15b4/0x4858 [ 78.409264] kasan_atomics+0x198/0x2e0 [ 78.409297] kunit_try_run_case+0x170/0x3f0 [ 78.409331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.409365] kthread+0x328/0x630 [ 78.409391] ret_from_fork+0x10/0x20 [ 78.409424] [ 78.480471] Allocated by task 349: [ 78.483857] kasan_save_stack+0x3c/0x68 [ 78.487676] kasan_save_track+0x20/0x40 [ 78.491495] kasan_save_alloc_info+0x40/0x58 [ 78.495748] __kasan_kmalloc+0xd4/0xd8 [ 78.499481] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.503995] kasan_atomics+0xb8/0x2e0 [ 78.507641] kunit_try_run_case+0x170/0x3f0 [ 78.511807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.517276] kthread+0x328/0x630 [ 78.520488] ret_from_fork+0x10/0x20 [ 78.524047] [ 78.525522] The buggy address belongs to the object at ffff000807848f80 [ 78.525522] which belongs to the cache kmalloc-64 of size 64 [ 78.537849] The buggy address is located 0 bytes to the right of [ 78.537849] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 78.550696] [ 78.552173] The buggy address belongs to the physical page: [ 78.557727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 78.565715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.572223] page_type: f5(slab) [ 78.575358] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.583080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.590799] page dumped because: kasan: bad access detected [ 78.596354] [ 78.597830] Memory state around the buggy address: [ 78.602608] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.609813] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.617018] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.624219] ^ [ 78.628997] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.636201] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.643402] ================================================================== [ 73.356409] ================================================================== [ 73.363449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 73.370739] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 73.378117] [ 73.379597] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 73.379646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.379662] Hardware name: WinLink E850-96 board (DT) [ 73.379680] Call trace: [ 73.379692] show_stack+0x20/0x38 (C) [ 73.379725] dump_stack_lvl+0x8c/0xd0 [ 73.379757] print_report+0x118/0x5d0 [ 73.379786] kasan_report+0xdc/0x128 [ 73.379815] kasan_check_range+0x100/0x1a8 [ 73.379846] __kasan_check_write+0x20/0x30 [ 73.379877] kasan_atomics_helper+0xe44/0x4858 [ 73.379915] kasan_atomics+0x198/0x2e0 [ 73.379946] kunit_try_run_case+0x170/0x3f0 [ 73.379982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.380016] kthread+0x328/0x630 [ 73.380042] ret_from_fork+0x10/0x20 [ 73.380075] [ 73.451032] Allocated by task 349: [ 73.454418] kasan_save_stack+0x3c/0x68 [ 73.458238] kasan_save_track+0x20/0x40 [ 73.462057] kasan_save_alloc_info+0x40/0x58 [ 73.466310] __kasan_kmalloc+0xd4/0xd8 [ 73.470042] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.474556] kasan_atomics+0xb8/0x2e0 [ 73.478202] kunit_try_run_case+0x170/0x3f0 [ 73.482369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.487838] kthread+0x328/0x630 [ 73.491049] ret_from_fork+0x10/0x20 [ 73.494608] [ 73.496084] The buggy address belongs to the object at ffff000807848f80 [ 73.496084] which belongs to the cache kmalloc-64 of size 64 [ 73.508411] The buggy address is located 0 bytes to the right of [ 73.508411] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 73.521257] [ 73.522734] The buggy address belongs to the physical page: [ 73.528290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 73.536276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.542785] page_type: f5(slab) [ 73.545920] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.553642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.561361] page dumped because: kasan: bad access detected [ 73.566916] [ 73.568392] Memory state around the buggy address: [ 73.573170] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.580375] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.587579] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.594781] ^ [ 73.599558] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.606763] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.613964] ================================================================== [ 66.491564] ================================================================== [ 66.498621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 66.505911] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 66.513290] [ 66.514774] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 66.514824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.514840] Hardware name: WinLink E850-96 board (DT) [ 66.514858] Call trace: [ 66.514870] show_stack+0x20/0x38 (C) [ 66.514900] dump_stack_lvl+0x8c/0xd0 [ 66.514934] print_report+0x118/0x5d0 [ 66.514961] kasan_report+0xdc/0x128 [ 66.514988] kasan_check_range+0x100/0x1a8 [ 66.515018] __kasan_check_write+0x20/0x30 [ 66.515050] kasan_atomics_helper+0x4e4/0x4858 [ 66.515087] kasan_atomics+0x198/0x2e0 [ 66.515121] kunit_try_run_case+0x170/0x3f0 [ 66.515156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.515189] kthread+0x328/0x630 [ 66.515215] ret_from_fork+0x10/0x20 [ 66.515248] [ 66.586205] Allocated by task 349: [ 66.589591] kasan_save_stack+0x3c/0x68 [ 66.593410] kasan_save_track+0x20/0x40 [ 66.597229] kasan_save_alloc_info+0x40/0x58 [ 66.601483] __kasan_kmalloc+0xd4/0xd8 [ 66.605215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.609729] kasan_atomics+0xb8/0x2e0 [ 66.613375] kunit_try_run_case+0x170/0x3f0 [ 66.617541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.623010] kthread+0x328/0x630 [ 66.626222] ret_from_fork+0x10/0x20 [ 66.629781] [ 66.631256] The buggy address belongs to the object at ffff000807848f80 [ 66.631256] which belongs to the cache kmalloc-64 of size 64 [ 66.643583] The buggy address is located 0 bytes to the right of [ 66.643583] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 66.656430] [ 66.657907] The buggy address belongs to the physical page: [ 66.663462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 66.671449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.677957] page_type: f5(slab) [ 66.681091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.688814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.696533] page dumped because: kasan: bad access detected [ 66.702089] [ 66.703564] Memory state around the buggy address: [ 66.708343] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.715547] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.722752] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.729953] ^ [ 66.734730] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.741935] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.749137] ================================================================== [ 70.462153] ================================================================== [ 70.469221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 70.476598] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 70.483890] [ 70.485370] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 70.485419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.485435] Hardware name: WinLink E850-96 board (DT) [ 70.485453] Call trace: [ 70.485467] show_stack+0x20/0x38 (C) [ 70.485498] dump_stack_lvl+0x8c/0xd0 [ 70.485531] print_report+0x118/0x5d0 [ 70.485560] kasan_report+0xdc/0x128 [ 70.485589] __asan_report_load4_noabort+0x20/0x30 [ 70.485621] kasan_atomics_helper+0x3dcc/0x4858 [ 70.485656] kasan_atomics+0x198/0x2e0 [ 70.485688] kunit_try_run_case+0x170/0x3f0 [ 70.485724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.485755] kthread+0x328/0x630 [ 70.485782] ret_from_fork+0x10/0x20 [ 70.485812] [ 70.553506] Allocated by task 349: [ 70.556892] kasan_save_stack+0x3c/0x68 [ 70.560711] kasan_save_track+0x20/0x40 [ 70.564531] kasan_save_alloc_info+0x40/0x58 [ 70.568784] __kasan_kmalloc+0xd4/0xd8 [ 70.572517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.577030] kasan_atomics+0xb8/0x2e0 [ 70.580676] kunit_try_run_case+0x170/0x3f0 [ 70.584843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.590312] kthread+0x328/0x630 [ 70.593523] ret_from_fork+0x10/0x20 [ 70.597082] [ 70.598558] The buggy address belongs to the object at ffff000807848f80 [ 70.598558] which belongs to the cache kmalloc-64 of size 64 [ 70.610884] The buggy address is located 0 bytes to the right of [ 70.610884] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 70.623731] [ 70.625207] The buggy address belongs to the physical page: [ 70.630763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 70.638748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.645259] page_type: f5(slab) [ 70.648393] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.656116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.663835] page dumped because: kasan: bad access detected [ 70.669390] [ 70.670866] Memory state around the buggy address: [ 70.675644] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.682849] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.690053] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.697254] ^ [ 70.702032] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.709237] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.716438] ================================================================== [ 74.677932] ================================================================== [ 74.684957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 74.692247] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 74.699625] [ 74.701104] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 74.701152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.701170] Hardware name: WinLink E850-96 board (DT) [ 74.701187] Call trace: [ 74.701201] show_stack+0x20/0x38 (C) [ 74.701237] dump_stack_lvl+0x8c/0xd0 [ 74.701265] print_report+0x118/0x5d0 [ 74.701291] kasan_report+0xdc/0x128 [ 74.701319] kasan_check_range+0x100/0x1a8 [ 74.701349] __kasan_check_write+0x20/0x30 [ 74.701379] kasan_atomics_helper+0xff0/0x4858 [ 74.701414] kasan_atomics+0x198/0x2e0 [ 74.701447] kunit_try_run_case+0x170/0x3f0 [ 74.701482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.701514] kthread+0x328/0x630 [ 74.701542] ret_from_fork+0x10/0x20 [ 74.701573] [ 74.772540] Allocated by task 349: [ 74.775926] kasan_save_stack+0x3c/0x68 [ 74.779745] kasan_save_track+0x20/0x40 [ 74.783564] kasan_save_alloc_info+0x40/0x58 [ 74.787818] __kasan_kmalloc+0xd4/0xd8 [ 74.791551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.796064] kasan_atomics+0xb8/0x2e0 [ 74.799710] kunit_try_run_case+0x170/0x3f0 [ 74.803877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.809346] kthread+0x328/0x630 [ 74.812557] ret_from_fork+0x10/0x20 [ 74.816116] [ 74.817592] The buggy address belongs to the object at ffff000807848f80 [ 74.817592] which belongs to the cache kmalloc-64 of size 64 [ 74.829919] The buggy address is located 0 bytes to the right of [ 74.829919] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 74.842765] [ 74.844241] The buggy address belongs to the physical page: [ 74.849797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 74.857784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.864293] page_type: f5(slab) [ 74.867426] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.875150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.882869] page dumped because: kasan: bad access detected [ 74.888424] [ 74.889900] Memory state around the buggy address: [ 74.894678] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.901883] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.909088] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.916288] ^ [ 74.921068] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.928271] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.935472] ================================================================== [ 79.704212] ================================================================== [ 79.711270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 79.718647] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 79.725938] [ 79.727419] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 79.727467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.727485] Hardware name: WinLink E850-96 board (DT) [ 79.727502] Call trace: [ 79.727515] show_stack+0x20/0x38 (C) [ 79.727546] dump_stack_lvl+0x8c/0xd0 [ 79.727580] print_report+0x118/0x5d0 [ 79.727609] kasan_report+0xdc/0x128 [ 79.727635] __asan_report_load8_noabort+0x20/0x30 [ 79.727669] kasan_atomics_helper+0x3e10/0x4858 [ 79.727704] kasan_atomics+0x198/0x2e0 [ 79.727737] kunit_try_run_case+0x170/0x3f0 [ 79.727772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.727805] kthread+0x328/0x630 [ 79.727833] ret_from_fork+0x10/0x20 [ 79.727864] [ 79.795555] Allocated by task 349: [ 79.798941] kasan_save_stack+0x3c/0x68 [ 79.802760] kasan_save_track+0x20/0x40 [ 79.806580] kasan_save_alloc_info+0x40/0x58 [ 79.810833] __kasan_kmalloc+0xd4/0xd8 [ 79.814566] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.819079] kasan_atomics+0xb8/0x2e0 [ 79.822725] kunit_try_run_case+0x170/0x3f0 [ 79.826892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.832360] kthread+0x328/0x630 [ 79.835572] ret_from_fork+0x10/0x20 [ 79.839131] [ 79.840607] The buggy address belongs to the object at ffff000807848f80 [ 79.840607] which belongs to the cache kmalloc-64 of size 64 [ 79.852934] The buggy address is located 0 bytes to the right of [ 79.852934] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 79.865780] [ 79.867256] The buggy address belongs to the physical page: [ 79.872812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 79.880797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.887308] page_type: f5(slab) [ 79.890442] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.898165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.905884] page dumped because: kasan: bad access detected [ 79.911439] [ 79.912915] Memory state around the buggy address: [ 79.917693] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.924897] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.932102] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.939303] ^ [ 79.944081] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.951286] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.958487] ================================================================== [ 80.492588] ================================================================== [ 80.499626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 80.507003] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 80.514381] [ 80.515862] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 80.515915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.515932] Hardware name: WinLink E850-96 board (DT) [ 80.515952] Call trace: [ 80.515966] show_stack+0x20/0x38 (C) [ 80.515997] dump_stack_lvl+0x8c/0xd0 [ 80.516027] print_report+0x118/0x5d0 [ 80.516057] kasan_report+0xdc/0x128 [ 80.516085] kasan_check_range+0x100/0x1a8 [ 80.516116] __kasan_check_write+0x20/0x30 [ 80.516147] kasan_atomics_helper+0x17ec/0x4858 [ 80.516183] kasan_atomics+0x198/0x2e0 [ 80.516216] kunit_try_run_case+0x170/0x3f0 [ 80.516252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.516284] kthread+0x328/0x630 [ 80.516312] ret_from_fork+0x10/0x20 [ 80.516344] [ 80.587384] Allocated by task 349: [ 80.590769] kasan_save_stack+0x3c/0x68 [ 80.594589] kasan_save_track+0x20/0x40 [ 80.598408] kasan_save_alloc_info+0x40/0x58 [ 80.602661] __kasan_kmalloc+0xd4/0xd8 [ 80.606394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.610908] kasan_atomics+0xb8/0x2e0 [ 80.614553] kunit_try_run_case+0x170/0x3f0 [ 80.618720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.624189] kthread+0x328/0x630 [ 80.627401] ret_from_fork+0x10/0x20 [ 80.630960] [ 80.632435] The buggy address belongs to the object at ffff000807848f80 [ 80.632435] which belongs to the cache kmalloc-64 of size 64 [ 80.644762] The buggy address is located 0 bytes to the right of [ 80.644762] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 80.657608] [ 80.659086] The buggy address belongs to the physical page: [ 80.664640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 80.672627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.679136] page_type: f5(slab) [ 80.682269] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.689993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.697712] page dumped because: kasan: bad access detected [ 80.703267] [ 80.704743] Memory state around the buggy address: [ 80.709521] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.716726] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.723930] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.731132] ^ [ 80.735909] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.743114] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.750315] ================================================================== [ 75.738121] ================================================================== [ 75.745183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 75.752560] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 75.759939] [ 75.761419] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 75.761465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.761483] Hardware name: WinLink E850-96 board (DT) [ 75.761502] Call trace: [ 75.761514] show_stack+0x20/0x38 (C) [ 75.761546] dump_stack_lvl+0x8c/0xd0 [ 75.761577] print_report+0x118/0x5d0 [ 75.761605] kasan_report+0xdc/0x128 [ 75.761633] kasan_check_range+0x100/0x1a8 [ 75.761663] __kasan_check_write+0x20/0x30 [ 75.761695] kasan_atomics_helper+0x1190/0x4858 [ 75.761733] kasan_atomics+0x198/0x2e0 [ 75.761765] kunit_try_run_case+0x170/0x3f0 [ 75.761799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.761831] kthread+0x328/0x630 [ 75.761860] ret_from_fork+0x10/0x20 [ 75.761892] [ 75.832941] Allocated by task 349: [ 75.836326] kasan_save_stack+0x3c/0x68 [ 75.840146] kasan_save_track+0x20/0x40 [ 75.843966] kasan_save_alloc_info+0x40/0x58 [ 75.848219] __kasan_kmalloc+0xd4/0xd8 [ 75.851951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.856465] kasan_atomics+0xb8/0x2e0 [ 75.860111] kunit_try_run_case+0x170/0x3f0 [ 75.864278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.869746] kthread+0x328/0x630 [ 75.872958] ret_from_fork+0x10/0x20 [ 75.876517] [ 75.877992] The buggy address belongs to the object at ffff000807848f80 [ 75.877992] which belongs to the cache kmalloc-64 of size 64 [ 75.890319] The buggy address is located 0 bytes to the right of [ 75.890319] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 75.903166] [ 75.904642] The buggy address belongs to the physical page: [ 75.910198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 75.918183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.924694] page_type: f5(slab) [ 75.927826] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.935550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.943269] page dumped because: kasan: bad access detected [ 75.948825] [ 75.950300] Memory state around the buggy address: [ 75.955079] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.962284] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.969488] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.976689] ^ [ 75.981467] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.988672] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.995873] ================================================================== [ 76.533445] ================================================================== [ 76.540484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 76.547861] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 76.555239] [ 76.556720] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 76.556770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.556786] Hardware name: WinLink E850-96 board (DT) [ 76.556805] Call trace: [ 76.556820] show_stack+0x20/0x38 (C) [ 76.556852] dump_stack_lvl+0x8c/0xd0 [ 76.556882] print_report+0x118/0x5d0 [ 76.556911] kasan_report+0xdc/0x128 [ 76.556938] kasan_check_range+0x100/0x1a8 [ 76.556969] __kasan_check_write+0x20/0x30 [ 76.557001] kasan_atomics_helper+0x12d8/0x4858 [ 76.557037] kasan_atomics+0x198/0x2e0 [ 76.557069] kunit_try_run_case+0x170/0x3f0 [ 76.557103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.557135] kthread+0x328/0x630 [ 76.557164] ret_from_fork+0x10/0x20 [ 76.557194] [ 76.628242] Allocated by task 349: [ 76.631628] kasan_save_stack+0x3c/0x68 [ 76.635447] kasan_save_track+0x20/0x40 [ 76.639266] kasan_save_alloc_info+0x40/0x58 [ 76.643519] __kasan_kmalloc+0xd4/0xd8 [ 76.647252] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.651766] kasan_atomics+0xb8/0x2e0 [ 76.655412] kunit_try_run_case+0x170/0x3f0 [ 76.659578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.665047] kthread+0x328/0x630 [ 76.668259] ret_from_fork+0x10/0x20 [ 76.671818] [ 76.673293] The buggy address belongs to the object at ffff000807848f80 [ 76.673293] which belongs to the cache kmalloc-64 of size 64 [ 76.685620] The buggy address is located 0 bytes to the right of [ 76.685620] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 76.698467] [ 76.699943] The buggy address belongs to the physical page: [ 76.705498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 76.713485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.719994] page_type: f5(slab) [ 76.723127] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.730851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.738570] page dumped because: kasan: bad access detected [ 76.744125] [ 76.745601] Memory state around the buggy address: [ 76.750379] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.757584] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.764789] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.771990] ^ [ 76.776768] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.783972] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.791173] ================================================================== [ 64.643706] ================================================================== [ 64.650736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 64.658024] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 64.665314] [ 64.666799] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 64.666856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.666872] Hardware name: WinLink E850-96 board (DT) [ 64.666893] Call trace: [ 64.666907] show_stack+0x20/0x38 (C) [ 64.666945] dump_stack_lvl+0x8c/0xd0 [ 64.666977] print_report+0x118/0x5d0 [ 64.667009] kasan_report+0xdc/0x128 [ 64.667038] kasan_check_range+0x100/0x1a8 [ 64.667071] __kasan_check_read+0x20/0x30 [ 64.667106] kasan_atomics_helper+0x2b0/0x4858 [ 64.667140] kasan_atomics+0x198/0x2e0 [ 64.667174] kunit_try_run_case+0x170/0x3f0 [ 64.667215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.667249] kthread+0x328/0x630 [ 64.667278] ret_from_fork+0x10/0x20 [ 64.667316] [ 64.738142] Allocated by task 349: [ 64.741531] kasan_save_stack+0x3c/0x68 [ 64.745347] kasan_save_track+0x20/0x40 [ 64.749167] kasan_save_alloc_info+0x40/0x58 [ 64.753420] __kasan_kmalloc+0xd4/0xd8 [ 64.757152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.761667] kasan_atomics+0xb8/0x2e0 [ 64.765312] kunit_try_run_case+0x170/0x3f0 [ 64.769479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.774948] kthread+0x328/0x630 [ 64.778159] ret_from_fork+0x10/0x20 [ 64.781718] [ 64.783196] The buggy address belongs to the object at ffff000807848f80 [ 64.783196] which belongs to the cache kmalloc-64 of size 64 [ 64.795521] The buggy address is located 0 bytes to the right of [ 64.795521] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 64.808367] [ 64.809845] The buggy address belongs to the physical page: [ 64.815402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 64.823387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.829896] page_type: f5(slab) [ 64.833030] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.840752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.848471] page dumped because: kasan: bad access detected [ 64.854026] [ 64.855502] Memory state around the buggy address: [ 64.860281] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.867485] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.874691] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.881890] ^ [ 64.886670] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.893873] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.901074] ================================================================== [ 74.148017] ================================================================== [ 74.155104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 74.162394] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 74.169772] [ 74.171253] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 74.171305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.171321] Hardware name: WinLink E850-96 board (DT) [ 74.171341] Call trace: [ 74.171353] show_stack+0x20/0x38 (C) [ 74.171385] dump_stack_lvl+0x8c/0xd0 [ 74.171416] print_report+0x118/0x5d0 [ 74.171446] kasan_report+0xdc/0x128 [ 74.171473] kasan_check_range+0x100/0x1a8 [ 74.171503] __kasan_check_write+0x20/0x30 [ 74.171535] kasan_atomics_helper+0xf20/0x4858 [ 74.171568] kasan_atomics+0x198/0x2e0 [ 74.171604] kunit_try_run_case+0x170/0x3f0 [ 74.171639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.171673] kthread+0x328/0x630 [ 74.171700] ret_from_fork+0x10/0x20 [ 74.171734] [ 74.242687] Allocated by task 349: [ 74.246073] kasan_save_stack+0x3c/0x68 [ 74.249892] kasan_save_track+0x20/0x40 [ 74.253712] kasan_save_alloc_info+0x40/0x58 [ 74.257965] __kasan_kmalloc+0xd4/0xd8 [ 74.261697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.266211] kasan_atomics+0xb8/0x2e0 [ 74.269857] kunit_try_run_case+0x170/0x3f0 [ 74.274023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.279492] kthread+0x328/0x630 [ 74.282704] ret_from_fork+0x10/0x20 [ 74.286263] [ 74.287739] The buggy address belongs to the object at ffff000807848f80 [ 74.287739] which belongs to the cache kmalloc-64 of size 64 [ 74.300065] The buggy address is located 0 bytes to the right of [ 74.300065] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 74.312912] [ 74.314387] The buggy address belongs to the physical page: [ 74.319944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 74.327929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.334440] page_type: f5(slab) [ 74.337573] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.345297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.353016] page dumped because: kasan: bad access detected [ 74.358571] [ 74.360046] Memory state around the buggy address: [ 74.364825] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.372029] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.379234] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.386435] ^ [ 74.391213] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.398418] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.405619] ================================================================== [ 80.230938] ================================================================== [ 80.237998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 80.245375] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 80.252667] [ 80.254146] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 80.254194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.254211] Hardware name: WinLink E850-96 board (DT) [ 80.254229] Call trace: [ 80.254241] show_stack+0x20/0x38 (C) [ 80.254275] dump_stack_lvl+0x8c/0xd0 [ 80.254305] print_report+0x118/0x5d0 [ 80.254334] kasan_report+0xdc/0x128 [ 80.254362] __asan_report_load8_noabort+0x20/0x30 [ 80.254394] kasan_atomics_helper+0x3e20/0x4858 [ 80.254429] kasan_atomics+0x198/0x2e0 [ 80.254462] kunit_try_run_case+0x170/0x3f0 [ 80.254496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.254531] kthread+0x328/0x630 [ 80.254558] ret_from_fork+0x10/0x20 [ 80.254590] [ 80.322283] Allocated by task 349: [ 80.325669] kasan_save_stack+0x3c/0x68 [ 80.329488] kasan_save_track+0x20/0x40 [ 80.333308] kasan_save_alloc_info+0x40/0x58 [ 80.337561] __kasan_kmalloc+0xd4/0xd8 [ 80.341294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.345808] kasan_atomics+0xb8/0x2e0 [ 80.349453] kunit_try_run_case+0x170/0x3f0 [ 80.353620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.359089] kthread+0x328/0x630 [ 80.362300] ret_from_fork+0x10/0x20 [ 80.365860] [ 80.367335] The buggy address belongs to the object at ffff000807848f80 [ 80.367335] which belongs to the cache kmalloc-64 of size 64 [ 80.379662] The buggy address is located 0 bytes to the right of [ 80.379662] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 80.392508] [ 80.393984] The buggy address belongs to the physical page: [ 80.399540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 80.407526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.414036] page_type: f5(slab) [ 80.417171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.424893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.432612] page dumped because: kasan: bad access detected [ 80.438167] [ 80.439643] Memory state around the buggy address: [ 80.444421] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.451625] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.458830] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.466032] ^ [ 80.470809] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.478014] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.485215] ================================================================== [ 69.667398] ================================================================== [ 69.674442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 69.681732] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 69.689110] [ 69.690589] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 69.690639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.690656] Hardware name: WinLink E850-96 board (DT) [ 69.690674] Call trace: [ 69.690687] show_stack+0x20/0x38 (C) [ 69.690722] dump_stack_lvl+0x8c/0xd0 [ 69.690752] print_report+0x118/0x5d0 [ 69.690779] kasan_report+0xdc/0x128 [ 69.690806] kasan_check_range+0x100/0x1a8 [ 69.690835] __kasan_check_write+0x20/0x30 [ 69.690867] kasan_atomics_helper+0xa04/0x4858 [ 69.690901] kasan_atomics+0x198/0x2e0 [ 69.690935] kunit_try_run_case+0x170/0x3f0 [ 69.690971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.691002] kthread+0x328/0x630 [ 69.691030] ret_from_fork+0x10/0x20 [ 69.691063] [ 69.762025] Allocated by task 349: [ 69.765411] kasan_save_stack+0x3c/0x68 [ 69.769230] kasan_save_track+0x20/0x40 [ 69.773049] kasan_save_alloc_info+0x40/0x58 [ 69.777303] __kasan_kmalloc+0xd4/0xd8 [ 69.781035] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.785549] kasan_atomics+0xb8/0x2e0 [ 69.789195] kunit_try_run_case+0x170/0x3f0 [ 69.793362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.798831] kthread+0x328/0x630 [ 69.802042] ret_from_fork+0x10/0x20 [ 69.805602] [ 69.807077] The buggy address belongs to the object at ffff000807848f80 [ 69.807077] which belongs to the cache kmalloc-64 of size 64 [ 69.819403] The buggy address is located 0 bytes to the right of [ 69.819403] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 69.832250] [ 69.833726] The buggy address belongs to the physical page: [ 69.839285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 69.847269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.853778] page_type: f5(slab) [ 69.856912] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.864635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.872354] page dumped because: kasan: bad access detected [ 69.877909] [ 69.879385] Memory state around the buggy address: [ 69.884163] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.891368] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.898572] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.905773] ^ [ 69.910551] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.917756] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.924957] ================================================================== [ 73.883134] ================================================================== [ 73.890178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 73.897467] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 73.904845] [ 73.906325] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 73.906379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.906395] Hardware name: WinLink E850-96 board (DT) [ 73.906415] Call trace: [ 73.906428] show_stack+0x20/0x38 (C) [ 73.906459] dump_stack_lvl+0x8c/0xd0 [ 73.906492] print_report+0x118/0x5d0 [ 73.906520] kasan_report+0xdc/0x128 [ 73.906548] kasan_check_range+0x100/0x1a8 [ 73.906578] __kasan_check_write+0x20/0x30 [ 73.906610] kasan_atomics_helper+0xeb8/0x4858 [ 73.906646] kasan_atomics+0x198/0x2e0 [ 73.906682] kunit_try_run_case+0x170/0x3f0 [ 73.906715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.906748] kthread+0x328/0x630 [ 73.906775] ret_from_fork+0x10/0x20 [ 73.906808] [ 73.977761] Allocated by task 349: [ 73.981146] kasan_save_stack+0x3c/0x68 [ 73.984966] kasan_save_track+0x20/0x40 [ 73.988785] kasan_save_alloc_info+0x40/0x58 [ 73.993038] __kasan_kmalloc+0xd4/0xd8 [ 73.996771] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.001285] kasan_atomics+0xb8/0x2e0 [ 74.004931] kunit_try_run_case+0x170/0x3f0 [ 74.009097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.014566] kthread+0x328/0x630 [ 74.017778] ret_from_fork+0x10/0x20 [ 74.021336] [ 74.022812] The buggy address belongs to the object at ffff000807848f80 [ 74.022812] which belongs to the cache kmalloc-64 of size 64 [ 74.035139] The buggy address is located 0 bytes to the right of [ 74.035139] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 74.047985] [ 74.049463] The buggy address belongs to the physical page: [ 74.055018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 74.063005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.069513] page_type: f5(slab) [ 74.072649] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.080370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.088089] page dumped because: kasan: bad access detected [ 74.093644] [ 74.095120] Memory state around the buggy address: [ 74.099898] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.107103] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.114308] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.121509] ^ [ 74.126287] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.133491] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.140693] ================================================================== [ 74.942849] ================================================================== [ 74.949884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 74.957260] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 74.964638] [ 74.966122] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 74.966175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.966193] Hardware name: WinLink E850-96 board (DT) [ 74.966211] Call trace: [ 74.966223] show_stack+0x20/0x38 (C) [ 74.966255] dump_stack_lvl+0x8c/0xd0 [ 74.966284] print_report+0x118/0x5d0 [ 74.966313] kasan_report+0xdc/0x128 [ 74.966342] kasan_check_range+0x100/0x1a8 [ 74.966372] __kasan_check_write+0x20/0x30 [ 74.966403] kasan_atomics_helper+0x1058/0x4858 [ 74.966440] kasan_atomics+0x198/0x2e0 [ 74.966474] kunit_try_run_case+0x170/0x3f0 [ 74.966508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.966542] kthread+0x328/0x630 [ 74.966570] ret_from_fork+0x10/0x20 [ 74.966600] [ 75.037641] Allocated by task 349: [ 75.041026] kasan_save_stack+0x3c/0x68 [ 75.044845] kasan_save_track+0x20/0x40 [ 75.048665] kasan_save_alloc_info+0x40/0x58 [ 75.052918] __kasan_kmalloc+0xd4/0xd8 [ 75.056651] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.061165] kasan_atomics+0xb8/0x2e0 [ 75.064811] kunit_try_run_case+0x170/0x3f0 [ 75.068977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.074446] kthread+0x328/0x630 [ 75.077657] ret_from_fork+0x10/0x20 [ 75.081216] [ 75.082692] The buggy address belongs to the object at ffff000807848f80 [ 75.082692] which belongs to the cache kmalloc-64 of size 64 [ 75.095019] The buggy address is located 0 bytes to the right of [ 75.095019] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 75.107865] [ 75.109341] The buggy address belongs to the physical page: [ 75.114897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 75.122882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.129393] page_type: f5(slab) [ 75.132527] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.140250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.147969] page dumped because: kasan: bad access detected [ 75.153524] [ 75.155000] Memory state around the buggy address: [ 75.159778] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.166983] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.174188] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.181389] ^ [ 75.186168] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.193371] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.200572] ================================================================== [ 69.402450] ================================================================== [ 69.409515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 69.416805] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 69.424183] [ 69.425663] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 69.425710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.425725] Hardware name: WinLink E850-96 board (DT) [ 69.425745] Call trace: [ 69.425758] show_stack+0x20/0x38 (C) [ 69.425790] dump_stack_lvl+0x8c/0xd0 [ 69.425821] print_report+0x118/0x5d0 [ 69.425849] kasan_report+0xdc/0x128 [ 69.425877] kasan_check_range+0x100/0x1a8 [ 69.425907] __kasan_check_write+0x20/0x30 [ 69.425937] kasan_atomics_helper+0x99c/0x4858 [ 69.425971] kasan_atomics+0x198/0x2e0 [ 69.426004] kunit_try_run_case+0x170/0x3f0 [ 69.426038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.426072] kthread+0x328/0x630 [ 69.426099] ret_from_fork+0x10/0x20 [ 69.426129] [ 69.497099] Allocated by task 349: [ 69.500485] kasan_save_stack+0x3c/0x68 [ 69.504304] kasan_save_track+0x20/0x40 [ 69.508123] kasan_save_alloc_info+0x40/0x58 [ 69.512377] __kasan_kmalloc+0xd4/0xd8 [ 69.516109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.520623] kasan_atomics+0xb8/0x2e0 [ 69.524269] kunit_try_run_case+0x170/0x3f0 [ 69.528435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.533904] kthread+0x328/0x630 [ 69.537116] ret_from_fork+0x10/0x20 [ 69.540675] [ 69.542150] The buggy address belongs to the object at ffff000807848f80 [ 69.542150] which belongs to the cache kmalloc-64 of size 64 [ 69.554477] The buggy address is located 0 bytes to the right of [ 69.554477] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 69.567323] [ 69.568799] The buggy address belongs to the physical page: [ 69.574355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 69.582341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.588851] page_type: f5(slab) [ 69.591984] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.599708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.607427] page dumped because: kasan: bad access detected [ 69.612983] [ 69.614458] Memory state around the buggy address: [ 69.619236] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.626441] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.633646] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.640847] ^ [ 69.645625] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.652829] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.660031] ================================================================== [ 72.041850] ================================================================== [ 72.048885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 72.056262] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 72.063553] [ 72.065035] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 72.065084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.065100] Hardware name: WinLink E850-96 board (DT) [ 72.065119] Call trace: [ 72.065133] show_stack+0x20/0x38 (C) [ 72.065164] dump_stack_lvl+0x8c/0xd0 [ 72.065197] print_report+0x118/0x5d0 [ 72.065226] kasan_report+0xdc/0x128 [ 72.065255] __asan_report_load4_noabort+0x20/0x30 [ 72.065288] kasan_atomics_helper+0x3dd8/0x4858 [ 72.065324] kasan_atomics+0x198/0x2e0 [ 72.065358] kunit_try_run_case+0x170/0x3f0 [ 72.065393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.065425] kthread+0x328/0x630 [ 72.065452] ret_from_fork+0x10/0x20 [ 72.065485] [ 72.133170] Allocated by task 349: [ 72.136556] kasan_save_stack+0x3c/0x68 [ 72.140375] kasan_save_track+0x20/0x40 [ 72.144195] kasan_save_alloc_info+0x40/0x58 [ 72.148448] __kasan_kmalloc+0xd4/0xd8 [ 72.152180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.156694] kasan_atomics+0xb8/0x2e0 [ 72.160340] kunit_try_run_case+0x170/0x3f0 [ 72.164507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.169975] kthread+0x328/0x630 [ 72.173187] ret_from_fork+0x10/0x20 [ 72.176746] [ 72.178222] The buggy address belongs to the object at ffff000807848f80 [ 72.178222] which belongs to the cache kmalloc-64 of size 64 [ 72.190548] The buggy address is located 0 bytes to the right of [ 72.190548] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 72.203395] [ 72.204871] The buggy address belongs to the physical page: [ 72.210428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 72.218413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.224923] page_type: f5(slab) [ 72.228057] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.235780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.243499] page dumped because: kasan: bad access detected [ 72.249054] [ 72.250530] Memory state around the buggy address: [ 72.255308] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.262512] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.269717] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.276918] ^ [ 72.281696] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.288901] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.296102] ================================================================== [ 65.435033] ================================================================== [ 65.442040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 65.449417] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 65.456796] [ 65.458279] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 65.458330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.458346] Hardware name: WinLink E850-96 board (DT) [ 65.458369] Call trace: [ 65.458382] show_stack+0x20/0x38 (C) [ 65.458416] dump_stack_lvl+0x8c/0xd0 [ 65.458449] print_report+0x118/0x5d0 [ 65.458477] kasan_report+0xdc/0x128 [ 65.458507] __asan_report_store4_noabort+0x20/0x30 [ 65.458540] kasan_atomics_helper+0x3f94/0x4858 [ 65.458576] kasan_atomics+0x198/0x2e0 [ 65.458608] kunit_try_run_case+0x170/0x3f0 [ 65.458643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.458676] kthread+0x328/0x630 [ 65.458704] ret_from_fork+0x10/0x20 [ 65.458740] [ 65.526499] Allocated by task 349: [ 65.529884] kasan_save_stack+0x3c/0x68 [ 65.533704] kasan_save_track+0x20/0x40 [ 65.537523] kasan_save_alloc_info+0x40/0x58 [ 65.541776] __kasan_kmalloc+0xd4/0xd8 [ 65.545509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.550023] kasan_atomics+0xb8/0x2e0 [ 65.553668] kunit_try_run_case+0x170/0x3f0 [ 65.557835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.563304] kthread+0x328/0x630 [ 65.566515] ret_from_fork+0x10/0x20 [ 65.570075] [ 65.571550] The buggy address belongs to the object at ffff000807848f80 [ 65.571550] which belongs to the cache kmalloc-64 of size 64 [ 65.583878] The buggy address is located 0 bytes to the right of [ 65.583878] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 65.596723] [ 65.598202] The buggy address belongs to the physical page: [ 65.603757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 65.611744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.618251] page_type: f5(slab) [ 65.621387] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.629108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.636827] page dumped because: kasan: bad access detected [ 65.642382] [ 65.643858] Memory state around the buggy address: [ 65.648637] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.655841] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.663048] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.670246] ^ [ 65.675024] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.682229] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.689430] ================================================================== [ 67.551236] ================================================================== [ 67.558327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 67.565618] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 67.572996] [ 67.574476] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 67.574526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.574541] Hardware name: WinLink E850-96 board (DT) [ 67.574558] Call trace: [ 67.574571] show_stack+0x20/0x38 (C) [ 67.574602] dump_stack_lvl+0x8c/0xd0 [ 67.574634] print_report+0x118/0x5d0 [ 67.574663] kasan_report+0xdc/0x128 [ 67.574690] kasan_check_range+0x100/0x1a8 [ 67.574720] __kasan_check_write+0x20/0x30 [ 67.574751] kasan_atomics_helper+0x684/0x4858 [ 67.574786] kasan_atomics+0x198/0x2e0 [ 67.574819] kunit_try_run_case+0x170/0x3f0 [ 67.574856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.574888] kthread+0x328/0x630 [ 67.574916] ret_from_fork+0x10/0x20 [ 67.574948] [ 67.645911] Allocated by task 349: [ 67.649298] kasan_save_stack+0x3c/0x68 [ 67.653116] kasan_save_track+0x20/0x40 [ 67.656936] kasan_save_alloc_info+0x40/0x58 [ 67.661189] __kasan_kmalloc+0xd4/0xd8 [ 67.664921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.669435] kasan_atomics+0xb8/0x2e0 [ 67.673081] kunit_try_run_case+0x170/0x3f0 [ 67.677248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.682717] kthread+0x328/0x630 [ 67.685928] ret_from_fork+0x10/0x20 [ 67.689487] [ 67.690963] The buggy address belongs to the object at ffff000807848f80 [ 67.690963] which belongs to the cache kmalloc-64 of size 64 [ 67.703289] The buggy address is located 0 bytes to the right of [ 67.703289] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 67.716136] [ 67.717612] The buggy address belongs to the physical page: [ 67.723168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 67.731153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.737663] page_type: f5(slab) [ 67.740798] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.748521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.756239] page dumped because: kasan: bad access detected [ 67.761795] [ 67.763271] Memory state around the buggy address: [ 67.768049] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.775253] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.782458] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.789659] ^ [ 67.794437] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.801642] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.808843] ================================================================== [ 66.226644] ================================================================== [ 66.233694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 66.240985] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 66.248363] [ 66.249846] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 66.249898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.249913] Hardware name: WinLink E850-96 board (DT) [ 66.249933] Call trace: [ 66.249946] show_stack+0x20/0x38 (C) [ 66.249978] dump_stack_lvl+0x8c/0xd0 [ 66.250009] print_report+0x118/0x5d0 [ 66.250037] kasan_report+0xdc/0x128 [ 66.250065] kasan_check_range+0x100/0x1a8 [ 66.250093] __kasan_check_write+0x20/0x30 [ 66.250124] kasan_atomics_helper+0x47c/0x4858 [ 66.250158] kasan_atomics+0x198/0x2e0 [ 66.250190] kunit_try_run_case+0x170/0x3f0 [ 66.250226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.250258] kthread+0x328/0x630 [ 66.250286] ret_from_fork+0x10/0x20 [ 66.250321] [ 66.321278] Allocated by task 349: [ 66.324664] kasan_save_stack+0x3c/0x68 [ 66.328484] kasan_save_track+0x20/0x40 [ 66.332303] kasan_save_alloc_info+0x40/0x58 [ 66.336556] __kasan_kmalloc+0xd4/0xd8 [ 66.340289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.344803] kasan_atomics+0xb8/0x2e0 [ 66.348448] kunit_try_run_case+0x170/0x3f0 [ 66.352615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.358083] kthread+0x328/0x630 [ 66.361295] ret_from_fork+0x10/0x20 [ 66.364854] [ 66.366330] The buggy address belongs to the object at ffff000807848f80 [ 66.366330] which belongs to the cache kmalloc-64 of size 64 [ 66.378657] The buggy address is located 0 bytes to the right of [ 66.378657] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 66.391503] [ 66.392980] The buggy address belongs to the physical page: [ 66.398536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 66.406523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.413031] page_type: f5(slab) [ 66.416165] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.423888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.431607] page dumped because: kasan: bad access detected [ 66.437162] [ 66.438638] Memory state around the buggy address: [ 66.443418] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.450620] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.457825] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.465026] ^ [ 66.469804] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.477009] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.484210] ==================================================================
