Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 66.800594] ================================================================== [ 66.807623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 66.814914] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 66.822292] [ 66.823773] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 66.823822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.823838] Hardware name: WinLink E850-96 board (DT) [ 66.823857] Call trace: [ 66.823870] show_stack+0x20/0x38 (C) [ 66.823902] dump_stack_lvl+0x8c/0xd0 [ 66.823937] print_report+0x118/0x5d0 [ 66.823963] kasan_report+0xdc/0x128 [ 66.823990] kasan_check_range+0x100/0x1a8 [ 66.824020] __kasan_check_write+0x20/0x30 [ 66.824054] kasan_atomics_helper+0x760/0x4858 [ 66.824088] kasan_atomics+0x198/0x2e0 [ 66.824120] kunit_try_run_case+0x170/0x3f0 [ 66.824154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.824188] kthread+0x328/0x630 [ 66.824217] ret_from_fork+0x10/0x20 [ 66.824251] [ 66.895207] Allocated by task 349: [ 66.898596] kasan_save_stack+0x3c/0x68 [ 66.902412] kasan_save_track+0x20/0x40 [ 66.906232] kasan_save_alloc_info+0x40/0x58 [ 66.910485] __kasan_kmalloc+0xd4/0xd8 [ 66.914217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.918732] kasan_atomics+0xb8/0x2e0 [ 66.922377] kunit_try_run_case+0x170/0x3f0 [ 66.926544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.932013] kthread+0x328/0x630 [ 66.935224] ret_from_fork+0x10/0x20 [ 66.938783] [ 66.940259] The buggy address belongs to the object at ffff000808448180 [ 66.940259] which belongs to the cache kmalloc-64 of size 64 [ 66.952585] The buggy address is located 0 bytes to the right of [ 66.952585] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 66.965432] [ 66.966908] The buggy address belongs to the physical page: [ 66.972465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 66.980449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.986960] page_type: f5(slab) [ 66.990094] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.997817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.005536] page dumped because: kasan: bad access detected [ 67.011091] [ 67.012567] Memory state around the buggy address: [ 67.017347] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.024550] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.031754] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.038955] ^ [ 67.043733] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.050938] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.058139] ================================================================== [ 72.867464] ================================================================== [ 72.874546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 72.881836] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 72.889215] [ 72.890696] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 72.890746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.890762] Hardware name: WinLink E850-96 board (DT) [ 72.890781] Call trace: [ 72.890796] show_stack+0x20/0x38 (C) [ 72.890828] dump_stack_lvl+0x8c/0xd0 [ 72.890862] print_report+0x118/0x5d0 [ 72.890891] kasan_report+0xdc/0x128 [ 72.890918] kasan_check_range+0x100/0x1a8 [ 72.890947] __kasan_check_write+0x20/0x30 [ 72.890980] kasan_atomics_helper+0xf20/0x4858 [ 72.891013] kasan_atomics+0x198/0x2e0 [ 72.891046] kunit_try_run_case+0x170/0x3f0 [ 72.891080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.891116] kthread+0x328/0x630 [ 72.891146] ret_from_fork+0x10/0x20 [ 72.891177] [ 72.962130] Allocated by task 349: [ 72.965515] kasan_save_stack+0x3c/0x68 [ 72.969335] kasan_save_track+0x20/0x40 [ 72.973155] kasan_save_alloc_info+0x40/0x58 [ 72.977408] __kasan_kmalloc+0xd4/0xd8 [ 72.981140] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.985654] kasan_atomics+0xb8/0x2e0 [ 72.989300] kunit_try_run_case+0x170/0x3f0 [ 72.993467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.998935] kthread+0x328/0x630 [ 73.002147] ret_from_fork+0x10/0x20 [ 73.005706] [ 73.007181] The buggy address belongs to the object at ffff000808448180 [ 73.007181] which belongs to the cache kmalloc-64 of size 64 [ 73.019510] The buggy address is located 0 bytes to the right of [ 73.019510] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 73.032355] [ 73.033831] The buggy address belongs to the physical page: [ 73.039388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 73.047373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.053882] page_type: f5(slab) [ 73.057017] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.064740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.072458] page dumped because: kasan: bad access detected [ 73.078014] [ 73.079490] Memory state around the buggy address: [ 73.084267] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.091472] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.098677] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.105878] ^ [ 73.110656] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.117860] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.125062] ================================================================== [ 63.627851] ================================================================== [ 63.634928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 63.642305] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 63.649597] [ 63.651078] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.651132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.651146] Hardware name: WinLink E850-96 board (DT) [ 63.651165] Call trace: [ 63.651178] show_stack+0x20/0x38 (C) [ 63.651211] dump_stack_lvl+0x8c/0xd0 [ 63.651242] print_report+0x118/0x5d0 [ 63.651268] kasan_report+0xdc/0x128 [ 63.651294] __asan_report_load4_noabort+0x20/0x30 [ 63.651329] kasan_atomics_helper+0x40fc/0x4858 [ 63.651363] kasan_atomics+0x198/0x2e0 [ 63.651397] kunit_try_run_case+0x170/0x3f0 [ 63.651431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.651464] kthread+0x328/0x630 [ 63.651493] ret_from_fork+0x10/0x20 [ 63.651523] [ 63.719213] Allocated by task 349: [ 63.722599] kasan_save_stack+0x3c/0x68 [ 63.726418] kasan_save_track+0x20/0x40 [ 63.730238] kasan_save_alloc_info+0x40/0x58 [ 63.734491] __kasan_kmalloc+0xd4/0xd8 [ 63.738224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.742737] kasan_atomics+0xb8/0x2e0 [ 63.746384] kunit_try_run_case+0x170/0x3f0 [ 63.750550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.756018] kthread+0x328/0x630 [ 63.759230] ret_from_fork+0x10/0x20 [ 63.762789] [ 63.764265] The buggy address belongs to the object at ffff000808448180 [ 63.764265] which belongs to the cache kmalloc-64 of size 64 [ 63.776592] The buggy address is located 0 bytes to the right of [ 63.776592] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 63.789438] [ 63.790914] The buggy address belongs to the physical page: [ 63.796470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 63.804456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.810966] page_type: f5(slab) [ 63.814100] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.821823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.829541] page dumped because: kasan: bad access detected [ 63.835097] [ 63.836572] Memory state around the buggy address: [ 63.841351] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.848555] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.855760] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.862961] ^ [ 63.867740] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.874944] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.882145] ================================================================== [ 71.814213] ================================================================== [ 71.821263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 71.828640] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 71.835932] [ 71.837415] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 71.837464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.837481] Hardware name: WinLink E850-96 board (DT) [ 71.837498] Call trace: [ 71.837511] show_stack+0x20/0x38 (C) [ 71.837543] dump_stack_lvl+0x8c/0xd0 [ 71.837575] print_report+0x118/0x5d0 [ 71.837603] kasan_report+0xdc/0x128 [ 71.837630] __asan_report_load8_noabort+0x20/0x30 [ 71.837665] kasan_atomics_helper+0x3f58/0x4858 [ 71.837701] kasan_atomics+0x198/0x2e0 [ 71.837733] kunit_try_run_case+0x170/0x3f0 [ 71.837769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.837804] kthread+0x328/0x630 [ 71.837832] ret_from_fork+0x10/0x20 [ 71.837866] [ 71.905549] Allocated by task 349: [ 71.908936] kasan_save_stack+0x3c/0x68 [ 71.912754] kasan_save_track+0x20/0x40 [ 71.916573] kasan_save_alloc_info+0x40/0x58 [ 71.920826] __kasan_kmalloc+0xd4/0xd8 [ 71.924559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.929073] kasan_atomics+0xb8/0x2e0 [ 71.932719] kunit_try_run_case+0x170/0x3f0 [ 71.936885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.942354] kthread+0x328/0x630 [ 71.945566] ret_from_fork+0x10/0x20 [ 71.949125] [ 71.950600] The buggy address belongs to the object at ffff000808448180 [ 71.950600] which belongs to the cache kmalloc-64 of size 64 [ 71.962927] The buggy address is located 0 bytes to the right of [ 71.962927] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 71.975774] [ 71.977251] The buggy address belongs to the physical page: [ 71.982805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 71.990791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.997301] page_type: f5(slab) [ 72.000434] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.008158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.015877] page dumped because: kasan: bad access detected [ 72.021433] [ 72.022908] Memory state around the buggy address: [ 72.027686] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.034891] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.042096] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.049297] ^ [ 72.054075] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.061279] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.068480] ================================================================== [ 68.916773] ================================================================== [ 68.923740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 68.931028] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 68.938406] [ 68.939890] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 68.939941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.939957] Hardware name: WinLink E850-96 board (DT) [ 68.939980] Call trace: [ 68.939994] show_stack+0x20/0x38 (C) [ 68.940027] dump_stack_lvl+0x8c/0xd0 [ 68.940060] print_report+0x118/0x5d0 [ 68.940088] kasan_report+0xdc/0x128 [ 68.940115] kasan_check_range+0x100/0x1a8 [ 68.940145] __kasan_check_write+0x20/0x30 [ 68.940176] kasan_atomics_helper+0xad4/0x4858 [ 68.940211] kasan_atomics+0x198/0x2e0 [ 68.940244] kunit_try_run_case+0x170/0x3f0 [ 68.940279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.940312] kthread+0x328/0x630 [ 68.940345] ret_from_fork+0x10/0x20 [ 68.940377] [ 69.011321] Allocated by task 349: [ 69.014707] kasan_save_stack+0x3c/0x68 [ 69.018526] kasan_save_track+0x20/0x40 [ 69.022346] kasan_save_alloc_info+0x40/0x58 [ 69.026599] __kasan_kmalloc+0xd4/0xd8 [ 69.030332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.034845] kasan_atomics+0xb8/0x2e0 [ 69.038491] kunit_try_run_case+0x170/0x3f0 [ 69.042658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.048128] kthread+0x328/0x630 [ 69.051338] ret_from_fork+0x10/0x20 [ 69.054897] [ 69.056373] The buggy address belongs to the object at ffff000808448180 [ 69.056373] which belongs to the cache kmalloc-64 of size 64 [ 69.068700] The buggy address is located 0 bytes to the right of [ 69.068700] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 69.081546] [ 69.083023] The buggy address belongs to the physical page: [ 69.088580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 69.096565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.103074] page_type: f5(slab) [ 69.106210] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.113931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.121650] page dumped because: kasan: bad access detected [ 69.127205] [ 69.128681] Memory state around the buggy address: [ 69.133461] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.140664] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.147868] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.155069] ^ [ 69.159847] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.167052] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.174253] ================================================================== [ 76.839974] ================================================================== [ 76.847056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 76.854433] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 76.861812] [ 76.863295] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 76.863344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.863358] Hardware name: WinLink E850-96 board (DT) [ 76.863378] Call trace: [ 76.863390] show_stack+0x20/0x38 (C) [ 76.863424] dump_stack_lvl+0x8c/0xd0 [ 76.863457] print_report+0x118/0x5d0 [ 76.863485] kasan_report+0xdc/0x128 [ 76.863514] kasan_check_range+0x100/0x1a8 [ 76.863545] __kasan_check_write+0x20/0x30 [ 76.863578] kasan_atomics_helper+0x154c/0x4858 [ 76.863615] kasan_atomics+0x198/0x2e0 [ 76.863647] kunit_try_run_case+0x170/0x3f0 [ 76.863683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.863716] kthread+0x328/0x630 [ 76.863746] ret_from_fork+0x10/0x20 [ 76.863781] [ 76.934814] Allocated by task 349: [ 76.938201] kasan_save_stack+0x3c/0x68 [ 76.942018] kasan_save_track+0x20/0x40 [ 76.945838] kasan_save_alloc_info+0x40/0x58 [ 76.950091] __kasan_kmalloc+0xd4/0xd8 [ 76.953824] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.958338] kasan_atomics+0xb8/0x2e0 [ 76.961983] kunit_try_run_case+0x170/0x3f0 [ 76.966150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.971619] kthread+0x328/0x630 [ 76.974830] ret_from_fork+0x10/0x20 [ 76.978389] [ 76.979865] The buggy address belongs to the object at ffff000808448180 [ 76.979865] which belongs to the cache kmalloc-64 of size 64 [ 76.992192] The buggy address is located 0 bytes to the right of [ 76.992192] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 77.005038] [ 77.006514] The buggy address belongs to the physical page: [ 77.012071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 77.020056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.026566] page_type: f5(slab) [ 77.029699] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.037423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.045142] page dumped because: kasan: bad access detected [ 77.050697] [ 77.052173] Memory state around the buggy address: [ 77.056951] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.064156] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.071360] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.078562] ^ [ 77.083339] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.090544] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.097745] ================================================================== [ 64.681185] ================================================================== [ 64.688212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 64.695501] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 64.702879] [ 64.704361] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 64.704413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.704430] Hardware name: WinLink E850-96 board (DT) [ 64.704450] Call trace: [ 64.704463] show_stack+0x20/0x38 (C) [ 64.704497] dump_stack_lvl+0x8c/0xd0 [ 64.704529] print_report+0x118/0x5d0 [ 64.704557] kasan_report+0xdc/0x128 [ 64.704584] kasan_check_range+0x100/0x1a8 [ 64.704614] __kasan_check_write+0x20/0x30 [ 64.704644] kasan_atomics_helper+0x414/0x4858 [ 64.704678] kasan_atomics+0x198/0x2e0 [ 64.704710] kunit_try_run_case+0x170/0x3f0 [ 64.704745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.704778] kthread+0x328/0x630 [ 64.704804] ret_from_fork+0x10/0x20 [ 64.704836] [ 64.775794] Allocated by task 349: [ 64.779182] kasan_save_stack+0x3c/0x68 [ 64.783000] kasan_save_track+0x20/0x40 [ 64.786819] kasan_save_alloc_info+0x40/0x58 [ 64.791073] __kasan_kmalloc+0xd4/0xd8 [ 64.794805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.799319] kasan_atomics+0xb8/0x2e0 [ 64.802964] kunit_try_run_case+0x170/0x3f0 [ 64.807131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.812600] kthread+0x328/0x630 [ 64.815811] ret_from_fork+0x10/0x20 [ 64.819371] [ 64.820846] The buggy address belongs to the object at ffff000808448180 [ 64.820846] which belongs to the cache kmalloc-64 of size 64 [ 64.833172] The buggy address is located 0 bytes to the right of [ 64.833172] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 64.846019] [ 64.847495] The buggy address belongs to the physical page: [ 64.853053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 64.861037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.867547] page_type: f5(slab) [ 64.870680] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.878404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.886123] page dumped because: kasan: bad access detected [ 64.891678] [ 64.893154] Memory state around the buggy address: [ 64.897932] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.905137] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.912341] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.919543] ^ [ 64.924320] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.931525] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.938727] ================================================================== [ 76.044790] ================================================================== [ 76.051757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 76.059133] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 76.066511] [ 76.067994] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 76.068044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.068059] Hardware name: WinLink E850-96 board (DT) [ 76.068082] Call trace: [ 76.068097] show_stack+0x20/0x38 (C) [ 76.068127] dump_stack_lvl+0x8c/0xd0 [ 76.068160] print_report+0x118/0x5d0 [ 76.068190] kasan_report+0xdc/0x128 [ 76.068219] kasan_check_range+0x100/0x1a8 [ 76.068250] __kasan_check_write+0x20/0x30 [ 76.068284] kasan_atomics_helper+0x1414/0x4858 [ 76.068319] kasan_atomics+0x198/0x2e0 [ 76.068351] kunit_try_run_case+0x170/0x3f0 [ 76.068388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.068421] kthread+0x328/0x630 [ 76.068452] ret_from_fork+0x10/0x20 [ 76.068488] [ 76.139513] Allocated by task 349: [ 76.142900] kasan_save_stack+0x3c/0x68 [ 76.146718] kasan_save_track+0x20/0x40 [ 76.150537] kasan_save_alloc_info+0x40/0x58 [ 76.154791] __kasan_kmalloc+0xd4/0xd8 [ 76.158523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.163037] kasan_atomics+0xb8/0x2e0 [ 76.166683] kunit_try_run_case+0x170/0x3f0 [ 76.170850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.176319] kthread+0x328/0x630 [ 76.179530] ret_from_fork+0x10/0x20 [ 76.183089] [ 76.184564] The buggy address belongs to the object at ffff000808448180 [ 76.184564] which belongs to the cache kmalloc-64 of size 64 [ 76.196891] The buggy address is located 0 bytes to the right of [ 76.196891] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 76.209738] [ 76.211214] The buggy address belongs to the physical page: [ 76.216771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 76.224755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.231265] page_type: f5(slab) [ 76.234400] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.242122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.249841] page dumped because: kasan: bad access detected [ 76.255397] [ 76.256872] Memory state around the buggy address: [ 76.261653] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.268855] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.276060] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.283261] ^ [ 76.288040] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.295243] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.302445] ================================================================== [ 68.651764] ================================================================== [ 68.658811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 68.666101] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 68.673479] [ 68.674963] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 68.675012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.675032] Hardware name: WinLink E850-96 board (DT) [ 68.675051] Call trace: [ 68.675063] show_stack+0x20/0x38 (C) [ 68.675096] dump_stack_lvl+0x8c/0xd0 [ 68.675130] print_report+0x118/0x5d0 [ 68.675158] kasan_report+0xdc/0x128 [ 68.675187] kasan_check_range+0x100/0x1a8 [ 68.675216] __kasan_check_write+0x20/0x30 [ 68.675249] kasan_atomics_helper+0xa6c/0x4858 [ 68.675283] kasan_atomics+0x198/0x2e0 [ 68.675315] kunit_try_run_case+0x170/0x3f0 [ 68.675350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.675386] kthread+0x328/0x630 [ 68.675414] ret_from_fork+0x10/0x20 [ 68.675448] [ 68.746395] Allocated by task 349: [ 68.749780] kasan_save_stack+0x3c/0x68 [ 68.753600] kasan_save_track+0x20/0x40 [ 68.757419] kasan_save_alloc_info+0x40/0x58 [ 68.761673] __kasan_kmalloc+0xd4/0xd8 [ 68.765405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.769919] kasan_atomics+0xb8/0x2e0 [ 68.773564] kunit_try_run_case+0x170/0x3f0 [ 68.777731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.783201] kthread+0x328/0x630 [ 68.786412] ret_from_fork+0x10/0x20 [ 68.789971] [ 68.791446] The buggy address belongs to the object at ffff000808448180 [ 68.791446] which belongs to the cache kmalloc-64 of size 64 [ 68.803773] The buggy address is located 0 bytes to the right of [ 68.803773] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 68.816619] [ 68.818095] The buggy address belongs to the physical page: [ 68.823653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 68.831637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.838147] page_type: f5(slab) [ 68.841281] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.849004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.856723] page dumped because: kasan: bad access detected [ 68.862278] [ 68.863754] Memory state around the buggy address: [ 68.868532] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.875737] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.882942] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.890143] ^ [ 68.894921] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.902125] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.909327] ================================================================== [ 63.098166] ================================================================== [ 63.105249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 63.112540] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 63.119917] [ 63.121400] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.121455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.121473] Hardware name: WinLink E850-96 board (DT) [ 63.121494] Call trace: [ 63.121510] show_stack+0x20/0x38 (C) [ 63.121544] dump_stack_lvl+0x8c/0xd0 [ 63.121580] print_report+0x118/0x5d0 [ 63.121607] kasan_report+0xdc/0x128 [ 63.121634] kasan_check_range+0x100/0x1a8 [ 63.121663] __kasan_check_write+0x20/0x30 [ 63.121695] kasan_atomics_helper+0x24c/0x4858 [ 63.121730] kasan_atomics+0x198/0x2e0 [ 63.121763] kunit_try_run_case+0x170/0x3f0 [ 63.121801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.121833] kthread+0x328/0x630 [ 63.121862] ret_from_fork+0x10/0x20 [ 63.121894] [ 63.192832] Allocated by task 349: [ 63.196220] kasan_save_stack+0x3c/0x68 [ 63.200038] kasan_save_track+0x20/0x40 [ 63.203857] kasan_save_alloc_info+0x40/0x58 [ 63.208110] __kasan_kmalloc+0xd4/0xd8 [ 63.211843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.216356] kasan_atomics+0xb8/0x2e0 [ 63.220002] kunit_try_run_case+0x170/0x3f0 [ 63.224169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.229638] kthread+0x328/0x630 [ 63.232849] ret_from_fork+0x10/0x20 [ 63.236408] [ 63.237884] The buggy address belongs to the object at ffff000808448180 [ 63.237884] which belongs to the cache kmalloc-64 of size 64 [ 63.250211] The buggy address is located 0 bytes to the right of [ 63.250211] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 63.263057] [ 63.264535] The buggy address belongs to the physical page: [ 63.270090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 63.278075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.284585] page_type: f5(slab) [ 63.287719] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.295442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.303161] page dumped because: kasan: bad access detected [ 63.308716] [ 63.310192] Memory state around the buggy address: [ 63.314970] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.322175] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.329379] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.336580] ^ [ 63.341359] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.348563] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.355764] ================================================================== [ 65.740864] ================================================================== [ 65.747917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 65.755207] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 65.762586] [ 65.764065] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 65.764114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.764132] Hardware name: WinLink E850-96 board (DT) [ 65.764151] Call trace: [ 65.764163] show_stack+0x20/0x38 (C) [ 65.764195] dump_stack_lvl+0x8c/0xd0 [ 65.764229] print_report+0x118/0x5d0 [ 65.764256] kasan_report+0xdc/0x128 [ 65.764284] kasan_check_range+0x100/0x1a8 [ 65.764313] __kasan_check_write+0x20/0x30 [ 65.764344] kasan_atomics_helper+0x5b4/0x4858 [ 65.764380] kasan_atomics+0x198/0x2e0 [ 65.764411] kunit_try_run_case+0x170/0x3f0 [ 65.764445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.764481] kthread+0x328/0x630 [ 65.764509] ret_from_fork+0x10/0x20 [ 65.764540] [ 65.835501] Allocated by task 349: [ 65.838886] kasan_save_stack+0x3c/0x68 [ 65.842706] kasan_save_track+0x20/0x40 [ 65.846525] kasan_save_alloc_info+0x40/0x58 [ 65.850779] __kasan_kmalloc+0xd4/0xd8 [ 65.854511] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.859025] kasan_atomics+0xb8/0x2e0 [ 65.862671] kunit_try_run_case+0x170/0x3f0 [ 65.866837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.872306] kthread+0x328/0x630 [ 65.875518] ret_from_fork+0x10/0x20 [ 65.879077] [ 65.880552] The buggy address belongs to the object at ffff000808448180 [ 65.880552] which belongs to the cache kmalloc-64 of size 64 [ 65.892879] The buggy address is located 0 bytes to the right of [ 65.892879] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 65.905726] [ 65.907202] The buggy address belongs to the physical page: [ 65.912759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 65.920743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.927253] page_type: f5(slab) [ 65.930386] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.938110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.945829] page dumped because: kasan: bad access detected [ 65.951385] [ 65.952860] Memory state around the buggy address: [ 65.957638] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.964843] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.972048] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.979249] ^ [ 65.984027] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.991231] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.998433] ================================================================== [ 77.370202] ================================================================== [ 77.377257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 77.384633] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 77.391925] [ 77.393408] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 77.393457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.393472] Hardware name: WinLink E850-96 board (DT) [ 77.393491] Call trace: [ 77.393506] show_stack+0x20/0x38 (C) [ 77.393538] dump_stack_lvl+0x8c/0xd0 [ 77.393569] print_report+0x118/0x5d0 [ 77.393597] kasan_report+0xdc/0x128 [ 77.393625] __asan_report_load8_noabort+0x20/0x30 [ 77.393660] kasan_atomics_helper+0x3db0/0x4858 [ 77.393695] kasan_atomics+0x198/0x2e0 [ 77.393730] kunit_try_run_case+0x170/0x3f0 [ 77.393767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.393802] kthread+0x328/0x630 [ 77.393829] ret_from_fork+0x10/0x20 [ 77.393863] [ 77.461542] Allocated by task 349: [ 77.464929] kasan_save_stack+0x3c/0x68 [ 77.468747] kasan_save_track+0x20/0x40 [ 77.472566] kasan_save_alloc_info+0x40/0x58 [ 77.476819] __kasan_kmalloc+0xd4/0xd8 [ 77.480552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.485066] kasan_atomics+0xb8/0x2e0 [ 77.488712] kunit_try_run_case+0x170/0x3f0 [ 77.492878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.498347] kthread+0x328/0x630 [ 77.501559] ret_from_fork+0x10/0x20 [ 77.505118] [ 77.506593] The buggy address belongs to the object at ffff000808448180 [ 77.506593] which belongs to the cache kmalloc-64 of size 64 [ 77.518920] The buggy address is located 0 bytes to the right of [ 77.518920] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 77.531766] [ 77.533242] The buggy address belongs to the physical page: [ 77.538798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 77.546784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.553294] page_type: f5(slab) [ 77.556428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.564151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.571870] page dumped because: kasan: bad access detected [ 77.577425] [ 77.578901] Memory state around the buggy address: [ 77.583679] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.590884] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.598089] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.605290] ^ [ 77.610068] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.617272] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.624473] ================================================================== [ 74.722703] ================================================================== [ 74.729727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 74.737104] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 74.744482] [ 74.745964] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 74.746014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.746031] Hardware name: WinLink E850-96 board (DT) [ 74.746052] Call trace: [ 74.746065] show_stack+0x20/0x38 (C) [ 74.746096] dump_stack_lvl+0x8c/0xd0 [ 74.746128] print_report+0x118/0x5d0 [ 74.746157] kasan_report+0xdc/0x128 [ 74.746183] kasan_check_range+0x100/0x1a8 [ 74.746212] __kasan_check_write+0x20/0x30 [ 74.746247] kasan_atomics_helper+0x11f8/0x4858 [ 74.746283] kasan_atomics+0x198/0x2e0 [ 74.746316] kunit_try_run_case+0x170/0x3f0 [ 74.746351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.746386] kthread+0x328/0x630 [ 74.746416] ret_from_fork+0x10/0x20 [ 74.746450] [ 74.817484] Allocated by task 349: [ 74.820870] kasan_save_stack+0x3c/0x68 [ 74.824689] kasan_save_track+0x20/0x40 [ 74.828509] kasan_save_alloc_info+0x40/0x58 [ 74.832762] __kasan_kmalloc+0xd4/0xd8 [ 74.836494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.841009] kasan_atomics+0xb8/0x2e0 [ 74.844654] kunit_try_run_case+0x170/0x3f0 [ 74.848820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.854291] kthread+0x328/0x630 [ 74.857501] ret_from_fork+0x10/0x20 [ 74.861060] [ 74.862535] The buggy address belongs to the object at ffff000808448180 [ 74.862535] which belongs to the cache kmalloc-64 of size 64 [ 74.874864] The buggy address is located 0 bytes to the right of [ 74.874864] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 74.887709] [ 74.889185] The buggy address belongs to the physical page: [ 74.894741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 74.902727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.909236] page_type: f5(slab) [ 74.912369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.920093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.927813] page dumped because: kasan: bad access detected [ 74.933368] [ 74.934844] Memory state around the buggy address: [ 74.939623] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.946826] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.954031] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.961232] ^ [ 74.966010] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.973215] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.980416] ================================================================== [ 66.270698] ================================================================== [ 66.277770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 66.285061] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 66.292439] [ 66.293922] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 66.293970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.293988] Hardware name: WinLink E850-96 board (DT) [ 66.294008] Call trace: [ 66.294022] show_stack+0x20/0x38 (C) [ 66.294055] dump_stack_lvl+0x8c/0xd0 [ 66.294088] print_report+0x118/0x5d0 [ 66.294115] kasan_report+0xdc/0x128 [ 66.294143] kasan_check_range+0x100/0x1a8 [ 66.294172] __kasan_check_write+0x20/0x30 [ 66.294207] kasan_atomics_helper+0x684/0x4858 [ 66.294242] kasan_atomics+0x198/0x2e0 [ 66.294274] kunit_try_run_case+0x170/0x3f0 [ 66.294308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.294343] kthread+0x328/0x630 [ 66.294374] ret_from_fork+0x10/0x20 [ 66.294409] [ 66.365354] Allocated by task 349: [ 66.368742] kasan_save_stack+0x3c/0x68 [ 66.372559] kasan_save_track+0x20/0x40 [ 66.376379] kasan_save_alloc_info+0x40/0x58 [ 66.380632] __kasan_kmalloc+0xd4/0xd8 [ 66.384365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.388878] kasan_atomics+0xb8/0x2e0 [ 66.392524] kunit_try_run_case+0x170/0x3f0 [ 66.396691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.402159] kthread+0x328/0x630 [ 66.405371] ret_from_fork+0x10/0x20 [ 66.408930] [ 66.410405] The buggy address belongs to the object at ffff000808448180 [ 66.410405] which belongs to the cache kmalloc-64 of size 64 [ 66.422732] The buggy address is located 0 bytes to the right of [ 66.422732] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 66.435579] [ 66.437057] The buggy address belongs to the physical page: [ 66.442613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 66.450598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.457107] page_type: f5(slab) [ 66.460240] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.467964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.475683] page dumped because: kasan: bad access detected [ 66.481238] [ 66.482714] Memory state around the buggy address: [ 66.487493] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.494696] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.501901] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.509102] ^ [ 66.513880] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.521085] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.528286] ================================================================== [ 71.549457] ================================================================== [ 71.556510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 71.563801] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 71.571092] [ 71.572577] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 71.572627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.572642] Hardware name: WinLink E850-96 board (DT) [ 71.572662] Call trace: [ 71.572677] show_stack+0x20/0x38 (C) [ 71.572708] dump_stack_lvl+0x8c/0xd0 [ 71.572741] print_report+0x118/0x5d0 [ 71.572769] kasan_report+0xdc/0x128 [ 71.572795] kasan_check_range+0x100/0x1a8 [ 71.572827] __kasan_check_read+0x20/0x30 [ 71.572858] kasan_atomics_helper+0xdd4/0x4858 [ 71.572894] kasan_atomics+0x198/0x2e0 [ 71.572925] kunit_try_run_case+0x170/0x3f0 [ 71.572962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.572995] kthread+0x328/0x630 [ 71.573025] ret_from_fork+0x10/0x20 [ 71.573055] [ 71.643921] Allocated by task 349: [ 71.647308] kasan_save_stack+0x3c/0x68 [ 71.651125] kasan_save_track+0x20/0x40 [ 71.654945] kasan_save_alloc_info+0x40/0x58 [ 71.659198] __kasan_kmalloc+0xd4/0xd8 [ 71.662931] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.667445] kasan_atomics+0xb8/0x2e0 [ 71.671091] kunit_try_run_case+0x170/0x3f0 [ 71.675257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.680726] kthread+0x328/0x630 [ 71.683938] ret_from_fork+0x10/0x20 [ 71.687497] [ 71.688972] The buggy address belongs to the object at ffff000808448180 [ 71.688972] which belongs to the cache kmalloc-64 of size 64 [ 71.701299] The buggy address is located 0 bytes to the right of [ 71.701299] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 71.714146] [ 71.715623] The buggy address belongs to the physical page: [ 71.721178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 71.729163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.735673] page_type: f5(slab) [ 71.738806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.746530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.754249] page dumped because: kasan: bad access detected [ 71.759804] [ 71.761280] Memory state around the buggy address: [ 71.766058] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.773263] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.780468] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.787668] ^ [ 71.792446] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.799651] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.806852] ================================================================== [ 70.761273] ================================================================== [ 70.768330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 70.775705] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 70.782996] [ 70.784479] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 70.784529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.784544] Hardware name: WinLink E850-96 board (DT) [ 70.784565] Call trace: [ 70.784577] show_stack+0x20/0x38 (C) [ 70.784608] dump_stack_lvl+0x8c/0xd0 [ 70.784640] print_report+0x118/0x5d0 [ 70.784669] kasan_report+0xdc/0x128 [ 70.784698] __asan_report_load4_noabort+0x20/0x30 [ 70.784731] kasan_atomics_helper+0x3dd8/0x4858 [ 70.784766] kasan_atomics+0x198/0x2e0 [ 70.784798] kunit_try_run_case+0x170/0x3f0 [ 70.784834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.784867] kthread+0x328/0x630 [ 70.784897] ret_from_fork+0x10/0x20 [ 70.784929] [ 70.852613] Allocated by task 349: [ 70.856000] kasan_save_stack+0x3c/0x68 [ 70.859818] kasan_save_track+0x20/0x40 [ 70.863638] kasan_save_alloc_info+0x40/0x58 [ 70.867891] __kasan_kmalloc+0xd4/0xd8 [ 70.871624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.876138] kasan_atomics+0xb8/0x2e0 [ 70.879783] kunit_try_run_case+0x170/0x3f0 [ 70.883949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.889418] kthread+0x328/0x630 [ 70.892630] ret_from_fork+0x10/0x20 [ 70.896189] [ 70.897664] The buggy address belongs to the object at ffff000808448180 [ 70.897664] which belongs to the cache kmalloc-64 of size 64 [ 70.909991] The buggy address is located 0 bytes to the right of [ 70.909991] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 70.922838] [ 70.924314] The buggy address belongs to the physical page: [ 70.929870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 70.937856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.944365] page_type: f5(slab) [ 70.947500] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.955223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.962941] page dumped because: kasan: bad access detected [ 70.968497] [ 70.969972] Memory state around the buggy address: [ 70.974750] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.981955] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.989160] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.996361] ^ [ 71.001139] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.008344] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.015545] ================================================================== [ 64.946178] ================================================================== [ 64.953141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 64.960428] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 64.967806] [ 64.969289] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 64.969339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.969356] Hardware name: WinLink E850-96 board (DT) [ 64.969377] Call trace: [ 64.969389] show_stack+0x20/0x38 (C) [ 64.969421] dump_stack_lvl+0x8c/0xd0 [ 64.969456] print_report+0x118/0x5d0 [ 64.969485] kasan_report+0xdc/0x128 [ 64.969513] kasan_check_range+0x100/0x1a8 [ 64.969544] __kasan_check_write+0x20/0x30 [ 64.969575] kasan_atomics_helper+0x47c/0x4858 [ 64.969608] kasan_atomics+0x198/0x2e0 [ 64.969639] kunit_try_run_case+0x170/0x3f0 [ 64.969672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.969705] kthread+0x328/0x630 [ 64.969736] ret_from_fork+0x10/0x20 [ 64.969767] [ 65.040721] Allocated by task 349: [ 65.044107] kasan_save_stack+0x3c/0x68 [ 65.047926] kasan_save_track+0x20/0x40 [ 65.051746] kasan_save_alloc_info+0x40/0x58 [ 65.055999] __kasan_kmalloc+0xd4/0xd8 [ 65.059732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.064246] kasan_atomics+0xb8/0x2e0 [ 65.067891] kunit_try_run_case+0x170/0x3f0 [ 65.072057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.077526] kthread+0x328/0x630 [ 65.080738] ret_from_fork+0x10/0x20 [ 65.084297] [ 65.085772] The buggy address belongs to the object at ffff000808448180 [ 65.085772] which belongs to the cache kmalloc-64 of size 64 [ 65.098099] The buggy address is located 0 bytes to the right of [ 65.098099] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 65.110946] [ 65.112424] The buggy address belongs to the physical page: [ 65.117979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 65.125965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.132474] page_type: f5(slab) [ 65.135608] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.143331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.151050] page dumped because: kasan: bad access detected [ 65.156605] [ 65.158080] Memory state around the buggy address: [ 65.162859] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.170063] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.177268] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.184469] ^ [ 65.189247] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.196452] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.203653] ================================================================== [ 67.595318] ================================================================== [ 67.602405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 67.609780] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 67.617072] [ 67.618556] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 67.618607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.618623] Hardware name: WinLink E850-96 board (DT) [ 67.618643] Call trace: [ 67.618655] show_stack+0x20/0x38 (C) [ 67.618688] dump_stack_lvl+0x8c/0xd0 [ 67.618723] print_report+0x118/0x5d0 [ 67.618751] kasan_report+0xdc/0x128 [ 67.618777] __asan_report_load4_noabort+0x20/0x30 [ 67.618812] kasan_atomics_helper+0x42d8/0x4858 [ 67.618848] kasan_atomics+0x198/0x2e0 [ 67.618880] kunit_try_run_case+0x170/0x3f0 [ 67.618918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.618953] kthread+0x328/0x630 [ 67.618983] ret_from_fork+0x10/0x20 [ 67.619013] [ 67.686689] Allocated by task 349: [ 67.690076] kasan_save_stack+0x3c/0x68 [ 67.693894] kasan_save_track+0x20/0x40 [ 67.697713] kasan_save_alloc_info+0x40/0x58 [ 67.701966] __kasan_kmalloc+0xd4/0xd8 [ 67.705699] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.710212] kasan_atomics+0xb8/0x2e0 [ 67.713858] kunit_try_run_case+0x170/0x3f0 [ 67.718025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.723494] kthread+0x328/0x630 [ 67.726705] ret_from_fork+0x10/0x20 [ 67.730265] [ 67.731740] The buggy address belongs to the object at ffff000808448180 [ 67.731740] which belongs to the cache kmalloc-64 of size 64 [ 67.744067] The buggy address is located 0 bytes to the right of [ 67.744067] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 67.756913] [ 67.758389] The buggy address belongs to the physical page: [ 67.763946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 67.771930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.778441] page_type: f5(slab) [ 67.781573] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.789298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.797017] page dumped because: kasan: bad access detected [ 67.802572] [ 67.804048] Memory state around the buggy address: [ 67.808827] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.816031] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.823235] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.830437] ^ [ 67.835214] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.842419] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.849620] ================================================================== [ 71.287829] ================================================================== [ 71.294882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 71.302259] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 71.309551] [ 71.311036] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 71.311086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.311103] Hardware name: WinLink E850-96 board (DT) [ 71.311122] Call trace: [ 71.311136] show_stack+0x20/0x38 (C) [ 71.311168] dump_stack_lvl+0x8c/0xd0 [ 71.311201] print_report+0x118/0x5d0 [ 71.311230] kasan_report+0xdc/0x128 [ 71.311258] __asan_report_load4_noabort+0x20/0x30 [ 71.311294] kasan_atomics_helper+0x3e04/0x4858 [ 71.311329] kasan_atomics+0x198/0x2e0 [ 71.311362] kunit_try_run_case+0x170/0x3f0 [ 71.311397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.311431] kthread+0x328/0x630 [ 71.311460] ret_from_fork+0x10/0x20 [ 71.311494] [ 71.379168] Allocated by task 349: [ 71.382555] kasan_save_stack+0x3c/0x68 [ 71.386372] kasan_save_track+0x20/0x40 [ 71.390192] kasan_save_alloc_info+0x40/0x58 [ 71.394445] __kasan_kmalloc+0xd4/0xd8 [ 71.398178] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.402692] kasan_atomics+0xb8/0x2e0 [ 71.406338] kunit_try_run_case+0x170/0x3f0 [ 71.410504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.415973] kthread+0x328/0x630 [ 71.419185] ret_from_fork+0x10/0x20 [ 71.422744] [ 71.424219] The buggy address belongs to the object at ffff000808448180 [ 71.424219] which belongs to the cache kmalloc-64 of size 64 [ 71.436546] The buggy address is located 0 bytes to the right of [ 71.436546] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 71.449393] [ 71.450870] The buggy address belongs to the physical page: [ 71.456424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 71.464410] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.470920] page_type: f5(slab) [ 71.474055] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.481777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.489496] page dumped because: kasan: bad access detected [ 71.495051] [ 71.496527] Memory state around the buggy address: [ 71.501305] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.508510] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.515715] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.522916] ^ [ 71.527694] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.534898] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.542100] ================================================================== [ 70.496372] ================================================================== [ 70.503403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 70.510692] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 70.518070] [ 70.519553] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 70.519604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.519621] Hardware name: WinLink E850-96 board (DT) [ 70.519644] Call trace: [ 70.519658] show_stack+0x20/0x38 (C) [ 70.519688] dump_stack_lvl+0x8c/0xd0 [ 70.519718] print_report+0x118/0x5d0 [ 70.519746] kasan_report+0xdc/0x128 [ 70.519774] kasan_check_range+0x100/0x1a8 [ 70.519803] __kasan_check_write+0x20/0x30 [ 70.519837] kasan_atomics_helper+0xca0/0x4858 [ 70.519871] kasan_atomics+0x198/0x2e0 [ 70.519904] kunit_try_run_case+0x170/0x3f0 [ 70.519939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.519975] kthread+0x328/0x630 [ 70.520003] ret_from_fork+0x10/0x20 [ 70.520034] [ 70.590985] Allocated by task 349: [ 70.594372] kasan_save_stack+0x3c/0x68 [ 70.598190] kasan_save_track+0x20/0x40 [ 70.602010] kasan_save_alloc_info+0x40/0x58 [ 70.606263] __kasan_kmalloc+0xd4/0xd8 [ 70.609996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.614509] kasan_atomics+0xb8/0x2e0 [ 70.618155] kunit_try_run_case+0x170/0x3f0 [ 70.622322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.627792] kthread+0x328/0x630 [ 70.631002] ret_from_fork+0x10/0x20 [ 70.634561] [ 70.636036] The buggy address belongs to the object at ffff000808448180 [ 70.636036] which belongs to the cache kmalloc-64 of size 64 [ 70.648363] The buggy address is located 0 bytes to the right of [ 70.648363] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 70.661210] [ 70.662686] The buggy address belongs to the physical page: [ 70.668243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 70.676227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.682737] page_type: f5(slab) [ 70.685870] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.693595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.701314] page dumped because: kasan: bad access detected [ 70.706869] [ 70.708344] Memory state around the buggy address: [ 70.713124] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.720327] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.727532] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.734733] ^ [ 70.739511] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.746716] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.753917] ================================================================== [ 73.662304] ================================================================== [ 73.669326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 73.676703] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 73.684081] [ 73.685564] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 73.685616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.685634] Hardware name: WinLink E850-96 board (DT) [ 73.685655] Call trace: [ 73.685667] show_stack+0x20/0x38 (C) [ 73.685702] dump_stack_lvl+0x8c/0xd0 [ 73.685734] print_report+0x118/0x5d0 [ 73.685761] kasan_report+0xdc/0x128 [ 73.685788] kasan_check_range+0x100/0x1a8 [ 73.685818] __kasan_check_write+0x20/0x30 [ 73.685850] kasan_atomics_helper+0x1058/0x4858 [ 73.685886] kasan_atomics+0x198/0x2e0 [ 73.685918] kunit_try_run_case+0x170/0x3f0 [ 73.685954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.685990] kthread+0x328/0x630 [ 73.686019] ret_from_fork+0x10/0x20 [ 73.686052] [ 73.757083] Allocated by task 349: [ 73.760469] kasan_save_stack+0x3c/0x68 [ 73.764289] kasan_save_track+0x20/0x40 [ 73.768108] kasan_save_alloc_info+0x40/0x58 [ 73.772361] __kasan_kmalloc+0xd4/0xd8 [ 73.776094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.780607] kasan_atomics+0xb8/0x2e0 [ 73.784253] kunit_try_run_case+0x170/0x3f0 [ 73.788420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.793889] kthread+0x328/0x630 [ 73.797100] ret_from_fork+0x10/0x20 [ 73.800659] [ 73.802136] The buggy address belongs to the object at ffff000808448180 [ 73.802136] which belongs to the cache kmalloc-64 of size 64 [ 73.814463] The buggy address is located 0 bytes to the right of [ 73.814463] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 73.827308] [ 73.828784] The buggy address belongs to the physical page: [ 73.834343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 73.842326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.848836] page_type: f5(slab) [ 73.851970] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.859693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.867412] page dumped because: kasan: bad access detected [ 73.872967] [ 73.874443] Memory state around the buggy address: [ 73.879221] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.886425] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.893630] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.900831] ^ [ 73.905609] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.912814] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.920015] ================================================================== [ 73.132446] ================================================================== [ 73.139475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 73.146763] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 73.154141] [ 73.155624] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 73.155675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.155690] Hardware name: WinLink E850-96 board (DT) [ 73.155712] Call trace: [ 73.155724] show_stack+0x20/0x38 (C) [ 73.155755] dump_stack_lvl+0x8c/0xd0 [ 73.155788] print_report+0x118/0x5d0 [ 73.155816] kasan_report+0xdc/0x128 [ 73.155844] kasan_check_range+0x100/0x1a8 [ 73.155873] __kasan_check_write+0x20/0x30 [ 73.155906] kasan_atomics_helper+0xf88/0x4858 [ 73.155942] kasan_atomics+0x198/0x2e0 [ 73.155975] kunit_try_run_case+0x170/0x3f0 [ 73.156007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.156041] kthread+0x328/0x630 [ 73.156067] ret_from_fork+0x10/0x20 [ 73.156102] [ 73.227057] Allocated by task 349: [ 73.230442] kasan_save_stack+0x3c/0x68 [ 73.234262] kasan_save_track+0x20/0x40 [ 73.238081] kasan_save_alloc_info+0x40/0x58 [ 73.242335] __kasan_kmalloc+0xd4/0xd8 [ 73.246067] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.250581] kasan_atomics+0xb8/0x2e0 [ 73.254227] kunit_try_run_case+0x170/0x3f0 [ 73.258393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.263863] kthread+0x328/0x630 [ 73.267074] ret_from_fork+0x10/0x20 [ 73.270633] [ 73.272108] The buggy address belongs to the object at ffff000808448180 [ 73.272108] which belongs to the cache kmalloc-64 of size 64 [ 73.284436] The buggy address is located 0 bytes to the right of [ 73.284436] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 73.297281] [ 73.298757] The buggy address belongs to the physical page: [ 73.304315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 73.312299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.318809] page_type: f5(slab) [ 73.321943] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.329666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.337385] page dumped because: kasan: bad access detected [ 73.342940] [ 73.344416] Memory state around the buggy address: [ 73.349194] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.356399] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.363604] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.370805] ^ [ 73.375582] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.382787] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.389988] ================================================================== [ 69.708164] ================================================================== [ 69.715220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 69.722596] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 69.729887] [ 69.731370] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 69.731422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.731437] Hardware name: WinLink E850-96 board (DT) [ 69.731456] Call trace: [ 69.731471] show_stack+0x20/0x38 (C) [ 69.731503] dump_stack_lvl+0x8c/0xd0 [ 69.731535] print_report+0x118/0x5d0 [ 69.731563] kasan_report+0xdc/0x128 [ 69.731591] __asan_report_load4_noabort+0x20/0x30 [ 69.731626] kasan_atomics_helper+0x3dbc/0x4858 [ 69.731660] kasan_atomics+0x198/0x2e0 [ 69.731693] kunit_try_run_case+0x170/0x3f0 [ 69.731730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.731765] kthread+0x328/0x630 [ 69.731796] ret_from_fork+0x10/0x20 [ 69.731826] [ 69.799504] Allocated by task 349: [ 69.802891] kasan_save_stack+0x3c/0x68 [ 69.806709] kasan_save_track+0x20/0x40 [ 69.810528] kasan_save_alloc_info+0x40/0x58 [ 69.814782] __kasan_kmalloc+0xd4/0xd8 [ 69.818514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.823028] kasan_atomics+0xb8/0x2e0 [ 69.826674] kunit_try_run_case+0x170/0x3f0 [ 69.830840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.836309] kthread+0x328/0x630 [ 69.839521] ret_from_fork+0x10/0x20 [ 69.843080] [ 69.844555] The buggy address belongs to the object at ffff000808448180 [ 69.844555] which belongs to the cache kmalloc-64 of size 64 [ 69.856882] The buggy address is located 0 bytes to the right of [ 69.856882] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 69.869729] [ 69.871205] The buggy address belongs to the physical page: [ 69.876762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 69.884746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.891256] page_type: f5(slab) [ 69.894391] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.902114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.909832] page dumped because: kasan: bad access detected [ 69.915388] [ 69.916863] Memory state around the buggy address: [ 69.921643] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.928846] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.936051] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.943252] ^ [ 69.948030] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.955234] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.962436] ================================================================== [ 