[ 33.016890] ================================================================== [ 33.017156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.017485] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.017590] [ 33.017692] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.018111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.018230] Hardware name: linux,dummy-virt (DT) [ 33.018285] Call trace: [ 33.018310] show_stack+0x20/0x38 (C) [ 33.018618] dump_stack_lvl+0x8c/0xd0 [ 33.018721] print_report+0x118/0x5d0 [ 33.018833] kasan_report+0xdc/0x128 [ 33.018920] kasan_check_range+0x100/0x1a8 [ 33.019225] __kasan_check_write+0x20/0x30 [ 33.019300] kasan_atomics_helper+0xa6c/0x4858 [ 33.019628] kasan_atomics+0x198/0x2e0 [ 33.019783] kunit_try_run_case+0x170/0x3f0 [ 33.019889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.020227] kthread+0x328/0x630 [ 33.020305] ret_from_fork+0x10/0x20 [ 33.020364] [ 33.020754] Allocated by task 296: [ 33.020841] kasan_save_stack+0x3c/0x68 [ 33.021223] kasan_save_track+0x20/0x40 [ 33.021343] kasan_save_alloc_info+0x40/0x58 [ 33.021452] __kasan_kmalloc+0xd4/0xd8 [ 33.021541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.021845] kasan_atomics+0xb8/0x2e0 [ 33.021944] kunit_try_run_case+0x170/0x3f0 [ 33.022035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.022128] kthread+0x328/0x630 [ 33.022264] ret_from_fork+0x10/0x20 [ 33.022460] [ 33.022487] The buggy address belongs to the object at fff00000c91a4d80 [ 33.022487] which belongs to the cache kmalloc-64 of size 64 [ 33.022657] The buggy address is located 0 bytes to the right of [ 33.022657] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.022813] [ 33.022876] The buggy address belongs to the physical page: [ 33.022955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.023162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.023219] page_type: f5(slab) [ 33.023611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.023708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.024083] page dumped because: kasan: bad access detected [ 33.024181] [ 33.024240] Memory state around the buggy address: [ 33.024359] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.024446] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.024529] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.024567] ^ [ 33.024645] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.024875] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.025041] ================================================================== [ 33.272430] ================================================================== [ 33.272749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 33.272820] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.273057] [ 33.273133] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.273319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.273371] Hardware name: linux,dummy-virt (DT) [ 33.273422] Call trace: [ 33.273461] show_stack+0x20/0x38 (C) [ 33.273518] dump_stack_lvl+0x8c/0xd0 [ 33.273565] print_report+0x118/0x5d0 [ 33.273821] kasan_report+0xdc/0x128 [ 33.273988] __asan_report_load8_noabort+0x20/0x30 [ 33.274345] kasan_atomics_helper+0x3db0/0x4858 [ 33.274654] kasan_atomics+0x198/0x2e0 [ 33.274751] kunit_try_run_case+0x170/0x3f0 [ 33.275134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.275196] kthread+0x328/0x630 [ 33.275270] ret_from_fork+0x10/0x20 [ 33.275944] [ 33.275986] Allocated by task 296: [ 33.276123] kasan_save_stack+0x3c/0x68 [ 33.276175] kasan_save_track+0x20/0x40 [ 33.276266] kasan_save_alloc_info+0x40/0x58 [ 33.276357] __kasan_kmalloc+0xd4/0xd8 [ 33.276716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.276885] kasan_atomics+0xb8/0x2e0 [ 33.277040] kunit_try_run_case+0x170/0x3f0 [ 33.277400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.277475] kthread+0x328/0x630 [ 33.277553] ret_from_fork+0x10/0x20 [ 33.277943] [ 33.278180] The buggy address belongs to the object at fff00000c91a4d80 [ 33.278180] which belongs to the cache kmalloc-64 of size 64 [ 33.278275] The buggy address is located 0 bytes to the right of [ 33.278275] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.278469] [ 33.278597] The buggy address belongs to the physical page: [ 33.278884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.279077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.279184] page_type: f5(slab) [ 33.279238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.279291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.279521] page dumped because: kasan: bad access detected [ 33.279590] [ 33.279621] Memory state around the buggy address: [ 33.279670] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.279718] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.279777] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.279831] ^ [ 33.279868] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.279923] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.279964] ================================================================== [ 33.242283] ================================================================== [ 33.242409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 33.242495] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.242549] [ 33.242917] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.243054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.243119] Hardware name: linux,dummy-virt (DT) [ 33.243154] Call trace: [ 33.243195] show_stack+0x20/0x38 (C) [ 33.243251] dump_stack_lvl+0x8c/0xd0 [ 33.243607] print_report+0x118/0x5d0 [ 33.243677] kasan_report+0xdc/0x128 [ 33.243723] kasan_check_range+0x100/0x1a8 [ 33.243769] __kasan_check_write+0x20/0x30 [ 33.243815] kasan_atomics_helper+0x147c/0x4858 [ 33.243918] kasan_atomics+0x198/0x2e0 [ 33.244008] kunit_try_run_case+0x170/0x3f0 [ 33.244061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.244448] kthread+0x328/0x630 [ 33.244501] ret_from_fork+0x10/0x20 [ 33.244561] [ 33.244716] Allocated by task 296: [ 33.244758] kasan_save_stack+0x3c/0x68 [ 33.244921] kasan_save_track+0x20/0x40 [ 33.244976] kasan_save_alloc_info+0x40/0x58 [ 33.245018] __kasan_kmalloc+0xd4/0xd8 [ 33.245059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.245390] kasan_atomics+0xb8/0x2e0 [ 33.245593] kunit_try_run_case+0x170/0x3f0 [ 33.245821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.245955] kthread+0x328/0x630 [ 33.246056] ret_from_fork+0x10/0x20 [ 33.246209] [ 33.246233] The buggy address belongs to the object at fff00000c91a4d80 [ 33.246233] which belongs to the cache kmalloc-64 of size 64 [ 33.246302] The buggy address is located 0 bytes to the right of [ 33.246302] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.246379] [ 33.246401] The buggy address belongs to the physical page: [ 33.246435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.246911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.247081] page_type: f5(slab) [ 33.247129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.247182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.247226] page dumped because: kasan: bad access detected [ 33.247305] [ 33.247365] Memory state around the buggy address: [ 33.247417] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.247464] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.247517] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.247563] ^ [ 33.247599] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.247653] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.247701] ================================================================== [ 33.248705] ================================================================== [ 33.248794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 33.249194] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.249276] [ 33.249314] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.249492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.249616] Hardware name: linux,dummy-virt (DT) [ 33.249684] Call trace: [ 33.249716] show_stack+0x20/0x38 (C) [ 33.249960] dump_stack_lvl+0x8c/0xd0 [ 33.250125] print_report+0x118/0x5d0 [ 33.250388] kasan_report+0xdc/0x128 [ 33.250545] kasan_check_range+0x100/0x1a8 [ 33.250618] __kasan_check_write+0x20/0x30 [ 33.250766] kasan_atomics_helper+0x14e4/0x4858 [ 33.250842] kasan_atomics+0x198/0x2e0 [ 33.250989] kunit_try_run_case+0x170/0x3f0 [ 33.251092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.251163] kthread+0x328/0x630 [ 33.251208] ret_from_fork+0x10/0x20 [ 33.251817] [ 33.252049] Allocated by task 296: [ 33.252115] kasan_save_stack+0x3c/0x68 [ 33.252472] kasan_save_track+0x20/0x40 [ 33.252550] kasan_save_alloc_info+0x40/0x58 [ 33.252774] __kasan_kmalloc+0xd4/0xd8 [ 33.252899] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.253219] kasan_atomics+0xb8/0x2e0 [ 33.253413] kunit_try_run_case+0x170/0x3f0 [ 33.253560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.253678] kthread+0x328/0x630 [ 33.253882] ret_from_fork+0x10/0x20 [ 33.254155] [ 33.254320] The buggy address belongs to the object at fff00000c91a4d80 [ 33.254320] which belongs to the cache kmalloc-64 of size 64 [ 33.254519] The buggy address is located 0 bytes to the right of [ 33.254519] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.254908] [ 33.254952] The buggy address belongs to the physical page: [ 33.255008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.255079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.255315] page_type: f5(slab) [ 33.255513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.255634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.255703] page dumped because: kasan: bad access detected [ 33.255745] [ 33.255767] Memory state around the buggy address: [ 33.255807] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.255864] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.255909] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.255948] ^ [ 33.255993] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.256045] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.256100] ================================================================== [ 33.086567] ================================================================== [ 33.086627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.086684] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.086736] [ 33.086897] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.087026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.087197] Hardware name: linux,dummy-virt (DT) [ 33.087234] Call trace: [ 33.087261] show_stack+0x20/0x38 (C) [ 33.087355] dump_stack_lvl+0x8c/0xd0 [ 33.087417] print_report+0x118/0x5d0 [ 33.087470] kasan_report+0xdc/0x128 [ 33.087515] kasan_check_range+0x100/0x1a8 [ 33.087563] __kasan_check_write+0x20/0x30 [ 33.087610] kasan_atomics_helper+0xd3c/0x4858 [ 33.087661] kasan_atomics+0x198/0x2e0 [ 33.087710] kunit_try_run_case+0x170/0x3f0 [ 33.087760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.087812] kthread+0x328/0x630 [ 33.087856] ret_from_fork+0x10/0x20 [ 33.087916] [ 33.087937] Allocated by task 296: [ 33.087969] kasan_save_stack+0x3c/0x68 [ 33.088022] kasan_save_track+0x20/0x40 [ 33.088064] kasan_save_alloc_info+0x40/0x58 [ 33.088104] __kasan_kmalloc+0xd4/0xd8 [ 33.088144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.088188] kasan_atomics+0xb8/0x2e0 [ 33.088227] kunit_try_run_case+0x170/0x3f0 [ 33.088268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.088312] kthread+0x328/0x630 [ 33.089056] ret_from_fork+0x10/0x20 [ 33.089109] [ 33.089133] The buggy address belongs to the object at fff00000c91a4d80 [ 33.089133] which belongs to the cache kmalloc-64 of size 64 [ 33.089194] The buggy address is located 0 bytes to the right of [ 33.089194] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.089258] [ 33.089527] The buggy address belongs to the physical page: [ 33.089742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.089803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.089863] page_type: f5(slab) [ 33.089906] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.090293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.090586] page dumped because: kasan: bad access detected [ 33.090652] [ 33.090723] Memory state around the buggy address: [ 33.090826] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.090949] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.091030] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.091112] ^ [ 33.091222] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.091284] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.091615] ================================================================== [ 33.208972] ================================================================== [ 33.209131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 33.209190] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.209242] [ 33.209279] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.209612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.210058] Hardware name: linux,dummy-virt (DT) [ 33.210148] Call trace: [ 33.210206] show_stack+0x20/0x38 (C) [ 33.210376] dump_stack_lvl+0x8c/0xd0 [ 33.210487] print_report+0x118/0x5d0 [ 33.210552] kasan_report+0xdc/0x128 [ 33.210894] kasan_check_range+0x100/0x1a8 [ 33.210979] __kasan_check_write+0x20/0x30 [ 33.211057] kasan_atomics_helper+0x12d8/0x4858 [ 33.211310] kasan_atomics+0x198/0x2e0 [ 33.211508] kunit_try_run_case+0x170/0x3f0 [ 33.211668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.211772] kthread+0x328/0x630 [ 33.211856] ret_from_fork+0x10/0x20 [ 33.212030] [ 33.212094] Allocated by task 296: [ 33.212174] kasan_save_stack+0x3c/0x68 [ 33.212318] kasan_save_track+0x20/0x40 [ 33.212371] kasan_save_alloc_info+0x40/0x58 [ 33.212418] __kasan_kmalloc+0xd4/0xd8 [ 33.212479] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.212601] kasan_atomics+0xb8/0x2e0 [ 33.212669] kunit_try_run_case+0x170/0x3f0 [ 33.212721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.212775] kthread+0x328/0x630 [ 33.212812] ret_from_fork+0x10/0x20 [ 33.212850] [ 33.212873] The buggy address belongs to the object at fff00000c91a4d80 [ 33.212873] which belongs to the cache kmalloc-64 of size 64 [ 33.212935] The buggy address is located 0 bytes to the right of [ 33.212935] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.213011] [ 33.213053] The buggy address belongs to the physical page: [ 33.213093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.213157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.213208] page_type: f5(slab) [ 33.213250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.213302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.213357] page dumped because: kasan: bad access detected [ 33.213390] [ 33.213720] Memory state around the buggy address: [ 33.214031] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.214105] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.214162] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.214435] ^ [ 33.214581] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.214654] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.214785] ================================================================== [ 33.216120] ================================================================== [ 33.216621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 33.216885] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.217150] [ 33.217294] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.217405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.217535] Hardware name: linux,dummy-virt (DT) [ 33.217684] Call trace: [ 33.217807] show_stack+0x20/0x38 (C) [ 33.217897] dump_stack_lvl+0x8c/0xd0 [ 33.217977] print_report+0x118/0x5d0 [ 33.218305] kasan_report+0xdc/0x128 [ 33.218625] kasan_check_range+0x100/0x1a8 [ 33.218790] __kasan_check_write+0x20/0x30 [ 33.219050] kasan_atomics_helper+0x1384/0x4858 [ 33.219243] kasan_atomics+0x198/0x2e0 [ 33.219315] kunit_try_run_case+0x170/0x3f0 [ 33.219662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.219719] kthread+0x328/0x630 [ 33.220093] ret_from_fork+0x10/0x20 [ 33.220205] [ 33.220483] Allocated by task 296: [ 33.220619] kasan_save_stack+0x3c/0x68 [ 33.220671] kasan_save_track+0x20/0x40 [ 33.221371] kasan_save_alloc_info+0x40/0x58 [ 33.221600] __kasan_kmalloc+0xd4/0xd8 [ 33.221839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.222037] kasan_atomics+0xb8/0x2e0 [ 33.222108] kunit_try_run_case+0x170/0x3f0 [ 33.222260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.222560] kthread+0x328/0x630 [ 33.222633] ret_from_fork+0x10/0x20 [ 33.222787] [ 33.222850] The buggy address belongs to the object at fff00000c91a4d80 [ 33.222850] which belongs to the cache kmalloc-64 of size 64 [ 33.222942] The buggy address is located 0 bytes to the right of [ 33.222942] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.223010] [ 33.223400] The buggy address belongs to the physical page: [ 33.223629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.223825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.223883] page_type: f5(slab) [ 33.224082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.224256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.224335] page dumped because: kasan: bad access detected [ 33.224617] [ 33.224723] Memory state around the buggy address: [ 33.224786] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.224910] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.224976] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.225035] ^ [ 33.225072] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.225117] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.225166] ================================================================== [ 33.110316] ================================================================== [ 33.110430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.110650] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.110745] [ 33.111051] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.111205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.111240] Hardware name: linux,dummy-virt (DT) [ 33.111277] Call trace: [ 33.111632] show_stack+0x20/0x38 (C) [ 33.111796] dump_stack_lvl+0x8c/0xd0 [ 33.111873] print_report+0x118/0x5d0 [ 33.112070] kasan_report+0xdc/0x128 [ 33.112243] __asan_report_load8_noabort+0x20/0x30 [ 33.112319] kasan_atomics_helper+0x3f58/0x4858 [ 33.112387] kasan_atomics+0x198/0x2e0 [ 33.112438] kunit_try_run_case+0x170/0x3f0 [ 33.112719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.112812] kthread+0x328/0x630 [ 33.113070] ret_from_fork+0x10/0x20 [ 33.113183] [ 33.113217] Allocated by task 296: [ 33.113252] kasan_save_stack+0x3c/0x68 [ 33.113309] kasan_save_track+0x20/0x40 [ 33.113364] kasan_save_alloc_info+0x40/0x58 [ 33.113623] __kasan_kmalloc+0xd4/0xd8 [ 33.113677] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.113834] kasan_atomics+0xb8/0x2e0 [ 33.113920] kunit_try_run_case+0x170/0x3f0 [ 33.114036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.114254] kthread+0x328/0x630 [ 33.114417] ret_from_fork+0x10/0x20 [ 33.114495] [ 33.114595] The buggy address belongs to the object at fff00000c91a4d80 [ 33.114595] which belongs to the cache kmalloc-64 of size 64 [ 33.114673] The buggy address is located 0 bytes to the right of [ 33.114673] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.115245] [ 33.115380] The buggy address belongs to the physical page: [ 33.115717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.115832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.115895] page_type: f5(slab) [ 33.115936] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.116013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.116066] page dumped because: kasan: bad access detected [ 33.116120] [ 33.116146] Memory state around the buggy address: [ 33.116201] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.116264] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.116316] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.116383] ^ [ 33.116420] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.116473] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.116520] ================================================================== [ 32.987833] ================================================================== [ 32.987886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.987940] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 32.987991] [ 32.988022] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.988210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.988246] Hardware name: linux,dummy-virt (DT) [ 32.988295] Call trace: [ 32.988365] show_stack+0x20/0x38 (C) [ 32.988420] dump_stack_lvl+0x8c/0xd0 [ 32.988479] print_report+0x118/0x5d0 [ 32.988535] kasan_report+0xdc/0x128 [ 32.988580] __asan_report_load4_noabort+0x20/0x30 [ 32.988687] kasan_atomics_helper+0x42d8/0x4858 [ 32.988763] kasan_atomics+0x198/0x2e0 [ 32.988867] kunit_try_run_case+0x170/0x3f0 [ 32.988921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.989241] kthread+0x328/0x630 [ 32.989319] ret_from_fork+0x10/0x20 [ 32.989380] [ 32.989491] Allocated by task 296: [ 32.989528] kasan_save_stack+0x3c/0x68 [ 32.989574] kasan_save_track+0x20/0x40 [ 32.989713] kasan_save_alloc_info+0x40/0x58 [ 32.989799] __kasan_kmalloc+0xd4/0xd8 [ 32.989940] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.990036] kasan_atomics+0xb8/0x2e0 [ 32.990143] kunit_try_run_case+0x170/0x3f0 [ 32.990187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.990231] kthread+0x328/0x630 [ 32.990274] ret_from_fork+0x10/0x20 [ 32.990312] [ 32.990343] The buggy address belongs to the object at fff00000c91a4d80 [ 32.990343] which belongs to the cache kmalloc-64 of size 64 [ 32.990933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 32.991080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.991841] Memory state around the buggy address: [ 32.992438] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.992911] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.996041] kasan_check_range+0x100/0x1a8 [ 32.996969] Allocated by task 296: [ 32.997020] kasan_save_stack+0x3c/0x68 [ 32.997158] kasan_save_track+0x20/0x40 [ 32.997420] kasan_save_alloc_info+0x40/0x58 [ 32.997607] __kasan_kmalloc+0xd4/0xd8 [ 32.997649] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.997695] kasan_atomics+0xb8/0x2e0 [ 32.997762] kunit_try_run_case+0x170/0x3f0 [ 32.997808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.997853] kthread+0x328/0x630 [ 32.998220] ret_from_fork+0x10/0x20 [ 32.998301] [ 32.998408] The buggy address belongs to the object at fff00000c91a4d80 [ 32.998408] which belongs to the cache kmalloc-64 of size 64 [ 32.998522] The buggy address is located 0 bytes to the right of [ 32.998522] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 32.998842] [ 32.998895] The buggy address belongs to the physical page: [ 32.998966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 32.999032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.999085] page_type: f5(slab) [ 32.999135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.999188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.999231] page dumped because: kasan: bad access detected [ 32.999584] [ 32.999655] Memory state around the buggy address: [ 32.999748] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.000029] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.000209] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.000454] ^ [ 33.000499] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.000652] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.000722] ================================================================== [ 33.226115] ================================================================== [ 33.226356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 33.226578] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.226639] [ 33.226675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.226971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.227016] Hardware name: linux,dummy-virt (DT) [ 33.227081] Call trace: [ 33.227108] show_stack+0x20/0x38 (C) [ 33.227162] dump_stack_lvl+0x8c/0xd0 [ 33.227209] print_report+0x118/0x5d0 [ 33.227423] kasan_report+0xdc/0x128 [ 33.228147] __asan_report_load8_noabort+0x20/0x30 [ 33.228288] kasan_atomics_helper+0x3f04/0x4858 [ 33.228505] kasan_atomics+0x198/0x2e0 [ 33.228583] kunit_try_run_case+0x170/0x3f0 [ 33.228736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.228941] kthread+0x328/0x630 [ 33.229405] ret_from_fork+0x10/0x20 [ 33.229793] [ 33.229821] Allocated by task 296: [ 33.229872] kasan_save_stack+0x3c/0x68 [ 33.229921] kasan_save_track+0x20/0x40 [ 33.229963] kasan_save_alloc_info+0x40/0x58 [ 33.230262] __kasan_kmalloc+0xd4/0xd8 [ 33.230401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.230583] kasan_atomics+0xb8/0x2e0 [ 33.230654] kunit_try_run_case+0x170/0x3f0 [ 33.230997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.231242] kthread+0x328/0x630 [ 33.231578] ret_from_fork+0x10/0x20 [ 33.231765] [ 33.231821] The buggy address belongs to the object at fff00000c91a4d80 [ 33.231821] which belongs to the cache kmalloc-64 of size 64 [ 33.232135] The buggy address is located 0 bytes to the right of [ 33.232135] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.232430] [ 33.232625] The buggy address belongs to the physical page: [ 33.232693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.233032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.233211] page_type: f5(slab) [ 33.233287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.233357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.233401] page dumped because: kasan: bad access detected [ 33.233434] [ 33.233466] Memory state around the buggy address: [ 33.233501] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.233558] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.233602] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.233642] ^ [ 33.233686] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.233753] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.233804] ================================================================== [ 33.317646] ================================================================== [ 33.317708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 33.317763] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.317971] [ 33.318045] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.318405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.318467] Hardware name: linux,dummy-virt (DT) [ 33.318501] Call trace: [ 33.318582] show_stack+0x20/0x38 (C) [ 33.318669] dump_stack_lvl+0x8c/0xd0 [ 33.318722] print_report+0x118/0x5d0 [ 33.318829] kasan_report+0xdc/0x128 [ 33.318895] __asan_report_load8_noabort+0x20/0x30 [ 33.318946] kasan_atomics_helper+0x3e20/0x4858 [ 33.319280] kasan_atomics+0x198/0x2e0 [ 33.319357] kunit_try_run_case+0x170/0x3f0 [ 33.319523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.319591] kthread+0x328/0x630 [ 33.319636] ret_from_fork+0x10/0x20 [ 33.319921] [ 33.320044] Allocated by task 296: [ 33.320249] kasan_save_stack+0x3c/0x68 [ 33.320444] kasan_save_track+0x20/0x40 [ 33.320500] kasan_save_alloc_info+0x40/0x58 [ 33.320572] __kasan_kmalloc+0xd4/0xd8 [ 33.320621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.320802] kasan_atomics+0xb8/0x2e0 [ 33.320858] kunit_try_run_case+0x170/0x3f0 [ 33.321008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.321062] kthread+0x328/0x630 [ 33.321230] ret_from_fork+0x10/0x20 [ 33.321285] [ 33.321461] The buggy address belongs to the object at fff00000c91a4d80 [ 33.321461] which belongs to the cache kmalloc-64 of size 64 [ 33.321580] The buggy address is located 0 bytes to the right of [ 33.321580] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.321872] [ 33.321923] The buggy address belongs to the physical page: [ 33.321977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.322090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.322178] page_type: f5(slab) [ 33.322545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.322647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.322753] page dumped because: kasan: bad access detected [ 33.322786] [ 33.322806] Memory state around the buggy address: [ 33.323026] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323215] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323272] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.323313] ^ [ 33.323357] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.323435] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.323493] ================================================================== [ 33.162193] ================================================================== [ 33.162252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.162304] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.162378] [ 33.162411] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.162508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.162539] Hardware name: linux,dummy-virt (DT) [ 33.162573] Call trace: [ 33.162596] show_stack+0x20/0x38 (C) [ 33.162647] dump_stack_lvl+0x8c/0xd0 [ 33.162694] print_report+0x118/0x5d0 [ 33.162740] kasan_report+0xdc/0x128 [ 33.162786] kasan_check_range+0x100/0x1a8 [ 33.162833] __kasan_check_write+0x20/0x30 [ 33.162901] kasan_atomics_helper+0x1058/0x4858 [ 33.162956] kasan_atomics+0x198/0x2e0 [ 33.163003] kunit_try_run_case+0x170/0x3f0 [ 33.163059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.163116] kthread+0x328/0x630 [ 33.163159] ret_from_fork+0x10/0x20 [ 33.163209] [ 33.163240] Allocated by task 296: [ 33.163270] kasan_save_stack+0x3c/0x68 [ 33.163316] kasan_save_track+0x20/0x40 [ 33.163523] kasan_save_alloc_info+0x40/0x58 [ 33.163699] __kasan_kmalloc+0xd4/0xd8 [ 33.163751] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.164179] kasan_atomics+0xb8/0x2e0 [ 33.164247] kunit_try_run_case+0x170/0x3f0 [ 33.164301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.164637] kthread+0x328/0x630 [ 33.164706] ret_from_fork+0x10/0x20 [ 33.164749] [ 33.164955] The buggy address belongs to the object at fff00000c91a4d80 [ 33.164955] which belongs to the cache kmalloc-64 of size 64 [ 33.165045] The buggy address is located 0 bytes to the right of [ 33.165045] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.165125] [ 33.165559] The buggy address belongs to the physical page: [ 33.165654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.165734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.165792] page_type: f5(slab) [ 33.165835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.165894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.166388] page dumped because: kasan: bad access detected [ 33.166531] [ 33.166569] Memory state around the buggy address: [ 33.166854] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.167179] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.167417] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.167541] ^ [ 33.167616] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.167759] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.167814] ================================================================== [ 33.076348] ================================================================== [ 33.076410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.076739] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.076820] [ 33.077277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.077654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.077709] Hardware name: linux,dummy-virt (DT) [ 33.077763] Call trace: [ 33.078201] show_stack+0x20/0x38 (C) [ 33.078319] dump_stack_lvl+0x8c/0xd0 [ 33.078579] print_report+0x118/0x5d0 [ 33.078668] kasan_report+0xdc/0x128 [ 33.078740] __asan_report_load4_noabort+0x20/0x30 [ 33.078877] kasan_atomics_helper+0x3dd8/0x4858 [ 33.078940] kasan_atomics+0x198/0x2e0 [ 33.079255] kunit_try_run_case+0x170/0x3f0 [ 33.079576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.079743] kthread+0x328/0x630 [ 33.079832] ret_from_fork+0x10/0x20 [ 33.080241] [ 33.080305] Allocated by task 296: [ 33.080570] kasan_save_stack+0x3c/0x68 [ 33.080781] kasan_save_track+0x20/0x40 [ 33.080861] kasan_save_alloc_info+0x40/0x58 [ 33.081127] __kasan_kmalloc+0xd4/0xd8 [ 33.081211] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.081523] kasan_atomics+0xb8/0x2e0 [ 33.081663] kunit_try_run_case+0x170/0x3f0 [ 33.081750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.081898] kthread+0x328/0x630 [ 33.081939] ret_from_fork+0x10/0x20 [ 33.081978] [ 33.082133] The buggy address belongs to the object at fff00000c91a4d80 [ 33.082133] which belongs to the cache kmalloc-64 of size 64 [ 33.082343] The buggy address is located 0 bytes to the right of [ 33.082343] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.082512] [ 33.082572] The buggy address belongs to the physical page: [ 33.082852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.083006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.083117] page_type: f5(slab) [ 33.083236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.083639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.083735] page dumped because: kasan: bad access detected [ 33.083807] [ 33.083916] Memory state around the buggy address: [ 33.083994] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.084061] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.084106] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.084454] ^ [ 33.084532] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.084851] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.084980] ================================================================== [ 33.002857] ================================================================== [ 33.002923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.003080] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.003142] [ 33.003178] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.003264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.003291] Hardware name: linux,dummy-virt (DT) [ 33.003553] Call trace: [ 33.003747] show_stack+0x20/0x38 (C) [ 33.003929] dump_stack_lvl+0x8c/0xd0 [ 33.003993] print_report+0x118/0x5d0 [ 33.004038] kasan_report+0xdc/0x128 [ 33.004083] kasan_check_range+0x100/0x1a8 [ 33.004129] __kasan_check_write+0x20/0x30 [ 33.004252] kasan_atomics_helper+0x99c/0x4858 [ 33.004578] kasan_atomics+0x198/0x2e0 [ 33.004698] kunit_try_run_case+0x170/0x3f0 [ 33.004755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.004808] kthread+0x328/0x630 [ 33.004885] ret_from_fork+0x10/0x20 [ 33.004947] [ 33.004969] Allocated by task 296: [ 33.005002] kasan_save_stack+0x3c/0x68 [ 33.005046] kasan_save_track+0x20/0x40 [ 33.005098] kasan_save_alloc_info+0x40/0x58 [ 33.005138] __kasan_kmalloc+0xd4/0xd8 [ 33.005187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.005232] kasan_atomics+0xb8/0x2e0 [ 33.005281] kunit_try_run_case+0x170/0x3f0 [ 33.005340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.005690] kthread+0x328/0x630 [ 33.005771] ret_from_fork+0x10/0x20 [ 33.005849] [ 33.005910] The buggy address belongs to the object at fff00000c91a4d80 [ 33.005910] which belongs to the cache kmalloc-64 of size 64 [ 33.006017] The buggy address is located 0 bytes to the right of [ 33.006017] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.006085] [ 33.006107] The buggy address belongs to the physical page: [ 33.006142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.006197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.006600] page_type: f5(slab) [ 33.006922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.007055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.007139] page dumped because: kasan: bad access detected [ 33.007221] [ 33.007264] Memory state around the buggy address: [ 33.007307] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.007592] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.007911] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.007987] ^ [ 33.008093] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.008203] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.008320] ================================================================== [ 33.010510] ================================================================== [ 33.010710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.010784] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.010838] [ 33.011232] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.011357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.011388] Hardware name: linux,dummy-virt (DT) [ 33.011420] Call trace: [ 33.011456] show_stack+0x20/0x38 (C) [ 33.011660] kasan_check_range+0x100/0x1a8 [ 33.011956] kthread+0x328/0x630 [ 33.013145] kunit_try_run_case+0x170/0x3f0 [ 33.013472] The buggy address is located 0 bytes to the right of [ 33.013472] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.013538] [ 33.013559] The buggy address belongs to the physical page: [ 33.013596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.013873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.014021] page_type: f5(slab) [ 33.014435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.014613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.014704] page dumped because: kasan: bad access detected [ 33.014800] [ 33.014870] Memory state around the buggy address: [ 33.014934] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.014982] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.015031] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.015373] ^ [ 33.015825] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.016194] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.016242] ================================================================== [ 33.092698] ================================================================== [ 33.092891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.092960] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.093481] [ 33.093757] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.093886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.093919] Hardware name: linux,dummy-virt (DT) [ 33.093987] Call trace: [ 33.094410] show_stack+0x20/0x38 (C) [ 33.094729] dump_stack_lvl+0x8c/0xd0 [ 33.094829] print_report+0x118/0x5d0 [ 33.094930] kasan_report+0xdc/0x128 [ 33.094981] __asan_report_load4_noabort+0x20/0x30 [ 33.095220] kasan_atomics_helper+0x3e04/0x4858 [ 33.095426] kasan_atomics+0x198/0x2e0 [ 33.095706] kunit_try_run_case+0x170/0x3f0 [ 33.095879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.095942] kthread+0x328/0x630 [ 33.095989] ret_from_fork+0x10/0x20 [ 33.096234] [ 33.096358] Allocated by task 296: [ 33.096660] kasan_save_stack+0x3c/0x68 [ 33.096781] kasan_save_track+0x20/0x40 [ 33.096829] kasan_save_alloc_info+0x40/0x58 [ 33.096903] __kasan_kmalloc+0xd4/0xd8 [ 33.097354] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.097523] kasan_atomics+0xb8/0x2e0 [ 33.097606] kunit_try_run_case+0x170/0x3f0 [ 33.097748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.097818] kthread+0x328/0x630 [ 33.098147] ret_from_fork+0x10/0x20 [ 33.098228] [ 33.098317] The buggy address belongs to the object at fff00000c91a4d80 [ 33.098317] which belongs to the cache kmalloc-64 of size 64 [ 33.098585] The buggy address is located 0 bytes to the right of [ 33.098585] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.098789] [ 33.098833] The buggy address belongs to the physical page: [ 33.098912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.099031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.099090] page_type: f5(slab) [ 33.099245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.099459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.099811] page dumped because: kasan: bad access detected [ 33.099857] [ 33.099878] Memory state around the buggy address: [ 33.099929] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.099993] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.100054] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.100100] ^ [ 33.100139] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.100191] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.100238] ================================================================== [ 33.324390] ================================================================== [ 33.324447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 33.324500] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.324559] [ 33.324594] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.324823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.324920] Hardware name: linux,dummy-virt (DT) [ 33.324967] Call trace: [ 33.325186] show_stack+0x20/0x38 (C) [ 33.325257] dump_stack_lvl+0x8c/0xd0 [ 33.325307] print_report+0x118/0x5d0 [ 33.325364] kasan_report+0xdc/0x128 [ 33.325410] kasan_check_range+0x100/0x1a8 [ 33.325612] __kasan_check_write+0x20/0x30 [ 33.325777] kasan_atomics_helper+0x17ec/0x4858 [ 33.325839] kasan_atomics+0x198/0x2e0 [ 33.325887] kunit_try_run_case+0x170/0x3f0 [ 33.325936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.325988] kthread+0x328/0x630 [ 33.326033] ret_from_fork+0x10/0x20 [ 33.326416] [ 33.326484] Allocated by task 296: [ 33.326672] kasan_save_stack+0x3c/0x68 [ 33.326848] kasan_save_track+0x20/0x40 [ 33.326932] kasan_save_alloc_info+0x40/0x58 [ 33.327109] __kasan_kmalloc+0xd4/0xd8 [ 33.327294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.327371] kasan_atomics+0xb8/0x2e0 [ 33.327544] kunit_try_run_case+0x170/0x3f0 [ 33.327712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.327764] kthread+0x328/0x630 [ 33.327951] ret_from_fork+0x10/0x20 [ 33.328137] [ 33.328191] The buggy address belongs to the object at fff00000c91a4d80 [ 33.328191] which belongs to the cache kmalloc-64 of size 64 [ 33.328285] The buggy address is located 0 bytes to the right of [ 33.328285] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.328362] [ 33.328386] The buggy address belongs to the physical page: [ 33.328419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.328475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.328526] page_type: f5(slab) [ 33.328567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.328619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.328673] page dumped because: kasan: bad access detected [ 33.328705] [ 33.328736] Memory state around the buggy address: [ 33.328781] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.328825] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.328869] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.328924] ^ [ 33.328958] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.329026] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.329083] ================================================================== [ 33.177998] ================================================================== [ 33.178221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.178488] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.178585] [ 33.178624] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.178904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.179080] Hardware name: linux,dummy-virt (DT) [ 33.179125] Call trace: [ 33.179151] show_stack+0x20/0x38 (C) [ 33.179204] dump_stack_lvl+0x8c/0xd0 [ 33.179436] print_report+0x118/0x5d0 [ 33.179500] kasan_report+0xdc/0x128 [ 33.179547] kasan_check_range+0x100/0x1a8 [ 33.179601] __kasan_check_write+0x20/0x30 [ 33.179804] kasan_atomics_helper+0x1128/0x4858 [ 33.179889] kasan_atomics+0x198/0x2e0 [ 33.179939] kunit_try_run_case+0x170/0x3f0 [ 33.179999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.180051] kthread+0x328/0x630 [ 33.180148] ret_from_fork+0x10/0x20 [ 33.180201] [ 33.180226] Allocated by task 296: [ 33.180259] kasan_save_stack+0x3c/0x68 [ 33.180306] kasan_save_track+0x20/0x40 [ 33.180358] kasan_save_alloc_info+0x40/0x58 [ 33.180398] __kasan_kmalloc+0xd4/0xd8 [ 33.180447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.180502] kasan_atomics+0xb8/0x2e0 [ 33.180547] kunit_try_run_case+0x170/0x3f0 [ 33.180589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.180632] kthread+0x328/0x630 [ 33.180677] ret_from_fork+0x10/0x20 [ 33.180739] [ 33.180769] The buggy address belongs to the object at fff00000c91a4d80 [ 33.180769] which belongs to the cache kmalloc-64 of size 64 [ 33.180837] The buggy address is located 0 bytes to the right of [ 33.180837] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.180903] [ 33.180926] The buggy address belongs to the physical page: [ 33.180958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.181012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.181062] page_type: f5(slab) [ 33.181101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.181153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.181192] page dumped because: kasan: bad access detected [ 33.181242] [ 33.181262] Memory state around the buggy address: [ 33.181296] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.182178] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.182244] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.182307] ^ [ 33.182364] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.182439] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.182480] ================================================================== [ 33.264902] ================================================================== [ 33.264967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 33.265045] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.265099] [ 33.265277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.265674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.265744] Hardware name: linux,dummy-virt (DT) [ 33.266124] Call trace: [ 33.266176] show_stack+0x20/0x38 (C) [ 33.266251] dump_stack_lvl+0x8c/0xd0 [ 33.266384] print_report+0x118/0x5d0 [ 33.266433] kasan_report+0xdc/0x128 [ 33.266479] kasan_check_range+0x100/0x1a8 [ 33.266526] __kasan_check_write+0x20/0x30 [ 33.266573] kasan_atomics_helper+0x15b4/0x4858 [ 33.266624] kasan_atomics+0x198/0x2e0 [ 33.267034] kunit_try_run_case+0x170/0x3f0 [ 33.267225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.267427] kthread+0x328/0x630 [ 33.267620] ret_from_fork+0x10/0x20 [ 33.267692] [ 33.267748] Allocated by task 296: [ 33.267932] kasan_save_stack+0x3c/0x68 [ 33.268215] kasan_save_track+0x20/0x40 [ 33.268395] kasan_save_alloc_info+0x40/0x58 [ 33.268574] __kasan_kmalloc+0xd4/0xd8 [ 33.268619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.268697] kasan_atomics+0xb8/0x2e0 [ 33.269000] kunit_try_run_case+0x170/0x3f0 [ 33.269396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.269554] kthread+0x328/0x630 [ 33.269677] ret_from_fork+0x10/0x20 [ 33.269816] [ 33.269841] The buggy address belongs to the object at fff00000c91a4d80 [ 33.269841] which belongs to the cache kmalloc-64 of size 64 [ 33.269904] The buggy address is located 0 bytes to the right of [ 33.269904] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.269971] [ 33.270129] The buggy address belongs to the physical page: [ 33.270273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.270593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.270976] page_type: f5(slab) [ 33.271131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.271184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.271358] page dumped because: kasan: bad access detected [ 33.271409] [ 33.271447] Memory state around the buggy address: [ 33.271485] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.271542] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.271586] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.271632] ^ [ 33.271669] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.271722] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.271771] ================================================================== [ 33.140195] ================================================================== [ 33.140366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.140441] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.140502] [ 33.140598] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.140715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.140748] Hardware name: linux,dummy-virt (DT) [ 33.140781] Call trace: [ 33.140959] show_stack+0x20/0x38 (C) [ 33.141029] dump_stack_lvl+0x8c/0xd0 [ 33.141087] print_report+0x118/0x5d0 [ 33.141419] kasan_report+0xdc/0x128 [ 33.141493] kasan_check_range+0x100/0x1a8 [ 33.141731] __kasan_check_write+0x20/0x30 [ 33.142082] kasan_atomics_helper+0xf20/0x4858 [ 33.142175] kasan_atomics+0x198/0x2e0 [ 33.142358] kunit_try_run_case+0x170/0x3f0 [ 33.142416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.142758] kthread+0x328/0x630 [ 33.142843] ret_from_fork+0x10/0x20 [ 33.143139] [ 33.143232] Allocated by task 296: [ 33.143347] kasan_save_stack+0x3c/0x68 [ 33.143437] kasan_save_track+0x20/0x40 [ 33.143500] kasan_save_alloc_info+0x40/0x58 [ 33.143811] __kasan_kmalloc+0xd4/0xd8 [ 33.143886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.143985] kasan_atomics+0xb8/0x2e0 [ 33.144174] kunit_try_run_case+0x170/0x3f0 [ 