74.192473] ================================================================== [ 74.199527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 74.206904] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 74.214282] [ 74.215764] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 74.215813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.215831] Hardware name: WinLink E850-96 board (DT) [ 74.215847] Call trace: [ 74.215857] show_stack+0x20/0x38 (C) [ 74.215889] dump_stack_lvl+0x8c/0xd0 [ 74.215922] print_report+0x118/0x5d0 [ 74.215952] kasan_report+0xdc/0x128 [ 74.215980] kasan_check_range+0x100/0x1a8 [ 74.216011] __kasan_check_write+0x20/0x30 [ 74.216044] kasan_atomics_helper+0x1128/0x4858 [ 74.216080] kasan_atomics+0x198/0x2e0 [ 74.216111] kunit_try_run_case+0x170/0x3f0 [ 74.216145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.216180] kthread+0x328/0x630 [ 74.216208] ret_from_fork+0x10/0x20 [ 74.216240] [ 74.287284] Allocated by task 349: [ 74.290670] kasan_save_stack+0x3c/0x68 [ 74.294489] kasan_save_track+0x20/0x40 [ 74.298308] kasan_save_alloc_info+0x40/0x58 [ 74.302562] __kasan_kmalloc+0xd4/0xd8 [ 74.306294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.310808] kasan_atomics+0xb8/0x2e0 [ 74.314454] kunit_try_run_case+0x170/0x3f0 [ 74.318620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.324090] kthread+0x328/0x630 [ 74.327301] ret_from_fork+0x10/0x20 [ 74.330860] [ 74.332335] The buggy address belongs to the object at ffff000808448180 [ 74.332335] which belongs to the cache kmalloc-64 of size 64 [ 74.344663] The buggy address is located 0 bytes to the right of [ 74.344663] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 74.357509] [ 74.358984] The buggy address belongs to the physical page: [ 74.364542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 74.372526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.379036] page_type: f5(slab) [ 74.382169] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.389893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.397612] page dumped because: kasan: bad access detected [ 74.403168] [ 74.404643] Memory state around the buggy address: [ 74.409423] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.416626] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.423831] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.431031] ^ [ 74.435811] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.443014] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.450216] ================================================================== [ 76.309827] ================================================================== [ 76.316857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 76.324233] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 76.331611] [ 76.333094] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 76.333143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.333159] Hardware name: WinLink E850-96 board (DT) [ 76.333179] Call trace: [ 76.333193] show_stack+0x20/0x38 (C) [ 76.333225] dump_stack_lvl+0x8c/0xd0 [ 76.333257] print_report+0x118/0x5d0 [ 76.333285] kasan_report+0xdc/0x128 [ 76.333313] kasan_check_range+0x100/0x1a8 [ 76.333345] __kasan_check_write+0x20/0x30 [ 76.333377] kasan_atomics_helper+0x147c/0x4858 [ 76.333413] kasan_atomics+0x198/0x2e0 [ 76.333447] kunit_try_run_case+0x170/0x3f0 [ 76.333483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.333516] kthread+0x328/0x630 [ 76.333545] ret_from_fork+0x10/0x20 [ 76.333579] [ 76.404613] Allocated by task 349: [ 76.408000] kasan_save_stack+0x3c/0x68 [ 76.411818] kasan_save_track+0x20/0x40 [ 76.415637] kasan_save_alloc_info+0x40/0x58 [ 76.419891] __kasan_kmalloc+0xd4/0xd8 [ 76.423624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.428137] kasan_atomics+0xb8/0x2e0 [ 76.431783] kunit_try_run_case+0x170/0x3f0 [ 76.435950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.441418] kthread+0x328/0x630 [ 76.444630] ret_from_fork+0x10/0x20 [ 76.448189] [ 76.449664] The buggy address belongs to the object at ffff000808448180 [ 76.449664] which belongs to the cache kmalloc-64 of size 64 [ 76.461991] The buggy address is located 0 bytes to the right of [ 76.461991] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 76.474838] [ 76.476313] The buggy address belongs to the physical page: [ 76.481870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 76.489856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.496366] page_type: f5(slab) [ 76.499498] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.507222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.514941] page dumped because: kasan: bad access detected [ 76.520497] [ 76.521972] Memory state around the buggy address: [ 76.526750] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.533956] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.541160] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.548361] ^ [ 76.553139] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.560343] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.567545] ================================================================== [ 70.234694] ================================================================== [ 70.241775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 70.249150] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 70.256442] [ 70.257925] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 70.257977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.257993] Hardware name: WinLink E850-96 board (DT) [ 70.258012] Call trace: [ 70.258025] show_stack+0x20/0x38 (C) [ 70.258057] dump_stack_lvl+0x8c/0xd0 [ 70.258089] print_report+0x118/0x5d0 [ 70.258119] kasan_report+0xdc/0x128 [ 70.258146] __asan_report_load4_noabort+0x20/0x30 [ 70.258182] kasan_atomics_helper+0x3de4/0x4858 [ 70.258221] kasan_atomics+0x198/0x2e0 [ 70.258252] kunit_try_run_case+0x170/0x3f0 [ 70.258288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.258322] kthread+0x328/0x630 [ 70.258350] ret_from_fork+0x10/0x20 [ 70.258381] [ 70.326058] Allocated by task 349: [ 70.329445] kasan_save_stack+0x3c/0x68 [ 70.333264] kasan_save_track+0x20/0x40 [ 70.337083] kasan_save_alloc_info+0x40/0x58 [ 70.341336] __kasan_kmalloc+0xd4/0xd8 [ 70.345069] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.349583] kasan_atomics+0xb8/0x2e0 [ 70.353229] kunit_try_run_case+0x170/0x3f0 [ 70.357395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.362865] kthread+0x328/0x630 [ 70.366076] ret_from_fork+0x10/0x20 [ 70.369634] [ 70.371110] The buggy address belongs to the object at ffff000808448180 [ 70.371110] which belongs to the cache kmalloc-64 of size 64 [ 70.383437] The buggy address is located 0 bytes to the right of [ 70.383437] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 70.396283] [ 70.397759] The buggy address belongs to the physical page: [ 70.403315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 70.411303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.417811] page_type: f5(slab) [ 70.420947] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.428668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.436387] page dumped because: kasan: bad access detected [ 70.441942] [ 70.443418] Memory state around the buggy address: [ 70.448197] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.455401] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.462605] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.469807] ^ [ 70.474584] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.481789] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.488990] ================================================================== [ 73.397352] ================================================================== [ 73.404401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 73.411690] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 73.419068] [ 73.420551] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 73.420601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.420618] Hardware name: WinLink E850-96 board (DT) [ 73.420638] Call trace: [ 73.420651] show_stack+0x20/0x38 (C) [ 73.420684] dump_stack_lvl+0x8c/0xd0 [ 73.420717] print_report+0x118/0x5d0 [ 73.420746] kasan_report+0xdc/0x128 [ 73.420773] kasan_check_range+0x100/0x1a8 [ 73.420804] __kasan_check_write+0x20/0x30 [ 73.420836] kasan_atomics_helper+0xff0/0x4858 [ 73.420872] kasan_atomics+0x198/0x2e0 [ 73.420904] kunit_try_run_case+0x170/0x3f0 [ 73.420939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.420973] kthread+0x328/0x630 [ 73.421004] ret_from_fork+0x10/0x20 [ 73.421035] [ 73.491983] Allocated by task 349: [ 73.495369] kasan_save_stack+0x3c/0x68 [ 73.499188] kasan_save_track+0x20/0x40 [ 73.503007] kasan_save_alloc_info+0x40/0x58 [ 73.507261] __kasan_kmalloc+0xd4/0xd8 [ 73.510994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.515507] kasan_atomics+0xb8/0x2e0 [ 73.519153] kunit_try_run_case+0x170/0x3f0 [ 73.523320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.528788] kthread+0x328/0x630 [ 73.532000] ret_from_fork+0x10/0x20 [ 73.535559] [ 73.537034] The buggy address belongs to the object at ffff000808448180 [ 73.537034] which belongs to the cache kmalloc-64 of size 64 [ 73.549363] The buggy address is located 0 bytes to the right of [ 73.549363] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 73.562208] [ 73.563684] The buggy address belongs to the physical page: [ 73.569243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 73.577226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.583735] page_type: f5(slab) [ 73.586868] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.594593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.602312] page dumped because: kasan: bad access detected [ 73.607867] [ 73.609342] Memory state around the buggy address: [ 73.614121] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.621326] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.628530] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.635731] ^ [ 73.640509] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.647714] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.654915] ================================================================== [ 73.927458] ================================================================== [ 73.934429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 73.941803] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 73.949182] [ 73.950667] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 73.950719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.950737] Hardware name: WinLink E850-96 board (DT) [ 73.950756] Call trace: [ 73.950770] show_stack+0x20/0x38 (C) [ 73.950805] dump_stack_lvl+0x8c/0xd0 [ 73.950836] print_report+0x118/0x5d0 [ 73.950864] kasan_report+0xdc/0x128 [ 73.950891] kasan_check_range+0x100/0x1a8 [ 73.950920] __kasan_check_write+0x20/0x30 [ 73.950953] kasan_atomics_helper+0x10c0/0x4858 [ 73.950989] kasan_atomics+0x198/0x2e0 [ 73.951021] kunit_try_run_case+0x170/0x3f0 [ 73.951057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.951092] kthread+0x328/0x630 [ 73.951120] ret_from_fork+0x10/0x20 [ 73.951152] [ 74.022183] Allocated by task 349: [ 74.025571] kasan_save_stack+0x3c/0x68 [ 74.029389] kasan_save_track+0x20/0x40 [ 74.033208] kasan_save_alloc_info+0x40/0x58 [ 74.037461] __kasan_kmalloc+0xd4/0xd8 [ 74.041194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.045708] kasan_atomics+0xb8/0x2e0 [ 74.049353] kunit_try_run_case+0x170/0x3f0 [ 74.053520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.058990] kthread+0x328/0x630 [ 74.062201] ret_from_fork+0x10/0x20 [ 74.065760] [ 74.067235] The buggy address belongs to the object at ffff000808448180 [ 74.067235] which belongs to the cache kmalloc-64 of size 64 [ 74.079563] The buggy address is located 0 bytes to the right of [ 74.079563] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 74.092408] [ 74.093885] The buggy address belongs to the physical page: [ 74.099443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 74.107427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.113936] page_type: f5(slab) [ 74.117070] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.124793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.132512] page dumped because: kasan: bad access detected [ 74.138067] [ 74.139543] Memory state around the buggy address: [ 74.144323] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.151526] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.158731] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.165932] ^ [ 74.170711] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.177914] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.185115] ================================================================== [ 78.685310] ================================================================== [ 78.692343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 78.699718] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 78.707096] [ 78.708579] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 78.708630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.708647] Hardware name: WinLink E850-96 board (DT) [ 78.708667] Call trace: [ 78.708681] show_stack+0x20/0x38 (C) [ 78.708714] dump_stack_lvl+0x8c/0xd0 [ 78.708746] print_report+0x118/0x5d0 [ 78.708774] kasan_report+0xdc/0x128 [ 78.708801] kasan_check_range+0x100/0x1a8 [ 78.708832] __kasan_check_write+0x20/0x30 [ 78.708866] kasan_atomics_helper+0x175c/0x4858 [ 78.708902] kasan_atomics+0x198/0x2e0 [ 78.708933] kunit_try_run_case+0x170/0x3f0 [ 78.708970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.709005] kthread+0x328/0x630 [ 78.709034] ret_from_fork+0x10/0x20 [ 78.709069] [ 78.780098] Allocated by task 349: [ 78.783485] kasan_save_stack+0x3c/0x68 [ 78.787303] kasan_save_track+0x20/0x40 [ 78.791123] kasan_save_alloc_info+0x40/0x58 [ 78.795376] __kasan_kmalloc+0xd4/0xd8 [ 78.799109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.803623] kasan_atomics+0xb8/0x2e0 [ 78.807268] kunit_try_run_case+0x170/0x3f0 [ 78.811435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.816905] kthread+0x328/0x630 [ 78.820115] ret_from_fork+0x10/0x20 [ 78.823674] [ 78.825149] The buggy address belongs to the object at ffff000808448180 [ 78.825149] which belongs to the cache kmalloc-64 of size 64 [ 78.837477] The buggy address is located 0 bytes to the right of [ 78.837477] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 78.850323] [ 78.851799] The buggy address belongs to the physical page: [ 78.857356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 78.865341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.871851] page_type: f5(slab) [ 78.874983] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.882708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.890427] page dumped because: kasan: bad access detected [ 78.895982] [ 78.897458] Memory state around the buggy address: [ 78.902236] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.909441] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.916645] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.923846] ^ [ 78.928624] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.935829] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.943030] ================================================================== [ 64.154445] ================================================================== [ 64.161484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 64.168860] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 64.176238] [ 64.177719] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 64.177767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.177784] Hardware name: WinLink E850-96 board (DT) [ 64.177803] Call trace: [ 64.177816] show_stack+0x20/0x38 (C) [ 64.177851] dump_stack_lvl+0x8c/0xd0 [ 64.177883] print_report+0x118/0x5d0 [ 64.177912] kasan_report+0xdc/0x128 [ 64.177938] __asan_report_store4_noabort+0x20/0x30 [ 64.177974] kasan_atomics_helper+0x3f94/0x4858 [ 64.178009] kasan_atomics+0x198/0x2e0 [ 64.178040] kunit_try_run_case+0x170/0x3f0 [ 64.178075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.178111] kthread+0x328/0x630 [ 64.178140] ret_from_fork+0x10/0x20 [ 64.178172] [ 64.245941] Allocated by task 349: [ 64.249328] kasan_save_stack+0x3c/0x68 [ 64.253147] kasan_save_track+0x20/0x40 [ 64.256965] kasan_save_alloc_info+0x40/0x58 [ 64.261219] __kasan_kmalloc+0xd4/0xd8 [ 64.264952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.269466] kasan_atomics+0xb8/0x2e0 [ 64.273111] kunit_try_run_case+0x170/0x3f0 [ 64.277278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.282748] kthread+0x328/0x630 [ 64.285958] ret_from_fork+0x10/0x20 [ 64.289518] [ 64.290993] The buggy address belongs to the object at ffff000808448180 [ 64.290993] which belongs to the cache kmalloc-64 of size 64 [ 64.303320] The buggy address is located 0 bytes to the right of [ 64.303320] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 64.316166] [ 64.317642] The buggy address belongs to the physical page: [ 64.323200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 64.331184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.337694] page_type: f5(slab) [ 64.340827] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.348551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.356270] page dumped because: kasan: bad access detected [ 64.361825] [ 64.363301] Memory state around the buggy address: [ 64.368079] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.375284] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.382488] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.389690] ^ [ 64.394467] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.401672] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.408874] ================================================================== [ 79.212046] ================================================================== [ 79.219071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 79.226446] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 79.233824] [ 79.235308] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 79.235357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.235376] Hardware name: WinLink E850-96 board (DT) [ 79.235395] Call trace: [ 79.235407] show_stack+0x20/0x38 (C) [ 79.235438] dump_stack_lvl+0x8c/0xd0 [ 79.235472] print_report+0x118/0x5d0 [ 79.235501] kasan_report+0xdc/0x128 [ 79.235529] kasan_check_range+0x100/0x1a8 [ 79.235561] __kasan_check_write+0x20/0x30 [ 79.235594] kasan_atomics_helper+0x17ec/0x4858 [ 79.235627] kasan_atomics+0x198/0x2e0 [ 79.235662] kunit_try_run_case+0x170/0x3f0 [ 79.235698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.235730] kthread+0x328/0x630 [ 79.235761] ret_from_fork+0x10/0x20 [ 79.235794] [ 79.306828] Allocated by task 349: [ 79.310214] kasan_save_stack+0x3c/0x68 [ 79.314032] kasan_save_track+0x20/0x40 [ 79.317851] kasan_save_alloc_info+0x40/0x58 [ 79.322104] __kasan_kmalloc+0xd4/0xd8 [ 79.325837] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.330350] kasan_atomics+0xb8/0x2e0 [ 79.333997] kunit_try_run_case+0x170/0x3f0 [ 79.338163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.343631] kthread+0x328/0x630 [ 79.346843] ret_from_fork+0x10/0x20 [ 79.350403] [ 79.351878] The buggy address belongs to the object at ffff000808448180 [ 79.351878] which belongs to the cache kmalloc-64 of size 64 [ 79.364205] The buggy address is located 0 bytes to the right of [ 79.364205] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 79.377052] [ 79.378529] The buggy address belongs to the physical page: [ 79.384083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 79.392069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.398579] page_type: f5(slab) [ 79.401712] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.409436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.417155] page dumped because: kasan: bad access detected [ 79.422710] [ 79.424186] Memory state around the buggy address: [ 79.428966] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.436169] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.443373] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.450574] ^ [ 79.455354] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.462557] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.469758] ================================================================== [ 74.457572] ================================================================== [ 74.464629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 74.472004] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 74.479382] [ 74.480864] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 74.480913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.480929] Hardware name: WinLink E850-96 board (DT) [ 74.480946] Call trace: [ 74.480960] show_stack+0x20/0x38 (C) [ 74.480991] dump_stack_lvl+0x8c/0xd0 [ 74.481025] print_report+0x118/0x5d0 [ 74.481053] kasan_report+0xdc/0x128 [ 74.481080] kasan_check_range+0x100/0x1a8 [ 74.481109] __kasan_check_write+0x20/0x30 [ 74.481141] kasan_atomics_helper+0x1190/0x4858 [ 74.481175] kasan_atomics+0x198/0x2e0 [ 74.481209] kunit_try_run_case+0x170/0x3f0 [ 74.481245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.481278] kthread+0x328/0x630 [ 74.481307] ret_from_fork+0x10/0x20 [ 74.481338] [ 74.552384] Allocated by task 349: [ 74.555771] kasan_save_stack+0x3c/0x68 [ 74.559589] kasan_save_track+0x20/0x40 [ 74.563408] kasan_save_alloc_info+0x40/0x58 [ 74.567662] __kasan_kmalloc+0xd4/0xd8 [ 74.571394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.575908] kasan_atomics+0xb8/0x2e0 [ 74.579554] kunit_try_run_case+0x170/0x3f0 [ 74.583720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.589190] kthread+0x328/0x630 [ 74.592401] ret_from_fork+0x10/0x20 [ 74.595960] [ 74.597437] The buggy address belongs to the object at ffff000808448180 [ 74.597437] which belongs to the cache kmalloc-64 of size 64 [ 74.609764] The buggy address is located 0 bytes to the right of [ 74.609764] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 74.622609] [ 74.624084] The buggy address belongs to the physical page: [ 74.629640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 74.637626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.644137] page_type: f5(slab) [ 74.647271] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.654994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.662713] page dumped because: kasan: bad access detected [ 74.668268] [ 74.669743] Memory state around the buggy address: [ 74.674523] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.681726] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.688931] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.696132] ^ [ 74.700911] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.708115] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.715315] ================================================================== [ 75.517946] ================================================================== [ 75.525029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 75.532404] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 75.539783] [ 75.541265] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 75.541317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.541334] Hardware name: WinLink E850-96 board (DT) [ 75.541355] Call trace: [ 75.541369] show_stack+0x20/0x38 (C) [ 75.541399] dump_stack_lvl+0x8c/0xd0 [ 75.541431] print_report+0x118/0x5d0 [ 75.541461] kasan_report+0xdc/0x128 [ 75.541487] kasan_check_range+0x100/0x1a8 [ 75.541517] __kasan_check_write+0x20/0x30 [ 75.541550] kasan_atomics_helper+0x1384/0x4858 [ 75.541584] kasan_atomics+0x198/0x2e0 [ 75.541616] kunit_try_run_case+0x170/0x3f0 [ 75.541651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.541686] kthread+0x328/0x630 [ 75.541716] ret_from_fork+0x10/0x20 [ 75.541748] [ 75.612785] Allocated by task 349: [ 75.616170] kasan_save_stack+0x3c/0x68 [ 75.619990] kasan_save_track+0x20/0x40 [ 75.623809] kasan_save_alloc_info+0x40/0x58 [ 75.628062] __kasan_kmalloc+0xd4/0xd8 [ 75.631795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.636309] kasan_atomics+0xb8/0x2e0 [ 75.639955] kunit_try_run_case+0x170/0x3f0 [ 75.644121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.649590] kthread+0x328/0x630 [ 75.652802] ret_from_fork+0x10/0x20 [ 75.656361] [ 75.657836] The buggy address belongs to the object at ffff000808448180 [ 75.657836] which belongs to the cache kmalloc-64 of size 64 [ 75.670163] The buggy address is located 0 bytes to the right of [ 75.670163] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 75.683010] [ 75.684486] The buggy address belongs to the physical page: [ 75.690042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 75.698027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.704537] page_type: f5(slab) [ 75.707672] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.715394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.723113] page dumped because: kasan: bad access detected [ 75.728668] [ 75.730144] Memory state around the buggy address: [ 75.734924] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.742127] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.749332] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.756533] ^ [ 75.761311] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.768515] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.775717] ================================================================== [ 69.443274] ================================================================== [ 69.450292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 69.457582] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 69.464960] [ 69.466444] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 69.466495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.466513] Hardware name: WinLink E850-96 board (DT) [ 69.466532] Call trace: [ 69.466546] show_stack+0x20/0x38 (C) [ 69.466583] dump_stack_lvl+0x8c/0xd0 [ 69.466615] print_report+0x118/0x5d0 [ 69.466642] kasan_report+0xdc/0x128 [ 69.466669] kasan_check_range+0x100/0x1a8 [ 69.466699] __kasan_check_write+0x20/0x30 [ 69.466733] kasan_atomics_helper+0xb70/0x4858 [ 69.466768] kasan_atomics+0x198/0x2e0 [ 69.466800] kunit_try_run_case+0x170/0x3f0 [ 69.466838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.466871] kthread+0x328/0x630 [ 69.466900] ret_from_fork+0x10/0x20 [ 69.466931] [ 69.537876] Allocated by task 349: [ 69.541263] kasan_save_stack+0x3c/0x68 [ 69.545081] kasan_save_track+0x20/0x40 [ 69.548900] kasan_save_alloc_info+0x40/0x58 [ 69.553154] __kasan_kmalloc+0xd4/0xd8 [ 69.556886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.561400] kasan_atomics+0xb8/0x2e0 [ 69.565046] kunit_try_run_case+0x170/0x3f0 [ 69.569213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.574683] kthread+0x328/0x630 [ 69.577893] ret_from_fork+0x10/0x20 [ 69.581452] [ 69.582927] The buggy address belongs to the object at ffff000808448180 [ 69.582927] which belongs to the cache kmalloc-64 of size 64 [ 69.595254] The buggy address is located 0 bytes to the right of [ 69.595254] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 69.608101] [ 69.609578] The buggy address belongs to the physical page: [ 69.615136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 69.623119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.629628] page_type: f5(slab) [ 69.632764] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.640486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.648204] page dumped because: kasan: bad access detected [ 69.653760] [ 69.655235] Memory state around the buggy address: [ 69.660015] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.667218] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.674423] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.681624] ^ [ 69.686402] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.693606] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.700808] ================================================================== [ 78.950470] ================================================================== [ 78.957443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 78.964818] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 78.972110] [ 78.973593] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 78.973642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.973659] Hardware name: WinLink E850-96 board (DT) [ 78.973679] Call trace: [ 78.973696] show_stack+0x20/0x38 (C) [ 78.973730] dump_stack_lvl+0x8c/0xd0 [ 78.973765] print_report+0x118/0x5d0 [ 78.973795] kasan_report+0xdc/0x128 [ 78.973821] __asan_report_load8_noabort+0x20/0x30 [ 78.973856] kasan_atomics_helper+0x3e20/0x4858 [ 78.973892] kasan_atomics+0x198/0x2e0 [ 78.973924] kunit_try_run_case+0x170/0x3f0 [ 78.973959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.973993] kthread+0x328/0x630 [ 78.974024] ret_from_fork+0x10/0x20 [ 78.974060] [ 79.041726] Allocated by task 349: [ 79.045114] kasan_save_stack+0x3c/0x68 [ 79.048931] kasan_save_track+0x20/0x40 [ 79.052751] kasan_save_alloc_info+0x40/0x58 [ 79.057004] __kasan_kmalloc+0xd4/0xd8 [ 