33.144348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.144479] kthread+0x328/0x630 [ 33.144593] ret_from_fork+0x10/0x20 [ 33.144634] [ 33.144802] The buggy address belongs to the object at fff00000c91a4d80 [ 33.144802] which belongs to the cache kmalloc-64 of size 64 [ 33.145028] The buggy address is located 0 bytes to the right of [ 33.145028] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.145402] [ 33.145465] The buggy address belongs to the physical page: [ 33.145586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.145651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.145834] page_type: f5(slab) [ 33.145882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.146103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.146208] page dumped because: kasan: bad access detected [ 33.146275] [ 33.146616] Memory state around the buggy address: [ 33.146716] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.146799] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.146934] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.147026] ^ [ 33.147084] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.147179] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.147255] ================================================================== [ 33.295634] ================================================================== [ 33.295976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 33.296159] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.296223] [ 33.296259] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.296535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.296703] Hardware name: linux,dummy-virt (DT) [ 33.296843] Call trace: [ 33.296871] show_stack+0x20/0x38 (C) [ 33.297045] dump_stack_lvl+0x8c/0xd0 [ 33.297108] print_report+0x118/0x5d0 [ 33.297155] kasan_report+0xdc/0x128 [ 33.297199] kasan_check_range+0x100/0x1a8 [ 33.297389] __kasan_check_write+0x20/0x30 [ 33.297493] kasan_atomics_helper+0x16d0/0x4858 [ 33.297715] kasan_atomics+0x198/0x2e0 [ 33.297777] kunit_try_run_case+0x170/0x3f0 [ 33.298127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.298208] kthread+0x328/0x630 [ 33.298461] ret_from_fork+0x10/0x20 [ 33.298655] [ 33.298714] Allocated by task 296: [ 33.298848] kasan_save_stack+0x3c/0x68 [ 33.298899] kasan_save_track+0x20/0x40 [ 33.298941] kasan_save_alloc_info+0x40/0x58 [ 33.298992] __kasan_kmalloc+0xd4/0xd8 [ 33.299038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.299084] kasan_atomics+0xb8/0x2e0 [ 33.299133] kunit_try_run_case+0x170/0x3f0 [ 33.299176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.299229] kthread+0x328/0x630 [ 33.299274] ret_from_fork+0x10/0x20 [ 33.299344] [ 33.299366] The buggy address belongs to the object at fff00000c91a4d80 [ 33.299366] which belongs to the cache kmalloc-64 of size 64 [ 33.299637] The buggy address is located 0 bytes to the right of [ 33.299637] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.300001] [ 33.300039] The buggy address belongs to the physical page: [ 33.300095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.300400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.300501] page_type: f5(slab) [ 33.300739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.300812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.300885] page dumped because: kasan: bad access detected [ 33.300919] [ 33.301363] Memory state around the buggy address: [ 33.301433] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.301769] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.301915] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.302032] ^ [ 33.302099] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.302163] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.302318] ================================================================== [ 33.256978] ================================================================== [ 33.257091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 33.257301] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.257450] [ 33.257513] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.257685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.257734] Hardware name: linux,dummy-virt (DT) [ 33.257802] Call trace: [ 33.257844] show_stack+0x20/0x38 (C) [ 33.258126] dump_stack_lvl+0x8c/0xd0 [ 33.258286] print_report+0x118/0x5d0 [ 33.258550] kasan_report+0xdc/0x128 [ 33.258640] kasan_check_range+0x100/0x1a8 [ 33.258697] __kasan_check_write+0x20/0x30 [ 33.259140] kasan_atomics_helper+0x154c/0x4858 [ 33.259374] kasan_atomics+0x198/0x2e0 [ 33.259568] kunit_try_run_case+0x170/0x3f0 [ 33.259629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.259998] kthread+0x328/0x630 [ 33.260091] ret_from_fork+0x10/0x20 [ 33.260577] [ 33.260611] Allocated by task 296: [ 33.260809] kasan_save_stack+0x3c/0x68 [ 33.261178] kasan_save_track+0x20/0x40 [ 33.262347] kasan_save_alloc_info+0x40/0x58 [ 33.262412] __kasan_kmalloc+0xd4/0xd8 [ 33.262455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.262502] kasan_atomics+0xb8/0x2e0 [ 33.262543] kunit_try_run_case+0x170/0x3f0 [ 33.262586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.262630] kthread+0x328/0x630 [ 33.262666] ret_from_fork+0x10/0x20 [ 33.262706] [ 33.262729] The buggy address belongs to the object at fff00000c91a4d80 [ 33.262729] which belongs to the cache kmalloc-64 of size 64 [ 33.262792] The buggy address is located 0 bytes to the right of [ 33.262792] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.262861] [ 33.262884] The buggy address belongs to the physical page: [ 33.262920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.262975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.263031] page_type: f5(slab) [ 33.263074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.263124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.263167] page dumped because: kasan: bad access detected [ 33.263200] [ 33.263220] Memory state around the buggy address: [ 33.263256] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.263300] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.263414] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.263481] ^ [ 33.263713] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.263774] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.263814] ================================================================== [ 33.119050] ================================================================== [ 33.119140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.119211] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.119281] [ 33.119317] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.119427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.119565] Hardware name: linux,dummy-virt (DT) [ 33.119663] Call trace: [ 33.120105] show_stack+0x20/0x38 (C) [ 33.120194] dump_stack_lvl+0x8c/0xd0 [ 33.120247] print_report+0x118/0x5d0 [ 33.120378] kasan_report+0xdc/0x128 [ 33.120432] kasan_check_range+0x100/0x1a8 [ 33.120483] __kasan_check_write+0x20/0x30 [ 33.120693] kasan_atomics_helper+0xe44/0x4858 [ 33.120764] kasan_atomics+0x198/0x2e0 [ 33.121151] kunit_try_run_case+0x170/0x3f0 [ 33.121238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.121296] kthread+0x328/0x630 [ 33.121352] ret_from_fork+0x10/0x20 [ 33.121511] [ 33.121717] Allocated by task 296: [ 33.121783] kasan_save_stack+0x3c/0x68 [ 33.122112] kasan_save_track+0x20/0x40 [ 33.122236] kasan_save_alloc_info+0x40/0x58 [ 33.122294] __kasan_kmalloc+0xd4/0xd8 [ 33.122450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.122505] kasan_atomics+0xb8/0x2e0 [ 33.122615] kunit_try_run_case+0x170/0x3f0 [ 33.122797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.122906] kthread+0x328/0x630 [ 33.123198] ret_from_fork+0x10/0x20 [ 33.123279] [ 33.123350] The buggy address belongs to the object at fff00000c91a4d80 [ 33.123350] which belongs to the cache kmalloc-64 of size 64 [ 33.123434] The buggy address is located 0 bytes to the right of [ 33.123434] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.123519] [ 33.123813] The buggy address belongs to the physical page: [ 33.123876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.124258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.124379] page_type: f5(slab) [ 33.124494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.124592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.124960] page dumped because: kasan: bad access detected [ 33.125020] [ 33.125071] Memory state around the buggy address: [ 33.125116] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.125177] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.125239] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.125285] ^ [ 33.125344] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.125634] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.125985] ================================================================== [ 33.287822] ================================================================== [ 33.288021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 33.288190] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.288253] [ 33.288290] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.288511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.288546] Hardware name: linux,dummy-virt (DT) [ 33.288597] Call trace: [ 33.288624] show_stack+0x20/0x38 (C) [ 33.288846] dump_stack_lvl+0x8c/0xd0 [ 33.288926] print_report+0x118/0x5d0 [ 33.288982] kasan_report+0xdc/0x128 [ 33.289029] __asan_report_load8_noabort+0x20/0x30 [ 33.289080] kasan_atomics_helper+0x3df4/0x4858 [ 33.289489] kasan_atomics+0x198/0x2e0 [ 33.289583] kunit_try_run_case+0x170/0x3f0 [ 33.289656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.289854] kthread+0x328/0x630 [ 33.289952] ret_from_fork+0x10/0x20 [ 33.290033] [ 33.290229] Allocated by task 296: [ 33.290412] kasan_save_stack+0x3c/0x68 [ 33.290682] kasan_save_track+0x20/0x40 [ 33.290843] kasan_save_alloc_info+0x40/0x58 [ 33.290926] __kasan_kmalloc+0xd4/0xd8 [ 33.291153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.291330] kasan_atomics+0xb8/0x2e0 [ 33.291403] kunit_try_run_case+0x170/0x3f0 [ 33.291755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.291848] kthread+0x328/0x630 [ 33.292054] ret_from_fork+0x10/0x20 [ 33.292175] [ 33.292295] The buggy address belongs to the object at fff00000c91a4d80 [ 33.292295] which belongs to the cache kmalloc-64 of size 64 [ 33.292530] The buggy address is located 0 bytes to the right of [ 33.292530] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.292605] [ 33.292629] The buggy address belongs to the physical page: [ 33.292807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.293150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.293309] page_type: f5(slab) [ 33.293503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.293706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.293772] page dumped because: kasan: bad access detected [ 33.293807] [ 33.293841] Memory state around the buggy address: [ 33.293884] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.294243] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.294334] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.294391] ^ [ 33.294442] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.294849] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.295005] ================================================================== [ 33.101559] ================================================================== [ 33.101682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.101817] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.101984] [ 33.102023] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.102391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.102449] Hardware name: linux,dummy-virt (DT) [ 33.102520] Call trace: [ 33.102592] show_stack+0x20/0x38 (C) [ 33.102669] dump_stack_lvl+0x8c/0xd0 [ 33.102976] print_report+0x118/0x5d0 [ 33.103069] kasan_report+0xdc/0x128 [ 33.103130] kasan_check_range+0x100/0x1a8 [ 33.103180] __kasan_check_read+0x20/0x30 [ 33.103535] kasan_atomics_helper+0xdd4/0x4858 [ 33.103847] kasan_atomics+0x198/0x2e0 [ 33.104011] kunit_try_run_case+0x170/0x3f0 [ 33.104088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.104428] kthread+0x328/0x630 [ 33.104507] ret_from_fork+0x10/0x20 [ 33.104820] [ 33.104872] Allocated by task 296: [ 33.105002] kasan_save_stack+0x3c/0x68 [ 33.105057] kasan_save_track+0x20/0x40 [ 33.105126] kasan_save_alloc_info+0x40/0x58 [ 33.105169] __kasan_kmalloc+0xd4/0xd8 [ 33.105212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.105575] kasan_atomics+0xb8/0x2e0 [ 33.105849] kunit_try_run_case+0x170/0x3f0 [ 33.105905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.105955] kthread+0x328/0x630 [ 33.106004] ret_from_fork+0x10/0x20 [ 33.106198] [ 33.106248] The buggy address belongs to the object at fff00000c91a4d80 [ 33.106248] which belongs to the cache kmalloc-64 of size 64 [ 33.106418] The buggy address is located 0 bytes to the right of [ 33.106418] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.106536] [ 33.106796] The buggy address belongs to the physical page: [ 33.106888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.107109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.107278] page_type: f5(slab) [ 33.107637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.107780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.107868] page dumped because: kasan: bad access detected [ 33.107956] [ 33.107979] Memory state around the buggy address: [ 33.108028] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.108084] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.108137] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.108184] ^ [ 33.108221] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.108272] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.108338] ================================================================== [ 33.280380] ================================================================== [ 33.280461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 33.280516] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.280576] [ 33.280611] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.280698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.280733] Hardware name: linux,dummy-virt (DT) [ 33.280765] Call trace: [ 33.280792] show_stack+0x20/0x38 (C) [ 33.280846] dump_stack_lvl+0x8c/0xd0 [ 33.280896] print_report+0x118/0x5d0 [ 33.280942] kasan_report+0xdc/0x128 [ 33.280987] kasan_check_range+0x100/0x1a8 [ 33.281044] __kasan_check_write+0x20/0x30 [ 33.281091] kasan_atomics_helper+0x1644/0x4858 [ 33.281142] kasan_atomics+0x198/0x2e0 [ 33.281189] kunit_try_run_case+0x170/0x3f0 [ 33.281248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.281306] kthread+0x328/0x630 [ 33.281362] ret_from_fork+0x10/0x20 [ 33.282397] [ 33.282453] Allocated by task 296: [ 33.282531] kasan_save_stack+0x3c/0x68 [ 33.282580] kasan_save_track+0x20/0x40 [ 33.282631] kasan_save_alloc_info+0x40/0x58 [ 33.282672] __kasan_kmalloc+0xd4/0xd8 [ 33.282762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.283063] kasan_atomics+0xb8/0x2e0 [ 33.283184] kunit_try_run_case+0x170/0x3f0 [ 33.283596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.283659] kthread+0x328/0x630 [ 33.283697] ret_from_fork+0x10/0x20 [ 33.284016] [ 33.284227] The buggy address belongs to the object at fff00000c91a4d80 [ 33.284227] which belongs to the cache kmalloc-64 of size 64 [ 33.284400] The buggy address is located 0 bytes to the right of [ 33.284400] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.284539] [ 33.284757] The buggy address belongs to the physical page: [ 33.284918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.285048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.285136] page_type: f5(slab) [ 33.285442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.285604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.285911] page dumped because: kasan: bad access detected [ 33.286002] [ 33.286051] Memory state around the buggy address: [ 33.286165] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.286270] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.286376] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.286734] ^ [ 33.286882] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.287077] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.287168] ================================================================== [ 33.302747] ================================================================== [ 33.302883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 33.302946] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.303289] [ 33.303477] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.303680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.303751] Hardware name: linux,dummy-virt (DT) [ 33.303786] Call trace: [ 33.303834] show_stack+0x20/0x38 (C) [ 33.303889] dump_stack_lvl+0x8c/0xd0 [ 33.304176] print_report+0x118/0x5d0 [ 33.304335] kasan_report+0xdc/0x128 [ 33.304403] __asan_report_load8_noabort+0x20/0x30 [ 33.304624] kasan_atomics_helper+0x3e10/0x4858 [ 33.304693] kasan_atomics+0x198/0x2e0 [ 33.304742] kunit_try_run_case+0x170/0x3f0 [ 33.304805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.305031] kthread+0x328/0x630 [ 33.305092] ret_from_fork+0x10/0x20 [ 33.305143] [ 33.305165] Allocated by task 296: [ 33.305195] kasan_save_stack+0x3c/0x68 [ 33.305240] kasan_save_track+0x20/0x40 [ 33.305281] kasan_save_alloc_info+0x40/0x58 [ 33.305341] __kasan_kmalloc+0xd4/0xd8 [ 33.305608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.305691] kasan_atomics+0xb8/0x2e0 [ 33.305899] kunit_try_run_case+0x170/0x3f0 [ 33.305952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.305997] kthread+0x328/0x630 [ 33.306492] ret_from_fork+0x10/0x20 [ 33.306634] [ 33.306702] The buggy address belongs to the object at fff00000c91a4d80 [ 33.306702] which belongs to the cache kmalloc-64 of size 64 [ 33.306811] The buggy address is located 0 bytes to the right of [ 33.306811] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.306929] [ 33.307572] The buggy address belongs to the physical page: [ 33.307628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.307710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.307764] page_type: f5(slab) [ 33.307807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.308035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.308083] page dumped because: kasan: bad access detected [ 33.308395] [ 33.308571] Memory state around the buggy address: [ 33.308635] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.308691] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.308811] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.308926] ^ [ 33.309235] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.309415] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.309491] ================================================================== [ 33.147869] ================================================================== [ 33.148042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.148126] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.148187] [ 33.148219] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.148335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.148375] Hardware name: linux,dummy-virt (DT) [ 33.148412] Call trace: [ 33.148435] show_stack+0x20/0x38 (C) [ 33.148486] dump_stack_lvl+0x8c/0xd0 [ 33.148546] print_report+0x118/0x5d0 [ 33.148592] kasan_report+0xdc/0x128 [ 33.148636] kasan_check_range+0x100/0x1a8 [ 33.148686] __kasan_check_write+0x20/0x30 [ 33.148742] kasan_atomics_helper+0xf88/0x4858 [ 33.148801] kasan_atomics+0x198/0x2e0 [ 33.148851] kunit_try_run_case+0x170/0x3f0 [ 33.148903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.148959] kthread+0x328/0x630 [ 33.149014] ret_from_fork+0x10/0x20 [ 33.149063] [ 33.149085] Allocated by task 296: [ 33.149115] kasan_save_stack+0x3c/0x68 [ 33.149161] kasan_save_track+0x20/0x40 [ 33.149204] kasan_save_alloc_info+0x40/0x58 [ 33.149246] __kasan_kmalloc+0xd4/0xd8 [ 33.149286] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.149343] kasan_atomics+0xb8/0x2e0 [ 33.150104] kunit_try_run_case+0x170/0x3f0 [ 33.150165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.150215] kthread+0x328/0x630 [ 33.150252] ret_from_fork+0x10/0x20 [ 33.150314] [ 33.150514] The buggy address belongs to the object at fff00000c91a4d80 [ 33.150514] which belongs to the cache kmalloc-64 of size 64 [ 33.150769] The buggy address is located 0 bytes to the right of [ 33.150769] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.151176] [ 33.151219] The buggy address belongs to the physical page: [ 33.151259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.151728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.152187] page_type: f5(slab) [ 33.152441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.152524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.152759] page dumped because: kasan: bad access detected [ 33.152894] [ 33.152940] Memory state around the buggy address: [ 33.153051] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.153136] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.153525] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.153597] ^ [ 33.153697] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.153780] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.153850] ================================================================== [ 33.133773] ================================================================== [ 33.133838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.133894] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.133953] [ 33.134277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.134637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.134800] Hardware name: linux,dummy-virt (DT) [ 33.134845] Call trace: [ 33.134872] show_stack+0x20/0x38 (C) [ 33.134928] dump_stack_lvl+0x8c/0xd0 [ 33.135074] print_report+0x118/0x5d0 [ 33.135128] kasan_report+0xdc/0x128 [ 33.135240] kasan_check_range+0x100/0x1a8 [ 33.135295] __kasan_check_write+0x20/0x30 [ 33.135356] kasan_atomics_helper+0xeb8/0x4858 [ 33.135427] kasan_atomics+0x198/0x2e0 [ 33.135479] kunit_try_run_case+0x170/0x3f0 [ 33.135804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.136177] kthread+0x328/0x630 [ 33.136248] ret_from_fork+0x10/0x20 [ 33.136668] [ 33.136706] Allocated by task 296: [ 33.136742] kasan_save_stack+0x3c/0x68 [ 33.136793] kasan_save_track+0x20/0x40 [ 33.136853] kasan_save_alloc_info+0x40/0x58 [ 33.136898] __kasan_kmalloc+0xd4/0xd8 [ 33.137085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.137264] kasan_atomics+0xb8/0x2e0 [ 33.137320] kunit_try_run_case+0x170/0x3f0 [ 33.137376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.137424] kthread+0x328/0x630 [ 33.137460] ret_from_fork+0x10/0x20 [ 33.137500] [ 33.137525] The buggy address belongs to the object at fff00000c91a4d80 [ 33.137525] which belongs to the cache kmalloc-64 of size 64 [ 33.137660] The buggy address is located 0 bytes to the right of [ 33.137660] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.137744] [ 33.137768] The buggy address belongs to the physical page: [ 33.137804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.137875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.137930] page_type: f5(slab) [ 33.137989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.138058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.138114] page dumped because: kasan: bad access detected [ 33.138152] [ 33.138178] Memory state around the buggy address: [ 33.138215] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.138267] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.138317] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.138973] ^ [ 33.139081] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.139174] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.139222] ================================================================== [ 33.310031] ================================================================== [ 33.310084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 33.310373] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.310768] [ 33.310814] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.310905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.310933] Hardware name: linux,dummy-virt (DT) [ 33.311082] Call trace: [ 33.311141] show_stack+0x20/0x38 (C) [ 33.311195] dump_stack_lvl+0x8c/0xd0 [ 33.311610] print_report+0x118/0x5d0 [ 33.311677] kasan_report+0xdc/0x128 [ 33.311995] kasan_check_range+0x100/0x1a8 [ 33.312073] __kasan_check_write+0x20/0x30 [ 33.312349] kasan_atomics_helper+0x175c/0x4858 [ 33.312522] kasan_atomics+0x198/0x2e0 [ 33.312759] kunit_try_run_case+0x170/0x3f0 [ 33.313004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.313095] kthread+0x328/0x630 [ 33.313283] ret_from_fork+0x10/0x20 [ 33.313358] [ 33.313380] Allocated by task 296: [ 33.313547] kasan_save_stack+0x3c/0x68 [ 33.313702] kasan_save_track+0x20/0x40 [ 33.313779] kasan_save_alloc_info+0x40/0x58 [ 33.313935] __kasan_kmalloc+0xd4/0xd8 [ 33.314122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.314176] kasan_atomics+0xb8/0x2e0 [ 33.314218] kunit_try_run_case+0x170/0x3f0 [ 33.314262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.314307] kthread+0x328/0x630 [ 33.314648] ret_from_fork+0x10/0x20 [ 33.314748] [ 33.314809] The buggy address belongs to the object at fff00000c91a4d80 [ 33.314809] which belongs to the cache kmalloc-64 of size 64 [ 33.315031] The buggy address is located 0 bytes to the right of [ 33.315031] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.315354] [ 33.315561] The buggy address belongs to the physical page: [ 33.315613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.315797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.315987] page_type: f5(slab) [ 33.316035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.316199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.316245] page dumped because: kasan: bad access detected [ 33.316279] [ 33.316434] Memory state around the buggy address: [ 33.316477] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.316560] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.316614] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.316672] ^ [ 33.316709] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.316761] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.316811] ================================================================== [ 33.154923] ================================================================== [ 33.155018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.155202] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.155401] [ 33.155447] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.155859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.155994] Hardware name: linux,dummy-virt (DT) [ 33.156060] Call trace: [ 33.156108] show_stack+0x20/0x38 (C) [ 33.156172] dump_stack_lvl+0x8c/0xd0 [ 33.156502] print_report+0x118/0x5d0 [ 33.156633] kasan_report+0xdc/0x128 [ 33.156711] kasan_check_range+0x100/0x1a8 [ 33.156813] __kasan_check_write+0x20/0x30 [ 33.156868] kasan_atomics_helper+0xff0/0x4858 [ 33.156956] kasan_atomics+0x198/0x2e0 [ 33.157013] kunit_try_run_case+0x170/0x3f0 [ 33.157065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.157531] kthread+0x328/0x630 [ 33.157719] ret_from_fork+0x10/0x20 [ 33.157868] [ 33.157895] Allocated by task 296: [ 33.157928] kasan_save_stack+0x3c/0x68 [ 33.157997] kasan_save_track+0x20/0x40 [ 33.158047] kasan_save_alloc_info+0x40/0x58 [ 33.158348] __kasan_kmalloc+0xd4/0xd8 [ 33.158529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.158705] kasan_atomics+0xb8/0x2e0 [ 33.158782] kunit_try_run_case+0x170/0x3f0 [ 33.158918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.158990] kthread+0x328/0x630 [ 33.159034] ret_from_fork+0x10/0x20 [ 33.159336] [ 33.159414] The buggy address belongs to the object at fff00000c91a4d80 [ 33.159414] which belongs to the cache kmalloc-64 of size 64 [ 33.159621] The buggy address is located 0 bytes to the right of [ 33.159621] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.159847] [ 33.159892] The buggy address belongs to the physical page: [ 33.159931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.159997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.160394] page_type: f5(slab) [ 33.160448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.160742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.160885] page dumped because: kasan: bad access detected [ 33.160958] [ 33.161064] Memory state around the buggy address: [ 33.161147] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.161233] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.161579] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.161719] ^ [ 33.161802] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.161868] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.161952] ================================================================== [ 33.026543] ================================================================== [ 33.026663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.026725] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.026793] [ 33.027002] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.027118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.027268] Hardware name: linux,dummy-virt (DT) [ 33.027312] Call trace: [ 33.027349] show_stack+0x20/0x38 (C) [ 33.027404] dump_stack_lvl+0x8c/0xd0 [ 33.027453] print_report+0x118/0x5d0 [ 33.027507] kasan_report+0xdc/0x128 [ 33.027664] kasan_atomics_helper+0xad4/0x4858 [ 33.028050] kasan_save_stack+0x3c/0x68 [ 33.028571] The buggy address is located 0 bytes to the right of [ 33.028571] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.028644] [ 33.028668] The buggy address belongs to the physical page: [ 33.028708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.028761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.028821] page_type: f5(slab) [ 33.028862] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.028916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.028967] page dumped because: kasan: bad access detected [ 33.029001] [ 33.029020] Memory state around the buggy address: [ 33.029052] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.029106] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.029152] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.029195] ^ [ 33.029230] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.029274] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.030589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.031375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.032917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.034616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.035613] [ 33.035658] The buggy address belongs to the physical page: [ 33.036427] page dumped because: kasan: bad access detected [ 33.036909] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.037587] ================================================================== [ 33.183537] ================================================================== [ 33.183592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 33.183718] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.183794] [ 33.183839] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.184212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.184274] Hardware name: linux,dummy-virt (DT) [ 33.184310] Call trace: [ 33.184344] show_stack+0x20/0x38 (C) [ 33.184400] dump_stack_lvl+0x8c/0xd0 [ 33.184445] print_report+0x118/0x5d0 [ 33.184490] kasan_report+0xdc/0x128 [ 33.184797] kasan_check_range+0x100/0x1a8 [ 33.184947] __kasan_check_write+0x20/0x30 [ 33.185044] kasan_atomics_helper+0x1190/0x4858 [ 33.185109] kasan_atomics+0x198/0x2e0 [ 33.185160] kunit_try_run_case+0x170/0x3f0 [ 33.185454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.185611] kthread+0x328/0x630 [ 33.186047] ret_from_fork+0x10/0x20 [ 33.186183] [ 33.186208] Allocated by task 296: [ 33.186240] kasan_save_stack+0x3c/0x68 [ 33.186469] kasan_save_track+0x20/0x40 [ 33.186651] kasan_save_alloc_info+0x40/0x58 [ 33.186735] __kasan_kmalloc+0xd4/0xd8 [ 33.186933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.187105] kasan_atomics+0xb8/0x2e0 [ 33.187188] kunit_try_run_case+0x170/0x3f0 [ 33.187261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.187475] kthread+0x328/0x630 [ 33.187645] ret_from_fork+0x10/0x20 [ 33.187721] [ 33.187908] The buggy address belongs to the object at fff00000c91a4d80 [ 33.187908] which belongs to the cache kmalloc-64 of size 64 [ 33.188018] The buggy address is located 0 bytes to the right of [ 33.188018] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.188204] [ 33.188533] The buggy address belongs to the physical page: [ 33.188602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.188825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.189051] page_type: f5(slab) [ 33.189110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.189488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.189647] page dumped because: kasan: bad access detected [ 33.189717] [ 33.190006] Memory state around the buggy address: [ 33.190053] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.190237] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.190425] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.190815] ^ [ 33.190922] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.191086] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.191156] ================================================================== [ 33.168707] ================================================================== [ 33.169063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.169220] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.169306] [ 33.169352] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.169580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.169718] Hardware name: linux,dummy-virt (DT) [ 33.169795] Call trace: [ 33.169828] show_stack+0x20/0x38 (C) [ 33.170058] dump_stack_lvl+0x8c/0xd0 [ 33.170229] print_report+0x118/0x5d0 [ 33.170459] kasan_report+0xdc/0x128 [ 33.170636] kasan_check_range+0x100/0x1a8 [ 33.170720] __kasan_check_write+0x20/0x30 [ 33.170911] kasan_atomics_helper+0x10c0/0x4858 [ 33.171104] kasan_atomics+0x198/0x2e0 [ 33.171185] kunit_try_run_case+0x170/0x3f0 [ 33.171541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.171635] kthread+0x328/0x630 [ 33.171831] ret_from_fork+0x10/0x20 [ 33.172045] [ 33.172089] Allocated by task 296: [ 33.172381] kasan_save_stack+0x3c/0x68 [ 33.172489] kasan_save_track+0x20/0x40 [ 33.172815] kasan_save_alloc_info+0x40/0x58 [ 33.173053] __kasan_kmalloc+0xd4/0xd8 [ 33.173196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.173368] kasan_atomics+0xb8/0x2e0 [ 33.173803] kunit_try_run_case+0x170/0x3f0 [ 33.173899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.174007] kthread+0x328/0x630 [ 33.174293] ret_from_fork+0x10/0x20 [ 33.174378] [ 33.174560] The buggy address belongs to the object at fff00000c91a4d80 [ 33.174560] which belongs to the cache kmalloc-64 of size 64 [ 33.174821] The buggy address is located 0 bytes to the right of [ 33.174821] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.175237] [ 33.175274] The buggy address belongs to the physical page: [ 33.175464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.175542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.175651] page_type: f5(slab) [ 33.175736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.176197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.176345] page dumped because: kasan: bad access detected [ 33.176421] [ 33.176475] Memory state around the buggy address: [ 33.176710] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.176951] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.177036] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.177137] ^ [ 33.177180] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.177240] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.177293] ================================================================== [ 33.200245] ================================================================== [ 33.200308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 33.200378] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.200630] [ 33.200803] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.200903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.201219] Hardware name: linux,dummy-virt (DT) [ 33.201335] Call trace: [ 33.201449] show_stack+0x20/0x38 (C) [ 33.201514] dump_stack_lvl+0x8c/0xd0 [ 33.201563] print_report+0x118/0x5d0 [ 33.201640] kasan_report+0xdc/0x128 [ 33.201769] kasan_check_range+0x100/0x1a8 [ 33.201820] __kasan_check_write+0x20/0x30 [ 33.201867] kasan_atomics_helper+0x126c/0x4858 [ 33.201925] kasan_atomics+0x198/0x2e0 [ 33.201972] kunit_try_run_case+0x170/0x3f0 [ 33.202420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.202528] kthread+0x328/0x630 [ 33.202908] ret_from_fork+0x10/0x20 [ 33.203376] [ 33.203427] Allocated by task 296: [ 33.203491] kasan_save_stack+0x3c/0x68 [ 33.203719] kasan_save_track+0x20/0x40 [ 33.203889] kasan_save_alloc_info+0x40/0x58 [ 33.204188] __kasan_kmalloc+0xd4/0xd8 [ 33.204361] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.204618] kasan_atomics+0xb8/0x2e0 [ 33.204827] kunit_try_run_case+0x170/0x3f0 [ 33.204958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.205137] kthread+0x328/0x630 [ 33.205523] ret_from_fork+0x10/0x20 [ 33.205733] [ 33.205785] The buggy address belongs to the object at fff00000c91a4d80 [ 33.205785] which belongs to the cache kmalloc-64 of size 64 [ 33.206029] The buggy address is located 0 bytes to the right of [ 33.206029] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.206109] [ 33.206140] The buggy address belongs to the physical page: [ 33.206175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.206234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.206506] page_type: f5(slab) [ 33.206593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.206967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.207050] page dumped because: kasan: bad access detected [ 33.207192] [ 33.207227] Memory state around the buggy address: [ 33.207262] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.207342] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.207398] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.207439] ^ [ 33.207475] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.207520] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.207627] ================================================================== [ 33.234714] ================================================================== [ 33.234778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 33.234865] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.235181] [ 33.235311] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.235483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.235517] Hardware name: linux,dummy-virt (DT) [ 33.235595] Call trace: [ 33.235654] show_stack+0x20/0x38 (C) [ 33.235728] dump_stack_lvl+0x8c/0xd0 [ 33.235821] print_report+0x118/0x5d0 [ 33.236005] kasan_report+0xdc/0x128 [ 33.236070] kasan_check_range+0x100/0x1a8 [ 33.236356] __kasan_check_write+0x20/0x30 [ 33.236427] kasan_atomics_helper+0x1414/0x4858 [ 33.236680] kasan_atomics+0x198/0x2e0 [ 33.236871] kunit_try_run_case+0x170/0x3f0 [ 33.236934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.237292] kthread+0x328/0x630 [ 33.237370] ret_from_fork+0x10/0x20 [ 33.237424] [ 33.237446] Allocated by task 296: [ 33.237478] kasan_save_stack+0x3c/0x68 [ 33.237864] kasan_save_track+0x20/0x40 [ 33.238001] kasan_save_alloc_info+0x40/0x58 [ 33.238096] __kasan_kmalloc+0xd4/0xd8 [ 33.238344] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.238497] kasan_atomics+0xb8/0x2e0 [ 33.238690] kunit_try_run_case+0x170/0x3f0 [ 33.238867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.238939] kthread+0x328/0x630 [ 33.239351] ret_from_fork+0x10/0x20 [ 33.239437] [ 33.239498] The buggy address belongs to the object at fff00000c91a4d80 [ 33.239498] which belongs to the cache kmalloc-64 of size 64 [ 33.239565] The buggy address is located 0 bytes to the right of [ 33.239565] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.239868] [ 33.240143] The buggy address belongs to the physical page: [ 33.240276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.240454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.240508] page_type: f5(slab) [ 33.240816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.240889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.240935] page dumped because: kasan: bad access detected [ 33.240982] [ 33.241015] Memory state around the buggy address: [ 33.241052] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.241108] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.241197] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.241235] ^ [ 33.241272] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.241317] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.241373] ================================================================== [ 33.126611] ================================================================== [ 33.126678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.126734] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.126986] [ 33.127141] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.127270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.127330] Hardware name: linux,dummy-virt (DT) [ 33.127366] Call trace: [ 33.127523] show_stack+0x20/0x38 (C) [ 33.127704] dump_stack_lvl+0x8c/0xd0 [ 33.127767] print_report+0x118/0x5d0 [ 33.127860] kasan_report+0xdc/0x128 [ 33.127937] __asan_report_store8_noabort+0x20/0x30 [ 33.128063] kasan_atomics_helper+0x3e5c/0x4858 [ 33.128124] kasan_atomics+0x198/0x2e0 [ 33.128177] kunit_try_run_case+0x170/0x3f0 [ 33.128386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.128589] kthread+0x328/0x630 [ 33.128653] ret_from_fork+0x10/0x20 [ 33.128705] [ 33.128765] Allocated by task 296: [ 33.128796] kasan_save_stack+0x3c/0x68 [ 33.128853] kasan_save_track+0x20/0x40 [ 33.128896] kasan_save_alloc_info+0x40/0x58 [ 33.128938] __kasan_kmalloc+0xd4/0xd8 [ 33.128979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.129029] kasan_atomics+0xb8/0x2e0 [ 33.129078] kunit_try_run_case+0x170/0x3f0 [ 33.129143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.129197] kthread+0x328/0x630 [ 33.129234] ret_from_fork+0x10/0x20 [ 33.129273] [ 33.129295] The buggy address belongs to the object at fff00000c91a4d80 [ 33.129295] which belongs to the cache kmalloc-64 of size 64 [ 33.129521] The buggy address is located 0 bytes to the right of [ 33.129521] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.130167] [ 33.130229] The buggy address belongs to the physical page: [ 33.130339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.130606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.130808] page_type: f5(slab) [ 33.130999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.131225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.131502] page dumped because: kasan: bad access detected [ 33.131665] [ 33.131950] Memory state around the buggy address: [ 33.132149] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.132267] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.132362] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.132419] ^ [ 33.132459] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.132663] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.132838] ================================================================== [ 33.192154] ================================================================== [ 33.192400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 33.192506] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.192842] [ 33.192904] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.193013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.193043] Hardware name: linux,dummy-virt (DT) [ 33.193076] Call trace: [ 33.193260] show_stack+0x20/0x38 (C) [ 33.193369] dump_stack_lvl+0x8c/0xd0 [ 33.193525] print_report+0x118/0x5d0 [ 33.193577] kasan_report+0xdc/0x128 [ 33.193623] kasan_check_range+0x100/0x1a8 [ 33.193884] __kasan_check_write+0x20/0x30 [ 33.194045] kasan_atomics_helper+0x11f8/0x4858 [ 33.194419] kasan_atomics+0x198/0x2e0 [ 33.194507] kunit_try_run_case+0x170/0x3f0 [ 33.194680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.194739] kthread+0x328/0x630 [ 33.195391] ret_from_fork+0x10/0x20 [ 33.195577] [ 33.195629] Allocated by task 296: [ 33.195663] kasan_save_stack+0x3c/0x68 [ 33.195746] kasan_save_track+0x20/0x40 [ 33.196108] kasan_save_alloc_info+0x40/0x58 [ 33.196542] __kasan_kmalloc+0xd4/0xd8 [ 33.196643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.196692] kasan_atomics+0xb8/0x2e0 [ 33.196742] kunit_try_run_case+0x170/0x3f0 [ 33.196785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.196840] kthread+0x328/0x630 [ 33.196888] ret_from_fork+0x10/0x20 [ 33.196932] [ 33.196957] The buggy address belongs to the object at fff00000c91a4d80 [ 33.196957] which belongs to the cache kmalloc-64 of size 64 [ 33.197045] The buggy address is located 0 bytes to the right of [ 33.197045] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.197128] [ 33.197151] The buggy address belongs to the physical page: [ 33.197194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.197262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.197316] page_type: f5(slab) [ 33.197372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.197443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.197487] page dumped because: kasan: bad access detected [ 33.197521] [ 33.197541] Memory state around the buggy address: [ 33.198197] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.198274] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.198347] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.198590] ^ [ 33.198699] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.198783] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.198969] ==================================================================
[ 26.372398] ================================================================== [ 26.372700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 26.373044] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.373782] [ 26.374056] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.374114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.374128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.374152] Call Trace: [ 26.374174] <TASK> [ 26.374194] dump_stack_lvl+0x73/0xb0 [ 26.374228] print_report+0xd1/0x610 [ 26.374252] ? __virt_addr_valid+0x1db/0x2d0 [ 26.374545] ? kasan_atomics_helper+0x3df/0x5450 [ 26.374571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.374598] ? kasan_atomics_helper+0x3df/0x5450 [ 26.374621] kasan_report+0x141/0x180 [ 26.374644] ? kasan_atomics_helper+0x3df/0x5450 [ 26.374671] kasan_check_range+0x10c/0x1c0 [ 26.374695] __kasan_check_read+0x15/0x20 [ 26.374719] kasan_atomics_helper+0x3df/0x5450 [ 26.374757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.374784] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.374811] ? kasan_atomics+0x152/0x310 [ 26.374838] kasan_atomics+0x1dc/0x310 [ 26.374862] ? __pfx_kasan_atomics+0x10/0x10 [ 26.374887] ? __pfx_read_tsc+0x10/0x10 [ 26.374910] ? ktime_get_ts64+0x86/0x230 [ 26.374937] kunit_try_run_case+0x1a5/0x480 [ 26.374961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.374983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.375009] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.375034] ? __kthread_parkme+0x82/0x180 [ 26.375056] ? preempt_count_sub+0x50/0x80 [ 26.375083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.375106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.375133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.375160] kthread+0x337/0x6f0 [ 26.375182] ? trace_preempt_on+0x20/0xc0 [ 26.375207] ? __pfx_kthread+0x10/0x10 [ 26.375230] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.375253] ? calculate_sigpending+0x7b/0xa0 [ 26.375297] ? __pfx_kthread+0x10/0x10 [ 26.375321] ret_from_fork+0x116/0x1d0 [ 26.375341] ? __pfx_kthread+0x10/0x10 [ 26.375364] ret_from_fork_asm+0x1a/0x30 [ 26.375396] </TASK> [ 26.375418] [ 26.387157] Allocated by task 315: [ 26.387426] kasan_save_stack+0x45/0x70 [ 26.387798] kasan_save_track+0x18/0x40 [ 26.388100] kasan_save_alloc_info+0x3b/0x50 [ 26.388359] __kasan_kmalloc+0xb7/0xc0 [ 26.388688] __kmalloc_cache_noprof+0x189/0x420 [ 26.389011] kasan_atomics+0x95/0x310 [ 26.389255] kunit_try_run_case+0x1a5/0x480 [ 26.389757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.390107] kthread+0x337/0x6f0 [ 26.390243] ret_from_fork+0x116/0x1d0 [ 26.390745] ret_from_fork_asm+0x1a/0x30 [ 26.390979] [ 26.391214] The buggy address belongs to the object at ffff88810613ea80 [ 26.391214] which belongs to the cache kmalloc-64 of size 64 [ 26.391849] The buggy address is located 0 bytes to the right of [ 26.391849] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.392697] [ 26.392794] The buggy address belongs to the physical page: [ 26.393048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.393660] flags: 0x200000000000000(node=0|zone=2) [ 26.393866] page_type: f5(slab) [ 26.394187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.394978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.395333] page dumped because: kasan: bad access detected [ 26.395837] [ 26.395934] Memory state around the buggy address: [ 26.396341] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.396854] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.397330] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.397719] ^ [ 26.398065] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.398597] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.398919] ================================================================== [ 27.139122] ================================================================== [ 27.139386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 27.140301] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.140796] [ 27.141173] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.141237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.141252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.141278] Call Trace: [ 27.141303] <TASK> [ 27.141324] dump_stack_lvl+0x73/0xb0 [ 27.141369] print_report+0xd1/0x610 [ 27.141393] ? __virt_addr_valid+0x1db/0x2d0 [ 27.141419] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.141529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.141562] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.141586] kasan_report+0x141/0x180 [ 27.141610] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.141636] kasan_check_range+0x10c/0x1c0 [ 27.141662] __kasan_check_read+0x15/0x20 [ 27.141686] kasan_atomics_helper+0x13b5/0x5450 [ 27.141709] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.141748] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.141775] ? kasan_atomics+0x152/0x310 [ 27.141801] kasan_atomics+0x1dc/0x310 [ 27.141825] ? __pfx_kasan_atomics+0x10/0x10 [ 27.141850] ? __pfx_read_tsc+0x10/0x10 [ 27.141873] ? ktime_get_ts64+0x86/0x230 [ 27.141900] kunit_try_run_case+0x1a5/0x480 [ 27.141924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.141945] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.141971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.141996] ? __kthread_parkme+0x82/0x180 [ 27.142018] ? preempt_count_sub+0x50/0x80 [ 27.142043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.142066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.142091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.142118] kthread+0x337/0x6f0 [ 27.142140] ? trace_preempt_on+0x20/0xc0 [ 27.142164] ? __pfx_kthread+0x10/0x10 [ 27.142188] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.142211] ? calculate_sigpending+0x7b/0xa0 [ 27.142237] ? __pfx_kthread+0x10/0x10 [ 27.142261] ret_from_fork+0x116/0x1d0 [ 27.142293] ? __pfx_kthread+0x10/0x10 [ 27.142316] ret_from_fork_asm+0x1a/0x30 [ 27.142349] </TASK> [ 27.142362] [ 27.152944] Allocated by task 315: [ 27.153116] kasan_save_stack+0x45/0x70 [ 27.153501] kasan_save_track+0x18/0x40 [ 27.153901] kasan_save_alloc_info+0x3b/0x50 [ 27.154069] __kasan_kmalloc+0xb7/0xc0 [ 27.154418] __kmalloc_cache_noprof+0x189/0x420 [ 27.154687] kasan_atomics+0x95/0x310 [ 27.154988] kunit_try_run_case+0x1a5/0x480 [ 27.155157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.155416] kthread+0x337/0x6f0 [ 27.155655] ret_from_fork+0x116/0x1d0 [ 27.155949] ret_from_fork_asm+0x1a/0x30 [ 27.156418] [ 27.156552] The buggy address belongs to the object at ffff88810613ea80 [ 27.156552] which belongs to the cache kmalloc-64 of size 64 [ 27.157246] The buggy address is located 0 bytes to the right of [ 27.157246] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.157827] [ 27.157917] The buggy address belongs to the physical page: [ 27.158137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.158798] flags: 0x200000000000000(node=0|zone=2) [ 27.159098] page_type: f5(slab) [ 27.159244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.159688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.160167] page dumped because: kasan: bad access detected [ 27.160422] [ 27.160526] Memory state around the buggy address: [ 27.160858] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.161422] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.161914] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.162269] ^ [ 27.162495] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.162998] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.163360] ================================================================== [ 27.512997] ================================================================== [ 27.514004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 27.514678] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.514988] [ 27.515098] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.515153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.515167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.515192] Call Trace: [ 27.515215] <TASK> [ 27.515235] dump_stack_lvl+0x73/0xb0 [ 27.515268] print_report+0xd1/0x610 [ 27.515293] ? __virt_addr_valid+0x1db/0x2d0 [ 27.515322] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.515346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.515373] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.515404] kasan_report+0x141/0x180 [ 27.515427] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.515454] kasan_check_range+0x10c/0x1c0 [ 27.515479] __kasan_check_write+0x18/0x20 [ 27.515504] kasan_atomics_helper+0x1b22/0x5450 [ 27.515526] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.515554] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.515580] ? kasan_atomics+0x152/0x310 [ 27.515607] kasan_atomics+0x1dc/0x310 [ 27.515630] ? __pfx_kasan_atomics+0x10/0x10 [ 27.515655] ? __pfx_read_tsc+0x10/0x10 [ 27.515678] ? ktime_get_ts64+0x86/0x230 [ 27.515705] kunit_try_run_case+0x1a5/0x480 [ 27.515728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.515983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.516026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.516051] ? __kthread_parkme+0x82/0x180 [ 27.516076] ? preempt_count_sub+0x50/0x80 [ 27.516322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.516363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.516392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.516429] kthread+0x337/0x6f0 [ 27.516454] ? trace_preempt_on+0x20/0xc0 [ 27.516479] ? __pfx_kthread+0x10/0x10 [ 27.516513] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.516538] ? calculate_sigpending+0x7b/0xa0 [ 27.516564] ? __pfx_kthread+0x10/0x10 [ 27.516589] ret_from_fork+0x116/0x1d0 [ 27.516610] ? __pfx_kthread+0x10/0x10 [ 27.516633] ret_from_fork_asm+0x1a/0x30 [ 27.516665] </TASK> [ 27.516679] [ 27.529841] Allocated by task 315: [ 27.530011] kasan_save_stack+0x45/0x70 [ 27.530197] kasan_save_track+0x18/0x40 [ 27.530787] kasan_save_alloc_info+0x3b/0x50 [ 27.531080] __kasan_kmalloc+0xb7/0xc0 [ 27.531459] __kmalloc_cache_noprof+0x189/0x420 [ 27.531805] kasan_atomics+0x95/0x310 [ 27.531997] kunit_try_run_case+0x1a5/0x480 [ 27.532186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.532795] kthread+0x337/0x6f0 [ 27.533381] ret_from_fork+0x116/0x1d0 [ 27.533685] ret_from_fork_asm+0x1a/0x30 [ 27.533998] [ 27.534071] The buggy address belongs to the object at ffff88810613ea80 [ 27.534071] which belongs to the cache kmalloc-64 of size 64 [ 27.534997] The buggy address is located 0 bytes to the right of [ 27.534997] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.536328] [ 27.536403] The buggy address belongs to the physical page: [ 27.536582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.537374] flags: 0x200000000000000(node=0|zone=2) [ 27.537876] page_type: f5(slab) [ 27.538178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.538559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.539326] page dumped because: kasan: bad access detected [ 27.539532] [ 27.539702] Memory state around the buggy address: [ 27.540154] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.540872] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.541313] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.542088] ^ [ 27.542252] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.543009] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.543441] ================================================================== [ 27.330577] ================================================================== [ 27.330915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 27.331230] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.331648] [ 27.333051] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.333116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.333131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.333156] Call Trace: [ 27.333179] <TASK> [ 27.333199] dump_stack_lvl+0x73/0xb0 [ 27.333236] print_report+0xd1/0x610 [ 27.333317] ? __virt_addr_valid+0x1db/0x2d0 [ 27.333348] ? kasan_atomics_helper+0x177f/0x5450 [ 27.333372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.333416] ? kasan_atomics_helper+0x177f/0x5450 [ 27.333441] kasan_report+0x141/0x180 [ 27.333464] ? kasan_atomics_helper+0x177f/0x5450 [ 27.333491] kasan_check_range+0x10c/0x1c0 [ 27.333516] __kasan_check_write+0x18/0x20 [ 27.333540] kasan_atomics_helper+0x177f/0x5450 [ 27.333564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.333591] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.333618] ? kasan_atomics+0x152/0x310 [ 27.333646] kasan_atomics+0x1dc/0x310 [ 27.333670] ? __pfx_kasan_atomics+0x10/0x10 [ 27.333695] ? __pfx_read_tsc+0x10/0x10 [ 27.333719] ? ktime_get_ts64+0x86/0x230 [ 27.333755] kunit_try_run_case+0x1a5/0x480 [ 27.333779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.333801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.333829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.333854] ? __kthread_parkme+0x82/0x180 [ 27.333877] ? preempt_count_sub+0x50/0x80 [ 27.333903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.333926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.333954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.333981] kthread+0x337/0x6f0 [ 27.334003] ? trace_preempt_on+0x20/0xc0 [ 27.334029] ? __pfx_kthread+0x10/0x10 [ 27.334052] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.334076] ? calculate_sigpending+0x7b/0xa0 [ 27.334103] ? __pfx_kthread+0x10/0x10 [ 27.334127] ret_from_fork+0x116/0x1d0 [ 27.334147] ? __pfx_kthread+0x10/0x10 [ 27.334170] ret_from_fork_asm+0x1a/0x30 [ 27.334203] </TASK> [ 27.334216] [ 27.345127] Allocated by task 315: [ 27.345434] kasan_save_stack+0x45/0x70 [ 27.345803] kasan_save_track+0x18/0x40 [ 27.346136] kasan_save_alloc_info+0x3b/0x50 [ 27.346498] __kasan_kmalloc+0xb7/0xc0 [ 27.346943] __kmalloc_cache_noprof+0x189/0x420 [ 27.347495] kasan_atomics+0x95/0x310 [ 27.347891] kunit_try_run_case+0x1a5/0x480 [ 27.348379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.348952] kthread+0x337/0x6f0 [ 27.349259] ret_from_fork+0x116/0x1d0 [ 27.349633] ret_from_fork_asm+0x1a/0x30 [ 27.350064] [ 27.350241] The buggy address belongs to the object at ffff88810613ea80 [ 27.350241] which belongs to the cache kmalloc-64 of size 64 [ 27.351442] The buggy address is located 0 bytes to the right of [ 27.351442] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.352715] [ 27.352909] The buggy address belongs to the physical page: [ 27.353522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.354306] flags: 0x200000000000000(node=0|zone=2) [ 27.354833] page_type: f5(slab) [ 27.355136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.356024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.356948] page dumped because: kasan: bad access detected [ 27.357518] [ 27.357710] Memory state around the buggy address: [ 27.358203] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.358839] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.359636] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.359859] ^ [ 27.360012] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.360223] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.360785] ================================================================== [ 26.575650] ================================================================== [ 26.576368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 26.576709] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.576998] [ 26.577081] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.577133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.577147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.577170] Call Trace: [ 26.577188] <TASK> [ 26.577205] dump_stack_lvl+0x73/0xb0 [ 26.577237] print_report+0xd1/0x610 [ 26.577259] ? __virt_addr_valid+0x1db/0x2d0 [ 26.577286] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.577309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.577337] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.577360] kasan_report+0x141/0x180 [ 26.577384] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.577412] kasan_check_range+0x10c/0x1c0 [ 26.577439] __kasan_check_write+0x18/0x20 [ 26.577464] kasan_atomics_helper+0x7c7/0x5450 [ 26.577487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.577514] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.577541] ? kasan_atomics+0x152/0x310 [ 26.577569] kasan_atomics+0x1dc/0x310 [ 26.577594] ? __pfx_kasan_atomics+0x10/0x10 [ 26.577619] ? __pfx_read_tsc+0x10/0x10 [ 26.577643] ? ktime_get_ts64+0x86/0x230 [ 26.577669] kunit_try_run_case+0x1a5/0x480 [ 26.577692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.577714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.577766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.577791] ? __kthread_parkme+0x82/0x180 [ 26.577827] ? preempt_count_sub+0x50/0x80 [ 26.577853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.577876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.577902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.577968] kthread+0x337/0x6f0 [ 26.578019] ? trace_preempt_on+0x20/0xc0 [ 26.578044] ? __pfx_kthread+0x10/0x10 [ 26.578067] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.578091] ? calculate_sigpending+0x7b/0xa0 [ 26.578117] ? __pfx_kthread+0x10/0x10 [ 26.578140] ret_from_fork+0x116/0x1d0 [ 26.578160] ? __pfx_kthread+0x10/0x10 [ 26.578183] ret_from_fork_asm+0x1a/0x30 [ 26.578215] </TASK> [ 26.578227] [ 26.589267] Allocated by task 315: [ 26.590428] kasan_save_stack+0x45/0x70 [ 26.590639] kasan_save_track+0x18/0x40 [ 26.590783] kasan_save_alloc_info+0x3b/0x50 [ 26.590929] __kasan_kmalloc+0xb7/0xc0 [ 26.591056] __kmalloc_cache_noprof+0x189/0x420 [ 26.591792] kasan_atomics+0x95/0x310 [ 26.592059] kunit_try_run_case+0x1a5/0x480 [ 26.592436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.592815] kthread+0x337/0x6f0 [ 26.592986] ret_from_fork+0x116/0x1d0 [ 26.593155] ret_from_fork_asm+0x1a/0x30 [ 26.593683] [ 26.593966] The buggy address belongs to the object at ffff88810613ea80 [ 26.593966] which belongs to the cache kmalloc-64 of size 64 [ 26.594893] The buggy address is located 0 bytes to the right of [ 26.594893] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.595622] [ 26.595866] The buggy address belongs to the physical page: [ 26.596247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.596621] flags: 0x200000000000000(node=0|zone=2) [ 26.596843] page_type: f5(slab) [ 26.596998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.597613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.597862] page dumped because: kasan: bad access detected [ 26.598083] [ 26.598167] Memory state around the buggy address: [ 26.598625] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.599287] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.599626] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.599918] ^ [ 26.600125] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.600842] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.601354] ================================================================== [ 27.270030] ================================================================== [ 27.270576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 27.270860] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.271230] [ 27.271405] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.271512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.271526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.271550] Call Trace: [ 27.271570] <TASK> [ 27.271589] dump_stack_lvl+0x73/0xb0 [ 27.271621] print_report+0xd1/0x610 [ 27.271644] ? __virt_addr_valid+0x1db/0x2d0 [ 27.271670] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.271693] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.271720] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.271755] kasan_report+0x141/0x180 [ 27.271778] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.271805] kasan_check_range+0x10c/0x1c0 [ 27.271830] __kasan_check_write+0x18/0x20 [ 27.271864] kasan_atomics_helper+0x15b6/0x5450 [ 27.271888] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.271914] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.271951] ? kasan_atomics+0x152/0x310 [ 27.271978] kasan_atomics+0x1dc/0x310 [ 27.272001] ? __pfx_kasan_atomics+0x10/0x10 [ 27.272026] ? __pfx_read_tsc+0x10/0x10 [ 27.272050] ? ktime_get_ts64+0x86/0x230 [ 27.272076] kunit_try_run_case+0x1a5/0x480 [ 27.272099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.272121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.272148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.272173] ? __kthread_parkme+0x82/0x180 [ 27.272196] ? preempt_count_sub+0x50/0x80 [ 27.272221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.272245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.272312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.272359] kthread+0x337/0x6f0 [ 27.272382] ? trace_preempt_on+0x20/0xc0 [ 27.272419] ? __pfx_kthread+0x10/0x10 [ 27.272443] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.272467] ? calculate_sigpending+0x7b/0xa0 [ 27.272493] ? __pfx_kthread+0x10/0x10 [ 27.272536] ret_from_fork+0x116/0x1d0 [ 27.272558] ? __pfx_kthread+0x10/0x10 [ 27.272591] ret_from_fork_asm+0x1a/0x30 [ 27.272623] </TASK> [ 27.272636] [ 27.280698] Allocated by task 315: [ 27.280891] kasan_save_stack+0x45/0x70 [ 27.281088] kasan_save_track+0x18/0x40 [ 27.281258] kasan_save_alloc_info+0x3b/0x50 [ 27.281712] __kasan_kmalloc+0xb7/0xc0 [ 27.281914] __kmalloc_cache_noprof+0x189/0x420 [ 27.282134] kasan_atomics+0x95/0x310 [ 27.282386] kunit_try_run_case+0x1a5/0x480 [ 27.282621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.282872] kthread+0x337/0x6f0 [ 27.283041] ret_from_fork+0x116/0x1d0 [ 27.283196] ret_from_fork_asm+0x1a/0x30 [ 27.283357] [ 27.283455] The buggy address belongs to the object at ffff88810613ea80 [ 27.283455] which belongs to the cache kmalloc-64 of size 64 [ 27.284122] The buggy address is located 0 bytes to the right of [ 27.284122] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.284714] [ 27.284832] The buggy address belongs to the physical page: [ 27.285053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.285463] flags: 0x200000000000000(node=0|zone=2) [ 27.285711] page_type: f5(slab) [ 27.285911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.286183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.286407] page dumped because: kasan: bad access detected [ 27.286580] [ 27.286645] Memory state around the buggy address: [ 27.286803] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.287361] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.288239] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.288672] ^ [ 27.288841] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.289051] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.289257] ================================================================== [ 27.544418] ================================================================== [ 27.545133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 27.545983] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.546655] [ 27.546927] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.546985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.546998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.547022] Call Trace: [ 27.547039] <TASK> [ 27.547057] dump_stack_lvl+0x73/0xb0 [ 27.547092] print_report+0xd1/0x610 [ 27.547115] ? __virt_addr_valid+0x1db/0x2d0 [ 27.547141] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.547164] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.547191] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.547214] kasan_report+0x141/0x180 [ 27.547237] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.547264] kasan_check_range+0x10c/0x1c0 [ 27.547287] __kasan_check_write+0x18/0x20 [ 27.547312] kasan_atomics_helper+0x1c18/0x5450 [ 27.547336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.547363] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.547388] ? kasan_atomics+0x152/0x310 [ 27.547425] kasan_atomics+0x1dc/0x310 [ 27.547448] ? __pfx_kasan_atomics+0x10/0x10 [ 27.547473] ? __pfx_read_tsc+0x10/0x10 [ 27.547496] ? ktime_get_ts64+0x86/0x230 [ 27.547522] kunit_try_run_case+0x1a5/0x480 [ 27.547546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.547568] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.547592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.547617] ? __kthread_parkme+0x82/0x180 [ 27.547640] ? preempt_count_sub+0x50/0x80 [ 27.547664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.547687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.547713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.547752] kthread+0x337/0x6f0 [ 27.547777] ? trace_preempt_on+0x20/0xc0 [ 27.547801] ? __pfx_kthread+0x10/0x10 [ 27.547823] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.547847] ? calculate_sigpending+0x7b/0xa0 [ 27.547873] ? __pfx_kthread+0x10/0x10 [ 27.547896] ret_from_fork+0x116/0x1d0 [ 27.547916] ? __pfx_kthread+0x10/0x10 [ 27.547939] ret_from_fork_asm+0x1a/0x30 [ 27.547972] </TASK> [ 27.547984] [ 27.559109] Allocated by task 315: [ 27.559442] kasan_save_stack+0x45/0x70 [ 27.559815] kasan_save_track+0x18/0x40 [ 27.560151] kasan_save_alloc_info+0x3b/0x50 [ 27.560880] __kasan_kmalloc+0xb7/0xc0 [ 27.561238] __kmalloc_cache_noprof+0x189/0x420 [ 27.561675] kasan_atomics+0x95/0x310 [ 27.562029] kunit_try_run_case+0x1a5/0x480 [ 27.562408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.562908] kthread+0x337/0x6f0 [ 27.563214] ret_from_fork+0x116/0x1d0 [ 27.563594] ret_from_fork_asm+0x1a/0x30 [ 27.563965] [ 27.564118] The buggy address belongs to the object at ffff88810613ea80 [ 27.564118] which belongs to the cache kmalloc-64 of size 64 [ 27.565152] The buggy address is located 0 bytes to the right of [ 27.565152] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.565884] [ 27.565960] The buggy address belongs to the physical page: [ 27.566130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.566364] flags: 0x200000000000000(node=0|zone=2) [ 27.566796] page_type: f5(slab) [ 27.567083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.567787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.568420] page dumped because: kasan: bad access detected [ 27.569026] [ 27.569178] Memory state around the buggy address: [ 27.569612] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.570225] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.570949] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.571515] ^ [ 27.571666] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.571884] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.572094] ================================================================== [ 27.828376] ================================================================== [ 27.828750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 27.829023] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.829244] [ 27.829430] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.829479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.829493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.829516] Call Trace: [ 27.829533] <TASK> [ 27.829549] dump_stack_lvl+0x73/0xb0 [ 27.829579] print_report+0xd1/0x610 [ 27.829603] ? __virt_addr_valid+0x1db/0x2d0 [ 27.829628] ? kasan_atomics_helper+0x218a/0x5450 [ 27.829650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.829678] ? kasan_atomics_helper+0x218a/0x5450 [ 27.829702] kasan_report+0x141/0x180 [ 27.829725] ? kasan_atomics_helper+0x218a/0x5450 [ 27.829774] kasan_check_range+0x10c/0x1c0 [ 27.829799] __kasan_check_write+0x18/0x20 [ 27.829823] kasan_atomics_helper+0x218a/0x5450 [ 27.829857] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.829884] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.829911] ? kasan_atomics+0x152/0x310 [ 27.829947] kasan_atomics+0x1dc/0x310 [ 27.829970] ? __pfx_kasan_atomics+0x10/0x10 [ 27.829996] ? __pfx_read_tsc+0x10/0x10 [ 27.830029] ? ktime_get_ts64+0x86/0x230 [ 27.830056] kunit_try_run_case+0x1a5/0x480 [ 27.830079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.830101] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.830135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.830161] ? __kthread_parkme+0x82/0x180 [ 27.830193] ? preempt_count_sub+0x50/0x80 [ 27.830219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.830243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.830277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.830305] kthread+0x337/0x6f0 [ 27.830328] ? trace_preempt_on+0x20/0xc0 [ 27.830363] ? __pfx_kthread+0x10/0x10 [ 27.830386] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.830418] ? calculate_sigpending+0x7b/0xa0 [ 27.830452] ? __pfx_kthread+0x10/0x10 [ 27.830477] ret_from_fork+0x116/0x1d0 [ 27.830497] ? __pfx_kthread+0x10/0x10 [ 27.830530] ret_from_fork_asm+0x1a/0x30 [ 27.830563] </TASK> [ 27.830575] [ 27.837995] Allocated by task 315: [ 27.838121] kasan_save_stack+0x45/0x70 [ 27.838257] kasan_save_track+0x18/0x40 [ 27.838386] kasan_save_alloc_info+0x3b/0x50 [ 27.838527] __kasan_kmalloc+0xb7/0xc0 [ 27.838653] __kmalloc_cache_noprof+0x189/0x420 [ 27.838915] kasan_atomics+0x95/0x310 [ 27.839098] kunit_try_run_case+0x1a5/0x480 [ 27.839297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.839724] kthread+0x337/0x6f0 [ 27.839898] ret_from_fork+0x116/0x1d0 [ 27.840079] ret_from_fork_asm+0x1a/0x30 [ 27.840269] [ 27.840363] The buggy address belongs to the object at ffff88810613ea80 [ 27.840363] which belongs to the cache kmalloc-64 of size 64 [ 27.841172] The buggy address is located 0 bytes to the right of [ 27.841172] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.841543] [ 27.841610] The buggy address belongs to the physical page: [ 27.841787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.842020] flags: 0x200000000000000(node=0|zone=2) [ 27.842177] page_type: f5(slab) [ 27.842339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.842919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.843290] page dumped because: kasan: bad access detected [ 27.843569] [ 27.843662] Memory state around the buggy address: [ 27.843897] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.844263] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.844628] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.844902] ^ [ 27.845142] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.845356] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.845640] ================================================================== [ 26.303578] ================================================================== [ 26.304051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 26.304527] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.304835] [ 26.305258] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.305365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.305378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.305402] Call Trace: [ 26.305428] <TASK> [ 26.305452] dump_stack_lvl+0x73/0xb0 [ 26.305487] print_report+0xd1/0x610 [ 26.305509] ? __virt_addr_valid+0x1db/0x2d0 [ 26.305533] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.305564] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.305589] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.305621] kasan_report+0x141/0x180 [ 26.305643] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.305669] __asan_report_store4_noabort+0x1b/0x30 [ 26.305694] kasan_atomics_helper+0x4ba2/0x5450 [ 26.305716] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.305752] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.305786] ? kasan_atomics+0x152/0x310 [ 26.305812] kasan_atomics+0x1dc/0x310 [ 26.305835] ? __pfx_kasan_atomics+0x10/0x10 [ 26.305870] ? __pfx_read_tsc+0x10/0x10 [ 26.305892] ? ktime_get_ts64+0x86/0x230 [ 26.305918] kunit_try_run_case+0x1a5/0x480 [ 26.305941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.305962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.305985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.306010] ? __kthread_parkme+0x82/0x180 [ 26.306040] ? preempt_count_sub+0x50/0x80 [ 26.306064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.306086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.306121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.306147] kthread+0x337/0x6f0 [ 26.306168] ? trace_preempt_on+0x20/0xc0 [ 26.306192] ? __pfx_kthread+0x10/0x10 [ 26.306213] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.306235] ? calculate_sigpending+0x7b/0xa0 [ 26.306260] ? __pfx_kthread+0x10/0x10 [ 26.306330] ret_from_fork+0x116/0x1d0 [ 26.306362] ? __pfx_kthread+0x10/0x10 [ 26.306384] ret_from_fork_asm+0x1a/0x30 [ 26.306425] </TASK> [ 26.306438] [ 26.315273] Allocated by task 315: [ 26.315471] kasan_save_stack+0x45/0x70 [ 26.315713] kasan_save_track+0x18/0x40 [ 26.315995] kasan_save_alloc_info+0x3b/0x50 [ 26.316255] __kasan_kmalloc+0xb7/0xc0 [ 26.316503] __kmalloc_cache_noprof+0x189/0x420 [ 26.316722] kasan_atomics+0x95/0x310 [ 26.316932] kunit_try_run_case+0x1a5/0x480 [ 26.317072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.317420] kthread+0x337/0x6f0 [ 26.317620] ret_from_fork+0x116/0x1d0 [ 26.317818] ret_from_fork_asm+0x1a/0x30 [ 26.318013] [ 26.318101] The buggy address belongs to the object at ffff88810613ea80 [ 26.318101] which belongs to the cache kmalloc-64 of size 64 [ 26.318790] The buggy address is located 0 bytes to the right of [ 26.318790] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.319490] [ 26.319603] The buggy address belongs to the physical page: [ 26.319844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.320142] flags: 0x200000000000000(node=0|zone=2) [ 26.320301] page_type: f5(slab) [ 26.320424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.320798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.321344] page dumped because: kasan: bad access detected [ 26.321506] [ 26.321569] Memory state around the buggy address: [ 26.321716] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.321996] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.322389] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.323146] ^ [ 26.323617] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.324002] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.324217] ================================================================== [ 26.480719] ================================================================== [ 26.480980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 26.481325] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.482198] [ 26.482414] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.482551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.482570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.482596] Call Trace: [ 26.482621] <TASK> [ 26.482644] dump_stack_lvl+0x73/0xb0 [ 26.482679] print_report+0xd1/0x610 [ 26.482703] ? __virt_addr_valid+0x1db/0x2d0 [ 26.482747] ? kasan_atomics_helper+0x565/0x5450 [ 26.482771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.482798] ? kasan_atomics_helper+0x565/0x5450 [ 26.482820] kasan_report+0x141/0x180 [ 26.482844] ? kasan_atomics_helper+0x565/0x5450 [ 26.482871] kasan_check_range+0x10c/0x1c0 [ 26.482896] __kasan_check_write+0x18/0x20 [ 26.482920] kasan_atomics_helper+0x565/0x5450 [ 26.482943] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.482970] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.482996] ? kasan_atomics+0x152/0x310 [ 26.483023] kasan_atomics+0x1dc/0x310 [ 26.483045] ? __pfx_kasan_atomics+0x10/0x10 [ 26.483071] ? __pfx_read_tsc+0x10/0x10 [ 26.483094] ? ktime_get_ts64+0x86/0x230 [ 26.483120] kunit_try_run_case+0x1a5/0x480 [ 26.483144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.483166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.483192] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.483216] ? __kthread_parkme+0x82/0x180 [ 26.483239] ? preempt_count_sub+0x50/0x80 [ 26.483263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.483338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.483365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.483392] kthread+0x337/0x6f0 [ 26.483425] ? trace_preempt_on+0x20/0xc0 [ 26.483450] ? __pfx_kthread+0x10/0x10 [ 26.483473] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.483497] ? calculate_sigpending+0x7b/0xa0 [ 26.483525] ? __pfx_kthread+0x10/0x10 [ 26.483549] ret_from_fork+0x116/0x1d0 [ 26.483569] ? __pfx_kthread+0x10/0x10 [ 26.483592] ret_from_fork_asm+0x1a/0x30 [ 26.483625] </TASK> [ 26.483638] [ 26.494075] Allocated by task 315: [ 26.494255] kasan_save_stack+0x45/0x70 [ 26.494819] kasan_save_track+0x18/0x40 [ 26.495004] kasan_save_alloc_info+0x3b/0x50 [ 26.495398] __kasan_kmalloc+0xb7/0xc0 [ 26.495663] __kmalloc_cache_noprof+0x189/0x420 [ 26.495904] kasan_atomics+0x95/0x310 [ 26.496072] kunit_try_run_case+0x1a5/0x480 [ 26.496252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.496910] kthread+0x337/0x6f0 [ 26.497054] ret_from_fork+0x116/0x1d0 [ 26.497238] ret_from_fork_asm+0x1a/0x30 [ 26.497684] [ 26.497787] The buggy address belongs to the object at ffff88810613ea80 [ 26.497787] which belongs to the cache kmalloc-64 of size 64 [ 26.498268] The buggy address is located 0 bytes to the right of [ 26.498268] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.499069] [ 26.499347] The buggy address belongs to the physical page: [ 26.499650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.499994] flags: 0x200000000000000(node=0|zone=2) [ 26.500209] page_type: f5(slab) [ 26.500658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.500959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.501699] page dumped because: kasan: bad access detected [ 26.501958] [ 26.502034] Memory state around the buggy address: [ 26.502242] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.502886] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.503170] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.503674] ^ [ 26.503956] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.504359] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.504831] ================================================================== [ 27.059138] ================================================================== [ 27.059364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 27.059691] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.060101] [ 27.060225] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.060281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.060295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.060325] Call Trace: [ 27.060348] <TASK> [ 27.060369] dump_stack_lvl+0x73/0xb0 [ 27.060428] print_report+0xd1/0x610 [ 27.060452] ? __virt_addr_valid+0x1db/0x2d0 [ 27.060479] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.060501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.060528] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.060621] kasan_report+0x141/0x180 [ 27.060651] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.060679] __asan_report_load4_noabort+0x18/0x20 [ 27.060704] kasan_atomics_helper+0x49e8/0x5450 [ 27.060727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.060765] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.060791] ? kasan_atomics+0x152/0x310 [ 27.060820] kasan_atomics+0x1dc/0x310 [ 27.060844] ? __pfx_kasan_atomics+0x10/0x10 [ 27.060868] ? __pfx_read_tsc+0x10/0x10 [ 27.060892] ? ktime_get_ts64+0x86/0x230 [ 27.060918] kunit_try_run_case+0x1a5/0x480 [ 27.060942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.060964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.060992] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.061016] ? __kthread_parkme+0x82/0x180 [ 27.061039] ? preempt_count_sub+0x50/0x80 [ 27.061065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.061088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.061115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.061141] kthread+0x337/0x6f0 [ 27.061165] ? trace_preempt_on+0x20/0xc0 [ 27.061190] ? __pfx_kthread+0x10/0x10 [ 27.061212] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.061236] ? calculate_sigpending+0x7b/0xa0 [ 27.062285] ? __pfx_kthread+0x10/0x10 [ 27.062322] ret_from_fork+0x116/0x1d0 [ 27.062344] ? __pfx_kthread+0x10/0x10 [ 27.062369] ret_from_fork_asm+0x1a/0x30 [ 27.062418] </TASK> [ 27.062433] [ 27.074829] Allocated by task 315: [ 27.075282] kasan_save_stack+0x45/0x70 [ 27.075687] kasan_save_track+0x18/0x40 [ 27.076179] kasan_save_alloc_info+0x3b/0x50 [ 27.076726] __kasan_kmalloc+0xb7/0xc0 [ 27.077176] __kmalloc_cache_noprof+0x189/0x420 [ 27.077740] kasan_atomics+0x95/0x310 [ 27.078181] kunit_try_run_case+0x1a5/0x480 [ 27.078823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.079485] kthread+0x337/0x6f0 [ 27.079923] ret_from_fork+0x116/0x1d0 [ 27.080368] ret_from_fork_asm+0x1a/0x30 [ 27.080876] [ 27.081058] The buggy address belongs to the object at ffff88810613ea80 [ 27.081058] which belongs to the cache kmalloc-64 of size 64 [ 27.082409] The buggy address is located 0 bytes to the right of [ 27.082409] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.083767] [ 27.084001] The buggy address belongs to the physical page: [ 27.084177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.084972] flags: 0x200000000000000(node=0|zone=2) [ 27.085704] page_type: f5(slab) [ 27.086135] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.086802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.087031] page dumped because: kasan: bad access detected [ 27.087197] [ 27.087264] Memory state around the buggy address: [ 27.087432] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.087801] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.088480] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.088873] ^ [ 27.089114] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.089408] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.090077] ================================================================== [ 27.419464] ================================================================== [ 27.419699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 27.420382] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.421024] [ 27.421200] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.421254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.421308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.421334] Call Trace: [ 27.421356] <TASK> [ 27.421374] dump_stack_lvl+0x73/0xb0 [ 27.421408] print_report+0xd1/0x610 [ 27.421433] ? __virt_addr_valid+0x1db/0x2d0 [ 27.421470] ? kasan_atomics_helper+0x194a/0x5450 [ 27.421492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.421519] ? kasan_atomics_helper+0x194a/0x5450 [ 27.421541] kasan_report+0x141/0x180 [ 27.421564] ? kasan_atomics_helper+0x194a/0x5450 [ 27.421591] kasan_check_range+0x10c/0x1c0 [ 27.421615] __kasan_check_write+0x18/0x20 [ 27.421639] kasan_atomics_helper+0x194a/0x5450 [ 27.421662] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.421689] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.421715] ? kasan_atomics+0x152/0x310 [ 27.421754] kasan_atomics+0x1dc/0x310 [ 27.421777] ? __pfx_kasan_atomics+0x10/0x10 [ 27.421803] ? __pfx_read_tsc+0x10/0x10 [ 27.421826] ? ktime_get_ts64+0x86/0x230 [ 27.421852] kunit_try_run_case+0x1a5/0x480 [ 27.421875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.421898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.421922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.421946] ? __kthread_parkme+0x82/0x180 [ 27.421969] ? preempt_count_sub+0x50/0x80 [ 27.421994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.422017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.422044] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.422071] kthread+0x337/0x6f0 [ 27.422093] ? trace_preempt_on+0x20/0xc0 [ 27.422117] ? __pfx_kthread+0x10/0x10 [ 27.422141] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.422163] ? calculate_sigpending+0x7b/0xa0 [ 27.422190] ? __pfx_kthread+0x10/0x10 [ 27.422214] ret_from_fork+0x116/0x1d0 [ 27.422235] ? __pfx_kthread+0x10/0x10 [ 27.422258] ret_from_fork_asm+0x1a/0x30 [ 27.422325] </TASK> [ 27.422340] [ 27.435097] Allocated by task 315: [ 27.435227] kasan_save_stack+0x45/0x70 [ 27.435648] kasan_save_track+0x18/0x40 [ 27.436009] kasan_save_alloc_info+0x3b/0x50 [ 27.436469] __kasan_kmalloc+0xb7/0xc0 [ 27.436811] __kmalloc_cache_noprof+0x189/0x420 [ 27.437201] kasan_atomics+0x95/0x310 [ 27.437576] kunit_try_run_case+0x1a5/0x480 [ 27.437955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.438487] kthread+0x337/0x6f0 [ 27.438872] ret_from_fork+0x116/0x1d0 [ 27.439249] ret_from_fork_asm+0x1a/0x30 [ 27.439833] [ 27.440029] The buggy address belongs to the object at ffff88810613ea80 [ 27.440029] which belongs to the cache kmalloc-64 of size 64 [ 27.441215] The buggy address is located 0 bytes to the right of [ 27.441215] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.441923] [ 27.441997] The buggy address belongs to the physical page: [ 27.442164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.442548] flags: 0x200000000000000(node=0|zone=2) [ 27.442973] page_type: f5(slab) [ 27.443253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.444022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.444926] page dumped because: kasan: bad access detected [ 27.445512] [ 27.445880] Memory state around the buggy address: [ 27.446458] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.446895] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.447110] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.447376] ^ [ 27.447805] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.448478] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.449091] ================================================================== [ 27.474071] ================================================================== [ 27.474776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 27.475510] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.476423] [ 27.476626] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.476679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.476716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.476752] Call Trace: [ 27.476774] <TASK> [ 27.476793] dump_stack_lvl+0x73/0xb0 [ 27.476829] print_report+0xd1/0x610 [ 27.476853] ? __virt_addr_valid+0x1db/0x2d0 [ 27.476878] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.476902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.476929] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.476952] kasan_report+0x141/0x180 [ 27.476975] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.477002] kasan_check_range+0x10c/0x1c0 [ 27.477027] __kasan_check_write+0x18/0x20 [ 27.477051] kasan_atomics_helper+0x1a7f/0x5450 [ 27.477074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.477100] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.477126] ? kasan_atomics+0x152/0x310 [ 27.477153] kasan_atomics+0x1dc/0x310 [ 27.477176] ? __pfx_kasan_atomics+0x10/0x10 [ 27.477201] ? __pfx_read_tsc+0x10/0x10 [ 27.477224] ? ktime_get_ts64+0x86/0x230 [ 27.477250] kunit_try_run_case+0x1a5/0x480 [ 27.477290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.477311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.477337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.477368] ? __kthread_parkme+0x82/0x180 [ 27.477391] ? preempt_count_sub+0x50/0x80 [ 27.477438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.477461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.477495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.477522] kthread+0x337/0x6f0 [ 27.477544] ? trace_preempt_on+0x20/0xc0 [ 27.477590] ? __pfx_kthread+0x10/0x10 [ 27.477614] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.477647] ? calculate_sigpending+0x7b/0xa0 [ 27.477673] ? __pfx_kthread+0x10/0x10 [ 27.477697] ret_from_fork+0x116/0x1d0 [ 27.477717] ? __pfx_kthread+0x10/0x10 [ 27.477750] ret_from_fork_asm+0x1a/0x30 [ 27.477781] </TASK> [ 27.477794] [ 27.493151] Allocated by task 315: [ 27.493589] kasan_save_stack+0x45/0x70 [ 27.493963] kasan_save_track+0x18/0x40 [ 27.494685] kasan_save_alloc_info+0x3b/0x50 [ 27.495184] __kasan_kmalloc+0xb7/0xc0 [ 27.495564] __kmalloc_cache_noprof+0x189/0x420 [ 27.495958] kasan_atomics+0x95/0x310 [ 27.496090] kunit_try_run_case+0x1a5/0x480 [ 27.496230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.496406] kthread+0x337/0x6f0 [ 27.496821] ret_from_fork+0x116/0x1d0 [ 27.497150] ret_from_fork_asm+0x1a/0x30 [ 27.497494] [ 27.497647] The buggy address belongs to the object at ffff88810613ea80 [ 27.497647] which belongs to the cache kmalloc-64 of size 64 [ 27.498634] The buggy address is located 0 bytes to the right of [ 27.498634] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.500079] [ 27.500652] The buggy address belongs to the physical page: [ 27.501077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.502054] flags: 0x200000000000000(node=0|zone=2) [ 27.502321] page_type: f5(slab) [ 27.502486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.504065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.505722] page dumped because: kasan: bad access detected [ 27.505983] [ 27.506073] Memory state around the buggy address: [ 27.507198] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.508139] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.508935] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.509723] ^ [ 27.510108] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.511257] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.511723] ================================================================== [ 26.934209] ================================================================== [ 26.934635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 26.935316] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.935632] [ 26.935758] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.935813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.935828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.935853] Call Trace: [ 26.935876] <TASK> [ 26.935897] dump_stack_lvl+0x73/0xb0 [ 26.935930] print_report+0xd1/0x610 [ 26.935955] ? __virt_addr_valid+0x1db/0x2d0 [ 26.935981] ? kasan_atomics_helper+0x1079/0x5450 [ 26.936004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.936030] ? kasan_atomics_helper+0x1079/0x5450 [ 26.936055] kasan_report+0x141/0x180 [ 26.936078] ? kasan_atomics_helper+0x1079/0x5450 [ 26.936105] kasan_check_range+0x10c/0x1c0 [ 26.936129] __kasan_check_write+0x18/0x20 [ 26.936153] kasan_atomics_helper+0x1079/0x5450 [ 26.936176] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.936202] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.936230] ? kasan_atomics+0x152/0x310 [ 26.936256] kasan_atomics+0x1dc/0x310 [ 26.936443] ? __pfx_kasan_atomics+0x10/0x10 [ 26.936472] ? __pfx_read_tsc+0x10/0x10 [ 26.936505] ? ktime_get_ts64+0x86/0x230 [ 26.936532] kunit_try_run_case+0x1a5/0x480 [ 26.936556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.936617] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.936643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.936670] ? __kthread_parkme+0x82/0x180 [ 26.936692] ? preempt_count_sub+0x50/0x80 [ 26.936718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.936755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.936782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.936809] kthread+0x337/0x6f0 [ 26.936832] ? trace_preempt_on+0x20/0xc0 [ 26.936857] ? __pfx_kthread+0x10/0x10 [ 26.936881] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.936906] ? calculate_sigpending+0x7b/0xa0 [ 26.936932] ? __pfx_kthread+0x10/0x10 [ 26.936955] ret_from_fork+0x116/0x1d0 [ 26.936976] ? __pfx_kthread+0x10/0x10 [ 26.936999] ret_from_fork_asm+0x1a/0x30 [ 26.937032] </TASK> [ 26.937045] [ 26.949945] Allocated by task 315: [ 26.950128] kasan_save_stack+0x45/0x70 [ 26.950541] kasan_save_track+0x18/0x40 [ 26.950793] kasan_save_alloc_info+0x3b/0x50 [ 26.951104] __kasan_kmalloc+0xb7/0xc0 [ 26.951465] __kmalloc_cache_noprof+0x189/0x420 [ 26.951749] kasan_atomics+0x95/0x310 [ 26.951932] kunit_try_run_case+0x1a5/0x480 [ 26.952116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.952556] kthread+0x337/0x6f0 [ 26.952839] ret_from_fork+0x116/0x1d0 [ 26.953207] ret_from_fork_asm+0x1a/0x30 [ 26.953538] [ 26.953779] The buggy address belongs to the object at ffff88810613ea80 [ 26.953779] which belongs to the cache kmalloc-64 of size 64 [ 26.954469] The buggy address is located 0 bytes to the right of [ 26.954469] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.955236] [ 26.955511] The buggy address belongs to the physical page: [ 26.955762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.956086] flags: 0x200000000000000(node=0|zone=2) [ 26.956519] page_type: f5(slab) [ 26.956810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.957480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.957814] page dumped because: kasan: bad access detected [ 26.958041] [ 26.958127] Memory state around the buggy address: [ 26.958626] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.959130] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.959863] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.960425] ^ [ 26.960812] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.961108] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.961811] ================================================================== [ 27.289768] ================================================================== [ 27.290184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 27.290796] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.291405] [ 27.291493] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.291596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.291612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.291637] Call Trace: [ 27.291659] <TASK> [ 27.291679] dump_stack_lvl+0x73/0xb0 [ 27.291712] print_report+0xd1/0x610 [ 27.291756] ? __virt_addr_valid+0x1db/0x2d0 [ 27.291782] ? kasan_atomics_helper+0x164f/0x5450 [ 27.291816] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.291843] ? kasan_atomics_helper+0x164f/0x5450 [ 27.291866] kasan_report+0x141/0x180 [ 27.291889] ? kasan_atomics_helper+0x164f/0x5450 [ 27.291924] kasan_check_range+0x10c/0x1c0 [ 27.291950] __kasan_check_write+0x18/0x20 [ 27.291975] kasan_atomics_helper+0x164f/0x5450 [ 27.292009] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.292038] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.292067] ? kasan_atomics+0x152/0x310 [ 27.292096] kasan_atomics+0x1dc/0x310 [ 27.292120] ? __pfx_kasan_atomics+0x10/0x10 [ 27.292147] ? __pfx_read_tsc+0x10/0x10 [ 27.292169] ? ktime_get_ts64+0x86/0x230 [ 27.292196] kunit_try_run_case+0x1a5/0x480 [ 27.292220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.292242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.292268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.292293] ? __kthread_parkme+0x82/0x180 [ 27.292322] ? preempt_count_sub+0x50/0x80 [ 27.292347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.292370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.292406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.292433] kthread+0x337/0x6f0 [ 27.292466] ? trace_preempt_on+0x20/0xc0 [ 27.292492] ? __pfx_kthread+0x10/0x10 [ 27.292515] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.292539] ? calculate_sigpending+0x7b/0xa0 [ 27.292565] ? __pfx_kthread+0x10/0x10 [ 27.292589] ret_from_fork+0x116/0x1d0 [ 27.292610] ? __pfx_kthread+0x10/0x10 [ 27.292633] ret_from_fork_asm+0x1a/0x30 [ 27.292664] </TASK> [ 27.292678] [ 27.300908] Allocated by task 315: [ 27.301113] kasan_save_stack+0x45/0x70 [ 27.301405] kasan_save_track+0x18/0x40 [ 27.301572] kasan_save_alloc_info+0x3b/0x50 [ 27.301811] __kasan_kmalloc+0xb7/0xc0 [ 27.301989] __kmalloc_cache_noprof+0x189/0x420 [ 27.302203] kasan_atomics+0x95/0x310 [ 27.302465] kunit_try_run_case+0x1a5/0x480 [ 27.302667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.302898] kthread+0x337/0x6f0 [ 27.303017] ret_from_fork+0x116/0x1d0 [ 27.303218] ret_from_fork_asm+0x1a/0x30 [ 27.303408] [ 27.303498] The buggy address belongs to the object at ffff88810613ea80 [ 27.303498] which belongs to the cache kmalloc-64 of size 64 [ 27.304297] The buggy address is located 0 bytes to the right of [ 27.304297] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.304761] [ 27.305008] The buggy address belongs to the physical page: [ 27.305257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.305750] flags: 0x200000000000000(node=0|zone=2) [ 27.306002] page_type: f5(slab) [ 27.306122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.306348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.306566] page dumped because: kasan: bad access detected [ 27.306819] [ 27.306907] Memory state around the buggy address: [ 27.307124] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.307461] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.307727] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.307938] ^ [ 27.308085] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.308294] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.308860] ================================================================== [ 26.705406] ================================================================== [ 26.705681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 26.705965] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.706381] [ 26.706634] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.706717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.706764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.706790] Call Trace: [ 26.706812] <TASK> [ 26.706842] dump_stack_lvl+0x73/0xb0 [ 26.706875] print_report+0xd1/0x610 [ 26.706899] ? __virt_addr_valid+0x1db/0x2d0 [ 26.706924] ? kasan_atomics_helper+0xac7/0x5450 [ 26.706947] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.706975] ? kasan_atomics_helper+0xac7/0x5450 [ 26.706997] kasan_report+0x141/0x180 [ 26.707020] ? kasan_atomics_helper+0xac7/0x5450 [ 26.707047] kasan_check_range+0x10c/0x1c0 [ 26.707071] __kasan_check_write+0x18/0x20 [ 26.707095] kasan_atomics_helper+0xac7/0x5450 [ 26.707119] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.707146] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.707172] ? kasan_atomics+0x152/0x310 [ 26.707199] kasan_atomics+0x1dc/0x310 [ 26.707222] ? __pfx_kasan_atomics+0x10/0x10 [ 26.707247] ? __pfx_read_tsc+0x10/0x10 [ 26.707270] ? ktime_get_ts64+0x86/0x230 [ 26.707296] kunit_try_run_case+0x1a5/0x480 [ 26.707322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.707344] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.707369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.707394] ? __kthread_parkme+0x82/0x180 [ 26.707416] ? preempt_count_sub+0x50/0x80 [ 26.707441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.707466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.707513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.707554] kthread+0x337/0x6f0 [ 26.707609] ? trace_preempt_on+0x20/0xc0 [ 26.707637] ? __pfx_kthread+0x10/0x10 [ 26.707661] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.707748] ? calculate_sigpending+0x7b/0xa0 [ 26.707778] ? __pfx_kthread+0x10/0x10 [ 26.707802] ret_from_fork+0x116/0x1d0 [ 26.707823] ? __pfx_kthread+0x10/0x10 [ 26.707847] ret_from_fork_asm+0x1a/0x30 [ 26.707880] </TASK> [ 26.707893] [ 26.724112] Allocated by task 315: [ 26.724281] kasan_save_stack+0x45/0x70 [ 26.724803] kasan_save_track+0x18/0x40 [ 26.725066] kasan_save_alloc_info+0x3b/0x50 [ 26.725332] __kasan_kmalloc+0xb7/0xc0 [ 26.725529] __kmalloc_cache_noprof+0x189/0x420 [ 26.725705] kasan_atomics+0x95/0x310 [ 26.726031] kunit_try_run_case+0x1a5/0x480 [ 26.726407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.726638] kthread+0x337/0x6f0 [ 26.726855] ret_from_fork+0x116/0x1d0 [ 26.727126] ret_from_fork_asm+0x1a/0x30 [ 26.727337] [ 26.727451] The buggy address belongs to the object at ffff88810613ea80 [ 26.727451] which belongs to the cache kmalloc-64 of size 64 [ 26.728293] The buggy address is located 0 bytes to the right of [ 26.728293] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.728896] [ 26.729003] The buggy address belongs to the physical page: [ 26.729419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.730124] flags: 0x200000000000000(node=0|zone=2) [ 26.730550] page_type: f5(slab) [ 26.730754] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.731071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.731477] page dumped because: kasan: bad access detected [ 26.731889] [ 26.731967] Memory state around the buggy address: [ 26.732242] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.732574] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.732912] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.733213] ^ [ 26.733526] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.733770] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.734063] ================================================================== [ 26.602229] ================================================================== [ 26.603238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 26.603494] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.603716] [ 26.604082] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.604141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.604156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.604181] Call Trace: [ 26.604205] <TASK> [ 26.604224] dump_stack_lvl+0x73/0xb0 [ 26.604346] print_report+0xd1/0x610 [ 26.604377] ? __virt_addr_valid+0x1db/0x2d0 [ 26.604427] ? kasan_atomics_helper+0x860/0x5450 [ 26.604449] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.604476] ? kasan_atomics_helper+0x860/0x5450 [ 26.604499] kasan_report+0x141/0x180 [ 26.604551] ? kasan_atomics_helper+0x860/0x5450 [ 26.604579] kasan_check_range+0x10c/0x1c0 [ 26.604605] __kasan_check_write+0x18/0x20 [ 26.604640] kasan_atomics_helper+0x860/0x5450 [ 26.604663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.604715] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.604757] ? kasan_atomics+0x152/0x310 [ 26.604784] kasan_atomics+0x1dc/0x310 [ 26.604807] ? __pfx_kasan_atomics+0x10/0x10 [ 26.604833] ? __pfx_read_tsc+0x10/0x10 [ 26.604857] ? ktime_get_ts64+0x86/0x230 [ 26.604883] kunit_try_run_case+0x1a5/0x480 [ 26.604907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.604929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.604955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.604979] ? __kthread_parkme+0x82/0x180 [ 26.605001] ? preempt_count_sub+0x50/0x80 [ 26.605027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.605050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.605076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.605103] kthread+0x337/0x6f0 [ 26.605126] ? trace_preempt_on+0x20/0xc0 [ 26.605150] ? __pfx_kthread+0x10/0x10 [ 26.605173] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.605196] ? calculate_sigpending+0x7b/0xa0 [ 26.605222] ? __pfx_kthread+0x10/0x10 [ 26.605246] ret_from_fork+0x116/0x1d0 [ 26.605323] ? __pfx_kthread+0x10/0x10 [ 26.605347] ret_from_fork_asm+0x1a/0x30 [ 26.605379] </TASK> [ 26.605392] [ 26.619876] Allocated by task 315: [ 26.620223] kasan_save_stack+0x45/0x70 [ 26.620703] kasan_save_track+0x18/0x40 [ 26.621097] kasan_save_alloc_info+0x3b/0x50 [ 26.621404] __kasan_kmalloc+0xb7/0xc0 [ 26.621839] __kmalloc_cache_noprof+0x189/0x420 [ 26.621994] kasan_atomics+0x95/0x310 [ 26.622121] kunit_try_run_case+0x1a5/0x480 [ 26.622260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.622950] kthread+0x337/0x6f0 [ 26.623336] ret_from_fork+0x116/0x1d0 [ 26.623841] ret_from_fork_asm+0x1a/0x30 [ 26.624322] [ 26.624484] The buggy address belongs to the object at ffff88810613ea80 [ 26.624484] which belongs to the cache kmalloc-64 of size 64 [ 26.625203] The buggy address is located 0 bytes to the right of [ 26.625203] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.626214] [ 26.626420] The buggy address belongs to the physical page: [ 26.627012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.627773] flags: 0x200000000000000(node=0|zone=2) [ 26.627951] page_type: f5(slab) [ 26.628072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.628324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.628846] page dumped because: kasan: bad access detected [ 26.629450] [ 26.629658] Memory state around the buggy address: [ 26.630119] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.630849] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.631601] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.631914] ^ [ 26.632071] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.632436] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.633275] ================================================================== [ 27.599787] ================================================================== [ 27.600100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 27.600493] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.600977] [ 27.601074] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.601129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.601143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.601168] Call Trace: [ 27.601191] <TASK> [ 27.601211] dump_stack_lvl+0x73/0xb0 [ 27.601245] print_report+0xd1/0x610 [ 27.601272] ? __virt_addr_valid+0x1db/0x2d0 [ 27.601298] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.601346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.601373] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.601408] kasan_report+0x141/0x180 [ 27.601450] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.601478] kasan_check_range+0x10c/0x1c0 [ 27.601502] __kasan_check_write+0x18/0x20 [ 27.601526] kasan_atomics_helper+0x1ce1/0x5450 [ 27.601550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.601576] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.601603] ? kasan_atomics+0x152/0x310 [ 27.601629] kasan_atomics+0x1dc/0x310 [ 27.601652] ? __pfx_kasan_atomics+0x10/0x10 [ 27.601677] ? __pfx_read_tsc+0x10/0x10 [ 27.601701] ? ktime_get_ts64+0x86/0x230 [ 27.601757] kunit_try_run_case+0x1a5/0x480 [ 27.601780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.601802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.601827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.601852] ? __kthread_parkme+0x82/0x180 [ 27.601875] ? preempt_count_sub+0x50/0x80 [ 27.601900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.601923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.601948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.601975] kthread+0x337/0x6f0 [ 27.601998] ? trace_preempt_on+0x20/0xc0 [ 27.602022] ? __pfx_kthread+0x10/0x10 [ 27.602045] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.602068] ? calculate_sigpending+0x7b/0xa0 [ 27.602094] ? __pfx_kthread+0x10/0x10 [ 27.602117] ret_from_fork+0x116/0x1d0 [ 27.602137] ? __pfx_kthread+0x10/0x10 [ 27.602160] ret_from_fork_asm+0x1a/0x30 [ 27.602193] </TASK> [ 27.602205] [ 27.611833] Allocated by task 315: [ 27.612018] kasan_save_stack+0x45/0x70 [ 27.612203] kasan_save_track+0x18/0x40 [ 27.612376] kasan_save_alloc_info+0x3b/0x50 [ 27.612816] __kasan_kmalloc+0xb7/0xc0 [ 27.613091] __kmalloc_cache_noprof+0x189/0x420 [ 27.613398] kasan_atomics+0x95/0x310 [ 27.613758] kunit_try_run_case+0x1a5/0x480 [ 27.614060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.614313] kthread+0x337/0x6f0 [ 27.614740] ret_from_fork+0x116/0x1d0 [ 27.614951] ret_from_fork_asm+0x1a/0x30 [ 27.615245] [ 27.615344] The buggy address belongs to the object at ffff88810613ea80 [ 27.615344] which belongs to the cache kmalloc-64 of size 64 [ 27.615962] The buggy address is located 0 bytes to the right of [ 27.615962] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.616813] [ 27.616927] The buggy address belongs to the physical page: [ 27.617296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.617784] flags: 0x200000000000000(node=0|zone=2) [ 27.618113] page_type: f5(slab) [ 27.618515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.618863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.619167] page dumped because: kasan: bad access detected [ 27.619388] [ 27.619664] Memory state around the buggy address: [ 27.619986] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.620629] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.621111] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.621693] ^ [ 27.621906] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.622127] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.622343] ================================================================== [ 27.772661] ================================================================== [ 27.772948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 27.773348] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.773646] [ 27.773782] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.773836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.773860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.773895] Call Trace: [ 27.773917] <TASK> [ 27.774234] dump_stack_lvl+0x73/0xb0 [ 27.774267] print_report+0xd1/0x610 [ 27.774291] ? __virt_addr_valid+0x1db/0x2d0 [ 27.774316] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.774339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.774366] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.774388] kasan_report+0x141/0x180 [ 27.774411] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.774438] __asan_report_load8_noabort+0x18/0x20 [ 27.774463] kasan_atomics_helper+0x4f98/0x5450 [ 27.774486] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.774513] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.774540] ? kasan_atomics+0x152/0x310 [ 27.774568] kasan_atomics+0x1dc/0x310 [ 27.774592] ? __pfx_kasan_atomics+0x10/0x10 [ 27.774627] ? __pfx_read_tsc+0x10/0x10 [ 27.774651] ? ktime_get_ts64+0x86/0x230 [ 27.774677] kunit_try_run_case+0x1a5/0x480 [ 27.774701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.774723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.774775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.774801] ? __kthread_parkme+0x82/0x180 [ 27.774824] ? preempt_count_sub+0x50/0x80 [ 27.774849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.774873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.774899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.774926] kthread+0x337/0x6f0 [ 27.774948] ? trace_preempt_on+0x20/0xc0 [ 27.774972] ? __pfx_kthread+0x10/0x10 [ 27.774995] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.775018] ? calculate_sigpending+0x7b/0xa0 [ 27.775044] ? __pfx_kthread+0x10/0x10 [ 27.775068] ret_from_fork+0x116/0x1d0 [ 27.775088] ? __pfx_kthread+0x10/0x10 [ 27.775110] ret_from_fork_asm+0x1a/0x30 [ 27.775143] </TASK> [ 27.775155] [ 27.782677] Allocated by task 315: [ 27.782811] kasan_save_stack+0x45/0x70 [ 27.783025] kasan_save_track+0x18/0x40 [ 27.783226] kasan_save_alloc_info+0x3b/0x50 [ 27.783404] __kasan_kmalloc+0xb7/0xc0 [ 27.783590] __kmalloc_cache_noprof+0x189/0x420 [ 27.783807] kasan_atomics+0x95/0x310 [ 27.783999] kunit_try_run_case+0x1a5/0x480 [ 27.784200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.784467] kthread+0x337/0x6f0 [ 27.784634] ret_from_fork+0x116/0x1d0 [ 27.784794] ret_from_fork_asm+0x1a/0x30 [ 27.784964] [ 27.785068] The buggy address belongs to the object at ffff88810613ea80 [ 27.785068] which belongs to the cache kmalloc-64 of size 64 [ 27.785675] The buggy address is located 0 bytes to the right of [ 27.785675] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.786092] [ 27.786160] The buggy address belongs to the physical page: [ 27.786327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.786560] flags: 0x200000000000000(node=0|zone=2) [ 27.786944] page_type: f5(slab) [ 27.787273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.787632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.788134] page dumped because: kasan: bad access detected [ 27.788305] [ 27.788373] Memory state around the buggy address: [ 27.788986] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.789253] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.790128] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.790582] ^ [ 27.790818] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.791086] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.791315] ================================================================== [ 27.809507] ================================================================== [ 27.809877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 27.810214] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.810911] [ 27.811021] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.811091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.811105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.811147] Call Trace: [ 27.811166] <TASK> [ 27.811184] dump_stack_lvl+0x73/0xb0 [ 27.811216] print_report+0xd1/0x610 [ 27.811239] ? __virt_addr_valid+0x1db/0x2d0 [ 27.811264] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.811287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.811314] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.811337] kasan_report+0x141/0x180 [ 27.811359] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.811387] __asan_report_load8_noabort+0x18/0x20 [ 27.811413] kasan_atomics_helper+0x4fb2/0x5450 [ 27.811435] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.811462] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.811508] ? kasan_atomics+0x152/0x310 [ 27.811535] kasan_atomics+0x1dc/0x310 [ 27.811570] ? __pfx_kasan_atomics+0x10/0x10 [ 27.811595] ? __pfx_read_tsc+0x10/0x10 [ 27.811618] ? ktime_get_ts64+0x86/0x230 [ 27.811644] kunit_try_run_case+0x1a5/0x480 [ 27.811667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.811689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.811715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.811751] ? __kthread_parkme+0x82/0x180 [ 27.811774] ? preempt_count_sub+0x50/0x80 [ 27.811799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.811822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.811848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.811875] kthread+0x337/0x6f0 [ 27.811897] ? trace_preempt_on+0x20/0xc0 [ 27.811922] ? __pfx_kthread+0x10/0x10 [ 27.811945] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.811968] ? calculate_sigpending+0x7b/0xa0 [ 27.812003] ? __pfx_kthread+0x10/0x10 [ 27.812027] ret_from_fork+0x116/0x1d0 [ 27.812048] ? __pfx_kthread+0x10/0x10 [ 27.812081] ret_from_fork_asm+0x1a/0x30 [ 27.812112] </TASK> [ 27.812125] [ 27.819777] Allocated by task 315: [ 27.819985] kasan_save_stack+0x45/0x70 [ 27.820171] kasan_save_track+0x18/0x40 [ 27.820369] kasan_save_alloc_info+0x3b/0x50 [ 27.820650] __kasan_kmalloc+0xb7/0xc0 [ 27.820822] __kmalloc_cache_noprof+0x189/0x420 [ 27.820972] kasan_atomics+0x95/0x310 [ 27.821100] kunit_try_run_case+0x1a5/0x480 [ 27.821239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.821410] kthread+0x337/0x6f0 [ 27.821526] ret_from_fork+0x116/0x1d0 [ 27.821654] ret_from_fork_asm+0x1a/0x30 [ 27.821798] [ 27.821863] The buggy address belongs to the object at ffff88810613ea80 [ 27.821863] which belongs to the cache kmalloc-64 of size 64 [ 27.822742] The buggy address is located 0 bytes to the right of [ 27.822742] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.823288] [ 27.823380] The buggy address belongs to the physical page: [ 27.823626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.823927] flags: 0x200000000000000(node=0|zone=2) [ 27.824086] page_type: f5(slab) [ 27.824202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.824432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.824651] page dumped because: kasan: bad access detected [ 27.824910] [ 27.825001] Memory state around the buggy address: [ 27.825226] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.825590] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.826081] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.826539] ^ [ 27.826885] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.827362] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.827708] ================================================================== [ 26.867040] ================================================================== [ 26.867605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 26.868004] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.868404] [ 26.868542] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.868609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.868624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.868648] Call Trace: [ 26.868673] <TASK> [ 26.868695] dump_stack_lvl+0x73/0xb0 [ 26.868756] print_report+0xd1/0x610 [ 26.868781] ? __virt_addr_valid+0x1db/0x2d0 [ 26.868807] ? kasan_atomics_helper+0xf10/0x5450 [ 26.868829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.868857] ? kasan_atomics_helper+0xf10/0x5450 [ 26.868880] kasan_report+0x141/0x180 [ 26.868903] ? kasan_atomics_helper+0xf10/0x5450 [ 26.868930] kasan_check_range+0x10c/0x1c0 [ 26.868954] __kasan_check_write+0x18/0x20 [ 26.868979] kasan_atomics_helper+0xf10/0x5450 [ 26.869002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.869029] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.869056] ? kasan_atomics+0x152/0x310 [ 26.869083] kasan_atomics+0x1dc/0x310 [ 26.869117] ? __pfx_kasan_atomics+0x10/0x10 [ 26.869142] ? __pfx_read_tsc+0x10/0x10 [ 26.869175] ? ktime_get_ts64+0x86/0x230 [ 26.869203] kunit_try_run_case+0x1a5/0x480 [ 26.869227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.869249] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.869275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.869301] ? __kthread_parkme+0x82/0x180 [ 26.869324] ? preempt_count_sub+0x50/0x80 [ 26.869349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.869373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.869417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.869444] kthread+0x337/0x6f0 [ 26.869467] ? trace_preempt_on+0x20/0xc0 [ 26.869492] ? __pfx_kthread+0x10/0x10 [ 26.869516] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.869540] ? calculate_sigpending+0x7b/0xa0 [ 26.869567] ? __pfx_kthread+0x10/0x10 [ 26.869649] ret_from_fork+0x116/0x1d0 [ 26.869685] ? __pfx_kthread+0x10/0x10 [ 26.869710] ret_from_fork_asm+0x1a/0x30 [ 26.869752] </TASK> [ 26.869766] [ 26.878106] Allocated by task 315: [ 26.878339] kasan_save_stack+0x45/0x70 [ 26.878777] kasan_save_track+0x18/0x40 [ 26.878953] kasan_save_alloc_info+0x3b/0x50 [ 26.879099] __kasan_kmalloc+0xb7/0xc0 [ 26.879226] __kmalloc_cache_noprof+0x189/0x420 [ 26.879417] kasan_atomics+0x95/0x310 [ 26.879596] kunit_try_run_case+0x1a5/0x480 [ 26.879855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.880262] kthread+0x337/0x6f0 [ 26.880505] ret_from_fork+0x116/0x1d0 [ 26.880641] ret_from_fork_asm+0x1a/0x30 [ 26.880789] [ 26.880858] The buggy address belongs to the object at ffff88810613ea80 [ 26.880858] which belongs to the cache kmalloc-64 of size 64 [ 26.881309] The buggy address is located 0 bytes to the right of [ 26.881309] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.881950] [ 26.882047] The buggy address belongs to the physical page: [ 26.882455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.882921] flags: 0x200000000000000(node=0|zone=2) [ 26.883158] page_type: f5(slab) [ 26.883426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.883750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.884056] page dumped because: kasan: bad access detected [ 26.884373] [ 26.884500] Memory state around the buggy address: [ 26.884701] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.885007] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.885217] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.885821] ^ [ 26.886128] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.886543] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.886841] ================================================================== [ 27.882094] ================================================================== [ 27.882496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 27.882862] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.883153] [ 27.883273] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.883337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.883351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.883375] Call Trace: [ 27.883393] <TASK> [ 27.883433] dump_stack_lvl+0x73/0xb0 [ 27.883474] print_report+0xd1/0x610 [ 27.883497] ? __virt_addr_valid+0x1db/0x2d0 [ 27.883523] ? kasan_atomics_helper+0x5115/0x5450 [ 27.883557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.883584] ? kasan_atomics_helper+0x5115/0x5450 [ 27.883607] kasan_report+0x141/0x180 [ 27.883639] ? kasan_atomics_helper+0x5115/0x5450 [ 27.883666] __asan_report_load8_noabort+0x18/0x20 [ 27.883691] kasan_atomics_helper+0x5115/0x5450 [ 27.883726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.883761] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.883787] ? kasan_atomics+0x152/0x310 [ 27.883813] kasan_atomics+0x1dc/0x310 [ 27.883837] ? __pfx_kasan_atomics+0x10/0x10 [ 27.883863] ? __pfx_read_tsc+0x10/0x10 [ 27.883886] ? ktime_get_ts64+0x86/0x230 [ 27.883913] kunit_try_run_case+0x1a5/0x480 [ 27.883937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.883959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.883985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.884010] ? __kthread_parkme+0x82/0x180 [ 27.884033] ? preempt_count_sub+0x50/0x80 [ 27.884059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.884092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.884118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.884145] kthread+0x337/0x6f0 [ 27.884178] ? trace_preempt_on+0x20/0xc0 [ 27.884204] ? __pfx_kthread+0x10/0x10 [ 27.884227] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.884250] ? calculate_sigpending+0x7b/0xa0 [ 27.884277] ? __pfx_kthread+0x10/0x10 [ 27.884301] ret_from_fork+0x116/0x1d0 [ 27.884328] ? __pfx_kthread+0x10/0x10 [ 27.884351] ret_from_fork_asm+0x1a/0x30 [ 27.884383] </TASK> [ 27.884395] [ 27.891697] Allocated by task 315: [ 27.891836] kasan_save_stack+0x45/0x70 [ 27.891975] kasan_save_track+0x18/0x40 [ 27.892157] kasan_save_alloc_info+0x3b/0x50 [ 27.892376] __kasan_kmalloc+0xb7/0xc0 [ 27.892791] __kmalloc_cache_noprof+0x189/0x420 [ 27.893026] kasan_atomics+0x95/0x310 [ 27.893155] kunit_try_run_case+0x1a5/0x480 [ 27.893296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.893625] kthread+0x337/0x6f0 [ 27.893821] ret_from_fork+0x116/0x1d0 [ 27.893994] ret_from_fork_asm+0x1a/0x30 [ 27.894128] [ 27.894194] The buggy address belongs to the object at ffff88810613ea80 [ 27.894194] which belongs to the cache kmalloc-64 of size 64 [ 27.894898] The buggy address is located 0 bytes to the right of [ 27.894898] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.895515] [ 27.895590] The buggy address belongs to the physical page: [ 27.895832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.896158] flags: 0x200000000000000(node=0|zone=2) [ 27.896397] page_type: f5(slab) [ 27.896574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.896910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.897226] page dumped because: kasan: bad access detected [ 27.897490] [ 27.897582] Memory state around the buggy address: [ 27.897814] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.898113] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.898423] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.898715] ^ [ 27.898905] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.899116] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.899322] ================================================================== [ 26.554627] ================================================================== [ 26.554945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 26.555286] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.555588] [ 26.555704] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.555813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.555829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.555856] Call Trace: [ 26.555877] <TASK> [ 26.555898] dump_stack_lvl+0x73/0xb0 [ 26.555931] print_report+0xd1/0x610 [ 26.555956] ? __virt_addr_valid+0x1db/0x2d0 [ 26.555993] ? kasan_atomics_helper+0x72f/0x5450 [ 26.556015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.556042] ? kasan_atomics_helper+0x72f/0x5450 [ 26.556065] kasan_report+0x141/0x180 [ 26.556088] ? kasan_atomics_helper+0x72f/0x5450 [ 26.556114] kasan_check_range+0x10c/0x1c0 [ 26.556139] __kasan_check_write+0x18/0x20 [ 26.556163] kasan_atomics_helper+0x72f/0x5450 [ 26.556185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.556212] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.556238] ? kasan_atomics+0x152/0x310 [ 26.556265] kasan_atomics+0x1dc/0x310 [ 26.556289] ? __pfx_kasan_atomics+0x10/0x10 [ 26.556319] ? __pfx_read_tsc+0x10/0x10 [ 26.556342] ? ktime_get_ts64+0x86/0x230 [ 26.556369] kunit_try_run_case+0x1a5/0x480 [ 26.556392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.556414] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.556439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.556464] ? __kthread_parkme+0x82/0x180 [ 26.556486] ? preempt_count_sub+0x50/0x80 [ 26.556544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.556592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.556642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.556692] kthread+0x337/0x6f0 [ 26.556714] ? trace_preempt_on+0x20/0xc0 [ 26.556776] ? __pfx_kthread+0x10/0x10 [ 26.556832] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.556856] ? calculate_sigpending+0x7b/0xa0 [ 26.556882] ? __pfx_kthread+0x10/0x10 [ 26.556915] ret_from_fork+0x116/0x1d0 [ 26.556935] ? __pfx_kthread+0x10/0x10 [ 26.556958] ret_from_fork_asm+0x1a/0x30 [ 26.556990] </TASK> [ 26.557003] [ 26.566474] Allocated by task 315: [ 26.566677] kasan_save_stack+0x45/0x70 [ 26.566937] kasan_save_track+0x18/0x40 [ 26.567106] kasan_save_alloc_info+0x3b/0x50 [ 26.567256] __kasan_kmalloc+0xb7/0xc0 [ 26.567474] __kmalloc_cache_noprof+0x189/0x420 [ 26.567729] kasan_atomics+0x95/0x310 [ 26.568002] kunit_try_run_case+0x1a5/0x480 [ 26.568271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.568563] kthread+0x337/0x6f0 [ 26.568783] ret_from_fork+0x116/0x1d0 [ 26.569013] ret_from_fork_asm+0x1a/0x30 [ 26.569243] [ 26.569355] The buggy address belongs to the object at ffff88810613ea80 [ 26.569355] which belongs to the cache kmalloc-64 of size 64 [ 26.569998] The buggy address is located 0 bytes to the right of [ 26.569998] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.570555] [ 26.570625] The buggy address belongs to the physical page: [ 26.570804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.571255] flags: 0x200000000000000(node=0|zone=2) [ 26.571746] page_type: f5(slab) [ 26.571924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.572165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.572390] page dumped because: kasan: bad access detected [ 26.573005] [ 26.573097] Memory state around the buggy address: [ 26.573319] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.573712] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.573927] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.574129] ^ [ 26.574279] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.574484] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.575101] ================================================================== [ 26.908261] ================================================================== [ 26.908946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 26.909261] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.910063] [ 26.910179] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.910234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.910248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.910536] Call Trace: [ 26.910580] <TASK> [ 26.910599] dump_stack_lvl+0x73/0xb0 [ 26.910639] print_report+0xd1/0x610 [ 26.910664] ? __virt_addr_valid+0x1db/0x2d0 [ 26.910691] ? kasan_atomics_helper+0x4a36/0x5450 [ 26.910714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.910751] ? kasan_atomics_helper+0x4a36/0x5450 [ 26.910775] kasan_report+0x141/0x180 [ 26.910800] ? kasan_atomics_helper+0x4a36/0x5450 [ 26.910829] __asan_report_load4_noabort+0x18/0x20 [ 26.910856] kasan_atomics_helper+0x4a36/0x5450 [ 26.910880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.910907] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.910933] ? kasan_atomics+0x152/0x310 [ 26.910960] kasan_atomics+0x1dc/0x310 [ 26.910984] ? __pfx_kasan_atomics+0x10/0x10 [ 26.911010] ? __pfx_read_tsc+0x10/0x10 [ 26.911035] ? ktime_get_ts64+0x86/0x230 [ 26.911062] kunit_try_run_case+0x1a5/0x480 [ 26.911087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.911109] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.911135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.911160] ? __kthread_parkme+0x82/0x180 [ 26.911183] ? preempt_count_sub+0x50/0x80 [ 26.911208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.911232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.911258] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.911526] kthread+0x337/0x6f0 [ 26.911568] ? trace_preempt_on+0x20/0xc0 [ 26.911594] ? __pfx_kthread+0x10/0x10 [ 26.911617] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.911644] ? calculate_sigpending+0x7b/0xa0 [ 26.911670] ? __pfx_kthread+0x10/0x10 [ 26.911694] ret_from_fork+0x116/0x1d0 [ 26.911715] ? __pfx_kthread+0x10/0x10 [ 26.911749] ret_from_fork_asm+0x1a/0x30 [ 26.911782] </TASK> [ 26.911795] [ 26.922490] Allocated by task 315: [ 26.922664] kasan_save_stack+0x45/0x70 [ 26.922865] kasan_save_track+0x18/0x40 [ 26.923038] kasan_save_alloc_info+0x3b/0x50 [ 26.923218] __kasan_kmalloc+0xb7/0xc0 [ 26.923691] __kmalloc_cache_noprof+0x189/0x420 [ 26.923922] kasan_atomics+0x95/0x310 [ 26.924091] kunit_try_run_case+0x1a5/0x480 [ 26.924340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.924781] kthread+0x337/0x6f0 [ 26.924936] ret_from_fork+0x116/0x1d0 [ 26.925104] ret_from_fork_asm+0x1a/0x30 [ 26.925325] [ 26.925424] The buggy address belongs to the object at ffff88810613ea80 [ 26.925424] which belongs to the cache kmalloc-64 of size 64 [ 26.925905] The buggy address is located 0 bytes to the right of [ 26.925905] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.926491] [ 26.926583] The buggy address belongs to the physical page: [ 26.926818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.927141] flags: 0x200000000000000(node=0|zone=2) [ 26.928541] page_type: f5(slab) [ 26.928687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.928935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.929237] page dumped because: kasan: bad access detected [ 26.930217] [ 26.930518] Memory state around the buggy address: [ 26.930759] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.931046] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.931600] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.932024] ^ [ 26.932228] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.932772] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.933073] ================================================================== [ 26.426761] ================================================================== [ 26.427086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 26.427415] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.428245] [ 26.428419] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.428474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.428575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.428600] Call Trace: [ 26.428682] <TASK> [ 26.428706] dump_stack_lvl+0x73/0xb0 [ 26.428755] print_report+0xd1/0x610 [ 26.428781] ? __virt_addr_valid+0x1db/0x2d0 [ 26.428806] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.428829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.428857] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.428878] kasan_report+0x141/0x180 [ 26.428902] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.428928] kasan_check_range+0x10c/0x1c0 [ 26.428952] __kasan_check_write+0x18/0x20 [ 26.428976] kasan_atomics_helper+0x4a0/0x5450 [ 26.428999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.429025] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.429052] ? kasan_atomics+0x152/0x310 [ 26.429079] kasan_atomics+0x1dc/0x310 [ 26.429102] ? __pfx_kasan_atomics+0x10/0x10 [ 26.429127] ? __pfx_read_tsc+0x10/0x10 [ 26.429151] ? ktime_get_ts64+0x86/0x230 [ 26.429177] kunit_try_run_case+0x1a5/0x480 [ 26.429202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.429224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.429249] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.429329] ? __kthread_parkme+0x82/0x180 [ 26.429354] ? preempt_count_sub+0x50/0x80 [ 26.429380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.429402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.429429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.429455] kthread+0x337/0x6f0 [ 26.429478] ? trace_preempt_on+0x20/0xc0 [ 26.429503] ? __pfx_kthread+0x10/0x10 [ 26.429526] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.429550] ? calculate_sigpending+0x7b/0xa0 [ 26.429576] ? __pfx_kthread+0x10/0x10 [ 26.429600] ret_from_fork+0x116/0x1d0 [ 26.429621] ? __pfx_kthread+0x10/0x10 [ 26.429644] ret_from_fork_asm+0x1a/0x30 [ 26.429676] </TASK> [ 26.429689] [ 26.440522] Allocated by task 315: [ 26.440711] kasan_save_stack+0x45/0x70 [ 26.440910] kasan_save_track+0x18/0x40 [ 26.441073] kasan_save_alloc_info+0x3b/0x50 [ 26.441696] __kasan_kmalloc+0xb7/0xc0 [ 26.441898] __kmalloc_cache_noprof+0x189/0x420 [ 26.442068] kasan_atomics+0x95/0x310 [ 26.442258] kunit_try_run_case+0x1a5/0x480 [ 26.442427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.442856] kthread+0x337/0x6f0 [ 26.443026] ret_from_fork+0x116/0x1d0 [ 26.443190] ret_from_fork_asm+0x1a/0x30 [ 26.443379] [ 26.443904] The buggy address belongs to the object at ffff88810613ea80 [ 26.443904] which belongs to the cache kmalloc-64 of size 64 [ 26.444361] The buggy address is located 0 bytes to the right of [ 26.444361] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.444953] [ 26.445044] The buggy address belongs to the physical page: [ 26.445636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.445976] flags: 0x200000000000000(node=0|zone=2) [ 26.446271] page_type: f5(slab) [ 26.446578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.446888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.447212] page dumped because: kasan: bad access detected [ 26.447872] [ 26.447961] Memory state around the buggy address: [ 26.448186] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.448673] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.449006] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.449563] ^ [ 26.449729] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.450986] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.451739] ================================================================== [ 27.114446] ================================================================== [ 27.114749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 27.115008] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.115802] [ 27.115930] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.115986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.116069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.116096] Call Trace: [ 27.116120] <TASK> [ 27.116140] dump_stack_lvl+0x73/0xb0 [ 27.116298] print_report+0xd1/0x610 [ 27.116329] ? __virt_addr_valid+0x1db/0x2d0 [ 27.116356] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.116381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.116416] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.116439] kasan_report+0x141/0x180 [ 27.116462] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.116490] __asan_report_load4_noabort+0x18/0x20 [ 27.116515] kasan_atomics_helper+0x49ce/0x5450 [ 27.116539] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.116565] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.116592] ? kasan_atomics+0x152/0x310 [ 27.116618] kasan_atomics+0x1dc/0x310 [ 27.116642] ? __pfx_kasan_atomics+0x10/0x10 [ 27.116667] ? __pfx_read_tsc+0x10/0x10 [ 27.116691] ? ktime_get_ts64+0x86/0x230 [ 27.116718] kunit_try_run_case+0x1a5/0x480 [ 27.116754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.116776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.116802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.116827] ? __kthread_parkme+0x82/0x180 [ 27.116849] ? preempt_count_sub+0x50/0x80 [ 27.116874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.116898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.116924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.116950] kthread+0x337/0x6f0 [ 27.116974] ? trace_preempt_on+0x20/0xc0 [ 27.116999] ? __pfx_kthread+0x10/0x10 [ 27.117022] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.117045] ? calculate_sigpending+0x7b/0xa0 [ 27.117072] ? __pfx_kthread+0x10/0x10 [ 27.117096] ret_from_fork+0x116/0x1d0 [ 27.117117] ? __pfx_kthread+0x10/0x10 [ 27.117140] ret_from_fork_asm+0x1a/0x30 [ 27.117173] </TASK> [ 27.117187] [ 27.127742] Allocated by task 315: [ 27.127930] kasan_save_stack+0x45/0x70 [ 27.128087] kasan_save_track+0x18/0x40 [ 27.128277] kasan_save_alloc_info+0x3b/0x50 [ 27.128704] __kasan_kmalloc+0xb7/0xc0 [ 27.128904] __kmalloc_cache_noprof+0x189/0x420 [ 27.129168] kasan_atomics+0x95/0x310 [ 27.129389] kunit_try_run_case+0x1a5/0x480 [ 27.129821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.130145] kthread+0x337/0x6f0 [ 27.130283] ret_from_fork+0x116/0x1d0 [ 27.130653] ret_from_fork_asm+0x1a/0x30 [ 27.131118] [ 27.131197] The buggy address belongs to the object at ffff88810613ea80 [ 27.131197] which belongs to the cache kmalloc-64 of size 64 [ 27.131949] The buggy address is located 0 bytes to the right of [ 27.131949] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.132713] [ 27.132921] The buggy address belongs to the physical page: [ 27.133252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.133681] flags: 0x200000000000000(node=0|zone=2) [ 27.133920] page_type: f5(slab) [ 27.134080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.134688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.134993] page dumped because: kasan: bad access detected [ 27.135659] [ 27.135775] Memory state around the buggy address: [ 27.135966] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.136586] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.136990] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.137401] ^ [ 27.137749] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.138117] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.138627] ================================================================== [ 27.164077] ================================================================== [ 27.164335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 27.164942] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.165250] [ 27.165423] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.165546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.165617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.165642] Call Trace: [ 27.165665] <TASK> [ 27.165685] dump_stack_lvl+0x73/0xb0 [ 27.165719] print_report+0xd1/0x610 [ 27.165755] ? __virt_addr_valid+0x1db/0x2d0 [ 27.165780] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.165803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.165830] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.165956] kasan_report+0x141/0x180 [ 27.165980] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.166007] __asan_report_load8_noabort+0x18/0x20 [ 27.166032] kasan_atomics_helper+0x4eae/0x5450 [ 27.166054] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.166081] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.166107] ? kasan_atomics+0x152/0x310 [ 27.166135] kasan_atomics+0x1dc/0x310 [ 27.166158] ? __pfx_kasan_atomics+0x10/0x10 [ 27.166183] ? __pfx_read_tsc+0x10/0x10 [ 27.166206] ? ktime_get_ts64+0x86/0x230 [ 27.166232] kunit_try_run_case+0x1a5/0x480 [ 27.166257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.166292] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.166319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.166343] ? __kthread_parkme+0x82/0x180 [ 27.166366] ? preempt_count_sub+0x50/0x80 [ 27.166392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.166421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.166448] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.166475] kthread+0x337/0x6f0 [ 27.166497] ? trace_preempt_on+0x20/0xc0 [ 27.166522] ? __pfx_kthread+0x10/0x10 [ 27.166545] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.166568] ? calculate_sigpending+0x7b/0xa0 [ 27.166595] ? __pfx_kthread+0x10/0x10 [ 27.166618] ret_from_fork+0x116/0x1d0 [ 27.166639] ? __pfx_kthread+0x10/0x10 [ 27.166662] ret_from_fork_asm+0x1a/0x30 [ 27.166693] </TASK> [ 27.166706] [ 27.176550] Allocated by task 315: [ 27.176817] kasan_save_stack+0x45/0x70 [ 27.177321] kasan_save_track+0x18/0x40 [ 27.177539] kasan_save_alloc_info+0x3b/0x50 [ 27.177741] __kasan_kmalloc+0xb7/0xc0 [ 27.177908] __kmalloc_cache_noprof+0x189/0x420 [ 27.178111] kasan_atomics+0x95/0x310 [ 27.178587] kunit_try_run_case+0x1a5/0x480 [ 27.178795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.179008] kthread+0x337/0x6f0 [ 27.179239] ret_from_fork+0x116/0x1d0 [ 27.179498] ret_from_fork_asm+0x1a/0x30 [ 27.179821] [ 27.179924] The buggy address belongs to the object at ffff88810613ea80 [ 27.179924] which belongs to the cache kmalloc-64 of size 64 [ 27.180409] The buggy address is located 0 bytes to the right of [ 27.180409] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.181196] [ 27.181369] The buggy address belongs to the physical page: [ 27.181555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.181910] flags: 0x200000000000000(node=0|zone=2) [ 27.182385] page_type: f5(slab) [ 27.182585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.183278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.183663] page dumped because: kasan: bad access detected [ 27.183903] [ 27.183974] Memory state around the buggy address: [ 27.184175] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.184508] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.185101] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.185541] ^ [ 