79.060737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.065250] kasan_atomics+0xb8/0x2e0 [ 79.068896] kunit_try_run_case+0x170/0x3f0 [ 79.073063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.078533] kthread+0x328/0x630 [ 79.081743] ret_from_fork+0x10/0x20 [ 79.085302] [ 79.086778] The buggy address belongs to the object at ffff000808448180 [ 79.086778] which belongs to the cache kmalloc-64 of size 64 [ 79.099104] The buggy address is located 0 bytes to the right of [ 79.099104] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 79.111951] [ 79.113428] The buggy address belongs to the physical page: [ 79.118984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 79.126969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.133479] page_type: f5(slab) [ 79.136613] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.144336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.152055] page dumped because: kasan: bad access detected [ 79.157610] [ 79.159085] Memory state around the buggy address: [ 79.163865] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.171068] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.178273] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.185474] ^ [ 79.190254] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.197457] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.204658] ================================================================== [ 77.631858] ================================================================== [ 77.638887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 77.646262] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 77.653640] [ 77.655123] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 77.655172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.655187] Hardware name: WinLink E850-96 board (DT) [ 77.655207] Call trace: [ 77.655220] show_stack+0x20/0x38 (C) [ 77.655252] dump_stack_lvl+0x8c/0xd0 [ 77.655285] print_report+0x118/0x5d0 [ 77.655313] kasan_report+0xdc/0x128 [ 77.655341] kasan_check_range+0x100/0x1a8 [ 77.655375] __kasan_check_write+0x20/0x30 [ 77.655407] kasan_atomics_helper+0x1644/0x4858 [ 77.655443] kasan_atomics+0x198/0x2e0 [ 77.655476] kunit_try_run_case+0x170/0x3f0 [ 77.655511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.655545] kthread+0x328/0x630 [ 77.655574] ret_from_fork+0x10/0x20 [ 77.655607] [ 77.726642] Allocated by task 349: [ 77.730029] kasan_save_stack+0x3c/0x68 [ 77.733847] kasan_save_track+0x20/0x40 [ 77.737666] kasan_save_alloc_info+0x40/0x58 [ 77.741920] __kasan_kmalloc+0xd4/0xd8 [ 77.745652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.750166] kasan_atomics+0xb8/0x2e0 [ 77.753812] kunit_try_run_case+0x170/0x3f0 [ 77.757978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.763447] kthread+0x328/0x630 [ 77.766659] ret_from_fork+0x10/0x20 [ 77.770218] [ 77.771693] The buggy address belongs to the object at ffff000808448180 [ 77.771693] which belongs to the cache kmalloc-64 of size 64 [ 77.784020] The buggy address is located 0 bytes to the right of [ 77.784020] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 77.796867] [ 77.798343] The buggy address belongs to the physical page: [ 77.803898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 77.811884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.818394] page_type: f5(slab) [ 77.821529] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.829251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.836970] page dumped because: kasan: bad access detected [ 77.842526] [ 77.844001] Memory state around the buggy address: [ 77.848779] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.855984] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.863189] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.870390] ^ [ 77.875168] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.882373] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.889573] ================================================================== [ 64.416259] ================================================================== [ 64.423286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 64.430575] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 64.437953] [ 64.439434] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 64.439486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.439503] Hardware name: WinLink E850-96 board (DT) [ 64.439521] Call trace: [ 64.439536] show_stack+0x20/0x38 (C) [ 64.439568] dump_stack_lvl+0x8c/0xd0 [ 64.439601] print_report+0x118/0x5d0 [ 64.439631] kasan_report+0xdc/0x128 [ 64.439658] kasan_check_range+0x100/0x1a8 [ 64.439687] __kasan_check_write+0x20/0x30 [ 64.439719] kasan_atomics_helper+0x3ac/0x4858 [ 64.439754] kasan_atomics+0x198/0x2e0 [ 64.439785] kunit_try_run_case+0x170/0x3f0 [ 64.439820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.439854] kthread+0x328/0x630 [ 64.439882] ret_from_fork+0x10/0x20 [ 64.439914] [ 64.510868] Allocated by task 349: [ 64.514255] kasan_save_stack+0x3c/0x68 [ 64.518073] kasan_save_track+0x20/0x40 [ 64.521893] kasan_save_alloc_info+0x40/0x58 [ 64.526146] __kasan_kmalloc+0xd4/0xd8 [ 64.529878] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.534392] kasan_atomics+0xb8/0x2e0 [ 64.538038] kunit_try_run_case+0x170/0x3f0 [ 64.542205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.547673] kthread+0x328/0x630 [ 64.550885] ret_from_fork+0x10/0x20 [ 64.554444] [ 64.555919] The buggy address belongs to the object at ffff000808448180 [ 64.555919] which belongs to the cache kmalloc-64 of size 64 [ 64.568246] The buggy address is located 0 bytes to the right of [ 64.568246] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 64.581093] [ 64.582568] The buggy address belongs to the physical page: [ 64.588126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 64.596110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.602621] page_type: f5(slab) [ 64.605753] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.613477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.621197] page dumped because: kasan: bad access detected [ 64.626752] [ 64.628228] Memory state around the buggy address: [ 64.633006] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.640210] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.647415] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.654616] ^ [ 64.659394] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.666599] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.673800] ================================================================== [ 71.023019] ================================================================== [ 71.029958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 71.037246] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 71.044624] [ 71.046108] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 71.046161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.046177] Hardware name: WinLink E850-96 board (DT) [ 71.046197] Call trace: [ 71.046212] show_stack+0x20/0x38 (C) [ 71.046247] dump_stack_lvl+0x8c/0xd0 [ 71.046279] print_report+0x118/0x5d0 [ 71.046307] kasan_report+0xdc/0x128 [ 71.046334] kasan_check_range+0x100/0x1a8 [ 71.046362] __kasan_check_write+0x20/0x30 [ 71.046396] kasan_atomics_helper+0xd3c/0x4858 [ 71.046433] kasan_atomics+0x198/0x2e0 [ 71.046465] kunit_try_run_case+0x170/0x3f0 [ 71.046502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.046537] kthread+0x328/0x630 [ 71.046566] ret_from_fork+0x10/0x20 [ 71.046602] [ 71.117540] Allocated by task 349: [ 71.120927] kasan_save_stack+0x3c/0x68 [ 71.124745] kasan_save_track+0x20/0x40 [ 71.128564] kasan_save_alloc_info+0x40/0x58 [ 71.132817] __kasan_kmalloc+0xd4/0xd8 [ 71.136550] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.141064] kasan_atomics+0xb8/0x2e0 [ 71.144710] kunit_try_run_case+0x170/0x3f0 [ 71.148876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.154345] kthread+0x328/0x630 [ 71.157557] ret_from_fork+0x10/0x20 [ 71.161116] [ 71.162591] The buggy address belongs to the object at ffff000808448180 [ 71.162591] which belongs to the cache kmalloc-64 of size 64 [ 71.174918] The buggy address is located 0 bytes to the right of [ 71.174918] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 71.187764] [ 71.189240] The buggy address belongs to the physical page: [ 71.194798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 71.202782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.209292] page_type: f5(slab) [ 71.212427] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.220149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.227868] page dumped because: kasan: bad access detected [ 71.233423] [ 71.234899] Memory state around the buggy address: [ 71.239679] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.246882] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.254087] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.261288] ^ [ 71.266065] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.273270] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.280472] ================================================================== [ 72.075946] ================================================================== [ 72.082895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 72.090182] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 72.097560] [ 72.099044] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 72.099093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.099111] Hardware name: WinLink E850-96 board (DT) [ 72.099132] Call trace: [ 72.099146] show_stack+0x20/0x38 (C) [ 72.099179] dump_stack_lvl+0x8c/0xd0 [ 72.099210] print_report+0x118/0x5d0 [ 72.099239] kasan_report+0xdc/0x128 [ 72.099267] kasan_check_range+0x100/0x1a8 [ 72.099298] __kasan_check_write+0x20/0x30 [ 72.099331] kasan_atomics_helper+0xe44/0x4858 [ 72.099365] kasan_atomics+0x198/0x2e0 [ 72.099397] kunit_try_run_case+0x170/0x3f0 [ 72.099432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.099469] kthread+0x328/0x630 [ 72.099498] ret_from_fork+0x10/0x20 [ 72.099532] [ 72.170475] Allocated by task 349: [ 72.173862] kasan_save_stack+0x3c/0x68 [ 72.177680] kasan_save_track+0x20/0x40 [ 72.181500] kasan_save_alloc_info+0x40/0x58 [ 72.185753] __kasan_kmalloc+0xd4/0xd8 [ 72.189486] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.194000] kasan_atomics+0xb8/0x2e0 [ 72.197645] kunit_try_run_case+0x170/0x3f0 [ 72.201812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.207280] kthread+0x328/0x630 [ 72.210492] ret_from_fork+0x10/0x20 [ 72.214051] [ 72.215527] The buggy address belongs to the object at ffff000808448180 [ 72.215527] which belongs to the cache kmalloc-64 of size 64 [ 72.227855] The buggy address is located 0 bytes to the right of [ 72.227855] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 72.240700] [ 72.242177] The buggy address belongs to the physical page: [ 72.247733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 72.255719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.262228] page_type: f5(slab) [ 72.265364] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.273085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.280804] page dumped because: kasan: bad access detected [ 72.286359] [ 72.287835] Memory state around the buggy address: [ 72.292616] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.299818] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.307022] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.314223] ^ [ 72.319001] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.326206] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.333407] ================================================================== [ 68.386858] ================================================================== [ 68.393886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 68.401174] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 68.408552] [ 68.410036] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 68.410087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.410104] Hardware name: WinLink E850-96 board (DT) [ 68.410123] Call trace: [ 68.410136] show_stack+0x20/0x38 (C) [ 68.410169] dump_stack_lvl+0x8c/0xd0 [ 68.410201] print_report+0x118/0x5d0 [ 68.410232] kasan_report+0xdc/0x128 [ 68.410261] kasan_check_range+0x100/0x1a8 [ 68.410290] __kasan_check_write+0x20/0x30 [ 68.410321] kasan_atomics_helper+0xa04/0x4858 [ 68.410354] kasan_atomics+0x198/0x2e0 [ 68.410385] kunit_try_run_case+0x170/0x3f0 [ 68.410424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.410457] kthread+0x328/0x630 [ 68.410488] ret_from_fork+0x10/0x20 [ 68.410519] [ 68.481468] Allocated by task 349: [ 68.484855] kasan_save_stack+0x3c/0x68 [ 68.488673] kasan_save_track+0x20/0x40 [ 68.492492] kasan_save_alloc_info+0x40/0x58 [ 68.496746] __kasan_kmalloc+0xd4/0xd8 [ 68.500479] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.504992] kasan_atomics+0xb8/0x2e0 [ 68.508638] kunit_try_run_case+0x170/0x3f0 [ 68.512805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.518274] kthread+0x328/0x630 [ 68.521485] ret_from_fork+0x10/0x20 [ 68.525044] [ 68.526520] The buggy address belongs to the object at ffff000808448180 [ 68.526520] which belongs to the cache kmalloc-64 of size 64 [ 68.538846] The buggy address is located 0 bytes to the right of [ 68.538846] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 68.551693] [ 68.553170] The buggy address belongs to the physical page: [ 68.558724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 68.566711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.573221] page_type: f5(slab) [ 68.576353] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.584078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.591797] page dumped because: kasan: bad access detected [ 68.597352] [ 68.598828] Memory state around the buggy address: [ 68.603606] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.610810] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.618015] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.625216] ^ [ 68.629994] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.637199] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.644400] ================================================================== [ 63.889571] ================================================================== [ 63.896558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 63.903846] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 63.911225] [ 63.912708] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.912760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.912775] Hardware name: WinLink E850-96 board (DT) [ 63.912796] Call trace: [ 63.912809] show_stack+0x20/0x38 (C) [ 63.912844] dump_stack_lvl+0x8c/0xd0 [ 63.912877] print_report+0x118/0x5d0 [ 63.912904] kasan_report+0xdc/0x128 [ 63.912931] kasan_check_range+0x100/0x1a8 [ 63.912961] __kasan_check_write+0x20/0x30 [ 63.912993] kasan_atomics_helper+0x32c/0x4858 [ 63.913029] kasan_atomics+0x198/0x2e0 [ 63.913061] kunit_try_run_case+0x170/0x3f0 [ 63.913096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.913130] kthread+0x328/0x630 [ 63.913158] ret_from_fork+0x10/0x20 [ 63.913190] [ 63.984140] Allocated by task 349: [ 63.987527] kasan_save_stack+0x3c/0x68 [ 63.991345] kasan_save_track+0x20/0x40 [ 63.995164] kasan_save_alloc_info+0x40/0x58 [ 63.999418] __kasan_kmalloc+0xd4/0xd8 [ 64.003150] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.007664] kasan_atomics+0xb8/0x2e0 [ 64.011310] kunit_try_run_case+0x170/0x3f0 [ 64.015477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.020947] kthread+0x328/0x630 [ 64.024157] ret_from_fork+0x10/0x20 [ 64.027716] [ 64.029191] The buggy address belongs to the object at ffff000808448180 [ 64.029191] which belongs to the cache kmalloc-64 of size 64 [ 64.041518] The buggy address is located 0 bytes to the right of [ 64.041518] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 64.054364] [ 64.055841] The buggy address belongs to the physical page: [ 64.061398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 64.069382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.075892] page_type: f5(slab) [ 64.079029] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.086749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.094468] page dumped because: kasan: bad access detected [ 64.100024] [ 64.101499] Memory state around the buggy address: [ 64.106278] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.113482] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.120687] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.127888] ^ [ 64.132667] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.139871] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.147072] ================================================================== [ 63.363093] ================================================================== [ 63.370175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 63.377465] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 63.384757] [ 63.386239] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.386291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.386309] Hardware name: WinLink E850-96 board (DT) [ 63.386328] Call trace: [ 63.386343] show_stack+0x20/0x38 (C) [ 63.386379] dump_stack_lvl+0x8c/0xd0 [ 63.386411] print_report+0x118/0x5d0 [ 63.386438] kasan_report+0xdc/0x128 [ 63.386467] kasan_check_range+0x100/0x1a8 [ 63.386496] __kasan_check_read+0x20/0x30 [ 63.386531] kasan_atomics_helper+0x2b0/0x4858 [ 63.386565] kasan_atomics+0x198/0x2e0 [ 63.386598] kunit_try_run_case+0x170/0x3f0 [ 63.386637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.386668] kthread+0x328/0x630 [ 63.386700] ret_from_fork+0x10/0x20 [ 63.386734] [ 63.457585] Allocated by task 349: [ 63.460973] kasan_save_stack+0x3c/0x68 [ 63.464790] kasan_save_track+0x20/0x40 [ 63.468610] kasan_save_alloc_info+0x40/0x58 [ 63.472863] __kasan_kmalloc+0xd4/0xd8 [ 63.476596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.481109] kasan_atomics+0xb8/0x2e0 [ 63.484755] kunit_try_run_case+0x170/0x3f0 [ 63.488922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.494390] kthread+0x328/0x630 [ 63.497601] ret_from_fork+0x10/0x20 [ 63.501161] [ 63.502636] The buggy address belongs to the object at ffff000808448180 [ 63.502636] which belongs to the cache kmalloc-64 of size 64 [ 63.514964] The buggy address is located 0 bytes to the right of [ 63.514964] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 63.527810] [ 63.529287] The buggy address belongs to the physical page: [ 63.534842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 63.542829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.549338] page_type: f5(slab) [ 63.552472] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.560195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.567913] page dumped because: kasan: bad access detected [ 63.573469] [ 63.574945] Memory state around the buggy address: [ 63.579723] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.586927] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.594132] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.601333] ^ [ 63.606113] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.613316] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.620517] ================================================================== [ 66.535647] ================================================================== [ 66.542701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 66.549987] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 66.557365] [ 66.558846] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 66.558895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.558912] Hardware name: WinLink E850-96 board (DT) [ 66.558930] Call trace: [ 66.558945] show_stack+0x20/0x38 (C) [ 66.558978] dump_stack_lvl+0x8c/0xd0 [ 66.559012] print_report+0x118/0x5d0 [ 66.559040] kasan_report+0xdc/0x128 [ 66.559066] kasan_check_range+0x100/0x1a8 [ 66.559097] __kasan_check_write+0x20/0x30 [ 66.559129] kasan_atomics_helper+0x6ec/0x4858 [ 66.559163] kasan_atomics+0x198/0x2e0 [ 66.559195] kunit_try_run_case+0x170/0x3f0 [ 66.559229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.559265] kthread+0x328/0x630 [ 66.559294] ret_from_fork+0x10/0x20 [ 66.559325] [ 66.630280] Allocated by task 349: [ 66.633668] kasan_save_stack+0x3c/0x68 [ 66.637486] kasan_save_track+0x20/0x40 [ 66.641305] kasan_save_alloc_info+0x40/0x58 [ 66.645558] __kasan_kmalloc+0xd4/0xd8 [ 66.649291] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.653805] kasan_atomics+0xb8/0x2e0 [ 66.657451] kunit_try_run_case+0x170/0x3f0 [ 66.661617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.667086] kthread+0x328/0x630 [ 66.670298] ret_from_fork+0x10/0x20 [ 66.673856] [ 66.675332] The buggy address belongs to the object at ffff000808448180 [ 66.675332] which belongs to the cache kmalloc-64 of size 64 [ 66.687659] The buggy address is located 0 bytes to the right of [ 66.687659] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 66.700505] [ 66.701981] The buggy address belongs to the physical page: [ 66.707539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 66.715523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.722033] page_type: f5(slab) [ 66.725166] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.732890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.740609] page dumped because: kasan: bad access detected [ 66.746165] [ 66.747640] Memory state around the buggy address: [ 66.752419] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.759623] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.766828] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.774029] ^ [ 66.778806] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.786011] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.793212] ================================================================== [ 65.211018] ================================================================== [ 65.218064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 65.225354] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 65.232732] [ 65.234215] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 65.234263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.234281] Hardware name: WinLink E850-96 board (DT) [ 65.234299] Call trace: [ 65.234312] show_stack+0x20/0x38 (C) [ 65.234344] dump_stack_lvl+0x8c/0xd0 [ 65.234376] print_report+0x118/0x5d0 [ 65.234403] kasan_report+0xdc/0x128 [ 65.234431] kasan_check_range+0x100/0x1a8 [ 65.234460] __kasan_check_write+0x20/0x30 [ 65.234493] kasan_atomics_helper+0x4e4/0x4858 [ 65.234528] kasan_atomics+0x198/0x2e0 [ 65.234561] kunit_try_run_case+0x170/0x3f0 [ 65.234595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.234632] kthread+0x328/0x630 [ 65.234661] ret_from_fork+0x10/0x20 [ 65.234692] [ 65.305648] Allocated by task 349: [ 65.309033] kasan_save_stack+0x3c/0x68 [ 65.312853] kasan_save_track+0x20/0x40 [ 65.316672] kasan_save_alloc_info+0x40/0x58 [ 65.320926] __kasan_kmalloc+0xd4/0xd8 [ 65.324658] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.329172] kasan_atomics+0xb8/0x2e0 [ 65.332818] kunit_try_run_case+0x170/0x3f0 [ 65.336984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.342453] kthread+0x328/0x630 [ 65.345665] ret_from_fork+0x10/0x20 [ 65.349224] [ 65.350700] The buggy address belongs to the object at ffff000808448180 [ 65.350700] which belongs to the cache kmalloc-64 of size 64 [ 65.363026] The buggy address is located 0 bytes to the right of [ 65.363026] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 65.375873] [ 65.377348] The buggy address belongs to the physical page: [ 65.382906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 65.390890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.397400] page_type: f5(slab) [ 65.400535] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.408257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.415976] page dumped because: kasan: bad access detected [ 65.421532] [ 65.423007] Memory state around the buggy address: [ 65.427785] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.434990] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.442195] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.449396] ^ [ 65.454174] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.461378] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.468580] ================================================================== [ 74.987859] ================================================================== [ 74.994828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 75.002204] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 75.009582] [ 75.011064] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 75.011112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.011128] Hardware name: WinLink E850-96 board (DT) [ 75.011147] Call trace: [ 75.011161] show_stack+0x20/0x38 (C) [ 75.011194] dump_stack_lvl+0x8c/0xd0 [ 75.011228] print_report+0x118/0x5d0 [ 75.011258] kasan_report+0xdc/0x128 [ 75.011284] kasan_check_range+0x100/0x1a8 [ 75.011315] __kasan_check_write+0x20/0x30 [ 75.011348] kasan_atomics_helper+0x126c/0x4858 [ 75.011382] kasan_atomics+0x198/0x2e0 [ 75.011416] kunit_try_run_case+0x170/0x3f0 [ 75.011451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.011486] kthread+0x328/0x630 [ 75.011518] ret_from_fork+0x10/0x20 [ 75.011551] [ 75.082584] Allocated by task 349: [ 75.085972] kasan_save_stack+0x3c/0x68 [ 75.089789] kasan_save_track+0x20/0x40 [ 75.093609] kasan_save_alloc_info+0x40/0x58 [ 75.097862] __kasan_kmalloc+0xd4/0xd8 [ 75.101595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.106108] kasan_atomics+0xb8/0x2e0 [ 75.109754] kunit_try_run_case+0x170/0x3f0 [ 75.113921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.119390] kthread+0x328/0x630 [ 75.122601] ret_from_fork+0x10/0x20 [ 75.126160] [ 75.127636] The buggy address belongs to the object at ffff000808448180 [ 75.127636] which belongs to the cache kmalloc-64 of size 64 [ 75.139964] The buggy address is located 0 bytes to the right of [ 75.139964] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 75.152809] [ 75.154287] The buggy address belongs to the physical page: [ 75.159844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 75.167828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.174337] page_type: f5(slab) [ 75.177471] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.185194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.192913] page dumped because: kasan: bad access detected [ 75.198468] [ 75.199944] Memory state around the buggy address: [ 75.204723] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.211927] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.219132] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.226332] ^ [ 75.231110] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.238315] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.245516] ================================================================== [ 62.571633] ================================================================== [ 62.578697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 62.586071] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 62.593451] [ 62.594933] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 62.594988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.595007] Hardware name: WinLink E850-96 board (DT) [ 62.595028] Call trace: [ 62.595043] show_stack+0x20/0x38 (C) [ 62.595084] dump_stack_lvl+0x8c/0xd0 [ 62.595116] print_report+0x118/0x5d0 [ 62.595144] kasan_report+0xdc/0x128 [ 62.595171] __asan_report_store4_noabort+0x20/0x30 [ 62.595207] kasan_atomics_helper+0x3f7c/0x4858 [ 62.595244] kasan_atomics+0x198/0x2e0 [ 62.595276] kunit_try_run_case+0x170/0x3f0 [ 62.595313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.595348] kthread+0x328/0x630 [ 62.595381] ret_from_fork+0x10/0x20 [ 62.595415] [ 62.663153] Allocated by task 349: [ 62.666539] kasan_save_stack+0x3c/0x68 [ 62.670359] kasan_save_track+0x20/0x40 [ 62.674177] kasan_save_alloc_info+0x40/0x58 [ 62.678431] __kasan_kmalloc+0xd4/0xd8 [ 62.682163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.686677] kasan_atomics+0xb8/0x2e0 [ 62.690323] kunit_try_run_case+0x170/0x3f0 [ 62.694489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.699959] kthread+0x328/0x630 [ 62.703170] ret_from_fork+0x10/0x20 [ 62.706729] [ 62.708206] The buggy address belongs to the object at ffff000808448180 [ 62.708206] which belongs to the cache kmalloc-64 of size 64 [ 62.720532] The buggy address is located 0 bytes to the right of [ 62.720532] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 62.733378] [ 62.734855] The buggy address belongs to the physical page: [ 62.740413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 62.748398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.754905] page_type: f5(slab) [ 62.758042] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.765762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.773481] page dumped because: kasan: bad access detected [ 62.779037] [ 62.780512] Memory state around the buggy address: [ 62.785293] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.792495] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.799700] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.806901] ^ [ 62.811680] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.818885] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.826085] ================================================================== [ 68.121907] ================================================================== [ 68.128959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 68.136248] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 68.143626] [ 68.145109] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 68.145159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.145177] Hardware name: WinLink E850-96 board (DT) [ 68.145195] Call trace: [ 68.145209] show_stack+0x20/0x38 (C) [ 68.145241] dump_stack_lvl+0x8c/0xd0 [ 68.145274] print_report+0x118/0x5d0 [ 68.145300] kasan_report+0xdc/0x128 [ 68.145327] kasan_check_range+0x100/0x1a8 [ 68.145357] __kasan_check_write+0x20/0x30 [ 68.145389] kasan_atomics_helper+0x99c/0x4858 [ 68.145425] kasan_atomics+0x198/0x2e0 [ 68.145456] kunit_try_run_case+0x170/0x3f0 [ 68.145493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.145527] kthread+0x328/0x630 [ 68.145557] ret_from_fork+0x10/0x20 [ 68.145591] [ 68.216542] Allocated by task 349: [ 68.219929] kasan_save_stack+0x3c/0x68 [ 68.223746] kasan_save_track+0x20/0x40 [ 68.227566] kasan_save_alloc_info+0x40/0x58 [ 68.231819] __kasan_kmalloc+0xd4/0xd8 [ 68.235552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.240066] kasan_atomics+0xb8/0x2e0 [ 68.243712] kunit_try_run_case+0x170/0x3f0 [ 68.247878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.253347] kthread+0x328/0x630 [ 68.256559] ret_from_fork+0x10/0x20 [ 68.260118] [ 68.261593] The buggy address belongs to the object at ffff000808448180 [ 68.261593] which belongs to the cache kmalloc-64 of size 64 [ 68.273920] The buggy address is located 0 bytes to the right of [ 68.273920] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 68.286766] [ 68.288242] The buggy address belongs to the physical page: [ 68.293800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 68.301786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.308294] page_type: f5(slab) [ 68.311428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.319151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.326870] page dumped because: kasan: bad access detected [ 68.332425] [ 68.333901] Memory state around the buggy address: [ 68.338679] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.345884] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.353088] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.360289] ^ [ 68.365068] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.372272] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.379473] ================================================================== [ 75.783094] ================================================================== [ 75.790129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 75.797505] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 75.804796] [ 75.806277] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 75.806325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.806343] Hardware name: WinLink E850-96 board (DT) [ 75.806364] Call trace: [ 75.806377] show_stack+0x20/0x38 (C) [ 75.806408] dump_stack_lvl+0x8c/0xd0 [ 75.806440] print_report+0x118/0x5d0 [ 75.806467] kasan_report+0xdc/0x128 [ 75.806495] __asan_report_load8_noabort+0x20/0x30 [ 75.806528] kasan_atomics_helper+0x3f04/0x4858 [ 75.806564] kasan_atomics+0x198/0x2e0 [ 75.806598] kunit_try_run_case+0x170/0x3f0 [ 75.806633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.806668] kthread+0x328/0x630 [ 75.806699] ret_from_fork+0x10/0x20 [ 75.806733] [ 75.874413] Allocated by task 349: [ 75.877800] kasan_save_stack+0x3c/0x68 [ 75.881618] kasan_save_track+0x20/0x40 [ 75.885437] kasan_save_alloc_info+0x40/0x58 [ 75.889690] __kasan_kmalloc+0xd4/0xd8 [ 75.893423] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.897937] kasan_atomics+0xb8/0x2e0 [ 75.901583] kunit_try_run_case+0x170/0x3f0 [ 75.905749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.911218] kthread+0x328/0x630 [ 75.914430] ret_from_fork+0x10/0x20 [ 75.917989] [ 75.919466] The buggy address belongs to the object at ffff000808448180 [ 75.919466] which belongs to the cache kmalloc-64 of size 64 [ 75.931791] The buggy address is located 0 bytes to the right of [ 75.931791] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 75.944638] [ 75.946114] The buggy address belongs to the physical page: [ 75.951671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 75.959655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.966165] page_type: f5(slab) [ 75.969299] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.977022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.984741] page dumped because: kasan: bad access detected [ 75.990297] [ 75.991772] Memory state around the buggy address: [ 75.996552] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.003755] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.010959] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.018161] ^ [ 76.022938] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.030143] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.037345] ================================================================== [ 77.896930] ================================================================== [ 77.903987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 77.911362] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 77.918653] [ 77.920135] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 77.920188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.920204] Hardware name: WinLink E850-96 board (DT) [ 77.920225] Call trace: [ 77.920239] show_stack+0x20/0x38 (C) [ 77.920271] dump_stack_lvl+0x8c/0xd0 [ 77.920303] print_report+0x118/0x5d0 [ 77.920333] kasan_report+0xdc/0x128 [ 77.920360] __asan_report_load8_noabort+0x20/0x30 [ 77.920396] kasan_atomics_helper+0x3df4/0x4858 [ 77.920432] kasan_atomics+0x198/0x2e0 [ 77.920464] kunit_try_run_case+0x170/0x3f0 [ 77.920501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.920536] kthread+0x328/0x630 [ 77.920563] ret_from_fork+0x10/0x20 [ 77.920594] [ 77.988270] Allocated by task 349: [ 77.991657] kasan_save_stack+0x3c/0x68 [ 77.995475] kasan_save_track+0x20/0x40 [ 77.999294] kasan_save_alloc_info+0x40/0x58 [ 78.003548] __kasan_kmalloc+0xd4/0xd8 [ 78.007280] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.011794] kasan_atomics+0xb8/0x2e0 [ 78.015440] kunit_try_run_case+0x170/0x3f0 [ 78.019607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.025075] kthread+0x328/0x630 [ 78.028287] ret_from_fork+0x10/0x20 [ 78.031846] [ 78.033321] The buggy address belongs to the object at ffff000808448180 [ 78.033321] which belongs to the cache kmalloc-64 of size 64 [ 78.045648] The buggy address is located 0 bytes to the right of [ 78.045648] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 78.058495] [ 78.059973] The buggy address belongs to the physical page: [ 78.065528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 78.073512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.080022] page_type: f5(slab) [ 78.083157] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.090879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.098598] page dumped because: kasan: bad access detected [ 78.104154] [ 78.105629] Memory state around the buggy address: [ 78.110407] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.117612] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.124817] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.132018] ^ [ 78.136796] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.144000] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.151202] ================================================================== [ 76.574902] ================================================================== [ 76.581956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 76.589333] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 76.596711] [ 76.598194] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 76.598243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.598259] Hardware name: WinLink E850-96 board (DT) [ 76.598277] Call trace: [ 76.598293] show_stack+0x20/0x38 (C) [ 76.598325] dump_stack_lvl+0x8c/0xd0 [ 76.598357] print_report+0x118/0x5d0 [ 76.598386] kasan_report+0xdc/0x128 [ 76.598414] kasan_check_range+0x100/0x1a8 [ 76.598446] __kasan_check_write+0x20/0x30 [ 76.598479] kasan_atomics_helper+0x14e4/0x4858 [ 76.598513] kasan_atomics+0x198/0x2e0 [ 76.598545] kunit_try_run_case+0x170/0x3f0 [ 76.598581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.598615] kthread+0x328/0x630 [ 76.598645] ret_from_fork+0x10/0x20 [ 76.598678] [ 76.669713] Allocated by task 349: [ 76.673101] kasan_save_stack+0x3c/0x68 [ 76.676919] kasan_save_track+0x20/0x40 [ 76.680738] kasan_save_alloc_info+0x40/0x58 [ 76.684991] __kasan_kmalloc+0xd4/0xd8 [ 76.688724] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.693237] kasan_atomics+0xb8/0x2e0 [ 76.696883] kunit_try_run_case+0x170/0x3f0 [ 76.701050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.706518] kthread+0x328/0x630 [ 76.709730] ret_from_fork+0x10/0x20 [ 76.713289] [ 76.714764] The buggy address belongs to the object at ffff000808448180 [ 76.714764] which belongs to the cache kmalloc-64 of size 64 [ 76.727093] The buggy address is located 0 bytes to the right of [ 76.727093] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 76.739938] [ 76.741414] The buggy address belongs to the physical page: [ 76.746970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 76.754956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.761466] page_type: f5(slab) [ 76.764600] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.772323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.780042] page dumped because: kasan: bad access detected [ 76.785597] [ 76.787073] Memory state around the buggy address: [ 76.791850] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.799055] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.806260] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.813461] ^ [ 76.818239] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.825444] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.832645] ================================================================== [ 62.302886] ================================================================== [ 62.317070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 62.324443] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 62.331736] [ 62.333223] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 62.333286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.333305] Hardware name: WinLink E850-96 board (DT) [ 62.333329] Call trace: [ 62.333343] show_stack+0x20/0x38 (C) [ 62.333383] dump_stack_lvl+0x8c/0xd0 [ 62.333420] print_report+0x118/0x5d0 [ 62.333451] kasan_report+0xdc/0x128 [ 62.333479] __asan_report_load4_noabort+0x20/0x30 [ 62.333515] kasan_atomics_helper+0x40a8/0x4858 [ 62.333554] kasan_atomics+0x198/0x2e0 [ 62.333588] kunit_try_run_case+0x170/0x3f0 [ 62.333627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.333662] kthread+0x328/0x630 [ 62.333695] ret_from_fork+0x10/0x20 [ 62.333734] [ 62.401353] Allocated by task 349: [ 62.404740] kasan_save_stack+0x3c/0x68 [ 62.408556] kasan_save_track+0x20/0x40 [ 62.412376] kasan_save_alloc_info+0x40/0x58 [ 62.416629] __kasan_kmalloc+0xd4/0xd8 [ 62.420362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.424875] kasan_atomics+0xb8/0x2e0 [ 62.428521] kunit_try_run_case+0x170/0x3f0 [ 62.432688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.438158] kthread+0x328/0x630 [ 62.441368] ret_from_fork+0x10/0x20 [ 62.444927] [ 62.446404] The buggy address belongs to the object at ffff000808448180 [ 62.446404] which belongs to the cache kmalloc-64 of size 64 [ 62.458733] The buggy address is located 0 bytes to the right of [ 62.458733] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 62.471576] [ 62.473055] The buggy address belongs to the physical page: [ 62.478612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 62.486596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.493106] page_type: f5(slab) [ 62.496242] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.503960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.511681] page dumped because: kasan: bad access detected [ 62.517235] [ 62.518712] Memory state around the buggy address: [ 62.523490] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.530693] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.537900] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.545099] ^ [ 62.549878] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.557082] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.564283] ================================================================== [ 65.475968] ================================================================== [ 65.482990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 65.490281] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 65.497659] [ 65.499138] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 65.499186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.499203] Hardware name: WinLink E850-96 board (DT) [ 65.499221] Call trace: [ 65.499232] show_stack+0x20/0x38 (C) [ 65.499265] dump_stack_lvl+0x8c/0xd0 [ 65.499299] print_report+0x118/0x5d0 [ 65.499327] kasan_report+0xdc/0x128 [ 65.499354] kasan_check_range+0x100/0x1a8 [ 65.499385] __kasan_check_write+0x20/0x30 [ 65.499417] kasan_atomics_helper+0x54c/0x4858 [ 65.499451] kasan_atomics+0x198/0x2e0 [ 65.499484] kunit_try_run_case+0x170/0x3f0 [ 65.499517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.499550] kthread+0x328/0x630 [ 65.499579] ret_from_fork+0x10/0x20 [ 65.499610] [ 65.570575] Allocated by task 349: [ 65.573960] kasan_save_stack+0x3c/0x68 [ 65.577779] kasan_save_track+0x20/0x40 [ 65.581599] kasan_save_alloc_info+0x40/0x58 [ 65.585852] __kasan_kmalloc+0xd4/0xd8 [ 65.589585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.594099] kasan_atomics+0xb8/0x2e0 [ 65.597744] kunit_try_run_case+0x170/0x3f0 [ 65.601911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.607380] kthread+0x328/0x630 [ 65.610591] ret_from_fork+0x10/0x20 [ 65.614150] [ 65.615626] The buggy address belongs to the object at ffff000808448180 [ 65.615626] which belongs to the cache kmalloc-64 of size 64 [ 65.627953] The buggy address is located 0 bytes to the right of [ 65.627953] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 65.640799] [ 65.642275] The buggy address belongs to the physical page: [ 65.647833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 65.655817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.662327] page_type: f5(slab) [ 65.665460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.673184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.680903] page dumped because: kasan: bad access detected [ 65.686458] [ 65.687934] Memory state around the buggy address: [ 65.692711] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.699916] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.707121] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.714323] ^ [ 65.719100] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.726305] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.733506] ================================================================== [ 66.005913] ================================================================== [ 66.012845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 66.020136] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 66.027512] [ 66.028995] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 66.029044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.029061] Hardware name: WinLink E850-96 board (DT) [ 66.029077] Call trace: [ 66.029091] show_stack+0x20/0x38 (C) [ 66.029123] dump_stack_lvl+0x8c/0xd0 [ 66.029155] print_report+0x118/0x5d0 [ 66.029183] kasan_report+0xdc/0x128 [ 66.029210] kasan_check_range+0x100/0x1a8 [ 66.029243] __kasan_check_write+0x20/0x30 [ 66.029273] kasan_atomics_helper+0x61c/0x4858 [ 66.029308] kasan_atomics+0x198/0x2e0 [ 66.029340] kunit_try_run_case+0x170/0x3f0 [ 66.029376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.029409] kthread+0x328/0x630 [ 66.029442] ret_from_fork+0x10/0x20 [ 66.029474] [ 66.100428] Allocated by task 349: [ 66.103815] kasan_save_stack+0x3c/0x68 [ 66.107632] kasan_save_track+0x20/0x40 [ 66.111452] kasan_save_alloc_info+0x40/0x58 [ 66.115705] __kasan_kmalloc+0xd4/0xd8 [ 66.119438] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.123952] kasan_atomics+0xb8/0x2e0 [ 66.127598] kunit_try_run_case+0x170/0x3f0 [ 66.131764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.137233] kthread+0x328/0x630 [ 66.140444] ret_from_fork+0x10/0x20 [ 66.144004] [ 66.145479] The buggy address belongs to the object at ffff000808448180 [ 66.145479] which belongs to the cache kmalloc-64 of size 64 [ 66.157806] The buggy address is located 0 bytes to the right of [ 66.157806] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 66.170652] [ 66.172128] The buggy address belongs to the physical page: [ 66.177686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 66.185670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.192180] page_type: f5(slab) [ 66.195313] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.203037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.210756] page dumped because: kasan: bad access detected [ 66.216311] [ 66.217787] Memory state around the buggy address: [ 66.222565] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.229770] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.236974] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.244176] ^ [ 66.248953] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.256158] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.263359] ================================================================== [ 77.105212] ================================================================== [ 77.112158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 77.119533] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 77.126911] [ 77.128394] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 77.128443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.128459] Hardware name: WinLink E850-96 board (DT) [ 77.128479] Call trace: [ 77.128494] show_stack+0x20/0x38 (C) [ 77.128530] dump_stack_lvl+0x8c/0xd0 [ 77.128563] print_report+0x118/0x5d0 [ 77.128594] kasan_report+0xdc/0x128 [ 77.128622] kasan_check_range+0x100/0x1a8 [ 77.128652] __kasan_check_write+0x20/0x30 [ 77.128685] kasan_atomics_helper+0x15b4/0x4858 [ 77.128720] kasan_atomics+0x198/0x2e0 [ 77.128752] kunit_try_run_case+0x170/0x3f0 [ 77.128787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.128819] kthread+0x328/0x630 [ 77.128849] ret_from_fork+0x10/0x20 [ 77.128885] [ 77.199913] Allocated by task 349: [ 77.203301] kasan_save_stack+0x3c/0x68 [ 77.207119] kasan_save_track+0x20/0x40 [ 77.210938] kasan_save_alloc_info+0x40/0x58 [ 77.215191] __kasan_kmalloc+0xd4/0xd8 [ 77.218924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.223438] kasan_atomics+0xb8/0x2e0 [ 77.227084] kunit_try_run_case+0x170/0x3f0 [ 77.231250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.236719] kthread+0x328/0x630 [ 77.239930] ret_from_fork+0x10/0x20 [ 77.243489] [ 77.244965] The buggy address belongs to the object at ffff000808448180 [ 77.244965] which belongs to the cache kmalloc-64 of size 64 [ 77.257293] The buggy address is located 0 bytes to the right of [ 77.257293] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 77.270139] [ 77.271615] The buggy address belongs to the physical page: [ 77.277172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 77.285157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.291666] page_type: f5(slab) [ 77.294801] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.302523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.310242] page dumped because: kasan: bad access detected [ 77.315797] [ 77.317273] Memory state around the buggy address: [ 77.322052] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.329256] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.336461] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.343662] ^ [ 77.348439] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.355644] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.362846] ================================================================== [ 67.857097] ================================================================== [ 67.864034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 67.871322] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 67.878700] [ 67.880183] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 67.880233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.880250] Hardware name: WinLink E850-96 board (DT) [ 67.880269] Call trace: [ 67.880284] show_stack+0x20/0x38 (C) [ 67.880317] dump_stack_lvl+0x8c/0xd0 [ 67.880351] print_report+0x118/0x5d0 [ 67.880379] kasan_report+0xdc/0x128 [ 67.880409] kasan_check_range+0x100/0x1a8 [ 67.880440] __kasan_check_write+0x20/0x30 [ 67.880471] kasan_atomics_helper+0x934/0x4858 [ 67.880506] kasan_atomics+0x198/0x2e0 [ 67.880539] kunit_try_run_case+0x170/0x3f0 [ 67.880575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.880612] kthread+0x328/0x630 [ 67.880642] ret_from_fork+0x10/0x20 [ 67.880673] [ 67.951615] Allocated by task 349: [ 67.955003] kasan_save_stack+0x3c/0x68 [ 67.958820] kasan_save_track+0x20/0x40 [ 67.962639] kasan_save_alloc_info+0x40/0x58 [ 67.966893] __kasan_kmalloc+0xd4/0xd8 [ 67.970625] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.975139] kasan_atomics+0xb8/0x2e0 [ 67.978785] kunit_try_run_case+0x170/0x3f0 [ 67.982952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.988420] kthread+0x328/0x630 [ 67.991632] ret_from_fork+0x10/0x20 [ 67.995191] [ 67.996666] The buggy address belongs to the object at ffff000808448180 [ 67.996666] which belongs to the cache kmalloc-64 of size 64 [ 68.008993] The buggy address is located 0 bytes to the right of [ 68.008993] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 68.021840] [ 68.023316] The buggy address belongs to the physical page: [ 68.028873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 68.036857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.043367] page_type: f5(slab) [ 68.046501] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.054225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.061943] page dumped because: kasan: bad access detected [ 68.067499] [ 68.068974] Memory state around the buggy address: [ 68.073754] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.080957] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.088162] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.095363] ^ [ 68.100141] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.107346] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.114547] ================================================================== [ 69.969908] ================================================================== [ 69.976850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 69.984137] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 69.991515] [ 69.992999] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 69.993051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.993067] Hardware name: WinLink E850-96 board (DT) [ 69.993088] Call trace: [ 69.993102] show_stack+0x20/0x38 (C) [ 69.993135] dump_stack_lvl+0x8c/0xd0 [ 69.993168] print_report+0x118/0x5d0 [ 69.993196] kasan_report+0xdc/0x128 [ 69.993221] kasan_check_range+0x100/0x1a8 [ 69.993253] __kasan_check_write+0x20/0x30 [ 69.993283] kasan_atomics_helper+0xc08/0x4858 [ 69.993318] kasan_atomics+0x198/0x2e0 [ 69.993351] kunit_try_run_case+0x170/0x3f0 [ 69.993385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.993421] kthread+0x328/0x630 [ 69.993449] ret_from_fork+0x10/0x20 [ 69.993481] [ 70.064430] Allocated by task 349: [ 70.067818] kasan_save_stack+0x3c/0x68 [ 70.071636] kasan_save_track+0x20/0x40 [ 70.075455] kasan_save_alloc_info+0x40/0x58 [ 70.079708] __kasan_kmalloc+0xd4/0xd8 [ 70.083441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.087955] kasan_atomics+0xb8/0x2e0 [ 70.091601] kunit_try_run_case+0x170/0x3f0 [ 70.095767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.101237] kthread+0x328/0x630 [ 70.104448] ret_from_fork+0x10/0x20 [ 70.108007] [ 70.109482] The buggy address belongs to the object at ffff000808448180 [ 70.109482] which belongs to the cache kmalloc-64 of size 64 [ 70.121809] The buggy address is located 0 bytes to the right of [ 70.121809] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 70.134655] [ 70.136132] The buggy address belongs to the physical page: [ 70.141689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 70.149673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.156183] page_type: f5(slab) [ 70.159319] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.167040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.174759] page dumped because: kasan: bad access detected [ 70.180314] [ 70.181790] Memory state around the buggy address: [ 70.186570] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.193773] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.200977] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.208179] ^ [ 70.212956] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.220161] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.227362] ================================================================== [ 62.833469] ================================================================== [ 62.840499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 62.847786] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 62.855077] [ 62.856562] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 62.856618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.856636] Hardware name: WinLink E850-96 board (DT) [ 62.856658] Call trace: [ 62.856673] show_stack+0x20/0x38 (C) [ 62.856711] dump_stack_lvl+0x8c/0xd0 [ 62.856745] print_report+0x118/0x5d0 [ 62.856776] kasan_report+0xdc/0x128 [ 62.856804] kasan_check_range+0x100/0x1a8 [ 62.856834] __kasan_check_read+0x20/0x30 [ 62.856868] kasan_atomics_helper+0x1ec/0x4858 [ 62.856905] kasan_atomics+0x198/0x2e0 [ 62.856936] kunit_try_run_case+0x170/0x3f0 [ 62.856973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.857008] kthread+0x328/0x630 [ 62.857038] ret_from_fork+0x10/0x20 [ 62.857074] [ 62.927906] Allocated by task 349: [ 62.931295] kasan_save_stack+0x3c/0x68 [ 62.935111] kasan_save_track+0x20/0x40 [ 62.938930] kasan_save_alloc_info+0x40/0x58 [ 62.943183] __kasan_kmalloc+0xd4/0xd8 [ 62.946916] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.951430] kasan_atomics+0xb8/0x2e0 [ 62.955076] kunit_try_run_case+0x170/0x3f0 [ 62.959243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.964712] kthread+0x328/0x630 [ 62.967923] ret_from_fork+0x10/0x20 [ 62.971483] [ 62.972959] The buggy address belongs to the object at ffff000808448180 [ 62.972959] which belongs to the cache kmalloc-64 of size 64 [ 62.985287] The buggy address is located 0 bytes to the right of [ 62.985287] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 62.998130] [ 62.999609] The buggy address belongs to the physical page: [ 63.005166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 63.013149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.019658] page_type: f5(slab) [ 63.022794] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.030515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.038235] page dumped because: kasan: bad access detected [ 63.043790] [ 63.045265] Memory state around the buggy address: [ 63.050044] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.057248] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.064453] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.071654] ^ [ 63.076433] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.083636] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.090838] ================================================================== [ 72.340770] ================================================================== [ 72.347820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 72.355195] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 72.362573] [ 72.364056] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 72.364107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.364123] Hardware name: WinLink E850-96 board (DT) [ 72.364143] Call trace: [ 72.364157] show_stack+0x20/0x38 (C) [ 72.364191] dump_stack_lvl+0x8c/0xd0 [ 72.364223] print_report+0x118/0x5d0 [ 72.364252] kasan_report+0xdc/0x128 [ 72.364281] __asan_report_store8_noabort+0x20/0x30 [ 72.364316] kasan_atomics_helper+0x3e5c/0x4858 [ 72.364351] kasan_atomics+0x198/0x2e0 [ 72.364384] kunit_try_run_case+0x170/0x3f0 [ 72.364417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.364449] kthread+0x328/0x630 [ 72.364478] ret_from_fork+0x10/0x20 [ 72.364510] [ 72.432277] Allocated by task 349: [ 72.435664] kasan_save_stack+0x3c/0x68 [ 72.439482] kasan_save_track+0x20/0x40 [ 72.443301] kasan_save_alloc_info+0x40/0x58 [ 72.447555] __kasan_kmalloc+0xd4/0xd8 [ 72.451287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.455801] kasan_atomics+0xb8/0x2e0 [ 72.459447] kunit_try_run_case+0x170/0x3f0 [ 72.463613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.469082] kthread+0x328/0x630 [ 72.472294] ret_from_fork+0x10/0x20 [ 72.475853] [ 72.477328] The buggy address belongs to the object at ffff000808448180 [ 72.477328] which belongs to the cache kmalloc-64 of size 64 [ 72.489655] The buggy address is located 0 bytes to the right of [ 72.489655] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 72.502502] [ 72.503979] The buggy address belongs to the physical page: [ 72.509534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 72.517520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.524029] page_type: f5(slab) [ 72.527162] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.534887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.542605] page dumped because: kasan: bad access detected [ 72.548160] [ 72.549636] Memory state around the buggy address: [ 72.554416] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.561619] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.568824] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.576025] ^ [ 72.580803] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.588007] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.595209] ================================================================== [ 69.181701] ================================================================== [ 69.188667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 69.196041] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 69.203332] [ 69.204815] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 69.204863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.204880] Hardware name: WinLink E850-96 board (DT) [ 69.204903] Call trace: [ 69.204917] show_stack+0x20/0x38 (C) [ 69.204951] dump_stack_lvl+0x8c/0xd0 [ 69.204982] print_report+0x118/0x5d0 [ 69.205010] kasan_report+0xdc/0x128 [ 69.205037] __asan_report_load4_noabort+0x20/0x30 [ 69.205072] kasan_atomics_helper+0x3dcc/0x4858 [ 69.205106] kasan_atomics+0x198/0x2e0 [ 69.205138] kunit_try_run_case+0x170/0x3f0 [ 69.205174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.205209] kthread+0x328/0x630 [ 69.205239] ret_from_fork+0x10/0x20 [ 69.205273] [ 69.272949] Allocated by task 349: [ 69.276337] kasan_save_stack+0x3c/0x68 [ 69.280155] kasan_save_track+0x20/0x40 [ 69.283974] kasan_save_alloc_info+0x40/0x58 [ 69.288227] __kasan_kmalloc+0xd4/0xd8 [ 69.291960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.296474] kasan_atomics+0xb8/0x2e0 [ 69.300120] kunit_try_run_case+0x170/0x3f0 [ 69.304286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.309756] kthread+0x328/0x630 [ 69.312966] ret_from_fork+0x10/0x20 [ 69.316525] [ 69.318001] The buggy address belongs to the object at ffff000808448180 [ 69.318001] which belongs to the cache kmalloc-64 of size 64 [ 69.330327] The buggy address is located 0 bytes to the right of [ 69.330327] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 69.343174] [ 69.344652] The buggy address belongs to the physical page: [ 69.350207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 69.358192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.364701] page_type: f5(slab) [ 69.367836] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.375559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.383277] page dumped because: kasan: bad access detected [ 69.388833] [ 69.390309] Memory state around the buggy address: [ 69.395088] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.402292] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.409496] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.416697] ^ [ 69.421475] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.428680] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.435881] ================================================================== [ 72.602593] ================================================================== [ 72.609624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 72.616910] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 72.624288] [ 72.625771] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 72.625822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.625837] Hardware name: WinLink E850-96 board (DT) [ 72.625857] Call trace: [ 72.625871] show_stack+0x20/0x38 (C) [ 72.625902] dump_stack_lvl+0x8c/0xd0 [ 72.625933] print_report+0x118/0x5d0 [ 72.625961] kasan_report+0xdc/0x128 [ 72.625990] kasan_check_range+0x100/0x1a8 [ 72.626020] __kasan_check_write+0x20/0x30 [ 72.626054] kasan_atomics_helper+0xeb8/0x4858 [ 72.626093] kasan_atomics+0x198/0x2e0 [ 72.626124] kunit_try_run_case+0x170/0x3f0 [ 72.626159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.626194] kthread+0x328/0x630 [ 72.626223] ret_from_fork+0x10/0x20 [ 72.626255] [ 72.697203] Allocated by task 349: [ 72.700591] kasan_save_stack+0x3c/0x68 [ 72.704408] kasan_save_track+0x20/0x40 [ 72.708228] kasan_save_alloc_info+0x40/0x58 [ 72.712481] __kasan_kmalloc+0xd4/0xd8 [ 72.716214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.720728] kasan_atomics+0xb8/0x2e0 [ 72.724373] kunit_try_run_case+0x170/0x3f0 [ 72.728540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.734008] kthread+0x328/0x630 [ 72.737220] ret_from_fork+0x10/0x20 [ 72.740779] [ 72.742255] The buggy address belongs to the object at ffff000808448180 [ 72.742255] which belongs to the cache kmalloc-64 of size 64 [ 72.754582] The buggy address is located 0 bytes to the right of [ 72.754582] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 72.767428] [ 72.768904] The buggy address belongs to the physical page: [ 72.774460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 72.782446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.788955] page_type: f5(slab) [ 72.792091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.799813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.807532] page dumped because: kasan: bad access detected [ 72.813087] [ 72.814563] Memory state around the buggy address: [ 72.819343] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.826545] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.833750] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.840952] ^ [ 72.845729] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.852934] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.860135] ================================================================== [ 78.158555] ================================================================== [ 78.165615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 78.172990] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 78.180368] [ 78.181851] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 78.181900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.181918] Hardware name: WinLink E850-96 board (DT) [ 78.181936] Call trace: [ 78.181950] show_stack+0x20/0x38 (C) [ 78.181983] dump_stack_lvl+0x8c/0xd0 [ 78.182017] print_report+0x118/0x5d0 [ 78.182046] kasan_report+0xdc/0x128 [ 78.182074] kasan_check_range+0x100/0x1a8 [ 78.182105] __kasan_check_write+0x20/0x30 [ 78.182139] kasan_atomics_helper+0x16d0/0x4858 [ 78.182173] kasan_atomics+0x198/0x2e0 [ 78.182204] kunit_try_run_case+0x170/0x3f0 [ 78.182242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.182279] kthread+0x328/0x630 [ 78.182309] ret_from_fork+0x10/0x20 [ 78.182341] [ 78.253370] Allocated by task 349: [ 78.256757] kasan_save_stack+0x3c/0x68 [ 78.260575] kasan_save_track+0x20/0x40 [ 78.264395] kasan_save_alloc_info+0x40/0x58 [ 78.268648] __kasan_kmalloc+0xd4/0xd8 [ 78.272380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.276894] kasan_atomics+0xb8/0x2e0 [ 78.280540] kunit_try_run_case+0x170/0x3f0 [ 78.284707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.290175] kthread+0x328/0x630 [ 78.293387] ret_from_fork+0x10/0x20 [ 78.296946] [ 78.298421] The buggy address belongs to the object at ffff000808448180 [ 78.298421] which belongs to the cache kmalloc-64 of size 64 [ 78.310748] The buggy address is located 0 bytes to the right of [ 78.310748] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 78.323595] [ 78.325072] The buggy address belongs to the physical page: [ 78.330628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 78.338612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.345122] page_type: f5(slab) [ 78.348255] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.355980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.363699] page dumped because: kasan: bad access detected [ 78.369254] [ 78.370729] Memory state around the buggy address: [ 78.375508] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.382712] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.389917] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.397118] ^ [ 78.401896] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.409101] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.416302] ================================================================== [ 75.252911] ================================================================== [ 75.259927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 75.267304] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 75.274683] [ 75.276166] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 75.276215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.276231] Hardware name: WinLink E850-96 board (DT) [ 75.276253] Call trace: [ 75.276266] show_stack+0x20/0x38 (C) [ 75.276299] dump_stack_lvl+0x8c/0xd0 [ 75.276332] print_report+0x118/0x5d0 [ 75.276359] kasan_report+0xdc/0x128 [ 75.276387] kasan_check_range+0x100/0x1a8 [ 75.276416] __kasan_check_write+0x20/0x30 [ 75.276449] kasan_atomics_helper+0x12d8/0x4858 [ 75.276487] kasan_atomics+0x198/0x2e0 [ 75.276519] kunit_try_run_case+0x170/0x3f0 [ 75.276554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.276590] kthread+0x328/0x630 [ 75.276619] ret_from_fork+0x10/0x20 [ 75.276651] [ 75.347685] Allocated by task 349: [ 75.351070] kasan_save_stack+0x3c/0x68 [ 75.354889] kasan_save_track+0x20/0x40 [ 75.358709] kasan_save_alloc_info+0x40/0x58 [ 75.362962] __kasan_kmalloc+0xd4/0xd8 [ 75.366695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.371209] kasan_atomics+0xb8/0x2e0 [ 75.374854] kunit_try_run_case+0x170/0x3f0 [ 75.379021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.384490] kthread+0x328/0x630 [ 75.387701] ret_from_fork+0x10/0x20 [ 75.391260] [ 75.392736] The buggy address belongs to the object at ffff000808448180 [ 75.392736] which belongs to the cache kmalloc-64 of size 64 [ 75.405064] The buggy address is located 0 bytes to the right of [ 75.405064] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 75.417909] [ 75.419387] The buggy address belongs to the physical page: [ 75.424944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 75.432927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.439437] page_type: f5(slab) [ 75.442571] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.450294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.458013] page dumped because: kasan: bad access detected [ 75.463568] [ 75.465044] Memory state around the buggy address: [ 75.469824] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.477027] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.484232] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.491433] ^ [ 75.496210] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.503415] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.510616] ================================================================== [ 67.330452] ================================================================== [ 67.337477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 67.344767] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 67.352145] [ 67.353627] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 67.353675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.353691] Hardware name: WinLink E850-96 board (DT) [ 67.353710] Call trace: [ 67.353722] show_stack+0x20/0x38 (C) [ 67.353758] dump_stack_lvl+0x8c/0xd0 [ 67.353789] print_report+0x118/0x5d0 [ 67.353815] kasan_report+0xdc/0x128 [ 67.353844] kasan_check_range+0x100/0x1a8 [ 67.353873] __kasan_check_write+0x20/0x30 [ 67.353906] kasan_atomics_helper+0x894/0x4858 [ 67.353943] kasan_atomics+0x198/0x2e0 [ 67.353975] kunit_try_run_case+0x170/0x3f0 [ 67.354012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.354047] kthread+0x328/0x630 [ 67.354079] ret_from_fork+0x10/0x20 [ 67.354109] [ 67.425060] Allocated by task 349: [ 67.428447] kasan_save_stack+0x3c/0x68 [ 67.432266] kasan_save_track+0x20/0x40 [ 67.436085] kasan_save_alloc_info+0x40/0x58 [ 67.440338] __kasan_kmalloc+0xd4/0xd8 [ 67.444071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.448585] kasan_atomics+0xb8/0x2e0 [ 67.452230] kunit_try_run_case+0x170/0x3f0 [ 67.456397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.461867] kthread+0x328/0x630 [ 67.465077] ret_from_fork+0x10/0x20 [ 67.468637] [ 67.470112] The buggy address belongs to the object at ffff000808448180 [ 67.470112] which belongs to the cache kmalloc-64 of size 64 [ 67.482440] The buggy address is located 0 bytes to the right of [ 67.482440] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 67.495285] [ 67.496763] The buggy address belongs to the physical page: [ 67.502318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 67.510303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.516813] page_type: f5(slab) [ 67.519947] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.527670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.535389] page dumped because: kasan: bad access detected [ 67.540944] [ 67.542420] Memory state around the buggy address: [ 67.547201] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.554403] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.561607] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.568808] ^ [ 67.573586] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.580791] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.587992] ================================================================== [ 67.065586] ================================================================== [ 67.072553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 67.079840] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 67.087218] [ 67.088701] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 67.088749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.088765] Hardware name: WinLink E850-96 board (DT) [ 67.088786] Call trace: [ 67.088799] show_stack+0x20/0x38 (C) [ 67.088835] dump_stack_lvl+0x8c/0xd0 [ 67.088868] print_report+0x118/0x5d0 [ 67.088897] kasan_report+0xdc/0x128 [ 67.088924] kasan_check_range+0x100/0x1a8 [ 67.088955] __kasan_check_write+0x20/0x30 [ 67.088988] kasan_atomics_helper+0x7cc/0x4858 [ 67.089024] kasan_atomics+0x198/0x2e0 [ 67.089057] kunit_try_run_case+0x170/0x3f0 [ 67.089093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.089127] kthread+0x328/0x630 [ 67.089157] ret_from_fork+0x10/0x20 [ 67.089189] [ 67.160134] Allocated by task 349: [ 67.163521] kasan_save_stack+0x3c/0x68 [ 67.167339] kasan_save_track+0x20/0x40 [ 67.171158] kasan_save_alloc_info+0x40/0x58 [ 67.175412] __kasan_kmalloc+0xd4/0xd8 [ 67.179144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.183658] kasan_atomics+0xb8/0x2e0 [ 67.187304] kunit_try_run_case+0x170/0x3f0 [ 67.191470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.196939] kthread+0x328/0x630 [ 67.200151] ret_from_fork+0x10/0x20 [ 67.203710] [ 67.205185] The buggy address belongs to the object at ffff000808448180 [ 67.205185] which belongs to the cache kmalloc-64 of size 64 [ 67.217512] The buggy address is located 0 bytes to the right of [ 67.217512] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 67.230359] [ 67.231836] The buggy address belongs to the physical page: [ 67.237392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 67.245376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.251886] page_type: f5(slab) [ 67.255020] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.262743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.270462] page dumped because: kasan: bad access detected [ 67.276018] [ 67.277493] Memory state around the buggy address: [ 67.282273] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.289476] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.296681] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.303882] ^ [ 67.308660] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.315865] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.323066] ================================================================== [ 78.423658] ================================================================== [ 78.430714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 78.438090] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 78.445381] [ 78.446865] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 78.446917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.446932] Hardware name: WinLink E850-96 board (DT) [ 78.446953] Call trace: [ 78.446967] show_stack+0x20/0x38 (C) [ 78.447002] dump_stack_lvl+0x8c/0xd0 [ 78.447036] print_report+0x118/0x5d0 [ 78.447062] kasan_report+0xdc/0x128 [ 78.447090] __asan_report_load8_noabort+0x20/0x30 [ 78.447125] kasan_atomics_helper+0x3e10/0x4858 [ 78.447161] kasan_atomics+0x198/0x2e0 [ 78.447194] kunit_try_run_case+0x170/0x3f0 [ 78.447230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.447265] kthread+0x328/0x630 [ 78.447296] ret_from_fork+0x10/0x20 [ 78.447327] [ 78.514998] Allocated by task 349: [ 78.518385] kasan_save_stack+0x3c/0x68 [ 78.522203] kasan_save_track+0x20/0x40 [ 78.526023] kasan_save_alloc_info+0x40/0x58 [ 78.530276] __kasan_kmalloc+0xd4/0xd8 [ 78.534009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.538522] kasan_atomics+0xb8/0x2e0 [ 78.542168] kunit_try_run_case+0x170/0x3f0 [ 78.546335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.551805] kthread+0x328/0x630 [ 78.555017] ret_from_fork+0x10/0x20 [ 78.558574] [ 78.560049] The buggy address belongs to the object at ffff000808448180 [ 78.560049] which belongs to the cache kmalloc-64 of size 64 [ 78.572376] The buggy address is located 0 bytes to the right of [ 78.572376] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 78.585223] [ 78.586699] The buggy address belongs to the physical page: [ 78.592256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 78.600241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.606751] page_type: f5(slab) [ 78.609885] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.617607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.625327] page dumped because: kasan: bad access detected [ 78.630882] [ 78.632358] Memory state around the buggy address: [ 78.637136] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.644340] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.651545] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.658746] ^ [ 78.663524] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.670729] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.677930] ==================================================================
[ 32.567374] ================================================================== [ 32.567433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 32.567485] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.567556] [ 32.567591] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.567676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.567705] Hardware name: linux,dummy-virt (DT) [ 32.567742] Call trace: [ 32.567769] show_stack+0x20/0x38 (C) [ 32.567816] dump_stack_lvl+0x8c/0xd0 [ 32.567863] print_report+0x118/0x5d0 [ 32.567912] kasan_report+0xdc/0x128 [ 32.567957] kasan_check_range+0x100/0x1a8 [ 32.568020] __kasan_check_write+0x20/0x30 [ 32.568083] kasan_atomics_helper+0x1128/0x4858 [ 32.568137] kasan_atomics+0x198/0x2e0 [ 32.568447] kunit_try_run_case+0x170/0x3f0 [ 32.568873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.568928] kthread+0x328/0x630 [ 32.568973] ret_from_fork+0x10/0x20 [ 32.569388] [ 32.569443] Allocated by task 296: [ 32.570069] kasan_save_stack+0x3c/0x68 [ 32.570342] kasan_save_track+0x20/0x40 [ 32.570426] kasan_save_alloc_info+0x40/0x58 [ 32.570598] __kasan_kmalloc+0xd4/0xd8 [ 32.570765] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.571070] kasan_atomics+0xb8/0x2e0 [ 32.571414] kunit_try_run_case+0x170/0x3f0 [ 32.571580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.571631] kthread+0x328/0x630 [ 32.571813] ret_from_fork+0x10/0x20 [ 32.572027] [ 32.572100] The buggy address belongs to the object at fff00000c85f0e00 [ 32.572100] which belongs to the cache kmalloc-64 of size 64 [ 32.572277] The buggy address is located 0 bytes to the right of [ 32.572277] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.572558] [ 32.572588] The buggy address belongs to the physical page: [ 32.572794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.572918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.572997] page_type: f5(slab) [ 32.573318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.573430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.573550] page dumped because: kasan: bad access detected [ 32.573628] [ 32.573912] Memory state around the buggy address: [ 32.574043] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.574145] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.574390] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.574562] ^ [ 32.574711] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.574789] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.574917] ================================================================== [ 32.684792] ================================================================== [ 32.684845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 32.684895] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.684946] [ 32.684976] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.685075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.685104] Hardware name: linux,dummy-virt (DT) [ 32.685134] Call trace: [ 32.685159] show_stack+0x20/0x38 (C) [ 32.685207] dump_stack_lvl+0x8c/0xd0 [ 32.685254] print_report+0x118/0x5d0 [ 32.685298] kasan_report+0xdc/0x128 [ 32.685343] __asan_report_load8_noabort+0x20/0x30 [ 32.685395] kasan_atomics_helper+0x3df4/0x4858 [ 32.685445] kasan_atomics+0x198/0x2e0 [ 32.685493] kunit_try_run_case+0x170/0x3f0 [ 32.685542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.685598] kthread+0x328/0x630 [ 32.685641] ret_from_fork+0x10/0x20 [ 32.685691] [ 32.685712] Allocated by task 296: [ 32.685741] kasan_save_stack+0x3c/0x68 [ 32.685784] kasan_save_track+0x20/0x40 [ 32.685823] kasan_save_alloc_info+0x40/0x58 [ 32.685862] __kasan_kmalloc+0xd4/0xd8 [ 32.685901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.686005] kasan_atomics+0xb8/0x2e0 [ 32.686240] kunit_try_run_case+0x170/0x3f0 [ 32.686282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.686325] kthread+0x328/0x630 [ 32.686361] ret_from_fork+0x10/0x20 [ 32.686447] [ 32.686505] The buggy address belongs to the object at fff00000c85f0e00 [ 32.686505] which belongs to the cache kmalloc-64 of size 64 [ 32.686746] The buggy address is located 0 bytes to the right of [ 32.686746] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.686812] [ 32.687010] The buggy address belongs to the physical page: [ 32.687066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.687400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.687463] page_type: f5(slab) [ 32.687503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.687555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.687595] page dumped because: kasan: bad access detected [ 32.687629] [ 32.687932] Memory state around the buggy address: [ 32.688057] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.688199] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.688364] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.688469] ^ [ 32.688835] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.688884] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.688925] ================================================================== [ 32.697493] ================================================================== [ 32.697615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 32.697687] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.697740] [ 32.697789] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.697873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.697900] Hardware name: linux,dummy-virt (DT) [ 32.697933] Call trace: [ 32.697955] show_stack+0x20/0x38 (C) [ 32.698023] dump_stack_lvl+0x8c/0xd0 [ 32.698081] print_report+0x118/0x5d0 [ 32.698239] kasan_report+0xdc/0x128 [ 32.698493] __asan_report_load8_noabort+0x20/0x30 [ 32.698566] kasan_atomics_helper+0x3e10/0x4858 [ 32.698928] kasan_atomics+0x198/0x2e0 [ 32.699003] kunit_try_run_case+0x170/0x3f0 [ 32.699068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.699120] kthread+0x328/0x630 [ 32.699197] ret_from_fork+0x10/0x20 [ 32.699293] [ 32.699322] Allocated by task 296: [ 32.699353] kasan_save_stack+0x3c/0x68 [ 32.699433] kasan_save_track+0x20/0x40 [ 32.699511] kasan_save_alloc_info+0x40/0x58 [ 32.699552] __kasan_kmalloc+0xd4/0xd8 [ 32.699590] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.699658] kasan_atomics+0xb8/0x2e0 [ 32.699698] kunit_try_run_case+0x170/0x3f0 [ 32.699738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.699781] kthread+0x328/0x630 [ 32.699902] ret_from_fork+0x10/0x20 [ 32.700034] [ 32.700088] The buggy address belongs to the object at fff00000c85f0e00 [ 32.700088] which belongs to the cache kmalloc-64 of size 64 [ 32.700151] The buggy address is located 0 bytes to the right of [ 32.700151] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.700246] [ 32.700434] The buggy address belongs to the physical page: [ 32.700521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.700669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.700741] page_type: f5(slab) [ 32.700781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.700855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.700928] page dumped because: kasan: bad access detected [ 32.700962] [ 32.700983] Memory state around the buggy address: [ 32.701016] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.701170] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.701232] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.701273] ^ [ 32.701308] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.701363] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.701404] ================================================================== [ 32.354357] ================================================================== [ 32.354405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.354453] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.354504] [ 32.354535] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.354618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.354648] Hardware name: linux,dummy-virt (DT) [ 32.354680] Call trace: [ 32.354704] show_stack+0x20/0x38 (C) [ 32.354775] dump_stack_lvl+0x8c/0xd0 [ 32.354823] print_report+0x118/0x5d0 [ 32.354867] kasan_report+0xdc/0x128 [ 32.354918] __asan_report_load4_noabort+0x20/0x30 [ 32.354968] kasan_atomics_helper+0x42d8/0x4858 [ 32.355020] kasan_atomics+0x198/0x2e0 [ 32.355684] kunit_try_run_case+0x170/0x3f0 [ 32.355782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.356544] kthread+0x328/0x630 [ 32.356639] ret_from_fork+0x10/0x20 [ 32.356721] [ 32.356742] Allocated by task 296: [ 32.356796] kasan_save_stack+0x3c/0x68 [ 32.357275] __kasan_kmalloc+0xd4/0xd8 [ 32.358627] [ 32.358926] [ 32.359151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.359280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.359341] page_type: f5(slab) [ 32.359871] page dumped because: kasan: bad access detected [ 32.360645] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.364657] kasan_atomics+0x198/0x2e0 [ 32.365592] Allocated by task 296: [ 32.365736] kasan_save_stack+0x3c/0x68 [ 32.365968] kasan_save_track+0x20/0x40 [ 32.366139] kasan_save_alloc_info+0x40/0x58 [ 32.366211] __kasan_kmalloc+0xd4/0xd8 [ 32.366540] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.366617] kasan_atomics+0xb8/0x2e0 [ 32.366784] kunit_try_run_case+0x170/0x3f0 [ 32.366856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.367043] kthread+0x328/0x630 [ 32.367241] ret_from_fork+0x10/0x20 [ 32.367300] [ 32.367324] The buggy address belongs to the object at fff00000c85f0e00 [ 32.367324] which belongs to the cache kmalloc-64 of size 64 [ 32.367650] The buggy address is located 0 bytes to the right of [ 32.367650] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.368072] [ 32.368126] The buggy address belongs to the physical page: [ 32.368281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.368547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.368814] page_type: f5(slab) [ 