27.185844] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.186229] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.186705] ================================================================== [ 27.863877] ================================================================== [ 27.864107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 27.864407] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.864978] [ 27.865091] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.865153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.865167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.865191] Call Trace: [ 27.865210] <TASK> [ 27.865238] dump_stack_lvl+0x73/0xb0 [ 27.865269] print_report+0xd1/0x610 [ 27.865292] ? __virt_addr_valid+0x1db/0x2d0 [ 27.865318] ? kasan_atomics_helper+0x224c/0x5450 [ 27.865340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.865368] ? kasan_atomics_helper+0x224c/0x5450 [ 27.865390] kasan_report+0x141/0x180 [ 27.865413] ? kasan_atomics_helper+0x224c/0x5450 [ 27.865440] kasan_check_range+0x10c/0x1c0 [ 27.865464] __kasan_check_write+0x18/0x20 [ 27.865488] kasan_atomics_helper+0x224c/0x5450 [ 27.865512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.865539] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.865565] ? kasan_atomics+0x152/0x310 [ 27.865592] kasan_atomics+0x1dc/0x310 [ 27.865616] ? __pfx_kasan_atomics+0x10/0x10 [ 27.865641] ? __pfx_read_tsc+0x10/0x10 [ 27.865665] ? ktime_get_ts64+0x86/0x230 [ 27.865691] kunit_try_run_case+0x1a5/0x480 [ 27.865714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.865747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.865773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.865798] ? __kthread_parkme+0x82/0x180 [ 27.865821] ? preempt_count_sub+0x50/0x80 [ 27.865847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.865870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.865896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.865924] kthread+0x337/0x6f0 [ 27.865947] ? trace_preempt_on+0x20/0xc0 [ 27.865972] ? __pfx_kthread+0x10/0x10 [ 27.865995] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.866018] ? calculate_sigpending+0x7b/0xa0 [ 27.866044] ? __pfx_kthread+0x10/0x10 [ 27.866068] ret_from_fork+0x116/0x1d0 [ 27.866089] ? __pfx_kthread+0x10/0x10 [ 27.866112] ret_from_fork_asm+0x1a/0x30 [ 27.866144] </TASK> [ 27.866156] [ 27.874187] Allocated by task 315: [ 27.874401] kasan_save_stack+0x45/0x70 [ 27.874636] kasan_save_track+0x18/0x40 [ 27.874855] kasan_save_alloc_info+0x3b/0x50 [ 27.875037] __kasan_kmalloc+0xb7/0xc0 [ 27.875213] __kmalloc_cache_noprof+0x189/0x420 [ 27.875476] kasan_atomics+0x95/0x310 [ 27.875638] kunit_try_run_case+0x1a5/0x480 [ 27.875788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.875959] kthread+0x337/0x6f0 [ 27.876076] ret_from_fork+0x116/0x1d0 [ 27.876204] ret_from_fork_asm+0x1a/0x30 [ 27.876346] [ 27.876413] The buggy address belongs to the object at ffff88810613ea80 [ 27.876413] which belongs to the cache kmalloc-64 of size 64 [ 27.876937] The buggy address is located 0 bytes to the right of [ 27.876937] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.877625] [ 27.877694] The buggy address belongs to the physical page: [ 27.877962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.878271] flags: 0x200000000000000(node=0|zone=2) [ 27.878482] page_type: f5(slab) [ 27.878646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.878953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.879174] page dumped because: kasan: bad access detected [ 27.879375] [ 27.879549] Memory state around the buggy address: [ 27.879802] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.880116] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.880421] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.880717] ^ [ 27.880948] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.881246] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.881595] ================================================================== [ 27.846171] ================================================================== [ 27.846614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 27.846938] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.847234] [ 27.847362] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.847421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.847435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.847459] Call Trace: [ 27.847477] <TASK> [ 27.847504] dump_stack_lvl+0x73/0xb0 [ 27.847535] print_report+0xd1/0x610 [ 27.847558] ? __virt_addr_valid+0x1db/0x2d0 [ 27.847596] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.847618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.847645] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.847675] kasan_report+0x141/0x180 [ 27.847699] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.847726] __asan_report_load8_noabort+0x18/0x20 [ 27.847767] kasan_atomics_helper+0x4fa5/0x5450 [ 27.847791] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.847818] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.847852] ? kasan_atomics+0x152/0x310 [ 27.847879] kasan_atomics+0x1dc/0x310 [ 27.847902] ? __pfx_kasan_atomics+0x10/0x10 [ 27.847938] ? __pfx_read_tsc+0x10/0x10 [ 27.847961] ? ktime_get_ts64+0x86/0x230 [ 27.847987] kunit_try_run_case+0x1a5/0x480 [ 27.848019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.848041] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.848066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.848102] ? __kthread_parkme+0x82/0x180 [ 27.848124] ? preempt_count_sub+0x50/0x80 [ 27.848150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.848182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.848208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.848245] kthread+0x337/0x6f0 [ 27.848268] ? trace_preempt_on+0x20/0xc0 [ 27.848293] ? __pfx_kthread+0x10/0x10 [ 27.848331] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.848355] ? calculate_sigpending+0x7b/0xa0 [ 27.848380] ? __pfx_kthread+0x10/0x10 [ 27.848426] ret_from_fork+0x116/0x1d0 [ 27.848447] ? __pfx_kthread+0x10/0x10 [ 27.848481] ret_from_fork_asm+0x1a/0x30 [ 27.848513] </TASK> [ 27.848525] [ 27.856229] Allocated by task 315: [ 27.856424] kasan_save_stack+0x45/0x70 [ 27.856596] kasan_save_track+0x18/0x40 [ 27.856798] kasan_save_alloc_info+0x3b/0x50 [ 27.856948] __kasan_kmalloc+0xb7/0xc0 [ 27.857144] __kmalloc_cache_noprof+0x189/0x420 [ 27.857360] kasan_atomics+0x95/0x310 [ 27.857583] kunit_try_run_case+0x1a5/0x480 [ 27.857766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.857972] kthread+0x337/0x6f0 [ 27.858135] ret_from_fork+0x116/0x1d0 [ 27.858290] ret_from_fork_asm+0x1a/0x30 [ 27.858524] [ 27.858602] The buggy address belongs to the object at ffff88810613ea80 [ 27.858602] which belongs to the cache kmalloc-64 of size 64 [ 27.859104] The buggy address is located 0 bytes to the right of [ 27.859104] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.859571] [ 27.859675] The buggy address belongs to the physical page: [ 27.859927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.860262] flags: 0x200000000000000(node=0|zone=2) [ 27.860556] page_type: f5(slab) [ 27.860718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.861043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.861342] page dumped because: kasan: bad access detected [ 27.861627] [ 27.861710] Memory state around the buggy address: [ 27.861915] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.862192] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.862547] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.862821] ^ [ 27.863041] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.863253] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.863458] ================================================================== [ 27.792002] ================================================================== [ 27.792444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 27.792769] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.793057] [ 27.793167] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.793229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.793243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.793279] Call Trace: [ 27.793297] <TASK> [ 27.793315] dump_stack_lvl+0x73/0xb0 [ 27.793347] print_report+0xd1/0x610 [ 27.793371] ? __virt_addr_valid+0x1db/0x2d0 [ 27.793405] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.793439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.793476] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.793499] kasan_report+0x141/0x180 [ 27.793523] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.793551] kasan_check_range+0x10c/0x1c0 [ 27.793576] __kasan_check_write+0x18/0x20 [ 27.793608] kasan_atomics_helper+0x20c8/0x5450 [ 27.793633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.793661] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.793697] ? kasan_atomics+0x152/0x310 [ 27.793724] kasan_atomics+0x1dc/0x310 [ 27.793757] ? __pfx_kasan_atomics+0x10/0x10 [ 27.793791] ? __pfx_read_tsc+0x10/0x10 [ 27.793814] ? ktime_get_ts64+0x86/0x230 [ 27.793840] kunit_try_run_case+0x1a5/0x480 [ 27.793874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.793897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.793923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.793948] ? __kthread_parkme+0x82/0x180 [ 27.793970] ? preempt_count_sub+0x50/0x80 [ 27.793995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.794019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.794045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.794071] kthread+0x337/0x6f0 [ 27.794094] ? trace_preempt_on+0x20/0xc0 [ 27.794119] ? __pfx_kthread+0x10/0x10 [ 27.794143] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.794166] ? calculate_sigpending+0x7b/0xa0 [ 27.794191] ? __pfx_kthread+0x10/0x10 [ 27.794215] ret_from_fork+0x116/0x1d0 [ 27.794235] ? __pfx_kthread+0x10/0x10 [ 27.794257] ret_from_fork_asm+0x1a/0x30 [ 27.794290] </TASK> [ 27.794302] [ 27.801764] Allocated by task 315: [ 27.801968] kasan_save_stack+0x45/0x70 [ 27.802131] kasan_save_track+0x18/0x40 [ 27.802312] kasan_save_alloc_info+0x3b/0x50 [ 27.802563] __kasan_kmalloc+0xb7/0xc0 [ 27.802759] __kmalloc_cache_noprof+0x189/0x420 [ 27.802958] kasan_atomics+0x95/0x310 [ 27.803146] kunit_try_run_case+0x1a5/0x480 [ 27.803333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.803610] kthread+0x337/0x6f0 [ 27.803739] ret_from_fork+0x116/0x1d0 [ 27.803920] ret_from_fork_asm+0x1a/0x30 [ 27.804136] [ 27.804233] The buggy address belongs to the object at ffff88810613ea80 [ 27.804233] which belongs to the cache kmalloc-64 of size 64 [ 27.804761] The buggy address is located 0 bytes to the right of [ 27.804761] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.805305] [ 27.805424] The buggy address belongs to the physical page: [ 27.805655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.806147] flags: 0x200000000000000(node=0|zone=2) [ 27.806386] page_type: f5(slab) [ 27.806550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.806814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.807039] page dumped because: kasan: bad access detected [ 27.807208] [ 27.807279] Memory state around the buggy address: [ 27.807452] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.807773] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.808111] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.808432] ^ [ 27.808629] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.808848] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.809055] ================================================================== [ 26.845878] ================================================================== [ 26.846193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 26.847856] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.848208] [ 26.848390] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.848455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.848471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.848497] Call Trace: [ 26.848518] <TASK> [ 26.848537] dump_stack_lvl+0x73/0xb0 [ 26.848572] print_report+0xd1/0x610 [ 26.848595] ? __virt_addr_valid+0x1db/0x2d0 [ 26.848622] ? kasan_atomics_helper+0xe78/0x5450 [ 26.848644] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.848672] ? kasan_atomics_helper+0xe78/0x5450 [ 26.848695] kasan_report+0x141/0x180 [ 26.848719] ? kasan_atomics_helper+0xe78/0x5450 [ 26.848757] kasan_check_range+0x10c/0x1c0 [ 26.848782] __kasan_check_write+0x18/0x20 [ 26.848806] kasan_atomics_helper+0xe78/0x5450 [ 26.848830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.848858] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.848884] ? kasan_atomics+0x152/0x310 [ 26.848910] kasan_atomics+0x1dc/0x310 [ 26.848934] ? __pfx_kasan_atomics+0x10/0x10 [ 26.848959] ? __pfx_read_tsc+0x10/0x10 [ 26.848983] ? ktime_get_ts64+0x86/0x230 [ 26.849009] kunit_try_run_case+0x1a5/0x480 [ 26.849033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.849055] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.849081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.849106] ? __kthread_parkme+0x82/0x180 [ 26.849128] ? preempt_count_sub+0x50/0x80 [ 26.849154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.849177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.849203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.849230] kthread+0x337/0x6f0 [ 26.849252] ? trace_preempt_on+0x20/0xc0 [ 26.849320] ? __pfx_kthread+0x10/0x10 [ 26.849345] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.849368] ? calculate_sigpending+0x7b/0xa0 [ 26.849395] ? __pfx_kthread+0x10/0x10 [ 26.849419] ret_from_fork+0x116/0x1d0 [ 26.849440] ? __pfx_kthread+0x10/0x10 [ 26.849463] ret_from_fork_asm+0x1a/0x30 [ 26.849496] </TASK> [ 26.849509] [ 26.858256] Allocated by task 315: [ 26.858402] kasan_save_stack+0x45/0x70 [ 26.858554] kasan_save_track+0x18/0x40 [ 26.858776] kasan_save_alloc_info+0x3b/0x50 [ 26.858984] __kasan_kmalloc+0xb7/0xc0 [ 26.859168] __kmalloc_cache_noprof+0x189/0x420 [ 26.859429] kasan_atomics+0x95/0x310 [ 26.859729] kunit_try_run_case+0x1a5/0x480 [ 26.859883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.860095] kthread+0x337/0x6f0 [ 26.860265] ret_from_fork+0x116/0x1d0 [ 26.860545] ret_from_fork_asm+0x1a/0x30 [ 26.860751] [ 26.860835] The buggy address belongs to the object at ffff88810613ea80 [ 26.860835] which belongs to the cache kmalloc-64 of size 64 [ 26.861185] The buggy address is located 0 bytes to the right of [ 26.861185] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.861589] [ 26.861778] The buggy address belongs to the physical page: [ 26.862026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.862372] flags: 0x200000000000000(node=0|zone=2) [ 26.862876] page_type: f5(slab) [ 26.863087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.863518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.863810] page dumped because: kasan: bad access detected [ 26.863979] [ 26.864067] Memory state around the buggy address: [ 26.864285] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.864813] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.865033] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.865237] ^ [ 26.865384] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.865982] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.866345] ================================================================== [ 27.705570] ================================================================== [ 27.705923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 27.706679] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.707373] [ 27.707543] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.707595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.707609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.707633] Call Trace: [ 27.707652] <TASK> [ 27.707670] dump_stack_lvl+0x73/0xb0 [ 27.707703] print_report+0xd1/0x610 [ 27.707750] ? __virt_addr_valid+0x1db/0x2d0 [ 27.707777] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.707802] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.707829] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.707871] kasan_report+0x141/0x180 [ 27.707894] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.707922] kasan_check_range+0x10c/0x1c0 [ 27.707946] __kasan_check_write+0x18/0x20 [ 27.707970] kasan_atomics_helper+0x1f43/0x5450 [ 27.708004] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.708031] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.708056] ? kasan_atomics+0x152/0x310 [ 27.708103] kasan_atomics+0x1dc/0x310 [ 27.708127] ? __pfx_kasan_atomics+0x10/0x10 [ 27.708152] ? __pfx_read_tsc+0x10/0x10 [ 27.708184] ? ktime_get_ts64+0x86/0x230 [ 27.708211] kunit_try_run_case+0x1a5/0x480 [ 27.708234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.708255] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.708281] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.708306] ? __kthread_parkme+0x82/0x180 [ 27.708336] ? preempt_count_sub+0x50/0x80 [ 27.708361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.708385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.708420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.708447] kthread+0x337/0x6f0 [ 27.708469] ? trace_preempt_on+0x20/0xc0 [ 27.708494] ? __pfx_kthread+0x10/0x10 [ 27.708518] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.708540] ? calculate_sigpending+0x7b/0xa0 [ 27.708566] ? __pfx_kthread+0x10/0x10 [ 27.708590] ret_from_fork+0x116/0x1d0 [ 27.708610] ? __pfx_kthread+0x10/0x10 [ 27.708633] ret_from_fork_asm+0x1a/0x30 [ 27.708665] </TASK> [ 27.708678] [ 27.721094] Allocated by task 315: [ 27.721226] kasan_save_stack+0x45/0x70 [ 27.721364] kasan_save_track+0x18/0x40 [ 27.721706] kasan_save_alloc_info+0x3b/0x50 [ 27.722116] __kasan_kmalloc+0xb7/0xc0 [ 27.722459] __kmalloc_cache_noprof+0x189/0x420 [ 27.722931] kasan_atomics+0x95/0x310 [ 27.723276] kunit_try_run_case+0x1a5/0x480 [ 27.723703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.724344] kthread+0x337/0x6f0 [ 27.724579] ret_from_fork+0x116/0x1d0 [ 27.724954] ret_from_fork_asm+0x1a/0x30 [ 27.725145] [ 27.725320] The buggy address belongs to the object at ffff88810613ea80 [ 27.725320] which belongs to the cache kmalloc-64 of size 64 [ 27.725912] The buggy address is located 0 bytes to the right of [ 27.725912] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.726263] [ 27.726329] The buggy address belongs to the physical page: [ 27.726505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.726941] flags: 0x200000000000000(node=0|zone=2) [ 27.727561] page_type: f5(slab) [ 27.727878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.728199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.728438] page dumped because: kasan: bad access detected [ 27.728956] [ 27.729110] Memory state around the buggy address: [ 27.729619] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.730290] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.730761] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.730962] ^ [ 27.731106] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.731307] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.731560] ================================================================== [ 27.677495] ================================================================== [ 27.678353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 27.678720] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.678947] [ 27.679029] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.679081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.679095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.679120] Call Trace: [ 27.679139] <TASK> [ 27.679157] dump_stack_lvl+0x73/0xb0 [ 27.679188] print_report+0xd1/0x610 [ 27.679212] ? __virt_addr_valid+0x1db/0x2d0 [ 27.679238] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.679261] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.679289] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.679312] kasan_report+0x141/0x180 [ 27.679335] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.679362] kasan_check_range+0x10c/0x1c0 [ 27.679387] __kasan_check_write+0x18/0x20 [ 27.679424] kasan_atomics_helper+0x1eaa/0x5450 [ 27.679448] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.679475] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.679501] ? kasan_atomics+0x152/0x310 [ 27.679528] kasan_atomics+0x1dc/0x310 [ 27.679551] ? __pfx_kasan_atomics+0x10/0x10 [ 27.679575] ? __pfx_read_tsc+0x10/0x10 [ 27.679599] ? ktime_get_ts64+0x86/0x230 [ 27.679635] kunit_try_run_case+0x1a5/0x480 [ 27.679659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.679680] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.679717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.679750] ? __kthread_parkme+0x82/0x180 [ 27.679772] ? preempt_count_sub+0x50/0x80 [ 27.679798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.679820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.679848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.679875] kthread+0x337/0x6f0 [ 27.679897] ? trace_preempt_on+0x20/0xc0 [ 27.679921] ? __pfx_kthread+0x10/0x10 [ 27.679945] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.679977] ? calculate_sigpending+0x7b/0xa0 [ 27.680002] ? __pfx_kthread+0x10/0x10 [ 27.680026] ret_from_fork+0x116/0x1d0 [ 27.680057] ? __pfx_kthread+0x10/0x10 [ 27.680087] ret_from_fork_asm+0x1a/0x30 [ 27.680120] </TASK> [ 27.680131] [ 27.693268] Allocated by task 315: [ 27.693693] kasan_save_stack+0x45/0x70 [ 27.694061] kasan_save_track+0x18/0x40 [ 27.694192] kasan_save_alloc_info+0x3b/0x50 [ 27.694330] __kasan_kmalloc+0xb7/0xc0 [ 27.694555] __kmalloc_cache_noprof+0x189/0x420 [ 27.694981] kasan_atomics+0x95/0x310 [ 27.695328] kunit_try_run_case+0x1a5/0x480 [ 27.695769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.696241] kthread+0x337/0x6f0 [ 27.696569] ret_from_fork+0x116/0x1d0 [ 27.696878] ret_from_fork_asm+0x1a/0x30 [ 27.697033] [ 27.697099] The buggy address belongs to the object at ffff88810613ea80 [ 27.697099] which belongs to the cache kmalloc-64 of size 64 [ 27.698155] The buggy address is located 0 bytes to the right of [ 27.698155] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.698661] [ 27.698846] The buggy address belongs to the physical page: [ 27.699337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.700058] flags: 0x200000000000000(node=0|zone=2) [ 27.700523] page_type: f5(slab) [ 27.700789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.701009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.701219] page dumped because: kasan: bad access detected [ 27.701379] [ 27.701523] Memory state around the buggy address: [ 27.701963] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.702620] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.703257] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.703953] ^ [ 27.704385] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.704883] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.705088] ================================================================== [ 27.732082] ================================================================== [ 27.732559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 27.732899] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.733165] [ 27.733272] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.733335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.733350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.733373] Call Trace: [ 27.733404] <TASK> [ 27.733432] dump_stack_lvl+0x73/0xb0 [ 27.733473] print_report+0xd1/0x610 [ 27.733497] ? __virt_addr_valid+0x1db/0x2d0 [ 27.733534] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.733557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.733594] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.733617] kasan_report+0x141/0x180 [ 27.733652] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.733679] __asan_report_load8_noabort+0x18/0x20 [ 27.733704] kasan_atomics_helper+0x4f71/0x5450 [ 27.733728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.733765] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.733791] ? kasan_atomics+0x152/0x310 [ 27.733818] kasan_atomics+0x1dc/0x310 [ 27.733841] ? __pfx_kasan_atomics+0x10/0x10 [ 27.733866] ? __pfx_read_tsc+0x10/0x10 [ 27.733889] ? ktime_get_ts64+0x86/0x230 [ 27.733915] kunit_try_run_case+0x1a5/0x480 [ 27.733939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.733961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.733987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.734012] ? __kthread_parkme+0x82/0x180 [ 27.734034] ? preempt_count_sub+0x50/0x80 [ 27.734058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.734082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.734108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.734134] kthread+0x337/0x6f0 [ 27.734165] ? trace_preempt_on+0x20/0xc0 [ 27.734190] ? __pfx_kthread+0x10/0x10 [ 27.734213] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.734247] ? calculate_sigpending+0x7b/0xa0 [ 27.734272] ? __pfx_kthread+0x10/0x10 [ 27.734296] ret_from_fork+0x116/0x1d0 [ 27.734316] ? __pfx_kthread+0x10/0x10 [ 27.734340] ret_from_fork_asm+0x1a/0x30 [ 27.734372] </TASK> [ 27.734384] [ 27.741801] Allocated by task 315: [ 27.741983] kasan_save_stack+0x45/0x70 [ 27.742121] kasan_save_track+0x18/0x40 [ 27.742298] kasan_save_alloc_info+0x3b/0x50 [ 27.742615] __kasan_kmalloc+0xb7/0xc0 [ 27.742815] __kmalloc_cache_noprof+0x189/0x420 [ 27.743030] kasan_atomics+0x95/0x310 [ 27.743209] kunit_try_run_case+0x1a5/0x480 [ 27.743432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.743699] kthread+0x337/0x6f0 [ 27.743892] ret_from_fork+0x116/0x1d0 [ 27.744039] ret_from_fork_asm+0x1a/0x30 [ 27.744227] [ 27.744323] The buggy address belongs to the object at ffff88810613ea80 [ 27.744323] which belongs to the cache kmalloc-64 of size 64 [ 27.744873] The buggy address is located 0 bytes to the right of [ 27.744873] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.745372] [ 27.745458] The buggy address belongs to the physical page: [ 27.745700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.745939] flags: 0x200000000000000(node=0|zone=2) [ 27.746093] page_type: f5(slab) [ 27.746206] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.746424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.746867] page dumped because: kasan: bad access detected [ 27.747111] [ 27.747198] Memory state around the buggy address: [ 27.747410] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.747700] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.747980] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.748255] ^ [ 27.748407] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.748746] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.749078] ================================================================== [ 26.734899] ================================================================== [ 26.735191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 26.735878] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.736230] [ 26.736380] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.736448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.736462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.736486] Call Trace: [ 26.736511] <TASK> [ 26.736533] dump_stack_lvl+0x73/0xb0 [ 26.736567] print_report+0xd1/0x610 [ 26.736590] ? __virt_addr_valid+0x1db/0x2d0 [ 26.736708] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.736784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.736813] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.736859] kasan_report+0x141/0x180 [ 26.736882] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.736909] kasan_check_range+0x10c/0x1c0 [ 26.736933] __kasan_check_write+0x18/0x20 [ 26.736957] kasan_atomics_helper+0xb6a/0x5450 [ 26.736980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.737006] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.737033] ? kasan_atomics+0x152/0x310 [ 26.737060] kasan_atomics+0x1dc/0x310 [ 26.737083] ? __pfx_kasan_atomics+0x10/0x10 [ 26.737107] ? __pfx_read_tsc+0x10/0x10 [ 26.737132] ? ktime_get_ts64+0x86/0x230 [ 26.737158] kunit_try_run_case+0x1a5/0x480 [ 26.737182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.737203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.737228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.737253] ? __kthread_parkme+0x82/0x180 [ 26.737319] ? preempt_count_sub+0x50/0x80 [ 26.737345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.737369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.737395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.737435] kthread+0x337/0x6f0 [ 26.737457] ? trace_preempt_on+0x20/0xc0 [ 26.737482] ? __pfx_kthread+0x10/0x10 [ 26.737505] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.737529] ? calculate_sigpending+0x7b/0xa0 [ 26.737555] ? __pfx_kthread+0x10/0x10 [ 26.737579] ret_from_fork+0x116/0x1d0 [ 26.737600] ? __pfx_kthread+0x10/0x10 [ 26.737623] ret_from_fork_asm+0x1a/0x30 [ 26.737655] </TASK> [ 26.737669] [ 26.746137] Allocated by task 315: [ 26.746333] kasan_save_stack+0x45/0x70 [ 26.746539] kasan_save_track+0x18/0x40 [ 26.746742] kasan_save_alloc_info+0x3b/0x50 [ 26.746930] __kasan_kmalloc+0xb7/0xc0 [ 26.747058] __kmalloc_cache_noprof+0x189/0x420 [ 26.747612] kasan_atomics+0x95/0x310 [ 26.747825] kunit_try_run_case+0x1a5/0x480 [ 26.748025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.748198] kthread+0x337/0x6f0 [ 26.748322] ret_from_fork+0x116/0x1d0 [ 26.748450] ret_from_fork_asm+0x1a/0x30 [ 26.748584] [ 26.748653] The buggy address belongs to the object at ffff88810613ea80 [ 26.748653] which belongs to the cache kmalloc-64 of size 64 [ 26.749320] The buggy address is located 0 bytes to the right of [ 26.749320] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.749890] [ 26.749985] The buggy address belongs to the physical page: [ 26.750241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.750716] flags: 0x200000000000000(node=0|zone=2) [ 26.750986] page_type: f5(slab) [ 26.751136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.751607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.752006] page dumped because: kasan: bad access detected [ 26.752178] [ 26.752243] Memory state around the buggy address: [ 26.752476] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.753033] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.753854] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.754168] ^ [ 26.754516] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.754883] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.755095] ================================================================== [ 26.993067] ================================================================== [ 26.993299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 26.993526] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.993812] [ 26.994133] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.994190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.994232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.994275] Call Trace: [ 26.994298] <TASK> [ 26.994319] dump_stack_lvl+0x73/0xb0 [ 26.994354] print_report+0xd1/0x610 [ 26.994379] ? __virt_addr_valid+0x1db/0x2d0 [ 26.994422] ? kasan_atomics_helper+0x1148/0x5450 [ 26.994445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.994473] ? kasan_atomics_helper+0x1148/0x5450 [ 26.994496] kasan_report+0x141/0x180 [ 26.994519] ? kasan_atomics_helper+0x1148/0x5450 [ 26.994547] kasan_check_range+0x10c/0x1c0 [ 26.994572] __kasan_check_write+0x18/0x20 [ 26.994596] kasan_atomics_helper+0x1148/0x5450 [ 26.994619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.994646] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.994673] ? kasan_atomics+0x152/0x310 [ 26.994699] kasan_atomics+0x1dc/0x310 [ 26.994723] ? __pfx_kasan_atomics+0x10/0x10 [ 26.994757] ? __pfx_read_tsc+0x10/0x10 [ 26.994781] ? ktime_get_ts64+0x86/0x230 [ 26.994808] kunit_try_run_case+0x1a5/0x480 [ 26.994832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.994856] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.994885] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.994911] ? __kthread_parkme+0x82/0x180 [ 26.994934] ? preempt_count_sub+0x50/0x80 [ 26.994960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.994983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.995010] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.995036] kthread+0x337/0x6f0 [ 26.995059] ? trace_preempt_on+0x20/0xc0 [ 26.995084] ? __pfx_kthread+0x10/0x10 [ 26.995108] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.995132] ? calculate_sigpending+0x7b/0xa0 [ 26.995160] ? __pfx_kthread+0x10/0x10 [ 26.995185] ret_from_fork+0x116/0x1d0 [ 26.995229] ? __pfx_kthread+0x10/0x10 [ 26.995272] ret_from_fork_asm+0x1a/0x30 [ 26.995306] </TASK> [ 26.995320] [ 27.009008] Allocated by task 315: [ 27.009194] kasan_save_stack+0x45/0x70 [ 27.009552] kasan_save_track+0x18/0x40 [ 27.009766] kasan_save_alloc_info+0x3b/0x50 [ 27.009913] __kasan_kmalloc+0xb7/0xc0 [ 27.010040] __kmalloc_cache_noprof+0x189/0x420 [ 27.010278] kasan_atomics+0x95/0x310 [ 27.010510] kunit_try_run_case+0x1a5/0x480 [ 27.010714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.010979] kthread+0x337/0x6f0 [ 27.011110] ret_from_fork+0x116/0x1d0 [ 27.011240] ret_from_fork_asm+0x1a/0x30 [ 27.011382] [ 27.011450] The buggy address belongs to the object at ffff88810613ea80 [ 27.011450] which belongs to the cache kmalloc-64 of size 64 [ 27.012023] The buggy address is located 0 bytes to the right of [ 27.012023] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.012648] [ 27.012718] The buggy address belongs to the physical page: [ 27.012898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.013550] flags: 0x200000000000000(node=0|zone=2) [ 27.013804] page_type: f5(slab) [ 27.013927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.014432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.014768] page dumped because: kasan: bad access detected [ 27.014935] [ 27.015002] Memory state around the buggy address: [ 27.015204] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.015521] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.016176] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.016510] ^ [ 27.016717] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.016934] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.017205] ================================================================== [ 27.248112] ================================================================== [ 27.248545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 27.248925] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.249223] [ 27.249319] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.249376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.249390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.249423] Call Trace: [ 27.249447] <TASK> [ 27.249467] dump_stack_lvl+0x73/0xb0 [ 27.249502] print_report+0xd1/0x610 [ 27.249536] ? __virt_addr_valid+0x1db/0x2d0 [ 27.249750] ? kasan_atomics_helper+0x151d/0x5450 [ 27.249774] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.249806] ? kasan_atomics_helper+0x151d/0x5450 [ 27.249830] kasan_report+0x141/0x180 [ 27.249854] ? kasan_atomics_helper+0x151d/0x5450 [ 27.249881] kasan_check_range+0x10c/0x1c0 [ 27.249905] __kasan_check_write+0x18/0x20 [ 27.249930] kasan_atomics_helper+0x151d/0x5450 [ 27.249954] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.249981] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.250008] ? kasan_atomics+0x152/0x310 [ 27.250035] kasan_atomics+0x1dc/0x310 [ 27.250059] ? __pfx_kasan_atomics+0x10/0x10 [ 27.250084] ? __pfx_read_tsc+0x10/0x10 [ 27.250108] ? ktime_get_ts64+0x86/0x230 [ 27.250135] kunit_try_run_case+0x1a5/0x480 [ 27.250159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.250181] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.250207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.250233] ? __kthread_parkme+0x82/0x180 [ 27.250256] ? preempt_count_sub+0x50/0x80 [ 27.250293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.250317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.250344] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.250370] kthread+0x337/0x6f0 [ 27.250392] ? trace_preempt_on+0x20/0xc0 [ 27.250423] ? __pfx_kthread+0x10/0x10 [ 27.250446] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.250469] ? calculate_sigpending+0x7b/0xa0 [ 27.250495] ? __pfx_kthread+0x10/0x10 [ 27.250519] ret_from_fork+0x116/0x1d0 [ 27.250539] ? __pfx_kthread+0x10/0x10 [ 27.250562] ret_from_fork_asm+0x1a/0x30 [ 27.250594] </TASK> [ 27.250607] [ 27.261092] Allocated by task 315: [ 27.261377] kasan_save_stack+0x45/0x70 [ 27.261602] kasan_save_track+0x18/0x40 [ 27.261785] kasan_save_alloc_info+0x3b/0x50 [ 27.262038] __kasan_kmalloc+0xb7/0xc0 [ 27.262235] __kmalloc_cache_noprof+0x189/0x420 [ 27.262509] kasan_atomics+0x95/0x310 [ 27.262646] kunit_try_run_case+0x1a5/0x480 [ 27.262854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.263132] kthread+0x337/0x6f0 [ 27.263378] ret_from_fork+0x116/0x1d0 [ 27.263532] ret_from_fork_asm+0x1a/0x30 [ 27.263697] [ 27.263803] The buggy address belongs to the object at ffff88810613ea80 [ 27.263803] which belongs to the cache kmalloc-64 of size 64 [ 27.264362] The buggy address is located 0 bytes to the right of [ 27.264362] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.264973] [ 27.265068] The buggy address belongs to the physical page: [ 27.265321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.265906] flags: 0x200000000000000(node=0|zone=2) [ 27.266182] page_type: f5(slab) [ 27.266379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.266634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.266902] page dumped because: kasan: bad access detected [ 27.267268] [ 27.267417] Memory state around the buggy address: [ 27.267679] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.267906] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.268226] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.268617] ^ [ 27.268822] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.269138] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.269554] ================================================================== [ 27.572685] ================================================================== [ 27.572999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 27.573247] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.573498] [ 27.573589] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.573643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.573657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.573682] Call Trace: [ 27.573704] <TASK> [ 27.573724] dump_stack_lvl+0x73/0xb0 [ 27.573769] print_report+0xd1/0x610 [ 27.573792] ? __virt_addr_valid+0x1db/0x2d0 [ 27.573817] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.573840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.573866] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.574096] kasan_report+0x141/0x180 [ 27.574122] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.574149] __asan_report_load8_noabort+0x18/0x20 [ 27.574173] kasan_atomics_helper+0x4f30/0x5450 [ 27.574200] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.575182] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.575245] ? kasan_atomics+0x152/0x310 [ 27.575275] kasan_atomics+0x1dc/0x310 [ 27.575299] ? __pfx_kasan_atomics+0x10/0x10 [ 27.575326] ? __pfx_read_tsc+0x10/0x10 [ 27.575349] ? ktime_get_ts64+0x86/0x230 [ 27.575378] kunit_try_run_case+0x1a5/0x480 [ 27.575402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.576262] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.576301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.576335] ? __kthread_parkme+0x82/0x180 [ 27.576360] ? preempt_count_sub+0x50/0x80 [ 27.576385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.576422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.576450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.576479] kthread+0x337/0x6f0 [ 27.576502] ? trace_preempt_on+0x20/0xc0 [ 27.576527] ? __pfx_kthread+0x10/0x10 [ 27.576551] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.576575] ? calculate_sigpending+0x7b/0xa0 [ 27.576601] ? __pfx_kthread+0x10/0x10 [ 27.576625] ret_from_fork+0x116/0x1d0 [ 27.576646] ? __pfx_kthread+0x10/0x10 [ 27.576669] ret_from_fork_asm+0x1a/0x30 [ 27.576702] </TASK> [ 27.576715] [ 27.588670] Allocated by task 315: [ 27.589037] kasan_save_stack+0x45/0x70 [ 27.589239] kasan_save_track+0x18/0x40 [ 27.589636] kasan_save_alloc_info+0x3b/0x50 [ 27.589869] __kasan_kmalloc+0xb7/0xc0 [ 27.590049] __kmalloc_cache_noprof+0x189/0x420 [ 27.590253] kasan_atomics+0x95/0x310 [ 27.590681] kunit_try_run_case+0x1a5/0x480 [ 27.590933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.591302] kthread+0x337/0x6f0 [ 27.591450] ret_from_fork+0x116/0x1d0 [ 27.591679] ret_from_fork_asm+0x1a/0x30 [ 27.591883] [ 27.591953] The buggy address belongs to the object at ffff88810613ea80 [ 27.591953] which belongs to the cache kmalloc-64 of size 64 [ 27.592489] The buggy address is located 0 bytes to the right of [ 27.592489] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.593001] [ 27.593100] The buggy address belongs to the physical page: [ 27.593327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.593718] flags: 0x200000000000000(node=0|zone=2) [ 27.593887] page_type: f5(slab) [ 27.594143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.595216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.595793] page dumped because: kasan: bad access detected [ 27.596114] [ 27.596215] Memory state around the buggy address: [ 27.596602] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.597584] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.597978] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.598289] ^ [ 27.598538] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.598847] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.599143] ================================================================== [ 27.017882] ================================================================== [ 27.018356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 27.018706] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.019075] [ 27.019231] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.019284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.019297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.019331] Call Trace: [ 27.019353] <TASK> [ 27.019371] dump_stack_lvl+0x73/0xb0 [ 27.019444] print_report+0xd1/0x610 [ 27.019469] ? __virt_addr_valid+0x1db/0x2d0 [ 27.019494] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.019518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.019544] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.019567] kasan_report+0x141/0x180 [ 27.019590] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.019643] __asan_report_load4_noabort+0x18/0x20 [ 27.019669] kasan_atomics_helper+0x4a02/0x5450 [ 27.019692] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.019718] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.019756] ? kasan_atomics+0x152/0x310 [ 27.019782] kasan_atomics+0x1dc/0x310 [ 27.019805] ? __pfx_kasan_atomics+0x10/0x10 [ 27.019830] ? __pfx_read_tsc+0x10/0x10 [ 27.019854] ? ktime_get_ts64+0x86/0x230 [ 27.019881] kunit_try_run_case+0x1a5/0x480 [ 27.019905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.019928] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.019955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.019980] ? __kthread_parkme+0x82/0x180 [ 27.020002] ? preempt_count_sub+0x50/0x80 [ 27.020028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.020641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.020668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.020695] kthread+0x337/0x6f0 [ 27.020718] ? trace_preempt_on+0x20/0xc0 [ 27.020752] ? __pfx_kthread+0x10/0x10 [ 27.020796] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.020819] ? calculate_sigpending+0x7b/0xa0 [ 27.020845] ? __pfx_kthread+0x10/0x10 [ 27.020869] ret_from_fork+0x116/0x1d0 [ 27.020890] ? __pfx_kthread+0x10/0x10 [ 27.020912] ret_from_fork_asm+0x1a/0x30 [ 27.020964] </TASK> [ 27.020977] [ 27.029226] Allocated by task 315: [ 27.029350] kasan_save_stack+0x45/0x70 [ 27.029707] kasan_save_track+0x18/0x40 [ 27.030133] kasan_save_alloc_info+0x3b/0x50 [ 27.030383] __kasan_kmalloc+0xb7/0xc0 [ 27.030549] __kmalloc_cache_noprof+0x189/0x420 [ 27.030698] kasan_atomics+0x95/0x310 [ 27.030833] kunit_try_run_case+0x1a5/0x480 [ 27.031000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.031277] kthread+0x337/0x6f0 [ 27.031582] ret_from_fork+0x116/0x1d0 [ 27.031762] ret_from_fork_asm+0x1a/0x30 [ 27.031934] [ 27.032001] The buggy address belongs to the object at ffff88810613ea80 [ 27.032001] which belongs to the cache kmalloc-64 of size 64 [ 27.032347] The buggy address is located 0 bytes to the right of [ 27.032347] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.033021] [ 27.033113] The buggy address belongs to the physical page: [ 27.033360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.033706] flags: 0x200000000000000(node=0|zone=2) [ 27.034036] page_type: f5(slab) [ 27.034155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.034382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.035109] page dumped because: kasan: bad access detected [ 27.035330] [ 27.035395] Memory state around the buggy address: [ 27.035760] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.036063] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.036628] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.037116] ^ [ 27.037492] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.037780] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.038071] ================================================================== [ 26.280217] ================================================================== [ 26.282054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 26.283113] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.283949] [ 26.284289] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.284359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.284373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.284399] Call Trace: [ 26.284416] <TASK> [ 26.284437] dump_stack_lvl+0x73/0xb0 [ 26.284475] print_report+0xd1/0x610 [ 26.284500] ? __virt_addr_valid+0x1db/0x2d0 [ 26.284527] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.284549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.284574] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.284596] kasan_report+0x141/0x180 [ 26.284618] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.284642] __asan_report_load4_noabort+0x18/0x20 [ 26.284667] kasan_atomics_helper+0x4bbc/0x5450 [ 26.284689] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.284714] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.284750] ? kasan_atomics+0x152/0x310 [ 26.284777] kasan_atomics+0x1dc/0x310 [ 26.284798] ? __pfx_kasan_atomics+0x10/0x10 [ 26.284822] ? __pfx_read_tsc+0x10/0x10 [ 26.284845] ? ktime_get_ts64+0x86/0x230 [ 26.284874] kunit_try_run_case+0x1a5/0x480 [ 26.284899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.284920] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.284945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.284969] ? __kthread_parkme+0x82/0x180 [ 26.284990] ? preempt_count_sub+0x50/0x80 [ 26.285068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.285102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.285128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.285153] kthread+0x337/0x6f0 [ 26.285175] ? trace_preempt_on+0x20/0xc0 [ 26.285200] ? __pfx_kthread+0x10/0x10 [ 26.285222] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.285244] ? calculate_sigpending+0x7b/0xa0 [ 26.285527] ? __pfx_kthread+0x10/0x10 [ 26.285558] ret_from_fork+0x116/0x1d0 [ 26.285580] ? __pfx_kthread+0x10/0x10 [ 26.285602] ret_from_fork_asm+0x1a/0x30 [ 26.285635] </TASK> [ 26.285648] [ 26.294461] Allocated by task 315: [ 26.294685] kasan_save_stack+0x45/0x70 [ 26.294899] kasan_save_track+0x18/0x40 [ 26.295178] kasan_save_alloc_info+0x3b/0x50 [ 26.295410] __kasan_kmalloc+0xb7/0xc0 [ 26.295619] __kmalloc_cache_noprof+0x189/0x420 [ 26.295780] kasan_atomics+0x95/0x310 [ 26.296227] kunit_try_run_case+0x1a5/0x480 [ 26.296588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.296868] kthread+0x337/0x6f0 [ 26.297029] ret_from_fork+0x116/0x1d0 [ 26.297227] ret_from_fork_asm+0x1a/0x30 [ 26.297544] [ 26.297662] The buggy address belongs to the object at ffff88810613ea80 [ 26.297662] which belongs to the cache kmalloc-64 of size 64 [ 26.298145] The buggy address is located 0 bytes to the right of [ 26.298145] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.298502] [ 26.298571] The buggy address belongs to the physical page: [ 26.298770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.299216] flags: 0x200000000000000(node=0|zone=2) [ 26.299696] page_type: f5(slab) [ 26.299848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.300074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.300311] page dumped because: kasan: bad access detected [ 26.300568] [ 26.300657] Memory state around the buggy address: [ 26.300892] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.301265] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.301710] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.301958] ^ [ 26.302425] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.302743] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.302952] ================================================================== [ 27.211896] ================================================================== [ 27.212236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 27.212886] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.213123] [ 27.213240] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.213295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.213309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.213334] Call Trace: [ 27.213350] <TASK> [ 27.213369] dump_stack_lvl+0x73/0xb0 [ 27.213402] print_report+0xd1/0x610 [ 27.213660] ? __virt_addr_valid+0x1db/0x2d0 [ 27.213688] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.213711] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.213751] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.213774] kasan_report+0x141/0x180 [ 27.213798] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.213825] __asan_report_store8_noabort+0x1b/0x30 [ 27.213850] kasan_atomics_helper+0x50d4/0x5450 [ 27.213874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.213902] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.213927] ? kasan_atomics+0x152/0x310 [ 27.213955] kasan_atomics+0x1dc/0x310 [ 27.213979] ? __pfx_kasan_atomics+0x10/0x10 [ 27.214004] ? __pfx_read_tsc+0x10/0x10 [ 27.214027] ? ktime_get_ts64+0x86/0x230 [ 27.214054] kunit_try_run_case+0x1a5/0x480 [ 27.214078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.214100] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.214126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.214152] ? __kthread_parkme+0x82/0x180 [ 27.214176] ? preempt_count_sub+0x50/0x80 [ 27.214202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.214226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.214252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.214292] kthread+0x337/0x6f0 [ 27.214315] ? trace_preempt_on+0x20/0xc0 [ 27.214341] ? __pfx_kthread+0x10/0x10 [ 27.214363] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.214387] ? calculate_sigpending+0x7b/0xa0 [ 27.214413] ? __pfx_kthread+0x10/0x10 [ 27.214437] ret_from_fork+0x116/0x1d0 [ 27.214457] ? __pfx_kthread+0x10/0x10 [ 27.214480] ret_from_fork_asm+0x1a/0x30 [ 27.214512] </TASK> [ 27.214525] [ 27.229983] Allocated by task 315: [ 27.230610] kasan_save_stack+0x45/0x70 [ 27.231108] kasan_save_track+0x18/0x40 [ 27.231494] kasan_save_alloc_info+0x3b/0x50 [ 27.231839] __kasan_kmalloc+0xb7/0xc0 [ 27.231981] __kmalloc_cache_noprof+0x189/0x420 [ 27.232134] kasan_atomics+0x95/0x310 [ 27.232261] kunit_try_run_case+0x1a5/0x480 [ 27.232999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.235374] kthread+0x337/0x6f0 [ 27.235695] ret_from_fork+0x116/0x1d0 [ 27.236212] ret_from_fork_asm+0x1a/0x30 [ 27.236465] [ 27.236544] The buggy address belongs to the object at ffff88810613ea80 [ 27.236544] which belongs to the cache kmalloc-64 of size 64 [ 27.237867] The buggy address is located 0 bytes to the right of [ 27.237867] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.239212] [ 27.239328] The buggy address belongs to the physical page: [ 27.239592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.239968] flags: 0x200000000000000(node=0|zone=2) [ 27.240204] page_type: f5(slab) [ 27.240377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.240661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.242438] page dumped because: kasan: bad access detected [ 27.243759] [ 27.244042] Memory state around the buggy address: [ 27.244497] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.245135] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.245791] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.246450] ^ [ 27.246977] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.247239] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.247654] ================================================================== [ 26.755938] ================================================================== [ 26.756467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 26.756881] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.757187] [ 26.757344] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.757436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.757451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.757475] Call Trace: [ 26.757509] <TASK> [ 26.757530] dump_stack_lvl+0x73/0xb0 [ 26.757592] print_report+0xd1/0x610 [ 26.757616] ? __virt_addr_valid+0x1db/0x2d0 [ 26.757653] ? kasan_atomics_helper+0xc70/0x5450 [ 26.757675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.757702] ? kasan_atomics_helper+0xc70/0x5450 [ 26.757724] kasan_report+0x141/0x180 [ 26.757758] ? kasan_atomics_helper+0xc70/0x5450 [ 26.757785] kasan_check_range+0x10c/0x1c0 [ 26.757810] __kasan_check_write+0x18/0x20 [ 26.757834] kasan_atomics_helper+0xc70/0x5450 [ 26.757857] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.757884] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.757911] ? kasan_atomics+0x152/0x310 [ 26.757968] kasan_atomics+0x1dc/0x310 [ 26.758015] ? __pfx_kasan_atomics+0x10/0x10 [ 26.758040] ? __pfx_read_tsc+0x10/0x10 [ 26.758064] ? ktime_get_ts64+0x86/0x230 [ 26.758091] kunit_try_run_case+0x1a5/0x480 [ 26.758114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.758136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.758161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.758187] ? __kthread_parkme+0x82/0x180 [ 26.758208] ? preempt_count_sub+0x50/0x80 [ 26.758234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.758256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.758337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.758365] kthread+0x337/0x6f0 [ 26.758388] ? trace_preempt_on+0x20/0xc0 [ 26.758424] ? __pfx_kthread+0x10/0x10 [ 26.758447] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.758472] ? calculate_sigpending+0x7b/0xa0 [ 26.758497] ? __pfx_kthread+0x10/0x10 [ 26.758520] ret_from_fork+0x116/0x1d0 [ 26.758541] ? __pfx_kthread+0x10/0x10 [ 26.758564] ret_from_fork_asm+0x1a/0x30 [ 26.758597] </TASK> [ 26.758609] [ 26.767512] Allocated by task 315: [ 26.767710] kasan_save_stack+0x45/0x70 [ 26.767861] kasan_save_track+0x18/0x40 [ 26.767987] kasan_save_alloc_info+0x3b/0x50 [ 26.768180] __kasan_kmalloc+0xb7/0xc0 [ 26.768529] __kmalloc_cache_noprof+0x189/0x420 [ 26.768785] kasan_atomics+0x95/0x310 [ 26.769066] kunit_try_run_case+0x1a5/0x480 [ 26.769325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.769613] kthread+0x337/0x6f0 [ 26.769752] ret_from_fork+0x116/0x1d0 [ 26.769898] ret_from_fork_asm+0x1a/0x30 [ 26.770092] [ 26.770183] The buggy address belongs to the object at ffff88810613ea80 [ 26.770183] which belongs to the cache kmalloc-64 of size 64 [ 26.770986] The buggy address is located 0 bytes to the right of [ 26.770986] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.771703] [ 26.771824] The buggy address belongs to the physical page: [ 26.772158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.772623] flags: 0x200000000000000(node=0|zone=2) [ 26.772807] page_type: f5(slab) [ 26.772928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.773207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.773598] page dumped because: kasan: bad access detected [ 26.773862] [ 26.773954] Memory state around the buggy address: [ 26.774331] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.774825] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.775047] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.775346] ^ [ 26.775805] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.776176] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.776516] ================================================================== [ 26.505843] ================================================================== [ 26.506473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 26.506804] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.507112] [ 26.507226] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.507283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.507297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.507593] Call Trace: [ 26.507628] <TASK> [ 26.507651] dump_stack_lvl+0x73/0xb0 [ 26.507688] print_report+0xd1/0x610 [ 26.507713] ? __virt_addr_valid+0x1db/0x2d0 [ 26.507756] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.507780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.507808] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.507830] kasan_report+0x141/0x180 [ 26.507853] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.507880] kasan_check_range+0x10c/0x1c0 [ 26.507904] __kasan_check_write+0x18/0x20 [ 26.507929] kasan_atomics_helper+0x5fe/0x5450 [ 26.507952] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.507978] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.508004] ? kasan_atomics+0x152/0x310 [ 26.508031] kasan_atomics+0x1dc/0x310 [ 26.508054] ? __pfx_kasan_atomics+0x10/0x10 [ 26.508079] ? __pfx_read_tsc+0x10/0x10 [ 26.508102] ? ktime_get_ts64+0x86/0x230 [ 26.508129] kunit_try_run_case+0x1a5/0x480 [ 26.508153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.508175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.508202] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.508226] ? __kthread_parkme+0x82/0x180 [ 26.508249] ? preempt_count_sub+0x50/0x80 [ 26.508402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.508430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.508458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.508484] kthread+0x337/0x6f0 [ 26.508508] ? trace_preempt_on+0x20/0xc0 [ 26.508533] ? __pfx_kthread+0x10/0x10 [ 26.508557] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.508581] ? calculate_sigpending+0x7b/0xa0 [ 26.508607] ? __pfx_kthread+0x10/0x10 [ 26.508631] ret_from_fork+0x116/0x1d0 [ 26.508652] ? __pfx_kthread+0x10/0x10 [ 26.508674] ret_from_fork_asm+0x1a/0x30 [ 26.508707] </TASK> [ 26.508720] [ 26.519187] Allocated by task 315: [ 26.519691] kasan_save_stack+0x45/0x70 [ 26.519913] kasan_save_track+0x18/0x40 [ 26.520052] kasan_save_alloc_info+0x3b/0x50 [ 26.520262] __kasan_kmalloc+0xb7/0xc0 [ 26.520840] __kmalloc_cache_noprof+0x189/0x420 [ 26.521021] kasan_atomics+0x95/0x310 [ 26.521212] kunit_try_run_case+0x1a5/0x480 [ 26.521436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.522003] kthread+0x337/0x6f0 [ 26.522183] ret_from_fork+0x116/0x1d0 [ 26.522340] ret_from_fork_asm+0x1a/0x30 [ 26.522566] [ 26.522647] The buggy address belongs to the object at ffff88810613ea80 [ 26.522647] which belongs to the cache kmalloc-64 of size 64 [ 26.523159] The buggy address is located 0 bytes to the right of [ 26.523159] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.524014] [ 26.524121] The buggy address belongs to the physical page: [ 26.524627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.525047] flags: 0x200000000000000(node=0|zone=2) [ 26.525386] page_type: f5(slab) [ 26.525649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.525999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.526716] page dumped because: kasan: bad access detected [ 26.526969] [ 26.527044] Memory state around the buggy address: [ 26.527462] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.527875] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.528173] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.528693] ^ [ 26.528883] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.529346] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.529637] ================================================================== [ 26.634235] ================================================================== [ 26.635106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 26.635765] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.636486] [ 26.636634] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.636722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.636750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.636775] Call Trace: [ 26.636833] <TASK> [ 26.636854] dump_stack_lvl+0x73/0xb0 [ 26.636894] print_report+0xd1/0x610 [ 26.636917] ? __virt_addr_valid+0x1db/0x2d0 [ 26.636943] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.636966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.636993] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.637016] kasan_report+0x141/0x180 [ 26.637039] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.637066] kasan_check_range+0x10c/0x1c0 [ 26.637090] __kasan_check_write+0x18/0x20 [ 26.637114] kasan_atomics_helper+0x8f9/0x5450 [ 26.637138] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.637165] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.637192] ? kasan_atomics+0x152/0x310 [ 26.637219] kasan_atomics+0x1dc/0x310 [ 26.637242] ? __pfx_kasan_atomics+0x10/0x10 [ 26.637312] ? __pfx_read_tsc+0x10/0x10 [ 26.637339] ? ktime_get_ts64+0x86/0x230 [ 26.637367] kunit_try_run_case+0x1a5/0x480 [ 26.637391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.637426] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.637453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.637477] ? __kthread_parkme+0x82/0x180 [ 26.637500] ? preempt_count_sub+0x50/0x80 [ 26.637525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.637548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.637575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.637601] kthread+0x337/0x6f0 [ 26.637623] ? trace_preempt_on+0x20/0xc0 [ 26.637648] ? __pfx_kthread+0x10/0x10 [ 26.637670] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.637694] ? calculate_sigpending+0x7b/0xa0 [ 26.637720] ? __pfx_kthread+0x10/0x10 [ 26.637755] ret_from_fork+0x116/0x1d0 [ 26.637775] ? __pfx_kthread+0x10/0x10 [ 26.637798] ret_from_fork_asm+0x1a/0x30 [ 26.637830] </TASK> [ 26.637844] [ 26.650830] Allocated by task 315: [ 26.651097] kasan_save_stack+0x45/0x70 [ 26.651431] kasan_save_track+0x18/0x40 [ 26.651610] kasan_save_alloc_info+0x3b/0x50 [ 26.651869] __kasan_kmalloc+0xb7/0xc0 [ 26.652062] __kmalloc_cache_noprof+0x189/0x420 [ 26.652257] kasan_atomics+0x95/0x310 [ 26.652393] kunit_try_run_case+0x1a5/0x480 [ 26.652588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.652953] kthread+0x337/0x6f0 [ 26.653101] ret_from_fork+0x116/0x1d0 [ 26.653245] ret_from_fork_asm+0x1a/0x30 [ 26.653588] [ 26.653726] The buggy address belongs to the object at ffff88810613ea80 [ 26.653726] which belongs to the cache kmalloc-64 of size 64 [ 26.654241] The buggy address is located 0 bytes to the right of [ 26.654241] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.655063] [ 26.655170] The buggy address belongs to the physical page: [ 26.655584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.655978] flags: 0x200000000000000(node=0|zone=2) [ 26.656221] page_type: f5(slab) [ 26.656456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.656837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.657189] page dumped because: kasan: bad access detected [ 26.657526] [ 26.657634] Memory state around the buggy address: [ 26.657897] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.658240] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.658674] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.659115] ^ [ 26.659371] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.659725] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.660443] ================================================================== [ 26.530196] ================================================================== [ 26.530447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 26.531367] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.531832] [ 26.532025] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.532083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.532192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.532220] Call Trace: [ 26.532243] <TASK> [ 26.532277] dump_stack_lvl+0x73/0xb0 [ 26.532312] print_report+0xd1/0x610 [ 26.532342] ? __virt_addr_valid+0x1db/0x2d0 [ 26.532368] ? kasan_atomics_helper+0x697/0x5450 [ 26.532390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.532469] ? kasan_atomics_helper+0x697/0x5450 [ 26.532494] kasan_report+0x141/0x180 [ 26.532517] ? kasan_atomics_helper+0x697/0x5450 [ 26.532545] kasan_check_range+0x10c/0x1c0 [ 26.532571] __kasan_check_write+0x18/0x20 [ 26.532595] kasan_atomics_helper+0x697/0x5450 [ 26.532618] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.532645] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.532671] ? kasan_atomics+0x152/0x310 [ 26.532697] kasan_atomics+0x1dc/0x310 [ 26.532721] ? __pfx_kasan_atomics+0x10/0x10 [ 26.532758] ? __pfx_read_tsc+0x10/0x10 [ 26.532783] ? ktime_get_ts64+0x86/0x230 [ 26.532810] kunit_try_run_case+0x1a5/0x480 [ 26.532835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.532856] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.532882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.532907] ? __kthread_parkme+0x82/0x180 [ 26.532929] ? preempt_count_sub+0x50/0x80 [ 26.532955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.532979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.533006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.533031] kthread+0x337/0x6f0 [ 26.533055] ? trace_preempt_on+0x20/0xc0 [ 26.533079] ? __pfx_kthread+0x10/0x10 [ 26.533103] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.533126] ? calculate_sigpending+0x7b/0xa0 [ 26.533151] ? __pfx_kthread+0x10/0x10 [ 26.533175] ret_from_fork+0x116/0x1d0 [ 26.533196] ? __pfx_kthread+0x10/0x10 [ 26.533219] ret_from_fork_asm+0x1a/0x30 [ 26.533251] </TASK> [ 26.533263] [ 26.544023] Allocated by task 315: [ 26.544340] kasan_save_stack+0x45/0x70 [ 26.544633] kasan_save_track+0x18/0x40 [ 26.544824] kasan_save_alloc_info+0x3b/0x50 [ 26.545014] __kasan_kmalloc+0xb7/0xc0 [ 26.545181] __kmalloc_cache_noprof+0x189/0x420 [ 26.545834] kasan_atomics+0x95/0x310 [ 26.545994] kunit_try_run_case+0x1a5/0x480 [ 26.546419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.546765] kthread+0x337/0x6f0 [ 26.546934] ret_from_fork+0x116/0x1d0 [ 26.547095] ret_from_fork_asm+0x1a/0x30 [ 26.547278] [ 26.547616] The buggy address belongs to the object at ffff88810613ea80 [ 26.547616] which belongs to the cache kmalloc-64 of size 64 [ 26.548119] The buggy address is located 0 bytes to the right of [ 26.548119] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.548897] [ 26.549014] The buggy address belongs to the physical page: [ 26.549524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.549903] flags: 0x200000000000000(node=0|zone=2) [ 26.550128] page_type: f5(slab) [ 26.550273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.550975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.551217] page dumped because: kasan: bad access detected [ 26.551397] [ 26.551465] Memory state around the buggy address: [ 26.551618] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.552029] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.552457] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.553128] ^ [ 26.553563] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.553984] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.554202] ================================================================== [ 26.345144] ================================================================== [ 26.346004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 26.346781] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.347515] [ 26.347843] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.347900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.347914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.347940] Call Trace: [ 26.347962] <TASK> [ 26.347981] dump_stack_lvl+0x73/0xb0 [ 26.348109] print_report+0xd1/0x610 [ 26.348133] ? __virt_addr_valid+0x1db/0x2d0 [ 26.348160] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.348183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.348210] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.348234] kasan_report+0x141/0x180 [ 26.348257] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.348350] __asan_report_store4_noabort+0x1b/0x30 [ 26.348379] kasan_atomics_helper+0x4b6e/0x5450 [ 26.348402] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.348443] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.348470] ? kasan_atomics+0x152/0x310 [ 26.348498] kasan_atomics+0x1dc/0x310 [ 26.348521] ? __pfx_kasan_atomics+0x10/0x10 [ 26.348546] ? __pfx_read_tsc+0x10/0x10 [ 26.348570] ? ktime_get_ts64+0x86/0x230 [ 26.348596] kunit_try_run_case+0x1a5/0x480 [ 26.348620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.348642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.348668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.348694] ? __kthread_parkme+0x82/0x180 [ 26.348716] ? preempt_count_sub+0x50/0x80 [ 26.348755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.348778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.348804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.348831] kthread+0x337/0x6f0 [ 26.348854] ? trace_preempt_on+0x20/0xc0 [ 26.348879] ? __pfx_kthread+0x10/0x10 [ 26.348902] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.348925] ? calculate_sigpending+0x7b/0xa0 [ 26.348951] ? __pfx_kthread+0x10/0x10 [ 26.348976] ret_from_fork+0x116/0x1d0 [ 26.348996] ? __pfx_kthread+0x10/0x10 [ 26.349019] ret_from_fork_asm+0x1a/0x30 [ 26.349052] </TASK> [ 26.349064] [ 26.360662] Allocated by task 315: [ 26.360813] kasan_save_stack+0x45/0x70 [ 26.361177] kasan_save_track+0x18/0x40 [ 26.361640] kasan_save_alloc_info+0x3b/0x50 [ 26.361828] __kasan_kmalloc+0xb7/0xc0 [ 26.362120] __kmalloc_cache_noprof+0x189/0x420 [ 26.362284] kasan_atomics+0x95/0x310 [ 26.362767] kunit_try_run_case+0x1a5/0x480 [ 26.362986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.363416] kthread+0x337/0x6f0 [ 26.363771] ret_from_fork+0x116/0x1d0 [ 26.363919] ret_from_fork_asm+0x1a/0x30 [ 26.364229] [ 26.364404] The buggy address belongs to the object at ffff88810613ea80 [ 26.364404] which belongs to the cache kmalloc-64 of size 64 [ 26.365109] The buggy address is located 0 bytes to the right of [ 26.365109] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.365803] [ 26.365999] The buggy address belongs to the physical page: [ 26.366187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.366994] flags: 0x200000000000000(node=0|zone=2) [ 26.367180] page_type: f5(slab) [ 26.367638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.368036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.368330] page dumped because: kasan: bad access detected [ 26.368753] [ 26.368853] Memory state around the buggy address: [ 26.369075] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.369646] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.370048] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.370468] ^ [ 26.370818] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.371213] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.371838] ================================================================== [ 26.682756] ================================================================== [ 26.683113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 26.683519] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.683951] [ 26.684104] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.684159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.684184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.684210] Call Trace: [ 26.684256] <TASK> [ 26.684275] dump_stack_lvl+0x73/0xb0 [ 26.684308] print_report+0xd1/0x610 [ 26.684396] ? __virt_addr_valid+0x1db/0x2d0 [ 26.684467] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.684489] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.684518] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.684551] kasan_report+0x141/0x180 [ 26.684574] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.684601] kasan_check_range+0x10c/0x1c0 [ 26.684627] __kasan_check_write+0x18/0x20 [ 26.684676] kasan_atomics_helper+0xa2b/0x5450 [ 26.684700] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.684727] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.684772] ? kasan_atomics+0x152/0x310 [ 26.684799] kasan_atomics+0x1dc/0x310 [ 26.684850] ? __pfx_kasan_atomics+0x10/0x10 [ 26.684875] ? __pfx_read_tsc+0x10/0x10 [ 26.684899] ? ktime_get_ts64+0x86/0x230 [ 26.684936] kunit_try_run_case+0x1a5/0x480 [ 26.684961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.685008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.685052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.685088] ? __kthread_parkme+0x82/0x180 [ 26.685110] ? preempt_count_sub+0x50/0x80 [ 26.685136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.685159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.685186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.685213] kthread+0x337/0x6f0 [ 26.685237] ? trace_preempt_on+0x20/0xc0 [ 26.685261] ? __pfx_kthread+0x10/0x10 [ 26.685345] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.685383] ? calculate_sigpending+0x7b/0xa0 [ 26.685419] ? __pfx_kthread+0x10/0x10 [ 26.685453] ret_from_fork+0x116/0x1d0 [ 26.685475] ? __pfx_kthread+0x10/0x10 [ 26.685509] ret_from_fork_asm+0x1a/0x30 [ 26.685543] </TASK> [ 26.685556] [ 26.695147] Allocated by task 315: [ 26.695338] kasan_save_stack+0x45/0x70 [ 26.695639] kasan_save_track+0x18/0x40 [ 26.695869] kasan_save_alloc_info+0x3b/0x50 [ 26.696032] __kasan_kmalloc+0xb7/0xc0 [ 26.696260] __kmalloc_cache_noprof+0x189/0x420 [ 26.696677] kasan_atomics+0x95/0x310 [ 26.696875] kunit_try_run_case+0x1a5/0x480 [ 26.697088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.697455] kthread+0x337/0x6f0 [ 26.697651] ret_from_fork+0x116/0x1d0 [ 26.697867] ret_from_fork_asm+0x1a/0x30 [ 26.698079] [ 26.698203] The buggy address belongs to the object at ffff88810613ea80 [ 26.698203] which belongs to the cache kmalloc-64 of size 64 [ 26.699090] The buggy address is located 0 bytes to the right of [ 26.699090] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.699707] [ 26.699814] The buggy address belongs to the physical page: [ 26.700057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.700293] flags: 0x200000000000000(node=0|zone=2) [ 26.700828] page_type: f5(slab) [ 26.701063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.701522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.701935] page dumped because: kasan: bad access detected [ 26.702230] [ 26.702362] Memory state around the buggy address: [ 26.702654] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.702985] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.703343] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.703722] ^ [ 26.703985] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.704383] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.704899] ================================================================== [ 26.798004] ================================================================== [ 26.798256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 26.798662] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.799286] [ 26.799451] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.799520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.799535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.799561] Call Trace: [ 26.799596] <TASK> [ 26.799618] dump_stack_lvl+0x73/0xb0 [ 26.799664] print_report+0xd1/0x610 [ 26.799689] ? __virt_addr_valid+0x1db/0x2d0 [ 26.799715] ? kasan_atomics_helper+0xd47/0x5450 [ 26.799755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.799783] ? kasan_atomics_helper+0xd47/0x5450 [ 26.799805] kasan_report+0x141/0x180 [ 26.799841] ? kasan_atomics_helper+0xd47/0x5450 [ 26.799868] kasan_check_range+0x10c/0x1c0 [ 26.799998] __kasan_check_write+0x18/0x20 [ 26.800030] kasan_atomics_helper+0xd47/0x5450 [ 26.800065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.800092] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.800119] ? kasan_atomics+0x152/0x310 [ 26.800146] kasan_atomics+0x1dc/0x310 [ 26.800170] ? __pfx_kasan_atomics+0x10/0x10 [ 26.800195] ? __pfx_read_tsc+0x10/0x10 [ 26.800218] ? ktime_get_ts64+0x86/0x230 [ 26.800246] kunit_try_run_case+0x1a5/0x480 [ 26.800312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.800344] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.800370] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.800394] ? __kthread_parkme+0x82/0x180 [ 26.800426] ? preempt_count_sub+0x50/0x80 [ 26.800451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.800476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.800504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.800532] kthread+0x337/0x6f0 [ 26.800556] ? trace_preempt_on+0x20/0xc0 [ 26.800581] ? __pfx_kthread+0x10/0x10 [ 26.800606] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.800629] ? calculate_sigpending+0x7b/0xa0 [ 26.800656] ? __pfx_kthread+0x10/0x10 [ 26.800679] ret_from_fork+0x116/0x1d0 [ 26.800701] ? __pfx_kthread+0x10/0x10 [ 26.800725] ret_from_fork_asm+0x1a/0x30 [ 26.800770] </TASK> [ 26.800783] [ 26.809690] Allocated by task 315: [ 26.809938] kasan_save_stack+0x45/0x70 [ 26.810172] kasan_save_track+0x18/0x40 [ 26.810307] kasan_save_alloc_info+0x3b/0x50 [ 26.810452] __kasan_kmalloc+0xb7/0xc0 [ 26.810633] __kmalloc_cache_noprof+0x189/0x420 [ 26.810933] kasan_atomics+0x95/0x310 [ 26.811128] kunit_try_run_case+0x1a5/0x480 [ 26.811333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.811588] kthread+0x337/0x6f0 [ 26.811752] ret_from_fork+0x116/0x1d0 [ 26.812023] ret_from_fork_asm+0x1a/0x30 [ 26.812335] [ 26.812451] The buggy address belongs to the object at ffff88810613ea80 [ 26.812451] which belongs to the cache kmalloc-64 of size 64 [ 26.813549] The buggy address is located 0 bytes to the right of [ 26.813549] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.814650] [ 26.814846] The buggy address belongs to the physical page: [ 26.815390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.816188] flags: 0x200000000000000(node=0|zone=2) [ 26.816806] page_type: f5(slab) [ 26.817172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.817988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.819405] page dumped because: kasan: bad access detected [ 26.819746] [ 26.820057] Memory state around the buggy address: [ 26.820709] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.821039] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.821654] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.822098] ^ [ 26.822758] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.823333] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.823982] ================================================================== [ 27.450037] ================================================================== [ 27.450709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 27.451039] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.451260] [ 27.451473] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.451537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.451551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.451577] Call Trace: [ 27.451596] <TASK> [ 27.451613] dump_stack_lvl+0x73/0xb0 [ 27.451645] print_report+0xd1/0x610 [ 27.451668] ? __virt_addr_valid+0x1db/0x2d0 [ 27.451694] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.451715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.451756] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.451779] kasan_report+0x141/0x180 [ 27.451802] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.451828] kasan_check_range+0x10c/0x1c0 [ 27.451853] __kasan_check_write+0x18/0x20 [ 27.451876] kasan_atomics_helper+0x19e3/0x5450 [ 27.451900] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.451926] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.451952] ? kasan_atomics+0x152/0x310 [ 27.451979] kasan_atomics+0x1dc/0x310 [ 27.452002] ? __pfx_kasan_atomics+0x10/0x10 [ 27.452027] ? __pfx_read_tsc+0x10/0x10 [ 27.452050] ? ktime_get_ts64+0x86/0x230 [ 27.452077] kunit_try_run_case+0x1a5/0x480 [ 27.452100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.452122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.452146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.452172] ? __kthread_parkme+0x82/0x180 [ 27.452194] ? preempt_count_sub+0x50/0x80 [ 27.452219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.452243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.452269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.452344] kthread+0x337/0x6f0 [ 27.452369] ? trace_preempt_on+0x20/0xc0 [ 27.452394] ? __pfx_kthread+0x10/0x10 [ 27.452429] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.452453] ? calculate_sigpending+0x7b/0xa0 [ 27.452479] ? __pfx_kthread+0x10/0x10 [ 27.452503] ret_from_fork+0x116/0x1d0 [ 27.452523] ? __pfx_kthread+0x10/0x10 [ 27.452546] ret_from_fork_asm+0x1a/0x30 [ 27.452578] </TASK> [ 27.452591] [ 27.464141] Allocated by task 315: [ 27.464460] kasan_save_stack+0x45/0x70 [ 27.464697] kasan_save_track+0x18/0x40 [ 27.464888] kasan_save_alloc_info+0x3b/0x50 [ 27.465036] __kasan_kmalloc+0xb7/0xc0 [ 27.465211] __kmalloc_cache_noprof+0x189/0x420 [ 27.465509] kasan_atomics+0x95/0x310 [ 27.465817] kunit_try_run_case+0x1a5/0x480 [ 27.466071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.466445] kthread+0x337/0x6f0 [ 27.466762] ret_from_fork+0x116/0x1d0 [ 27.466906] ret_from_fork_asm+0x1a/0x30 [ 27.467045] [ 27.467114] The buggy address belongs to the object at ffff88810613ea80 [ 27.467114] which belongs to the cache kmalloc-64 of size 64 [ 27.467649] The buggy address is located 0 bytes to the right of [ 27.467649] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.468192] [ 27.468292] The buggy address belongs to the physical page: [ 27.469304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.469815] flags: 0x200000000000000(node=0|zone=2) [ 27.469991] page_type: f5(slab) [ 27.470111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.470347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.470571] page dumped because: kasan: bad access detected [ 27.470745] [ 27.470811] Memory state around the buggy address: [ 27.470965] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.471178] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.471389] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.471598] ^ [ 27.471821] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.472433] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.473027] ================================================================== [ 27.361405] ================================================================== [ 27.362225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 27.362916] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.363748] [ 27.364099] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.364166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.364181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.364205] Call Trace: [ 27.364227] <TASK> [ 27.364246] dump_stack_lvl+0x73/0xb0 [ 27.364401] print_report+0xd1/0x610 [ 27.364435] ? __virt_addr_valid+0x1db/0x2d0 [ 27.364480] ? kasan_atomics_helper+0x1818/0x5450 [ 27.364503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.364530] ? kasan_atomics_helper+0x1818/0x5450 [ 27.364552] kasan_report+0x141/0x180 [ 27.364575] ? kasan_atomics_helper+0x1818/0x5450 [ 27.364601] kasan_check_range+0x10c/0x1c0 [ 27.364626] __kasan_check_write+0x18/0x20 [ 27.364650] kasan_atomics_helper+0x1818/0x5450 [ 27.364673] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.364700] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.364726] ? kasan_atomics+0x152/0x310 [ 27.364780] kasan_atomics+0x1dc/0x310 [ 27.364805] ? __pfx_kasan_atomics+0x10/0x10 [ 27.364830] ? __pfx_read_tsc+0x10/0x10 [ 27.364853] ? ktime_get_ts64+0x86/0x230 [ 27.364880] kunit_try_run_case+0x1a5/0x480 [ 27.364904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.364926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.364971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.364997] ? __kthread_parkme+0x82/0x180 [ 27.365022] ? preempt_count_sub+0x50/0x80 [ 27.365048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.365072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.365099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.365126] kthread+0x337/0x6f0 [ 27.365149] ? trace_preempt_on+0x20/0xc0 [ 27.365174] ? __pfx_kthread+0x10/0x10 [ 27.365197] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.365221] ? calculate_sigpending+0x7b/0xa0 [ 27.365248] ? __pfx_kthread+0x10/0x10 [ 27.365289] ret_from_fork+0x116/0x1d0 [ 27.365317] ? __pfx_kthread+0x10/0x10 [ 27.365341] ret_from_fork_asm+0x1a/0x30 [ 27.365373] </TASK> [ 27.365386] [ 27.377954] Allocated by task 315: [ 27.378170] kasan_save_stack+0x45/0x70 [ 27.378326] kasan_save_track+0x18/0x40 [ 27.378458] kasan_save_alloc_info+0x3b/0x50 [ 27.378773] __kasan_kmalloc+0xb7/0xc0 [ 27.379135] __kmalloc_cache_noprof+0x189/0x420 [ 27.379289] kasan_atomics+0x95/0x310 [ 27.379417] kunit_try_run_case+0x1a5/0x480 [ 27.379556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.380051] kthread+0x337/0x6f0 [ 27.380282] ret_from_fork+0x116/0x1d0 [ 27.380441] ret_from_fork_asm+0x1a/0x30 [ 27.380628] [ 27.380695] The buggy address belongs to the object at ffff88810613ea80 [ 27.380695] which belongs to the cache kmalloc-64 of size 64 [ 27.381144] The buggy address is located 0 bytes to the right of [ 27.381144] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.381902] [ 27.382100] The buggy address belongs to the physical page: [ 27.382314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.382810] flags: 0x200000000000000(node=0|zone=2) [ 27.383200] page_type: f5(slab) [ 27.383340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.383565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.383911] page dumped because: kasan: bad access detected [ 27.384352] [ 27.384448] Memory state around the buggy address: [ 27.384695] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.384945] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.385291] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.385639] ^ [ 27.385936] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.386149] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.386416] ================================================================== [ 26.399562] ================================================================== [ 26.399888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 26.400208] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.401396] [ 26.401631] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.401779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.401797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.401821] Call Trace: [ 26.401838] <TASK> [ 26.401859] dump_stack_lvl+0x73/0xb0 [ 26.401894] print_report+0xd1/0x610 [ 26.401919] ? __virt_addr_valid+0x1db/0x2d0 [ 26.401945] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.401968] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.401995] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.402017] kasan_report+0x141/0x180 [ 26.402041] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.402067] __asan_report_load4_noabort+0x18/0x20 [ 26.402092] kasan_atomics_helper+0x4b54/0x5450 [ 26.402115] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.402142] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.402169] ? kasan_atomics+0x152/0x310 [ 26.402196] kasan_atomics+0x1dc/0x310 [ 26.402218] ? __pfx_kasan_atomics+0x10/0x10 [ 26.402243] ? __pfx_read_tsc+0x10/0x10 [ 26.402285] ? ktime_get_ts64+0x86/0x230 [ 26.402324] kunit_try_run_case+0x1a5/0x480 [ 26.402348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.402369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.402396] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.402429] ? __kthread_parkme+0x82/0x180 [ 26.402452] ? preempt_count_sub+0x50/0x80 [ 26.402478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.402501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.402528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.402555] kthread+0x337/0x6f0 [ 26.402577] ? trace_preempt_on+0x20/0xc0 [ 26.402602] ? __pfx_kthread+0x10/0x10 [ 26.402625] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.402648] ? calculate_sigpending+0x7b/0xa0 [ 26.402675] ? __pfx_kthread+0x10/0x10 [ 26.402698] ret_from_fork+0x116/0x1d0 [ 26.402719] ? __pfx_kthread+0x10/0x10 [ 26.402753] ret_from_fork_asm+0x1a/0x30 [ 26.402785] </TASK> [ 26.402798] [ 26.414145] Allocated by task 315: [ 26.414467] kasan_save_stack+0x45/0x70 [ 26.414844] kasan_save_track+0x18/0x40 [ 26.415028] kasan_save_alloc_info+0x3b/0x50 [ 26.415393] __kasan_kmalloc+0xb7/0xc0 [ 26.415557] __kmalloc_cache_noprof+0x189/0x420 [ 26.415915] kasan_atomics+0x95/0x310 [ 26.416488] kunit_try_run_case+0x1a5/0x480 [ 26.416708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.416982] kthread+0x337/0x6f0 [ 26.417147] ret_from_fork+0x116/0x1d0 [ 26.417717] ret_from_fork_asm+0x1a/0x30 [ 26.417926] [ 26.418006] The buggy address belongs to the object at ffff88810613ea80 [ 26.418006] which belongs to the cache kmalloc-64 of size 64 [ 26.419018] The buggy address is located 0 bytes to the right of [ 26.419018] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.419742] [ 26.419826] The buggy address belongs to the physical page: [ 26.420245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.420864] flags: 0x200000000000000(node=0|zone=2) [ 26.421325] page_type: f5(slab) [ 26.421515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.422021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.422505] page dumped because: kasan: bad access detected [ 26.422855] [ 26.422931] Memory state around the buggy address: [ 26.423166] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.423690] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.424130] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.424624] ^ [ 26.424945] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.425511] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.425935] ================================================================== [ 27.749599] ================================================================== [ 27.750172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 27.750583] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.750821] [ 27.750901] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.750951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.750964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.750988] Call Trace: [ 27.751005] <TASK> [ 27.751021] dump_stack_lvl+0x73/0xb0 [ 27.751052] print_report+0xd1/0x610 [ 27.751075] ? __virt_addr_valid+0x1db/0x2d0 [ 27.751099] ? kasan_atomics_helper+0x2006/0x5450 [ 27.751122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.751149] ? kasan_atomics_helper+0x2006/0x5450 [ 27.751172] kasan_report+0x141/0x180 [ 27.751195] ? kasan_atomics_helper+0x2006/0x5450 [ 27.751222] kasan_check_range+0x10c/0x1c0 [ 27.751247] __kasan_check_write+0x18/0x20 [ 27.751284] kasan_atomics_helper+0x2006/0x5450 [ 27.751308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.751348] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.751374] ? kasan_atomics+0x152/0x310 [ 27.751401] kasan_atomics+0x1dc/0x310 [ 27.751425] ? __pfx_kasan_atomics+0x10/0x10 [ 27.751450] ? __pfx_read_tsc+0x10/0x10 [ 27.751475] ? ktime_get_ts64+0x86/0x230 [ 27.751502] kunit_try_run_case+0x1a5/0x480 [ 27.751525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.751547] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.751582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.751607] ? __kthread_parkme+0x82/0x180 [ 27.751630] ? preempt_count_sub+0x50/0x80 [ 27.751673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.751697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.751722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.751759] kthread+0x337/0x6f0 [ 27.751790] ? trace_preempt_on+0x20/0xc0 [ 27.751815] ? __pfx_kthread+0x10/0x10 [ 27.751838] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.751872] ? calculate_sigpending+0x7b/0xa0 [ 27.751897] ? __pfx_kthread+0x10/0x10 [ 27.751922] ret_from_fork+0x116/0x1d0 [ 27.751941] ? __pfx_kthread+0x10/0x10 [ 27.751974] ret_from_fork_asm+0x1a/0x30 [ 27.752007] </TASK> [ 27.752019] [ 27.761530] Allocated by task 315: [ 27.762525] kasan_save_stack+0x45/0x70 [ 27.763877] kasan_save_track+0x18/0x40 [ 27.764030] kasan_save_alloc_info+0x3b/0x50 [ 27.764178] __kasan_kmalloc+0xb7/0xc0 [ 27.764578] __kmalloc_cache_noprof+0x189/0x420 [ 27.764811] kasan_atomics+0x95/0x310 [ 27.765085] kunit_try_run_case+0x1a5/0x480 [ 27.765621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.765908] kthread+0x337/0x6f0 [ 27.766063] ret_from_fork+0x116/0x1d0 [ 27.766236] ret_from_fork_asm+0x1a/0x30 [ 27.766370] [ 27.766437] The buggy address belongs to the object at ffff88810613ea80 [ 27.766437] which belongs to the cache kmalloc-64 of size 64 [ 27.766833] The buggy address is located 0 bytes to the right of [ 27.766833] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.767372] [ 27.767529] The buggy address belongs to the physical page: [ 27.767697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.767970] flags: 0x200000000000000(node=0|zone=2) [ 27.768127] page_type: f5(slab) [ 27.768240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.768564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.768789] page dumped because: kasan: bad access detected [ 27.769547] [ 27.769623] Memory state around the buggy address: [ 27.769883] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.770212] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.770802] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.771137] ^ [ 27.771361] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.771718] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.772057] ================================================================== [ 26.452140] ================================================================== [ 26.452380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 26.453575] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.454430] [ 26.454796] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.454857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.454880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.454908] Call Trace: [ 26.454933] <TASK> [ 26.454953] dump_stack_lvl+0x73/0xb0 [ 26.454988] print_report+0xd1/0x610 [ 26.455011] ? __virt_addr_valid+0x1db/0x2d0 [ 26.455037] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.455059] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.455092] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.455117] kasan_report+0x141/0x180 [ 26.455140] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.455167] __asan_report_store4_noabort+0x1b/0x30 [ 26.455368] kasan_atomics_helper+0x4b3a/0x5450 [ 26.455453] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.455485] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.455513] ? kasan_atomics+0x152/0x310 [ 26.455541] kasan_atomics+0x1dc/0x310 [ 26.455564] ? __pfx_kasan_atomics+0x10/0x10 [ 26.455590] ? __pfx_read_tsc+0x10/0x10 [ 26.455615] ? ktime_get_ts64+0x86/0x230 [ 26.455641] kunit_try_run_case+0x1a5/0x480 [ 26.455665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.455686] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.455713] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.455750] ? __kthread_parkme+0x82/0x180 [ 26.455788] ? preempt_count_sub+0x50/0x80 [ 26.455833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.455857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.455884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.455910] kthread+0x337/0x6f0 [ 26.455933] ? trace_preempt_on+0x20/0xc0 [ 26.455958] ? __pfx_kthread+0x10/0x10 [ 26.455981] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.456004] ? calculate_sigpending+0x7b/0xa0 [ 26.456030] ? __pfx_kthread+0x10/0x10 [ 26.456055] ret_from_fork+0x116/0x1d0 [ 26.456075] ? __pfx_kthread+0x10/0x10 [ 26.456097] ret_from_fork_asm+0x1a/0x30 [ 26.456131] </TASK> [ 26.456143] [ 26.469629] Allocated by task 315: [ 26.469815] kasan_save_stack+0x45/0x70 [ 26.470032] kasan_save_track+0x18/0x40 [ 26.470212] kasan_save_alloc_info+0x3b/0x50 [ 26.470828] __kasan_kmalloc+0xb7/0xc0 [ 26.471020] __kmalloc_cache_noprof+0x189/0x420 [ 26.471193] kasan_atomics+0x95/0x310 [ 26.471408] kunit_try_run_case+0x1a5/0x480 [ 26.471672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.471921] kthread+0x337/0x6f0 [ 26.472080] ret_from_fork+0x116/0x1d0 [ 26.472249] ret_from_fork_asm+0x1a/0x30 [ 26.472977] [ 26.473056] The buggy address belongs to the object at ffff88810613ea80 [ 26.473056] which belongs to the cache kmalloc-64 of size 64 [ 26.473719] The buggy address is located 0 bytes to the right of [ 26.473719] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.474249] [ 26.474343] The buggy address belongs to the physical page: [ 26.474567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.475261] flags: 0x200000000000000(node=0|zone=2) [ 26.475655] page_type: f5(slab) [ 26.475829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.476257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.476840] page dumped because: kasan: bad access detected [ 26.477162] [ 26.477246] Memory state around the buggy address: [ 26.477447] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.477977] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.478598] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.478908] ^ [ 26.479123] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.479714] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.480022] ================================================================== [ 26.962569] ================================================================== [ 26.963368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 26.963938] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.964169] [ 26.964270] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.964329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.964344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.964369] Call Trace: [ 26.964392] <TASK> [ 26.964417] dump_stack_lvl+0x73/0xb0 [ 26.964452] print_report+0xd1/0x610 [ 26.964474] ? __virt_addr_valid+0x1db/0x2d0 [ 26.964501] ? kasan_atomics_helper+0x4a1c/0x5450 [ 26.964525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.964552] ? kasan_atomics_helper+0x4a1c/0x5450 [ 26.964575] kasan_report+0x141/0x180 [ 26.964597] ? kasan_atomics_helper+0x4a1c/0x5450 [ 26.964625] __asan_report_load4_noabort+0x18/0x20 [ 26.964650] kasan_atomics_helper+0x4a1c/0x5450 [ 26.964672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.964699] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.964725] ? kasan_atomics+0x152/0x310 [ 26.965499] kasan_atomics+0x1dc/0x310 [ 26.965530] ? __pfx_kasan_atomics+0x10/0x10 [ 26.965557] ? __pfx_read_tsc+0x10/0x10 [ 26.965585] ? ktime_get_ts64+0x86/0x230 [ 26.965613] kunit_try_run_case+0x1a5/0x480 [ 26.965638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.965661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.965687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.965712] ? __kthread_parkme+0x82/0x180 [ 26.965747] ? preempt_count_sub+0x50/0x80 [ 26.965772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.965795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.965822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.965849] kthread+0x337/0x6f0 [ 26.965872] ? trace_preempt_on+0x20/0xc0 [ 26.965897] ? __pfx_kthread+0x10/0x10 [ 26.965920] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.965944] ? calculate_sigpending+0x7b/0xa0 [ 26.965971] ? __pfx_kthread+0x10/0x10 [ 26.965995] ret_from_fork+0x116/0x1d0 [ 26.966015] ? __pfx_kthread+0x10/0x10 [ 26.966038] ret_from_fork_asm+0x1a/0x30 [ 26.966072] </TASK> [ 26.966088] [ 26.980849] Allocated by task 315: [ 26.981505] kasan_save_stack+0x45/0x70 [ 26.981917] kasan_save_track+0x18/0x40 [ 26.982277] kasan_save_alloc_info+0x3b/0x50 [ 26.983020] __kasan_kmalloc+0xb7/0xc0 [ 26.983498] __kmalloc_cache_noprof+0x189/0x420 [ 26.983873] kasan_atomics+0x95/0x310 [ 26.984017] kunit_try_run_case+0x1a5/0x480 [ 26.984159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.984346] kthread+0x337/0x6f0 [ 26.984466] ret_from_fork+0x116/0x1d0 [ 26.984596] ret_from_fork_asm+0x1a/0x30 [ 26.984742] [ 26.984813] The buggy address belongs to the object at ffff88810613ea80 [ 26.984813] which belongs to the cache kmalloc-64 of size 64 [ 26.985247] The buggy address is located 0 bytes to the right of [ 26.985247] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.985939] [ 26.986049] The buggy address belongs to the physical page: [ 26.986255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.987010] flags: 0x200000000000000(node=0|zone=2) [ 26.987560] page_type: f5(slab) [ 26.987972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.988700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.989657] page dumped because: kasan: bad access detected [ 26.990077] [ 26.990147] Memory state around the buggy address: [ 26.990498] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.991340] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.991841] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.992055] ^ [ 26.992205] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.992421] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.992628] ================================================================== [ 26.661017] ================================================================== [ 26.661462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 26.661828] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.662166] [ 26.662316] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.662382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.662396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.662466] Call Trace: [ 26.662510] <TASK> [ 26.662539] dump_stack_lvl+0x73/0xb0 [ 26.662573] print_report+0xd1/0x610 [ 26.662607] ? __virt_addr_valid+0x1db/0x2d0 [ 26.662634] ? kasan_atomics_helper+0x992/0x5450 [ 26.662656] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.662707] ? kasan_atomics_helper+0x992/0x5450 [ 26.662745] kasan_report+0x141/0x180 [ 26.662768] ? kasan_atomics_helper+0x992/0x5450 [ 26.662795] kasan_check_range+0x10c/0x1c0 [ 26.662820] __kasan_check_write+0x18/0x20 [ 26.662843] kasan_atomics_helper+0x992/0x5450 [ 26.662867] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.662894] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.662920] ? kasan_atomics+0x152/0x310 [ 26.662947] kasan_atomics+0x1dc/0x310 [ 26.662999] ? __pfx_kasan_atomics+0x10/0x10 [ 26.663024] ? __pfx_read_tsc+0x10/0x10 [ 26.663073] ? ktime_get_ts64+0x86/0x230 [ 26.663114] kunit_try_run_case+0x1a5/0x480 [ 26.663151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.663173] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.663199] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.663238] ? __kthread_parkme+0x82/0x180 [ 26.663275] ? preempt_count_sub+0x50/0x80 [ 26.663300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.663323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.663350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.663377] kthread+0x337/0x6f0 [ 26.663480] ? trace_preempt_on+0x20/0xc0 [ 26.663517] ? __pfx_kthread+0x10/0x10 [ 26.663540] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.663565] ? calculate_sigpending+0x7b/0xa0 [ 26.663591] ? __pfx_kthread+0x10/0x10 [ 26.663616] ret_from_fork+0x116/0x1d0 [ 26.663636] ? __pfx_kthread+0x10/0x10 [ 26.663659] ret_from_fork_asm+0x1a/0x30 [ 26.663692] </TASK> [ 26.663705] [ 26.672857] Allocated by task 315: [ 26.672996] kasan_save_stack+0x45/0x70 [ 26.673141] kasan_save_track+0x18/0x40 [ 26.673271] kasan_save_alloc_info+0x3b/0x50 [ 26.673495] __kasan_kmalloc+0xb7/0xc0 [ 26.673681] __kmalloc_cache_noprof+0x189/0x420 [ 26.674033] kasan_atomics+0x95/0x310 [ 26.674269] kunit_try_run_case+0x1a5/0x480 [ 26.674538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.675035] kthread+0x337/0x6f0 [ 26.675224] ret_from_fork+0x116/0x1d0 [ 26.675526] ret_from_fork_asm+0x1a/0x30 [ 26.675782] [ 26.675873] The buggy address belongs to the object at ffff88810613ea80 [ 26.675873] which belongs to the cache kmalloc-64 of size 64 [ 26.676301] The buggy address is located 0 bytes to the right of [ 26.676301] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.676878] [ 26.677016] The buggy address belongs to the physical page: [ 26.677601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.677993] flags: 0x200000000000000(node=0|zone=2) [ 26.678258] page_type: f5(slab) [ 26.678498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.678727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.679115] page dumped because: kasan: bad access detected [ 26.679518] [ 26.679625] Memory state around the buggy address: [ 26.679873] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.680212] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.680604] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.680868] ^ [ 26.681073] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.681691] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.681942] ================================================================== [ 26.887607] ================================================================== [ 26.887919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 26.888148] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.888777] [ 26.888872] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.888925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.888940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.888964] Call Trace: [ 26.888986] <TASK> [ 26.889006] dump_stack_lvl+0x73/0xb0 [ 26.889038] print_report+0xd1/0x610 [ 26.889062] ? __virt_addr_valid+0x1db/0x2d0 [ 26.889088] ? kasan_atomics_helper+0xfa9/0x5450 [ 26.889123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.889161] ? kasan_atomics_helper+0xfa9/0x5450 [ 26.889184] kasan_report+0x141/0x180 [ 26.889207] ? kasan_atomics_helper+0xfa9/0x5450 [ 26.889245] kasan_check_range+0x10c/0x1c0 [ 26.889313] __kasan_check_write+0x18/0x20 [ 26.889342] kasan_atomics_helper+0xfa9/0x5450 [ 26.889366] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.889403] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.889438] ? kasan_atomics+0x152/0x310 [ 26.889476] kasan_atomics+0x1dc/0x310 [ 26.889501] ? __pfx_kasan_atomics+0x10/0x10 [ 26.889529] ? __pfx_read_tsc+0x10/0x10 [ 26.889555] ? ktime_get_ts64+0x86/0x230 [ 26.889583] kunit_try_run_case+0x1a5/0x480 [ 26.889610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.889632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.889659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.889684] ? __kthread_parkme+0x82/0x180 [ 26.889708] ? preempt_count_sub+0x50/0x80 [ 26.889745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.889769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.889797] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.889824] kthread+0x337/0x6f0 [ 26.889847] ? trace_preempt_on+0x20/0xc0 [ 26.889872] ? __pfx_kthread+0x10/0x10 [ 26.889895] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.889919] ? calculate_sigpending+0x7b/0xa0 [ 26.889945] ? __pfx_kthread+0x10/0x10 [ 26.889969] ret_from_fork+0x116/0x1d0 [ 26.889991] ? __pfx_kthread+0x10/0x10 [ 26.890015] ret_from_fork_asm+0x1a/0x30 [ 26.890049] </TASK> [ 26.890062] [ 26.898818] Allocated by task 315: [ 26.899006] kasan_save_stack+0x45/0x70 [ 26.899210] kasan_save_track+0x18/0x40 [ 26.899489] kasan_save_alloc_info+0x3b/0x50 [ 26.899641] __kasan_kmalloc+0xb7/0xc0 [ 26.899783] __kmalloc_cache_noprof+0x189/0x420 [ 26.900013] kasan_atomics+0x95/0x310 [ 26.900212] kunit_try_run_case+0x1a5/0x480 [ 26.900641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.900911] kthread+0x337/0x6f0 [ 26.901067] ret_from_fork+0x116/0x1d0 [ 26.901200] ret_from_fork_asm+0x1a/0x30 [ 26.901412] [ 26.901561] The buggy address belongs to the object at ffff88810613ea80 [ 26.901561] which belongs to the cache kmalloc-64 of size 64 [ 26.902083] The buggy address is located 0 bytes to the right of [ 26.902083] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.902779] [ 26.902884] The buggy address belongs to the physical page: [ 26.903207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.903651] flags: 0x200000000000000(node=0|zone=2) [ 26.903879] page_type: f5(slab) [ 26.904059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.904298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.904524] page dumped because: kasan: bad access detected [ 26.904689] [ 26.904789] Memory state around the buggy address: [ 26.905008] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.905540] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.905792] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.905997] ^ [ 26.906143] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.906918] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.907331] ================================================================== [ 27.309662] ================================================================== [ 27.310022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 27.310523] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.310815] [ 27.310930] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.310994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.311009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.311043] Call Trace: [ 27.311063] <TASK> [ 27.311082] dump_stack_lvl+0x73/0xb0 [ 27.311114] print_report+0xd1/0x610 [ 27.311148] ? __virt_addr_valid+0x1db/0x2d0 [ 27.311173] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.311196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.311235] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.311258] kasan_report+0x141/0x180 [ 27.311343] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.311371] kasan_check_range+0x10c/0x1c0 [ 27.311396] __kasan_check_write+0x18/0x20 [ 27.311442] kasan_atomics_helper+0x16e7/0x5450 [ 27.311465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.311492] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.311527] ? kasan_atomics+0x152/0x310 [ 27.311554] kasan_atomics+0x1dc/0x310 [ 27.311578] ? __pfx_kasan_atomics+0x10/0x10 [ 27.311613] ? __pfx_read_tsc+0x10/0x10 [ 27.311637] ? ktime_get_ts64+0x86/0x230 [ 27.311664] kunit_try_run_case+0x1a5/0x480 [ 27.311694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.311717] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.311760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.311785] ? __kthread_parkme+0x82/0x180 [ 27.311808] ? preempt_count_sub+0x50/0x80 [ 27.311833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.311866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.311892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.311919] kthread+0x337/0x6f0 [ 27.311952] ? trace_preempt_on+0x20/0xc0 [ 27.311977] ? __pfx_kthread+0x10/0x10 [ 27.312001] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.312033] ? calculate_sigpending+0x7b/0xa0 [ 27.312059] ? __pfx_kthread+0x10/0x10 [ 27.312083] ret_from_fork+0x116/0x1d0 [ 27.312114] ? __pfx_kthread+0x10/0x10 [ 27.312137] ret_from_fork_asm+0x1a/0x30 [ 27.312178] </TASK> [ 27.312191] [ 27.320756] Allocated by task 315: [ 27.320897] kasan_save_stack+0x45/0x70 [ 27.321042] kasan_save_track+0x18/0x40 [ 27.321174] kasan_save_alloc_info+0x3b/0x50 [ 27.321349] __kasan_kmalloc+0xb7/0xc0 [ 27.321810] __kmalloc_cache_noprof+0x189/0x420 [ 27.322313] kasan_atomics+0x95/0x310 [ 27.322532] kunit_try_run_case+0x1a5/0x480 [ 27.322762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.322935] kthread+0x337/0x6f0 [ 27.323052] ret_from_fork+0x116/0x1d0 [ 27.323180] ret_from_fork_asm+0x1a/0x30 [ 27.323548] [ 27.323673] The buggy address belongs to the object at ffff88810613ea80 [ 27.323673] which belongs to the cache kmalloc-64 of size 64 [ 27.324334] The buggy address is located 0 bytes to the right of [ 27.324334] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.324690] [ 27.324878] The buggy address belongs to the physical page: [ 27.325328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.326101] flags: 0x200000000000000(node=0|zone=2) [ 27.326458] page_type: f5(slab) [ 27.326586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.326825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.327161] page dumped because: kasan: bad access detected [ 27.327533] [ 27.327644] Memory state around the buggy address: [ 27.327890] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.328173] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.328549] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.328870] ^ [ 27.329086] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.329592] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.330009] ================================================================== [ 27.622804] ================================================================== [ 27.623036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 27.623263] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.624536] [ 27.624822] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.624977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.624996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.625022] Call Trace: [ 27.625042] <TASK> [ 27.625062] dump_stack_lvl+0x73/0xb0 [ 27.625132] print_report+0xd1/0x610 [ 27.625157] ? __virt_addr_valid+0x1db/0x2d0 [ 27.625185] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.625208] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.625235] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.625257] kasan_report+0x141/0x180 [ 27.625280] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.625306] kasan_check_range+0x10c/0x1c0 [ 27.625330] __kasan_check_write+0x18/0x20 [ 27.625354] kasan_atomics_helper+0x1d7a/0x5450 [ 27.625378] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.625412] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.625438] ? kasan_atomics+0x152/0x310 [ 27.625465] kasan_atomics+0x1dc/0x310 [ 27.625489] ? __pfx_kasan_atomics+0x10/0x10 [ 27.625513] ? __pfx_read_tsc+0x10/0x10 [ 27.625537] ? ktime_get_ts64+0x86/0x230 [ 27.625562] kunit_try_run_case+0x1a5/0x480 [ 27.625586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.625607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.625633] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.625658] ? __kthread_parkme+0x82/0x180 [ 27.625681] ? preempt_count_sub+0x50/0x80 [ 27.625706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.625729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.625768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.625794] kthread+0x337/0x6f0 [ 27.625817] ? trace_preempt_on+0x20/0xc0 [ 27.625841] ? __pfx_kthread+0x10/0x10 [ 27.625864] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.625887] ? calculate_sigpending+0x7b/0xa0 [ 27.625914] ? __pfx_kthread+0x10/0x10 [ 27.625937] ret_from_fork+0x116/0x1d0 [ 27.625957] ? __pfx_kthread+0x10/0x10 [ 27.625979] ret_from_fork_asm+0x1a/0x30 [ 27.626012] </TASK> [ 27.626024] [ 27.637449] Allocated by task 315: [ 27.637748] kasan_save_stack+0x45/0x70 [ 27.638036] kasan_save_track+0x18/0x40 [ 27.638237] kasan_save_alloc_info+0x3b/0x50 [ 27.638584] __kasan_kmalloc+0xb7/0xc0 [ 27.638883] __kmalloc_cache_noprof+0x189/0x420 [ 27.639193] kasan_atomics+0x95/0x310 [ 27.639390] kunit_try_run_case+0x1a5/0x480 [ 27.639728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.639979] kthread+0x337/0x6f0 [ 27.640138] ret_from_fork+0x116/0x1d0 [ 27.640311] ret_from_fork_asm+0x1a/0x30 [ 27.640715] [ 27.640946] The buggy address belongs to the object at ffff88810613ea80 [ 27.640946] which belongs to the cache kmalloc-64 of size 64 [ 27.641804] The buggy address is located 0 bytes to the right of [ 27.641804] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.642578] [ 27.642682] The buggy address belongs to the physical page: [ 27.643091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.643593] flags: 0x200000000000000(node=0|zone=2) [ 27.643883] page_type: f5(slab) [ 27.644155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.644614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.645118] page dumped because: kasan: bad access detected [ 27.645310] [ 27.645379] Memory state around the buggy address: [ 27.645543] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.645769] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.645981] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.646190] ^ [ 27.646344] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.646556] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.646861] ================================================================== [ 27.038466] ================================================================== [ 27.039028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 27.039427] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.039725] [ 27.039850] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.039903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.039918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.039941] Call Trace: [ 27.039963] <TASK> [ 27.039980] dump_stack_lvl+0x73/0xb0 [ 27.040011] print_report+0xd1/0x610 [ 27.040033] ? __virt_addr_valid+0x1db/0x2d0 [ 27.040059] ? kasan_atomics_helper+0x1217/0x5450 [ 27.040103] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.040130] ? kasan_atomics_helper+0x1217/0x5450 [ 27.040153] kasan_report+0x141/0x180 [ 27.040177] ? kasan_atomics_helper+0x1217/0x5450 [ 27.040203] kasan_check_range+0x10c/0x1c0 [ 27.040228] __kasan_check_write+0x18/0x20 [ 27.040251] kasan_atomics_helper+0x1217/0x5450 [ 27.040275] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.040303] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.040336] ? kasan_atomics+0x152/0x310 [ 27.040362] kasan_atomics+0x1dc/0x310 [ 27.040389] ? __pfx_kasan_atomics+0x10/0x10 [ 27.040416] ? __pfx_read_tsc+0x10/0x10 [ 27.040442] ? ktime_get_ts64+0x86/0x230 [ 27.040467] kunit_try_run_case+0x1a5/0x480 [ 27.040492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.040514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.040540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.040565] ? __kthread_parkme+0x82/0x180 [ 27.040587] ? preempt_count_sub+0x50/0x80 [ 27.040613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.040637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.040677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.040705] kthread+0x337/0x6f0 [ 27.040762] ? trace_preempt_on+0x20/0xc0 [ 27.040806] ? __pfx_kthread+0x10/0x10 [ 27.040831] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.040854] ? calculate_sigpending+0x7b/0xa0 [ 27.040879] ? __pfx_kthread+0x10/0x10 [ 27.040904] ret_from_fork+0x116/0x1d0 [ 27.040925] ? __pfx_kthread+0x10/0x10 [ 27.040948] ret_from_fork_asm+0x1a/0x30 [ 27.040980] </TASK> [ 27.040993] [ 27.049102] Allocated by task 315: [ 27.049275] kasan_save_stack+0x45/0x70 [ 27.049494] kasan_save_track+0x18/0x40 [ 27.049706] kasan_save_alloc_info+0x3b/0x50 [ 27.049920] __kasan_kmalloc+0xb7/0xc0 [ 27.050102] __kmalloc_cache_noprof+0x189/0x420 [ 27.050265] kasan_atomics+0x95/0x310 [ 27.050388] kunit_try_run_case+0x1a5/0x480 [ 27.050825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.050999] kthread+0x337/0x6f0 [ 27.051116] ret_from_fork+0x116/0x1d0 [ 27.051513] ret_from_fork_asm+0x1a/0x30 [ 27.051692] [ 27.051766] The buggy address belongs to the object at ffff88810613ea80 [ 27.051766] which belongs to the cache kmalloc-64 of size 64 [ 27.052425] The buggy address is located 0 bytes to the right of [ 27.052425] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.053081] [ 27.053259] The buggy address belongs to the physical page: [ 27.053504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.053750] flags: 0x200000000000000(node=0|zone=2) [ 27.053989] page_type: f5(slab) [ 27.054160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.054566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.054937] page dumped because: kasan: bad access detected [ 27.055163] [ 27.055229] Memory state around the buggy address: [ 27.055382] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.055627] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.056784] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.057667] ^ [ 27.058087] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.058430] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.058720] ================================================================== [ 26.777011] ================================================================== [ 26.777627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 26.777900] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.778250] [ 26.778490] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.778597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.778612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.778637] Call Trace: [ 26.778679] <TASK> [ 26.778701] dump_stack_lvl+0x73/0xb0 [ 26.778752] print_report+0xd1/0x610 [ 26.778777] ? __virt_addr_valid+0x1db/0x2d0 [ 26.778802] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.778825] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.778852] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.778875] kasan_report+0x141/0x180 [ 26.778898] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.778924] __asan_report_load4_noabort+0x18/0x20 [ 26.778949] kasan_atomics_helper+0x4a84/0x5450 [ 26.778973] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.779002] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.779029] ? kasan_atomics+0x152/0x310 [ 26.779056] kasan_atomics+0x1dc/0x310 [ 26.779080] ? __pfx_kasan_atomics+0x10/0x10 [ 26.779105] ? __pfx_read_tsc+0x10/0x10 [ 26.779129] ? ktime_get_ts64+0x86/0x230 [ 26.779156] kunit_try_run_case+0x1a5/0x480 [ 26.779179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.779200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.779226] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.779250] ? __kthread_parkme+0x82/0x180 [ 26.779315] ? preempt_count_sub+0x50/0x80 [ 26.779378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.779403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.779440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.779493] kthread+0x337/0x6f0 [ 26.779517] ? trace_preempt_on+0x20/0xc0 [ 26.779553] ? __pfx_kthread+0x10/0x10 [ 26.779575] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.779599] ? calculate_sigpending+0x7b/0xa0 [ 26.779626] ? __pfx_kthread+0x10/0x10 [ 26.779649] ret_from_fork+0x116/0x1d0 [ 26.779670] ? __pfx_kthread+0x10/0x10 [ 26.779693] ret_from_fork_asm+0x1a/0x30 [ 26.779726] </TASK> [ 26.779749] [ 26.788221] Allocated by task 315: [ 26.788657] kasan_save_stack+0x45/0x70 [ 26.788907] kasan_save_track+0x18/0x40 [ 26.789119] kasan_save_alloc_info+0x3b/0x50 [ 26.789267] __kasan_kmalloc+0xb7/0xc0 [ 26.789413] __kmalloc_cache_noprof+0x189/0x420 [ 26.789680] kasan_atomics+0x95/0x310 [ 26.790095] kunit_try_run_case+0x1a5/0x480 [ 26.790589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.790791] kthread+0x337/0x6f0 [ 26.790914] ret_from_fork+0x116/0x1d0 [ 26.791091] ret_from_fork_asm+0x1a/0x30 [ 26.791342] [ 26.791460] The buggy address belongs to the object at ffff88810613ea80 [ 26.791460] which belongs to the cache kmalloc-64 of size 64 [ 26.792077] The buggy address is located 0 bytes to the right of [ 26.792077] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.792511] [ 26.792639] The buggy address belongs to the physical page: [ 26.792916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.793633] flags: 0x200000000000000(node=0|zone=2) [ 26.793864] page_type: f5(slab) [ 26.794032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.794410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.794764] page dumped because: kasan: bad access detected [ 26.794982] [ 26.795070] Memory state around the buggy address: [ 26.795263] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.795701] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.795987] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.796221] ^ [ 26.796469] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.796869] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.797147] ================================================================== [ 27.187514] ================================================================== [ 27.187889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 27.188221] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.188591] [ 27.188685] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.188752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.188767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.188791] Call Trace: [ 27.188809] <TASK> [ 27.188829] dump_stack_lvl+0x73/0xb0 [ 27.188866] print_report+0xd1/0x610 [ 27.188889] ? __virt_addr_valid+0x1db/0x2d0 [ 27.188915] ? kasan_atomics_helper+0x1467/0x5450 [ 27.188942] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.188970] ? kasan_atomics_helper+0x1467/0x5450 [ 27.188992] kasan_report+0x141/0x180 [ 27.189016] ? kasan_atomics_helper+0x1467/0x5450 [ 27.189043] kasan_check_range+0x10c/0x1c0 [ 27.189068] __kasan_check_write+0x18/0x20 [ 27.189093] kasan_atomics_helper+0x1467/0x5450 [ 27.189116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.189143] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.189169] ? kasan_atomics+0x152/0x310 [ 27.189197] kasan_atomics+0x1dc/0x310 [ 27.189220] ? __pfx_kasan_atomics+0x10/0x10 [ 27.189245] ? __pfx_read_tsc+0x10/0x10 [ 27.189670] ? ktime_get_ts64+0x86/0x230 [ 27.189707] kunit_try_run_case+0x1a5/0x480 [ 27.189744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.189766] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.189793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.189818] ? __kthread_parkme+0x82/0x180 [ 27.189842] ? preempt_count_sub+0x50/0x80 [ 27.189868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.189891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.189917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.189944] kthread+0x337/0x6f0 [ 27.189969] ? trace_preempt_on+0x20/0xc0 [ 27.189994] ? __pfx_kthread+0x10/0x10 [ 27.190017] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.190041] ? calculate_sigpending+0x7b/0xa0 [ 27.190066] ? __pfx_kthread+0x10/0x10 [ 27.190091] ret_from_fork+0x116/0x1d0 [ 27.190111] ? __pfx_kthread+0x10/0x10 [ 27.190134] ret_from_fork_asm+0x1a/0x30 [ 27.190167] </TASK> [ 27.190181] [ 27.201034] Allocated by task 315: [ 27.201213] kasan_save_stack+0x45/0x70 [ 27.201408] kasan_save_track+0x18/0x40 [ 27.201904] kasan_save_alloc_info+0x3b/0x50 [ 27.202150] __kasan_kmalloc+0xb7/0xc0 [ 27.202349] __kmalloc_cache_noprof+0x189/0x420 [ 27.202756] kasan_atomics+0x95/0x310 [ 27.202939] kunit_try_run_case+0x1a5/0x480 [ 27.203127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.203350] kthread+0x337/0x6f0 [ 27.203656] ret_from_fork+0x116/0x1d0 [ 27.203848] ret_from_fork_asm+0x1a/0x30 [ 27.204164] [ 27.204263] The buggy address belongs to the object at ffff88810613ea80 [ 27.204263] which belongs to the cache kmalloc-64 of size 64 [ 27.205025] The buggy address is located 0 bytes to the right of [ 27.205025] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.205536] [ 27.205853] The buggy address belongs to the physical page: [ 27.206053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.206634] flags: 0x200000000000000(node=0|zone=2) [ 27.206839] page_type: f5(slab) [ 27.207129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.207661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.208093] page dumped because: kasan: bad access detected [ 27.208288] [ 27.208424] Memory state around the buggy address: [ 27.208725] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.209084] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.209566] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.210014] ^ [ 27.210202] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.210652] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.211112] ================================================================== [ 26.825165] ================================================================== [ 26.825775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 26.826087] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.826706] [ 26.827017] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.827151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.827170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.827207] Call Trace: [ 26.827231] <TASK> [ 26.827253] dump_stack_lvl+0x73/0xb0 [ 26.827376] print_report+0xd1/0x610 [ 26.827402] ? __virt_addr_valid+0x1db/0x2d0 [ 26.827440] ? kasan_atomics_helper+0xde0/0x5450 [ 26.827463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.827490] ? kasan_atomics_helper+0xde0/0x5450 [ 26.827515] kasan_report+0x141/0x180 [ 26.827539] ? kasan_atomics_helper+0xde0/0x5450 [ 26.827566] kasan_check_range+0x10c/0x1c0 [ 26.827591] __kasan_check_write+0x18/0x20 [ 26.827615] kasan_atomics_helper+0xde0/0x5450 [ 26.827638] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.827666] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.827693] ? kasan_atomics+0x152/0x310 [ 26.827720] kasan_atomics+0x1dc/0x310 [ 26.827758] ? __pfx_kasan_atomics+0x10/0x10 [ 26.827783] ? __pfx_read_tsc+0x10/0x10 [ 26.827807] ? ktime_get_ts64+0x86/0x230 [ 26.827833] kunit_try_run_case+0x1a5/0x480 [ 26.827857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.827880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.827905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.827931] ? __kthread_parkme+0x82/0x180 [ 26.827954] ? preempt_count_sub+0x50/0x80 [ 26.827979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.828003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.828029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.828056] kthread+0x337/0x6f0 [ 26.828079] ? trace_preempt_on+0x20/0xc0 [ 26.828103] ? __pfx_kthread+0x10/0x10 [ 26.828127] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.828150] ? calculate_sigpending+0x7b/0xa0 [ 26.828176] ? __pfx_kthread+0x10/0x10 [ 26.828200] ret_from_fork+0x116/0x1d0 [ 26.828220] ? __pfx_kthread+0x10/0x10 [ 26.828244] ret_from_fork_asm+0x1a/0x30 [ 26.828328] </TASK> [ 26.828344] [ 26.837149] Allocated by task 315: [ 26.837327] kasan_save_stack+0x45/0x70 [ 26.837524] kasan_save_track+0x18/0x40 [ 26.837700] kasan_save_alloc_info+0x3b/0x50 [ 26.837853] __kasan_kmalloc+0xb7/0xc0 [ 26.837979] __kmalloc_cache_noprof+0x189/0x420 [ 26.838255] kasan_atomics+0x95/0x310 [ 26.838498] kunit_try_run_case+0x1a5/0x480 [ 26.838840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.839113] kthread+0x337/0x6f0 [ 26.839232] ret_from_fork+0x116/0x1d0 [ 26.839468] ret_from_fork_asm+0x1a/0x30 [ 26.839700] [ 26.839808] The buggy address belongs to the object at ffff88810613ea80 [ 26.839808] which belongs to the cache kmalloc-64 of size 64 [ 26.840589] The buggy address is located 0 bytes to the right of [ 26.840589] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.841086] [ 26.841184] The buggy address belongs to the physical page: [ 26.841553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.841817] flags: 0x200000000000000(node=0|zone=2) [ 26.841980] page_type: f5(slab) [ 26.842143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.842471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.842976] page dumped because: kasan: bad access detected [ 26.843171] [ 26.843237] Memory state around the buggy address: [ 26.843386] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.843845] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.844139] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.844550] ^ [ 26.844772] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.845063] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.845395] ================================================================== [ 27.648665] ================================================================== [ 27.649657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 27.650607] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.651365] [ 27.651614] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.651672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.651687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.651712] Call Trace: [ 27.651775] <TASK> [ 27.651796] dump_stack_lvl+0x73/0xb0 [ 27.651831] print_report+0xd1/0x610 [ 27.651867] ? __virt_addr_valid+0x1db/0x2d0 [ 27.651894] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.651917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.651944] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.651967] kasan_report+0x141/0x180 [ 27.651992] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.652020] kasan_check_range+0x10c/0x1c0 [ 27.652044] __kasan_check_write+0x18/0x20 [ 27.652067] kasan_atomics_helper+0x1e12/0x5450 [ 27.652091] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.652117] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.652145] ? kasan_atomics+0x152/0x310 [ 27.652171] kasan_atomics+0x1dc/0x310 [ 27.652195] ? __pfx_kasan_atomics+0x10/0x10 [ 27.652220] ? __pfx_read_tsc+0x10/0x10 [ 27.652244] ? ktime_get_ts64+0x86/0x230 [ 27.652271] kunit_try_run_case+0x1a5/0x480 [ 27.652294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.652319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.652345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.652370] ? __kthread_parkme+0x82/0x180 [ 27.652393] ? preempt_count_sub+0x50/0x80 [ 27.652430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.652454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.652480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.652506] kthread+0x337/0x6f0 [ 27.652529] ? trace_preempt_on+0x20/0xc0 [ 27.652556] ? __pfx_kthread+0x10/0x10 [ 27.652579] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.652602] ? calculate_sigpending+0x7b/0xa0 [ 27.652628] ? __pfx_kthread+0x10/0x10 [ 27.652651] ret_from_fork+0x116/0x1d0 [ 27.652672] ? __pfx_kthread+0x10/0x10 [ 27.652695] ret_from_fork_asm+0x1a/0x30 [ 27.652728] </TASK> [ 27.652751] [ 27.665282] Allocated by task 315: [ 27.665455] kasan_save_stack+0x45/0x70 [ 27.665885] kasan_save_track+0x18/0x40 [ 27.666206] kasan_save_alloc_info+0x3b/0x50 [ 27.666588] __kasan_kmalloc+0xb7/0xc0 [ 27.666763] __kmalloc_cache_noprof+0x189/0x420 [ 27.667158] kasan_atomics+0x95/0x310 [ 27.667554] kunit_try_run_case+0x1a5/0x480 [ 27.667779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.667954] kthread+0x337/0x6f0 [ 27.668072] ret_from_fork+0x116/0x1d0 [ 27.668203] ret_from_fork_asm+0x1a/0x30 [ 27.668344] [ 27.668448] The buggy address belongs to the object at ffff88810613ea80 [ 27.668448] which belongs to the cache kmalloc-64 of size 64 [ 27.669661] The buggy address is located 0 bytes to the right of [ 27.669661] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.670860] [ 27.671017] The buggy address belongs to the physical page: [ 27.671603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.672051] flags: 0x200000000000000(node=0|zone=2) [ 27.672210] page_type: f5(slab) [ 27.672333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.672860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.673146] page dumped because: kasan: bad access detected [ 27.673407] [ 27.673482] Memory state around the buggy address: [ 27.673851] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.674267] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.674534] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.675212] ^ [ 27.675715] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.676195] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.676402] ================================================================== [ 26.325227] ================================================================== [ 26.325576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 26.326029] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 26.326550] [ 26.326675] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.326750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.326764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.326788] Call Trace: [ 26.326805] <TASK> [ 26.326824] dump_stack_lvl+0x73/0xb0 [ 26.326867] print_report+0xd1/0x610 [ 26.326890] ? __virt_addr_valid+0x1db/0x2d0 [ 26.326916] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.326949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.326976] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.326999] kasan_report+0x141/0x180 [ 26.327031] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.327059] __asan_report_load4_noabort+0x18/0x20 [ 26.327084] kasan_atomics_helper+0x4b88/0x5450 [ 26.327118] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.327144] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.327181] ? kasan_atomics+0x152/0x310 [ 26.327208] kasan_atomics+0x1dc/0x310 [ 26.327232] ? __pfx_kasan_atomics+0x10/0x10 [ 26.327267] ? __pfx_read_tsc+0x10/0x10 [ 26.327351] ? ktime_get_ts64+0x86/0x230 [ 26.327389] kunit_try_run_case+0x1a5/0x480 [ 26.327414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.327447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.327475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.327499] ? __kthread_parkme+0x82/0x180 [ 26.327522] ? preempt_count_sub+0x50/0x80 [ 26.327547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.327570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.327597] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.327624] kthread+0x337/0x6f0 [ 26.327646] ? trace_preempt_on+0x20/0xc0 [ 26.327670] ? __pfx_kthread+0x10/0x10 [ 26.327694] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.327717] ? calculate_sigpending+0x7b/0xa0 [ 26.327752] ? __pfx_kthread+0x10/0x10 [ 26.327777] ret_from_fork+0x116/0x1d0 [ 26.327797] ? __pfx_kthread+0x10/0x10 [ 26.327829] ret_from_fork_asm+0x1a/0x30 [ 26.327861] </TASK> [ 26.327886] [ 26.335672] Allocated by task 315: [ 26.335922] kasan_save_stack+0x45/0x70 [ 26.336125] kasan_save_track+0x18/0x40 [ 26.336309] kasan_save_alloc_info+0x3b/0x50 [ 26.336515] __kasan_kmalloc+0xb7/0xc0 [ 26.336700] __kmalloc_cache_noprof+0x189/0x420 [ 26.336874] kasan_atomics+0x95/0x310 [ 26.337002] kunit_try_run_case+0x1a5/0x480 [ 26.337597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.337897] kthread+0x337/0x6f0 [ 26.338054] ret_from_fork+0x116/0x1d0 [ 26.338184] ret_from_fork_asm+0x1a/0x30 [ 26.338348] [ 26.338441] The buggy address belongs to the object at ffff88810613ea80 [ 26.338441] which belongs to the cache kmalloc-64 of size 64 [ 26.339043] The buggy address is located 0 bytes to the right of [ 26.339043] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 26.339637] [ 26.339769] The buggy address belongs to the physical page: [ 26.340079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 26.340329] flags: 0x200000000000000(node=0|zone=2) [ 26.340489] page_type: f5(slab) [ 26.340728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.341070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.341708] page dumped because: kasan: bad access detected [ 26.341993] [ 26.342062] Memory state around the buggy address: [ 26.342214] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.342616] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.342983] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.343239] ^ [ 26.343636] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.343995] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.344446] ================================================================== [ 27.090802] ================================================================== [ 27.091125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 27.091754] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.092115] [ 27.092417] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.092475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.092546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.092571] Call Trace: [ 27.092594] <TASK> [ 27.092614] dump_stack_lvl+0x73/0xb0 [ 27.092648] print_report+0xd1/0x610 [ 27.092672] ? __virt_addr_valid+0x1db/0x2d0 [ 27.092697] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.092720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.092761] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.092784] kasan_report+0x141/0x180 [ 27.092807] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.092834] kasan_check_range+0x10c/0x1c0 [ 27.092858] __kasan_check_write+0x18/0x20 [ 27.092883] kasan_atomics_helper+0x12e6/0x5450 [ 27.092907] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.092934] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.092960] ? kasan_atomics+0x152/0x310 [ 27.092987] kasan_atomics+0x1dc/0x310 [ 27.093011] ? __pfx_kasan_atomics+0x10/0x10 [ 27.093036] ? __pfx_read_tsc+0x10/0x10 [ 27.093060] ? ktime_get_ts64+0x86/0x230 [ 27.093086] kunit_try_run_case+0x1a5/0x480 [ 27.093109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.093131] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.093157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.093181] ? __kthread_parkme+0x82/0x180 [ 27.093204] ? preempt_count_sub+0x50/0x80 [ 27.093230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.093254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.093298] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.093325] kthread+0x337/0x6f0 [ 27.093348] ? trace_preempt_on+0x20/0xc0 [ 27.093373] ? __pfx_kthread+0x10/0x10 [ 27.093396] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.093426] ? calculate_sigpending+0x7b/0xa0 [ 27.093452] ? __pfx_kthread+0x10/0x10 [ 27.093476] ret_from_fork+0x116/0x1d0 [ 27.093497] ? __pfx_kthread+0x10/0x10 [ 27.093520] ret_from_fork_asm+0x1a/0x30 [ 27.093552] </TASK> [ 27.093565] [ 27.103533] Allocated by task 315: [ 27.103670] kasan_save_stack+0x45/0x70 [ 27.103888] kasan_save_track+0x18/0x40 [ 27.104069] kasan_save_alloc_info+0x3b/0x50 [ 27.104602] __kasan_kmalloc+0xb7/0xc0 [ 27.104901] __kmalloc_cache_noprof+0x189/0x420 [ 27.105193] kasan_atomics+0x95/0x310 [ 27.105477] kunit_try_run_case+0x1a5/0x480 [ 27.105657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.105989] kthread+0x337/0x6f0 [ 27.106155] ret_from_fork+0x116/0x1d0 [ 27.106324] ret_from_fork_asm+0x1a/0x30 [ 27.106714] [ 27.106809] The buggy address belongs to the object at ffff88810613ea80 [ 27.106809] which belongs to the cache kmalloc-64 of size 64 [ 27.107395] The buggy address is located 0 bytes to the right of [ 27.107395] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.108309] [ 27.108480] The buggy address belongs to the physical page: [ 27.108709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.109176] flags: 0x200000000000000(node=0|zone=2) [ 27.109389] page_type: f5(slab) [ 27.109786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.110152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.110613] page dumped because: kasan: bad access detected [ 27.111055] [ 27.111162] Memory state around the buggy address: [ 27.111438] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.111922] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.112242] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.112753] ^ [ 27.112986] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.113313] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.113870] ================================================================== [ 27.386994] ================================================================== [ 27.387450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 27.387781] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315 [ 27.388034] [ 27.388212] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 27.388264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.388278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.388302] Call Trace: [ 27.388330] <TASK> [ 27.388356] dump_stack_lvl+0x73/0xb0 [ 27.388390] print_report+0xd1/0x610 [ 27.388413] ? __virt_addr_valid+0x1db/0x2d0 [ 27.389036] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.389064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.389193] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.389219] kasan_report+0x141/0x180 [ 27.389244] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.389279] kasan_check_range+0x10c/0x1c0 [ 27.389303] __kasan_check_write+0x18/0x20 [ 27.389328] kasan_atomics_helper+0x18b1/0x5450 [ 27.389351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.389378] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.389405] ? kasan_atomics+0x152/0x310 [ 27.389432] kasan_atomics+0x1dc/0x310 [ 27.389456] ? __pfx_kasan_atomics+0x10/0x10 [ 27.389481] ? __pfx_read_tsc+0x10/0x10 [ 27.389505] ? ktime_get_ts64+0x86/0x230 [ 27.389532] kunit_try_run_case+0x1a5/0x480 [ 27.389554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.389576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.389602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.389626] ? __kthread_parkme+0x82/0x180 [ 27.389651] ? preempt_count_sub+0x50/0x80 [ 27.389677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.389700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.389726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.389764] kthread+0x337/0x6f0 [ 27.389787] ? trace_preempt_on+0x20/0xc0 [ 27.389812] ? __pfx_kthread+0x10/0x10 [ 27.389834] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.389858] ? calculate_sigpending+0x7b/0xa0 [ 27.389884] ? __pfx_kthread+0x10/0x10 [ 27.389908] ret_from_fork+0x116/0x1d0 [ 27.389928] ? __pfx_kthread+0x10/0x10 [ 27.389951] ret_from_fork_asm+0x1a/0x30 [ 27.389983] </TASK> [ 27.389997] [ 27.405102] Allocated by task 315: [ 27.405245] kasan_save_stack+0x45/0x70 [ 27.405681] kasan_save_track+0x18/0x40 [ 27.406054] kasan_save_alloc_info+0x3b/0x50 [ 27.406499] __kasan_kmalloc+0xb7/0xc0 [ 27.406857] __kmalloc_cache_noprof+0x189/0x420 [ 27.407271] kasan_atomics+0x95/0x310 [ 27.407622] kunit_try_run_case+0x1a5/0x480 [ 27.407929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.408102] kthread+0x337/0x6f0 [ 27.408220] ret_from_fork+0x116/0x1d0 [ 27.408420] ret_from_fork_asm+0x1a/0x30 [ 27.408862] [ 27.409018] The buggy address belongs to the object at ffff88810613ea80 [ 27.409018] which belongs to the cache kmalloc-64 of size 64 [ 27.410364] The buggy address is located 0 bytes to the right of [ 27.410364] allocated 48-byte region [ffff88810613ea80, ffff88810613eab0) [ 27.411542] [ 27.411787] The buggy address belongs to the physical page: [ 27.412201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e [ 27.412810] flags: 0x200000000000000(node=0|zone=2) [ 27.413254] page_type: f5(slab) [ 27.413615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.413904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.414125] page dumped because: kasan: bad access detected [ 27.414458] [ 27.414636] Memory state around the buggy address: [ 27.415182] ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.415886] ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.416635] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.417306] ^ [ 27.417845] ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.418534] ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.419015] ==================================================================