32.369007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.369129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.369218] page dumped because: kasan: bad access detected [ 32.369252] [ 32.369491] Memory state around the buggy address: [ 32.369652] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.370077] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.370163] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.370307] ^ [ 32.370364] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.370525] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.370649] ================================================================== [ 32.635883] ================================================================== [ 32.635985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 32.636199] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.636497] [ 32.636875] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.637127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.637195] Hardware name: linux,dummy-virt (DT) [ 32.637352] Call trace: [ 32.637379] show_stack+0x20/0x38 (C) [ 32.637434] dump_stack_lvl+0x8c/0xd0 [ 32.638072] print_report+0x118/0x5d0 [ 32.638144] kasan_report+0xdc/0x128 [ 32.638324] kasan_check_range+0x100/0x1a8 [ 32.638613] __kasan_check_write+0x20/0x30 [ 32.638772] kasan_atomics_helper+0x147c/0x4858 [ 32.638961] kasan_atomics+0x198/0x2e0 [ 32.639153] kunit_try_run_case+0x170/0x3f0 [ 32.639250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.639341] kthread+0x328/0x630 [ 32.639564] ret_from_fork+0x10/0x20 [ 32.639821] [ 32.639887] Allocated by task 296: [ 32.640200] kasan_save_stack+0x3c/0x68 [ 32.640661] kasan_save_track+0x20/0x40 [ 32.640781] kasan_save_alloc_info+0x40/0x58 [ 32.641175] __kasan_kmalloc+0xd4/0xd8 [ 32.641250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.641459] kasan_atomics+0xb8/0x2e0 [ 32.641705] kunit_try_run_case+0x170/0x3f0 [ 32.641809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.642145] kthread+0x328/0x630 [ 32.642546] ret_from_fork+0x10/0x20 [ 32.642792] [ 32.642838] The buggy address belongs to the object at fff00000c85f0e00 [ 32.642838] which belongs to the cache kmalloc-64 of size 64 [ 32.642917] The buggy address is located 0 bytes to the right of [ 32.642917] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.643204] [ 32.643239] The buggy address belongs to the physical page: [ 32.643398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.643807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.644315] page_type: f5(slab) [ 32.644381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.644795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.644865] page dumped because: kasan: bad access detected [ 32.645024] [ 32.645144] Memory state around the buggy address: [ 32.645213] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.645620] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.645718] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.645827] ^ [ 32.646095] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.646236] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.646484] ================================================================== [ 32.520044] ================================================================== [ 32.520114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 32.520278] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.520430] [ 32.520498] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.520597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.520895] Hardware name: linux,dummy-virt (DT) [ 32.520948] Call trace: [ 32.521026] show_stack+0x20/0x38 (C) [ 32.521380] dump_stack_lvl+0x8c/0xd0 [ 32.521506] print_report+0x118/0x5d0 [ 32.521620] kasan_report+0xdc/0x128 [ 32.521665] kasan_check_range+0x100/0x1a8 [ 32.521986] __kasan_check_write+0x20/0x30 [ 32.522392] kasan_atomics_helper+0xf20/0x4858 [ 32.522516] kasan_atomics+0x198/0x2e0 [ 32.522693] kunit_try_run_case+0x170/0x3f0 [ 32.522871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.523363] kthread+0x328/0x630 [ 32.523502] ret_from_fork+0x10/0x20 [ 32.523615] [ 32.523675] Allocated by task 296: [ 32.523704] kasan_save_stack+0x3c/0x68 [ 32.524122] kasan_save_track+0x20/0x40 [ 32.524259] kasan_save_alloc_info+0x40/0x58 [ 32.524439] __kasan_kmalloc+0xd4/0xd8 [ 32.524618] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.524675] kasan_atomics+0xb8/0x2e0 [ 32.524860] kunit_try_run_case+0x170/0x3f0 [ 32.524984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.525124] kthread+0x328/0x630 [ 32.525436] ret_from_fork+0x10/0x20 [ 32.525580] [ 32.525627] The buggy address belongs to the object at fff00000c85f0e00 [ 32.525627] which belongs to the cache kmalloc-64 of size 64 [ 32.525844] The buggy address is located 0 bytes to the right of [ 32.525844] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.526102] [ 32.526147] The buggy address belongs to the physical page: [ 32.526295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.526511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.526634] page_type: f5(slab) [ 32.526967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.527233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.527468] page dumped because: kasan: bad access detected [ 32.527597] [ 32.527693] Memory state around the buggy address: [ 32.527775] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.527934] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.527981] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.528234] ^ [ 32.528407] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.528619] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.528817] ================================================================== [ 32.549677] ================================================================== [ 32.549749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 32.549874] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.549936] [ 32.550160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.550270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.550352] Hardware name: linux,dummy-virt (DT) [ 32.550390] Call trace: [ 32.550440] show_stack+0x20/0x38 (C) [ 32.550492] dump_stack_lvl+0x8c/0xd0 [ 32.550551] print_report+0x118/0x5d0 [ 32.550597] kasan_report+0xdc/0x128 [ 32.550640] kasan_check_range+0x100/0x1a8 [ 32.550688] __kasan_check_write+0x20/0x30 [ 32.551185] kasan_atomics_helper+0x1058/0x4858 [ 32.551265] kasan_atomics+0x198/0x2e0 [ 32.551543] kunit_try_run_case+0x170/0x3f0 [ 32.551694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.551757] kthread+0x328/0x630 [ 32.551802] ret_from_fork+0x10/0x20 [ 32.551852] [ 32.551872] Allocated by task 296: [ 32.552383] kasan_save_stack+0x3c/0x68 [ 32.552528] kasan_save_track+0x20/0x40 [ 32.552626] kasan_save_alloc_info+0x40/0x58 [ 32.552704] __kasan_kmalloc+0xd4/0xd8 [ 32.552857] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.552914] kasan_atomics+0xb8/0x2e0 [ 32.552961] kunit_try_run_case+0x170/0x3f0 [ 32.553003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.553311] kthread+0x328/0x630 [ 32.553444] ret_from_fork+0x10/0x20 [ 32.553497] [ 32.553540] The buggy address belongs to the object at fff00000c85f0e00 [ 32.553540] which belongs to the cache kmalloc-64 of size 64 [ 32.553605] The buggy address is located 0 bytes to the right of [ 32.553605] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.553672] [ 32.553703] The buggy address belongs to the physical page: [ 32.553737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.553804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.553854] page_type: f5(slab) [ 32.553908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.553961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.554012] page dumped because: kasan: bad access detected [ 32.554045] [ 32.554092] Memory state around the buggy address: [ 32.554126] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.554170] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.554214] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.554255] ^ [ 32.554299] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.554353] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.554394] ================================================================== [ 32.648157] ================================================================== [ 32.648716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 32.649002] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.649221] [ 32.649291] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.649386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.649506] Hardware name: linux,dummy-virt (DT) [ 32.649578] Call trace: [ 32.649637] show_stack+0x20/0x38 (C) [ 32.649692] dump_stack_lvl+0x8c/0xd0 [ 32.649747] print_report+0x118/0x5d0 [ 32.649793] kasan_report+0xdc/0x128 [ 32.649837] kasan_check_range+0x100/0x1a8 [ 32.649883] __kasan_check_write+0x20/0x30 [ 32.649938] kasan_atomics_helper+0x14e4/0x4858 [ 32.649989] kasan_atomics+0x198/0x2e0 [ 32.650037] kunit_try_run_case+0x170/0x3f0 [ 32.650097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.650148] kthread+0x328/0x630 [ 32.650191] ret_from_fork+0x10/0x20 [ 32.650258] [ 32.650282] Allocated by task 296: [ 32.650328] kasan_save_stack+0x3c/0x68 [ 32.650372] kasan_save_track+0x20/0x40 [ 32.650413] kasan_save_alloc_info+0x40/0x58 [ 32.650453] __kasan_kmalloc+0xd4/0xd8 [ 32.650503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.650546] kasan_atomics+0xb8/0x2e0 [ 32.650585] kunit_try_run_case+0x170/0x3f0 [ 32.650626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.650680] kthread+0x328/0x630 [ 32.650724] ret_from_fork+0x10/0x20 [ 32.650777] [ 32.650798] The buggy address belongs to the object at fff00000c85f0e00 [ 32.650798] which belongs to the cache kmalloc-64 of size 64 [ 32.650866] The buggy address is located 0 bytes to the right of [ 32.650866] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.650932] [ 32.650954] The buggy address belongs to the physical page: [ 32.650987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.651054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.651550] page_type: f5(slab) [ 32.652045] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.652131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.652225] page dumped because: kasan: bad access detected [ 32.652278] [ 32.652333] Memory state around the buggy address: [ 32.652773] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.653078] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.653131] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.653169] ^ [ 32.653206] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.653600] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.654122] ================================================================== [ 32.712615] ================================================================== [ 32.712664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 32.712716] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.712787] [ 32.712821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.713061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.713126] Hardware name: linux,dummy-virt (DT) [ 32.713161] Call trace: [ 32.713211] show_stack+0x20/0x38 (C) [ 32.713270] dump_stack_lvl+0x8c/0xd0 [ 32.713471] print_report+0x118/0x5d0 [ 32.713578] kasan_report+0xdc/0x128 [ 32.713663] kasan_check_range+0x100/0x1a8 [ 32.713728] __kasan_check_write+0x20/0x30 [ 32.713814] kasan_atomics_helper+0x17ec/0x4858 [ 32.713895] kasan_atomics+0x198/0x2e0 [ 32.713942] kunit_try_run_case+0x170/0x3f0 [ 32.714010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.714073] kthread+0x328/0x630 [ 32.714153] ret_from_fork+0x10/0x20 [ 32.714230] [ 32.714258] Allocated by task 296: [ 32.714290] kasan_save_stack+0x3c/0x68 [ 32.714334] kasan_save_track+0x20/0x40 [ 32.714375] kasan_save_alloc_info+0x40/0x58 [ 32.714645] __kasan_kmalloc+0xd4/0xd8 [ 32.714715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.714761] kasan_atomics+0xb8/0x2e0 [ 32.714798] kunit_try_run_case+0x170/0x3f0 [ 32.714851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.714895] kthread+0x328/0x630 [ 32.714936] ret_from_fork+0x10/0x20 [ 32.714976] [ 32.714998] The buggy address belongs to the object at fff00000c85f0e00 [ 32.714998] which belongs to the cache kmalloc-64 of size 64 [ 32.715076] The buggy address is located 0 bytes to the right of [ 32.715076] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.715142] [ 32.715164] The buggy address belongs to the physical page: [ 32.715196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.715247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.715306] page_type: f5(slab) [ 32.715346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.715396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.715445] page dumped because: kasan: bad access detected [ 32.715484] [ 32.715504] Memory state around the buggy address: [ 32.715548] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.715592] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.715636] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.715676] ^ [ 32.715708] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.715751] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.715799] ================================================================== [ 32.488152] ================================================================== [ 32.488370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 32.488553] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.488611] [ 32.488643] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.489320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.489358] Hardware name: linux,dummy-virt (DT) [ 32.489406] Call trace: [ 32.489453] show_stack+0x20/0x38 (C) [ 32.489882] dump_stack_lvl+0x8c/0xd0 [ 32.490113] print_report+0x118/0x5d0 [ 32.490428] kasan_report+0xdc/0x128 [ 32.490630] __asan_report_load8_noabort+0x20/0x30 [ 32.491011] kasan_atomics_helper+0x3f58/0x4858 [ 32.491141] kasan_atomics+0x198/0x2e0 [ 32.491194] kunit_try_run_case+0x170/0x3f0 [ 32.491405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.491740] kthread+0x328/0x630 [ 32.491937] ret_from_fork+0x10/0x20 [ 32.492017] [ 32.492038] Allocated by task 296: [ 32.492192] kasan_save_stack+0x3c/0x68 [ 32.492481] kasan_save_track+0x20/0x40 [ 32.492659] kasan_save_alloc_info+0x40/0x58 [ 32.492867] __kasan_kmalloc+0xd4/0xd8 [ 32.492951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.492995] kasan_atomics+0xb8/0x2e0 [ 32.493042] kunit_try_run_case+0x170/0x3f0 [ 32.493095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.493489] kthread+0x328/0x630 [ 32.493571] ret_from_fork+0x10/0x20 [ 32.493642] [ 32.493780] The buggy address belongs to the object at fff00000c85f0e00 [ 32.493780] which belongs to the cache kmalloc-64 of size 64 [ 32.494012] The buggy address is located 0 bytes to the right of [ 32.494012] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.494161] [ 32.494222] The buggy address belongs to the physical page: [ 32.494494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.494705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.494781] page_type: f5(slab) [ 32.494865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.494951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.495022] page dumped because: kasan: bad access detected [ 32.495065] [ 32.495086] Memory state around the buggy address: [ 32.495268] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.495575] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.495786] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.495874] ^ [ 32.496012] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.496107] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.496228] ================================================================== [ 32.619946] ================================================================== [ 32.619998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 32.620139] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.620387] [ 32.620421] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.620507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.620536] Hardware name: linux,dummy-virt (DT) [ 32.620569] Call trace: [ 32.620592] show_stack+0x20/0x38 (C) [ 32.620644] dump_stack_lvl+0x8c/0xd0 [ 32.620693] print_report+0x118/0x5d0 [ 32.620739] kasan_report+0xdc/0x128 [ 32.620784] __asan_report_load8_noabort+0x20/0x30 [ 32.621401] kasan_atomics_helper+0x3f04/0x4858 [ 32.621529] kasan_atomics+0x198/0x2e0 [ 32.621876] kunit_try_run_case+0x170/0x3f0 [ 32.622005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.622383] kthread+0x328/0x630 [ 32.622479] ret_from_fork+0x10/0x20 [ 32.622793] [ 32.622917] Allocated by task 296: [ 32.623229] kasan_save_stack+0x3c/0x68 [ 32.623323] kasan_save_track+0x20/0x40 [ 32.623385] kasan_save_alloc_info+0x40/0x58 [ 32.623629] __kasan_kmalloc+0xd4/0xd8 [ 32.623857] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.624070] kasan_atomics+0xb8/0x2e0 [ 32.624177] kunit_try_run_case+0x170/0x3f0 [ 32.624292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.624462] kthread+0x328/0x630 [ 32.624667] ret_from_fork+0x10/0x20 [ 32.624993] [ 32.625068] The buggy address belongs to the object at fff00000c85f0e00 [ 32.625068] which belongs to the cache kmalloc-64 of size 64 [ 32.625439] The buggy address is located 0 bytes to the right of [ 32.625439] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.625639] [ 32.625713] The buggy address belongs to the physical page: [ 32.625847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.625932] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.626311] page_type: f5(slab) [ 32.626491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.626708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.626803] page dumped because: kasan: bad access detected [ 32.627220] [ 32.627264] Memory state around the buggy address: [ 32.627318] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.627629] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.627750] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.627869] ^ [ 32.628068] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.628143] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.628384] ================================================================== [ 32.530539] ================================================================== [ 32.530593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 32.530645] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.530697] [ 32.530965] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.531212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.531386] Hardware name: linux,dummy-virt (DT) [ 32.531651] Call trace: [ 32.531688] show_stack+0x20/0x38 (C) [ 32.531741] dump_stack_lvl+0x8c/0xd0 [ 32.531981] print_report+0x118/0x5d0 [ 32.532043] kasan_report+0xdc/0x128 [ 32.532102] kasan_check_range+0x100/0x1a8 [ 32.532300] __kasan_check_write+0x20/0x30 [ 32.532490] kasan_atomics_helper+0xf88/0x4858 [ 32.532923] kasan_atomics+0x198/0x2e0 [ 32.533407] kunit_try_run_case+0x170/0x3f0 [ 32.533693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.533754] kthread+0x328/0x630 [ 32.533799] ret_from_fork+0x10/0x20 [ 32.534241] [ 32.534286] Allocated by task 296: [ 32.534364] kasan_save_stack+0x3c/0x68 [ 32.534514] kasan_save_track+0x20/0x40 [ 32.534565] kasan_save_alloc_info+0x40/0x58 [ 32.534607] __kasan_kmalloc+0xd4/0xd8 [ 32.534982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.535180] kasan_atomics+0xb8/0x2e0 [ 32.535334] kunit_try_run_case+0x170/0x3f0 [ 32.535501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.535706] kthread+0x328/0x630 [ 32.535769] ret_from_fork+0x10/0x20 [ 32.536059] [ 32.536149] The buggy address belongs to the object at fff00000c85f0e00 [ 32.536149] which belongs to the cache kmalloc-64 of size 64 [ 32.536361] The buggy address is located 0 bytes to the right of [ 32.536361] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.536443] [ 32.536466] The buggy address belongs to the physical page: [ 32.536686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.536775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.536976] page_type: f5(slab) [ 32.537150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.537290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.537417] page dumped because: kasan: bad access detected [ 32.537491] [ 32.537512] Memory state around the buggy address: [ 32.537595] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.537660] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.537711] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.537757] ^ [ 32.537796] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537846] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537902] ================================================================== [ 32.690464] ================================================================== [ 32.690527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 32.690716] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.690810] [ 32.690841] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.690927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.690954] Hardware name: linux,dummy-virt (DT) [ 32.691379] Call trace: [ 32.691421] show_stack+0x20/0x38 (C) [ 32.691482] dump_stack_lvl+0x8c/0xd0 [ 32.691565] print_report+0x118/0x5d0 [ 32.691774] kasan_report+0xdc/0x128 [ 32.692096] kasan_check_range+0x100/0x1a8 [ 32.692158] __kasan_check_write+0x20/0x30 [ 32.692594] kasan_atomics_helper+0x16d0/0x4858 [ 32.692742] kasan_atomics+0x198/0x2e0 [ 32.692995] kunit_try_run_case+0x170/0x3f0 [ 32.693056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.693127] kthread+0x328/0x630 [ 32.693170] ret_from_fork+0x10/0x20 [ 32.693219] [ 32.693842] Allocated by task 296: [ 32.693977] kasan_save_stack+0x3c/0x68 [ 32.694173] kasan_save_track+0x20/0x40 [ 32.694292] kasan_save_alloc_info+0x40/0x58 [ 32.694402] __kasan_kmalloc+0xd4/0xd8 [ 32.694507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.694550] kasan_atomics+0xb8/0x2e0 [ 32.694590] kunit_try_run_case+0x170/0x3f0 [ 32.694631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.694674] kthread+0x328/0x630 [ 32.694709] ret_from_fork+0x10/0x20 [ 32.694760] [ 32.694804] The buggy address belongs to the object at fff00000c85f0e00 [ 32.694804] which belongs to the cache kmalloc-64 of size 64 [ 32.694864] The buggy address is located 0 bytes to the right of [ 32.694864] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.694936] [ 32.694959] The buggy address belongs to the physical page: [ 32.695015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.695078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.695132] page_type: f5(slab) [ 32.695283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.695338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.695378] page dumped because: kasan: bad access detected [ 32.695656] [ 32.695744] Memory state around the buggy address: [ 32.695827] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.696178] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.696235] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.696323] ^ [ 32.696653] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.696770] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.696889] ================================================================== [ 32.497536] ================================================================== [ 32.497643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 32.497698] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.497766] [ 32.498074] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.498178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.498416] Hardware name: linux,dummy-virt (DT) [ 32.498475] Call trace: [ 32.498503] show_stack+0x20/0x38 (C) [ 32.498686] dump_stack_lvl+0x8c/0xd0 [ 32.498753] print_report+0x118/0x5d0 [ 32.498797] kasan_report+0xdc/0x128 [ 32.499076] kasan_check_range+0x100/0x1a8 [ 32.499138] __kasan_check_write+0x20/0x30 [ 32.499330] kasan_atomics_helper+0xe44/0x4858 [ 32.499575] kasan_atomics+0x198/0x2e0 [ 32.499639] kunit_try_run_case+0x170/0x3f0 [ 32.499693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.499754] kthread+0x328/0x630 [ 32.499828] ret_from_fork+0x10/0x20 [ 32.499883] [ 32.499923] Allocated by task 296: [ 32.499960] kasan_save_stack+0x3c/0x68 [ 32.500150] kasan_save_track+0x20/0x40 [ 32.500543] kasan_save_alloc_info+0x40/0x58 [ 32.500745] __kasan_kmalloc+0xd4/0xd8 [ 32.500867] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.500911] kasan_atomics+0xb8/0x2e0 [ 32.501250] kunit_try_run_case+0x170/0x3f0 [ 32.501430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.501607] kthread+0x328/0x630 [ 32.501875] ret_from_fork+0x10/0x20 [ 32.501925] [ 32.502101] The buggy address belongs to the object at fff00000c85f0e00 [ 32.502101] which belongs to the cache kmalloc-64 of size 64 [ 32.502313] The buggy address is located 0 bytes to the right of [ 32.502313] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.502628] [ 32.502679] The buggy address belongs to the physical page: [ 32.502741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.502824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.502874] page_type: f5(slab) [ 32.502923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.502975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.503019] page dumped because: kasan: bad access detected [ 32.503076] [ 32.503106] Memory state around the buggy address: [ 32.503139] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.503183] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.503227] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.503281] ^ [ 32.503314] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.503358] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.503407] ================================================================== [ 32.371942] ================================================================== [ 32.372321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 32.372515] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.372634] [ 32.372842] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.373033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.373078] Hardware name: linux,dummy-virt (DT) [ 32.373111] Call trace: [ 32.373135] show_stack+0x20/0x38 (C) [ 32.373186] dump_stack_lvl+0x8c/0xd0 [ 32.373236] print_report+0x118/0x5d0 [ 32.373281] kasan_report+0xdc/0x128 [ 32.373388] kasan_check_range+0x100/0x1a8 [ 32.373459] __kasan_check_write+0x20/0x30 [ 32.373513] kasan_atomics_helper+0x99c/0x4858 [ 32.373563] kasan_atomics+0x198/0x2e0 [ 32.373614] kunit_try_run_case+0x170/0x3f0 [ 32.373672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.373723] kthread+0x328/0x630 [ 32.373775] ret_from_fork+0x10/0x20 [ 32.373836] [ 32.373857] Allocated by task 296: [ 32.373894] kasan_save_stack+0x3c/0x68 [ 32.373940] kasan_save_track+0x20/0x40 [ 32.373987] kasan_save_alloc_info+0x40/0x58 [ 32.374034] __kasan_kmalloc+0xd4/0xd8 [ 32.374624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.374883] kasan_atomics+0xb8/0x2e0 [ 32.375205] kunit_try_run_case+0x170/0x3f0 [ 32.375258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.375571] kthread+0x328/0x630 [ 32.375700] ret_from_fork+0x10/0x20 [ 32.375799] [ 32.375928] The buggy address belongs to the object at fff00000c85f0e00 [ 32.375928] which belongs to the cache kmalloc-64 of size 64 [ 32.376167] The buggy address is located 0 bytes to the right of [ 32.376167] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.376485] [ 32.376551] The buggy address belongs to the physical page: [ 32.376608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.376757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.376810] page_type: f5(slab) [ 32.376857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.377194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.377652] page dumped because: kasan: bad access detected [ 32.377756] [ 32.377817] Memory state around the buggy address: [ 32.378032] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.378300] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.378395] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.378517] ^ [ 32.378575] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.378630] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.378759] ================================================================== [ 32.504134] ================================================================== [ 32.504185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 32.504236] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.504626] [ 32.504707] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.505174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.505245] Hardware name: linux,dummy-virt (DT) [ 32.505380] Call trace: [ 32.505436] show_stack+0x20/0x38 (C) [ 32.505649] dump_stack_lvl+0x8c/0xd0 [ 32.506036] print_report+0x118/0x5d0 [ 32.506146] kasan_report+0xdc/0x128 [ 32.506241] __asan_report_store8_noabort+0x20/0x30 [ 32.506585] kasan_atomics_helper+0x3e5c/0x4858 [ 32.506712] kasan_atomics+0x198/0x2e0 [ 32.506764] kunit_try_run_case+0x170/0x3f0 [ 32.507128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.507220] kthread+0x328/0x630 [ 32.507574] ret_from_fork+0x10/0x20 [ 32.507713] [ 32.507735] Allocated by task 296: [ 32.507795] kasan_save_stack+0x3c/0x68 [ 32.508077] kasan_save_track+0x20/0x40 [ 32.508236] kasan_save_alloc_info+0x40/0x58 [ 32.508461] __kasan_kmalloc+0xd4/0xd8 [ 32.508698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.508982] kasan_atomics+0xb8/0x2e0 [ 32.509202] kunit_try_run_case+0x170/0x3f0 [ 32.509297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.509350] kthread+0x328/0x630 [ 32.509731] ret_from_fork+0x10/0x20 [ 32.509820] [ 32.510015] The buggy address belongs to the object at fff00000c85f0e00 [ 32.510015] which belongs to the cache kmalloc-64 of size 64 [ 32.510421] The buggy address is located 0 bytes to the right of [ 32.510421] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.510670] [ 32.510822] The buggy address belongs to the physical page: [ 32.510878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.510968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.511152] page_type: f5(slab) [ 32.511545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.511628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.511798] page dumped because: kasan: bad access detected [ 32.511880] [ 32.511920] Memory state around the buggy address: [ 32.512005] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.512062] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.512106] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.512553] ^ [ 32.512942] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.513030] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.513151] ================================================================== [ 32.464178] ================================================================== [ 32.464564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 32.464657] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.464741] [ 32.464775] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.465179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.465234] Hardware name: linux,dummy-virt (DT) [ 32.465490] Call trace: [ 32.465524] show_stack+0x20/0x38 (C) [ 32.465578] dump_stack_lvl+0x8c/0xd0 [ 32.465995] print_report+0x118/0x5d0 [ 32.466361] kasan_report+0xdc/0x128 [ 32.466672] kasan_check_range+0x100/0x1a8 [ 32.466811] __kasan_check_write+0x20/0x30 [ 32.466885] kasan_atomics_helper+0xd3c/0x4858 [ 32.467195] kasan_atomics+0x198/0x2e0 [ 32.467398] kunit_try_run_case+0x170/0x3f0 [ 32.467630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.467690] kthread+0x328/0x630 [ 32.467743] ret_from_fork+0x10/0x20 [ 32.468122] [ 32.468202] Allocated by task 296: [ 32.468253] kasan_save_stack+0x3c/0x68 [ 32.468303] kasan_save_track+0x20/0x40 [ 32.468344] kasan_save_alloc_info+0x40/0x58 [ 32.468812] __kasan_kmalloc+0xd4/0xd8 [ 32.468982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.469114] kasan_atomics+0xb8/0x2e0 [ 32.469380] kunit_try_run_case+0x170/0x3f0 [ 32.469578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.469658] kthread+0x328/0x630 [ 32.469779] ret_from_fork+0x10/0x20 [ 32.470126] [ 32.470194] The buggy address belongs to the object at fff00000c85f0e00 [ 32.470194] which belongs to the cache kmalloc-64 of size 64 [ 32.470315] The buggy address is located 0 bytes to the right of [ 32.470315] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.470462] [ 32.470522] The buggy address belongs to the physical page: [ 32.470591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.470650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.470738] page_type: f5(slab) [ 32.470922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.471314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.471380] page dumped because: kasan: bad access detected [ 32.471520] [ 32.471542] Memory state around the buggy address: [ 32.471583] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.471906] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.471999] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.472042] ^ [ 32.472387] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.472530] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.472629] ================================================================== [ 32.454138] ================================================================== [ 32.454510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 32.454582] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.454913] [ 32.454974] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.455073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.455284] Hardware name: linux,dummy-virt (DT) [ 32.455412] Call trace: [ 32.455551] show_stack+0x20/0x38 (C) [ 32.455611] dump_stack_lvl+0x8c/0xd0 [ 32.455659] print_report+0x118/0x5d0 [ 32.455705] kasan_report+0xdc/0x128 [ 32.455749] __asan_report_load4_noabort+0x20/0x30 [ 32.456365] kasan_atomics_helper+0x3dd8/0x4858 [ 32.456448] kasan_atomics+0x198/0x2e0 [ 32.456773] kunit_try_run_case+0x170/0x3f0 [ 32.456943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.457267] kthread+0x328/0x630 [ 32.457427] ret_from_fork+0x10/0x20 [ 32.457499] [ 32.457626] Allocated by task 296: [ 32.457826] kasan_save_stack+0x3c/0x68 [ 32.458180] kasan_save_track+0x20/0x40 [ 32.458260] kasan_save_alloc_info+0x40/0x58 [ 32.458324] __kasan_kmalloc+0xd4/0xd8 [ 32.458612] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.458785] kasan_atomics+0xb8/0x2e0 [ 32.458975] kunit_try_run_case+0x170/0x3f0 [ 32.459121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.459252] kthread+0x328/0x630 [ 32.459445] ret_from_fork+0x10/0x20 [ 32.459643] [ 32.459696] The buggy address belongs to the object at fff00000c85f0e00 [ 32.459696] which belongs to the cache kmalloc-64 of size 64 [ 32.459784] The buggy address is located 0 bytes to the right of [ 32.459784] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.459927] [ 32.459988] The buggy address belongs to the physical page: [ 32.460129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.460488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.460569] page_type: f5(slab) [ 32.460775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.460852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.461314] page dumped because: kasan: bad access detected [ 32.461505] [ 32.461546] Memory state around the buggy address: [ 32.461768] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.462013] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.462085] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.462269] ^ [ 32.462468] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.462540] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.462672] ================================================================== [ 32.701950] ================================================================== [ 32.702014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 32.702116] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.702192] [ 32.702250] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.702336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.702365] Hardware name: linux,dummy-virt (DT) [ 32.702395] Call trace: [ 32.702419] show_stack+0x20/0x38 (C) [ 32.702641] dump_stack_lvl+0x8c/0xd0 [ 32.702699] print_report+0x118/0x5d0 [ 32.702743] kasan_report+0xdc/0x128 [ 32.702788] kasan_check_range+0x100/0x1a8 [ 32.702842] __kasan_check_write+0x20/0x30 [ 32.702975] kasan_atomics_helper+0x175c/0x4858 [ 32.703059] kasan_atomics+0x198/0x2e0 [ 32.703182] kunit_try_run_case+0x170/0x3f0 [ 32.703255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.703372] kthread+0x328/0x630 [ 32.703418] ret_from_fork+0x10/0x20 [ 32.703476] [ 32.703499] Allocated by task 296: [ 32.703529] kasan_save_stack+0x3c/0x68 [ 32.703582] kasan_save_track+0x20/0x40 [ 32.703624] kasan_save_alloc_info+0x40/0x58 [ 32.703664] __kasan_kmalloc+0xd4/0xd8 [ 32.703712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.703755] kasan_atomics+0xb8/0x2e0 [ 32.703803] kunit_try_run_case+0x170/0x3f0 [ 32.703844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.703895] kthread+0x328/0x630 [ 32.703940] ret_from_fork+0x10/0x20 [ 32.703985] [ 32.704007] The buggy address belongs to the object at fff00000c85f0e00 [ 32.704007] which belongs to the cache kmalloc-64 of size 64 [ 32.704077] The buggy address is located 0 bytes to the right of [ 32.704077] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.704143] [ 32.704172] The buggy address belongs to the physical page: [ 32.704204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.704278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.704330] page_type: f5(slab) [ 32.704403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.704453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.704702] page dumped because: kasan: bad access detected [ 32.704780] [ 32.704802] Memory state around the buggy address: [ 32.704837] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.705112] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.705185] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.705225] ^ [ 32.705266] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.705374] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.705466] ================================================================== [ 32.396516] ================================================================== [ 32.396569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 32.397068] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.397179] [ 32.397603] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.397719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.398249] kasan_check_range+0x100/0x1a8 [ 32.399517] [ 32.399657] kasan_save_track+0x20/0x40 [ 32.400461] ret_from_fork+0x10/0x20 [ 32.401106] [ 32.401270] The buggy address belongs to the physical page: [ 32.401482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.401809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.401973] page_type: f5(slab) [ 32.402201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.402261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.402657] page dumped because: kasan: bad access detected [ 32.402745] [ 32.403011] Memory state around the buggy address: [ 32.403292] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.403342] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.403516] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.403709] ^ [ 32.403781] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.403930] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.404021] ================================================================== [ 32.591654] ================================================================== [ 32.591707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 32.591758] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.592258] [ 32.592380] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.592651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.592682] Hardware name: linux,dummy-virt (DT) [ 32.592714] Call trace: [ 32.592885] show_stack+0x20/0x38 (C) [ 32.593138] dump_stack_lvl+0x8c/0xd0 [ 32.593234] print_report+0x118/0x5d0 [ 32.593635] kasan_report+0xdc/0x128 [ 32.593744] kasan_check_range+0x100/0x1a8 [ 32.593821] __kasan_check_write+0x20/0x30 [ 32.593987] kasan_atomics_helper+0x126c/0x4858 [ 32.594339] kasan_atomics+0x198/0x2e0 [ 32.594477] kunit_try_run_case+0x170/0x3f0 [ 32.594567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.594920] kthread+0x328/0x630 [ 32.595009] ret_from_fork+0x10/0x20 [ 32.595410] [ 32.595514] Allocated by task 296: [ 32.595584] kasan_save_stack+0x3c/0x68 [ 32.595954] kasan_save_track+0x20/0x40 [ 32.596032] kasan_save_alloc_info+0x40/0x58 [ 32.596088] __kasan_kmalloc+0xd4/0xd8 [ 32.596281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.596501] kasan_atomics+0xb8/0x2e0 [ 32.596802] kunit_try_run_case+0x170/0x3f0 [ 32.596940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.596989] kthread+0x328/0x630 [ 32.597334] ret_from_fork+0x10/0x20 [ 32.597448] [ 32.597662] The buggy address belongs to the object at fff00000c85f0e00 [ 32.597662] which belongs to the cache kmalloc-64 of size 64 [ 32.597731] The buggy address is located 0 bytes to the right of [ 32.597731] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.598247] [ 32.598333] The buggy address belongs to the physical page: [ 32.598532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.598761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.598964] page_type: f5(slab) [ 32.599283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.599425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.599483] page dumped because: kasan: bad access detected [ 32.599538] [ 32.599573] Memory state around the buggy address: [ 32.599606] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.599652] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.599695] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.599743] ^ [ 32.599788] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.599842] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.599887] ================================================================== [ 32.601739] ================================================================== [ 32.601922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 32.601982] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.602292] [ 32.602661] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.602768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.602862] Hardware name: linux,dummy-virt (DT) [ 32.602897] Call trace: [ 32.602924] show_stack+0x20/0x38 (C) [ 32.603082] dump_stack_lvl+0x8c/0xd0 [ 32.603139] print_report+0x118/0x5d0 [ 32.603183] kasan_report+0xdc/0x128 [ 32.603227] kasan_check_range+0x100/0x1a8 [ 32.603289] __kasan_check_write+0x20/0x30 [ 32.603505] kasan_atomics_helper+0x12d8/0x4858 [ 32.603841] kasan_atomics+0x198/0x2e0 [ 32.603913] kunit_try_run_case+0x170/0x3f0 [ 32.603965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.604125] kthread+0x328/0x630 [ 32.604212] ret_from_fork+0x10/0x20 [ 32.604421] [ 32.604488] Allocated by task 296: [ 32.604608] kasan_save_stack+0x3c/0x68 [ 32.604690] kasan_save_track+0x20/0x40 [ 32.604870] kasan_save_alloc_info+0x40/0x58 [ 32.604952] __kasan_kmalloc+0xd4/0xd8 [ 32.605382] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.605560] kasan_atomics+0xb8/0x2e0 [ 32.605666] kunit_try_run_case+0x170/0x3f0 [ 32.605895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.606037] kthread+0x328/0x630 [ 32.606094] ret_from_fork+0x10/0x20 [ 32.606502] [ 32.606613] The buggy address belongs to the object at fff00000c85f0e00 [ 32.606613] which belongs to the cache kmalloc-64 of size 64 [ 32.606681] The buggy address is located 0 bytes to the right of [ 32.606681] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.606882] [ 32.606999] The buggy address belongs to the physical page: [ 32.607058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.607141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.607199] page_type: f5(slab) [ 32.607247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.607307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.607350] page dumped because: kasan: bad access detected [ 32.607384] [ 32.607404] Memory state around the buggy address: [ 32.607447] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.607493] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.607538] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.607578] ^ [ 32.607623] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.607678] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.607727] ================================================================== [ 32.671978] ================================================================== [ 32.672038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 32.672100] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.672151] [ 32.672193] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.672299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.672341] Hardware name: linux,dummy-virt (DT) [ 32.672401] Call trace: [ 32.672556] show_stack+0x20/0x38 (C) [ 32.672611] dump_stack_lvl+0x8c/0xd0 [ 32.672660] print_report+0x118/0x5d0 [ 32.672707] kasan_report+0xdc/0x128 [ 32.672761] __asan_report_load8_noabort+0x20/0x30 [ 32.672811] kasan_atomics_helper+0x3db0/0x4858 [ 32.672878] kasan_atomics+0x198/0x2e0 [ 32.672925] kunit_try_run_case+0x170/0x3f0 [ 32.672989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.673042] kthread+0x328/0x630 [ 32.673108] ret_from_fork+0x10/0x20 [ 32.673159] [ 32.673192] Allocated by task 296: [ 32.673228] kasan_save_stack+0x3c/0x68 [ 32.673281] kasan_save_track+0x20/0x40 [ 32.673321] kasan_save_alloc_info+0x40/0x58 [ 32.673378] __kasan_kmalloc+0xd4/0xd8 [ 32.673419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.673471] kasan_atomics+0xb8/0x2e0 [ 32.673519] kunit_try_run_case+0x170/0x3f0 [ 32.673560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.673609] kthread+0x328/0x630 [ 32.673646] ret_from_fork+0x10/0x20 [ 32.673693] [ 32.673713] The buggy address belongs to the object at fff00000c85f0e00 [ 32.673713] which belongs to the cache kmalloc-64 of size 64 [ 32.673772] The buggy address is located 0 bytes to the right of [ 32.673772] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.673848] [ 32.673869] The buggy address belongs to the physical page: [ 32.673902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.673957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.674013] page_type: f5(slab) [ 32.674069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.674333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.674436] page dumped because: kasan: bad access detected [ 32.674788] [ 32.674906] Memory state around the buggy address: [ 32.675577] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.675709] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.676025] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.676119] ^ [ 32.676218] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676284] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676498] ================================================================== [ 32.473983] ================================================================== [ 32.474037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 32.474209] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.474272] [ 32.474329] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.474416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.474445] Hardware name: linux,dummy-virt (DT) [ 32.474479] Call trace: [ 32.474519] show_stack+0x20/0x38 (C) [ 32.474574] dump_stack_lvl+0x8c/0xd0 [ 32.474621] print_report+0x118/0x5d0 [ 32.474666] kasan_report+0xdc/0x128 [ 32.474726] __asan_report_load4_noabort+0x20/0x30 [ 32.474786] kasan_atomics_helper+0x3e04/0x4858 [ 32.474848] kasan_atomics+0x198/0x2e0 [ 32.474897] kunit_try_run_case+0x170/0x3f0 [ 32.474948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.475001] kthread+0x328/0x630 [ 32.475056] ret_from_fork+0x10/0x20 [ 32.475412] [ 32.475733] Allocated by task 296: [ 32.475776] kasan_save_stack+0x3c/0x68 [ 32.475823] kasan_save_track+0x20/0x40 [ 32.475866] kasan_save_alloc_info+0x40/0x58 [ 32.476161] __kasan_kmalloc+0xd4/0xd8 [ 32.476390] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.476604] kasan_atomics+0xb8/0x2e0 [ 32.476842] kunit_try_run_case+0x170/0x3f0 [ 32.476918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.476964] kthread+0x328/0x630 [ 32.476998] ret_from_fork+0x10/0x20 [ 32.477035] [ 32.477069] The buggy address belongs to the object at fff00000c85f0e00 [ 32.477069] which belongs to the cache kmalloc-64 of size 64 [ 32.477403] The buggy address is located 0 bytes to the right of [ 32.477403] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.477631] [ 32.477789] The buggy address belongs to the physical page: [ 32.477900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.478066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.478286] page_type: f5(slab) [ 32.478492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.478585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.478851] page dumped because: kasan: bad access detected [ 32.479037] [ 32.479110] Memory state around the buggy address: [ 32.479336] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.479553] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.479701] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.479800] ^ [ 32.479855] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.479974] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.480015] ================================================================== [ 32.576178] ================================================================== [ 32.576271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 32.576661] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.576790] [ 32.576869] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.577154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.577290] Hardware name: linux,dummy-virt (DT) [ 32.577332] Call trace: [ 32.577407] show_stack+0x20/0x38 (C) [ 32.577462] dump_stack_lvl+0x8c/0xd0 [ 32.577508] print_report+0x118/0x5d0 [ 32.577574] kasan_report+0xdc/0x128 [ 32.577630] kasan_check_range+0x100/0x1a8 [ 32.577677] __kasan_check_write+0x20/0x30 [ 32.577734] kasan_atomics_helper+0x1190/0x4858 [ 32.577792] kasan_atomics+0x198/0x2e0 [ 32.577847] kunit_try_run_case+0x170/0x3f0 [ 32.577897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.577948] kthread+0x328/0x630 [ 32.577992] ret_from_fork+0x10/0x20 [ 32.578060] [ 32.578083] Allocated by task 296: [ 32.578113] kasan_save_stack+0x3c/0x68 [ 32.578157] kasan_save_track+0x20/0x40 [ 32.578197] kasan_save_alloc_info+0x40/0x58 [ 32.578252] __kasan_kmalloc+0xd4/0xd8 [ 32.578293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.578335] kasan_atomics+0xb8/0x2e0 [ 32.578381] kunit_try_run_case+0x170/0x3f0 [ 32.578422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.578471] kthread+0x328/0x630 [ 32.578507] ret_from_fork+0x10/0x20 [ 32.578545] [ 32.578565] The buggy address belongs to the object at fff00000c85f0e00 [ 32.578565] which belongs to the cache kmalloc-64 of size 64 [ 32.578625] The buggy address is located 0 bytes to the right of [ 32.578625] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.578700] [ 32.578730] The buggy address belongs to the physical page: [ 32.578781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.578838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.578900] page_type: f5(slab) [ 32.578962] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.579014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.579905] page dumped because: kasan: bad access detected [ 32.579973] [ 32.580018] Memory state around the buggy address: [ 32.580093] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.580179] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.580243] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.580402] ^ [ 32.580552] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.580603] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.580644] ================================================================== [ 32.655133] ================================================================== [ 32.655539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 32.655621] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.655675] [ 32.655713] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.655947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.655979] Hardware name: linux,dummy-virt (DT) [ 32.656012] Call trace: [ 32.656035] show_stack+0x20/0x38 (C) [ 32.656196] dump_stack_lvl+0x8c/0xd0 [ 32.656248] print_report+0x118/0x5d0 [ 32.656523] kasan_report+0xdc/0x128 [ 32.656736] kasan_check_range+0x100/0x1a8 [ 32.656875] __kasan_check_write+0x20/0x30 [ 32.657078] kasan_atomics_helper+0x154c/0x4858 [ 32.657174] kasan_atomics+0x198/0x2e0 [ 32.657251] kunit_try_run_case+0x170/0x3f0 [ 32.657324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.657377] kthread+0x328/0x630 [ 32.657663] ret_from_fork+0x10/0x20 [ 32.658317] [ 32.658840] Allocated by task 296: [ 32.658907] kasan_save_stack+0x3c/0x68 [ 32.658980] kasan_save_track+0x20/0x40 [ 32.659106] kasan_save_alloc_info+0x40/0x58 [ 32.659151] __kasan_kmalloc+0xd4/0xd8 [ 32.659583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.659666] kasan_atomics+0xb8/0x2e0 [ 32.659912] kunit_try_run_case+0x170/0x3f0 [ 32.660104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.660293] kthread+0x328/0x630 [ 32.660517] ret_from_fork+0x10/0x20 [ 32.660785] [ 32.661034] The buggy address belongs to the object at fff00000c85f0e00 [ 32.661034] which belongs to the cache kmalloc-64 of size 64 [ 32.661135] The buggy address is located 0 bytes to the right of [ 32.661135] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.661529] [ 32.661567] The buggy address belongs to the physical page: [ 32.661624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.661922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.662071] page_type: f5(slab) [ 32.662166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.662599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.662669] page dumped because: kasan: bad access detected [ 32.662872] [ 32.663136] Memory state around the buggy address: [ 32.663232] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.663464] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.663550] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.663653] ^ [ 32.663691] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.663736] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.664152] ================================================================== [ 32.538906] ================================================================== [ 32.539222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 32.539639] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.539732] [ 32.539768] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.539935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.539984] Hardware name: linux,dummy-virt (DT) [ 32.540311] Call trace: [ 32.540395] show_stack+0x20/0x38 (C) [ 32.540460] dump_stack_lvl+0x8c/0xd0 [ 32.540700] print_report+0x118/0x5d0 [ 32.540946] kasan_report+0xdc/0x128 [ 32.541090] kasan_check_range+0x100/0x1a8 [ 32.541233] __kasan_check_write+0x20/0x30 [ 32.541322] kasan_atomics_helper+0xff0/0x4858 [ 32.541498] kasan_atomics+0x198/0x2e0 [ 32.541656] kunit_try_run_case+0x170/0x3f0 [ 32.541764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.541826] kthread+0x328/0x630 [ 32.542043] ret_from_fork+0x10/0x20 [ 32.542284] [ 32.542344] Allocated by task 296: [ 32.542552] kasan_save_stack+0x3c/0x68 [ 32.542768] kasan_save_track+0x20/0x40 [ 32.542839] kasan_save_alloc_info+0x40/0x58 [ 32.542895] __kasan_kmalloc+0xd4/0xd8 [ 32.542938] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.543294] kasan_atomics+0xb8/0x2e0 [ 32.543384] kunit_try_run_case+0x170/0x3f0 [ 32.543786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.544134] kthread+0x328/0x630 [ 32.544281] ret_from_fork+0x10/0x20 [ 32.544520] [ 32.544654] The buggy address belongs to the object at fff00000c85f0e00 [ 32.544654] which belongs to the cache kmalloc-64 of size 64 [ 32.544827] The buggy address is located 0 bytes to the right of [ 32.544827] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.545124] [ 32.545298] The buggy address belongs to the physical page: [ 32.545344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.545557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.545855] page_type: f5(slab) [ 32.546121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.546273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.546358] page dumped because: kasan: bad access detected [ 32.546530] [ 32.546709] Memory state around the buggy address: [ 32.546776] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.546879] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.546932] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.546979] ^ [ 32.547018] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.547078] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.547134] ================================================================== [ 32.582421] ================================================================== [ 32.582483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 32.582537] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.582633] [ 32.582693] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.582820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.582866] Hardware name: linux,dummy-virt (DT) [ 32.582897] Call trace: [ 32.582923] show_stack+0x20/0x38 (C) [ 32.583154] dump_stack_lvl+0x8c/0xd0 [ 32.583332] print_report+0x118/0x5d0 [ 32.583701] kasan_report+0xdc/0x128 [ 32.583806] kasan_check_range+0x100/0x1a8 [ 32.583874] __kasan_check_write+0x20/0x30 [ 32.583997] kasan_atomics_helper+0x11f8/0x4858 [ 32.584067] kasan_atomics+0x198/0x2e0 [ 32.584121] kunit_try_run_case+0x170/0x3f0 [ 32.584178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.584565] kthread+0x328/0x630 [ 32.584857] ret_from_fork+0x10/0x20 [ 32.584917] [ 32.584941] Allocated by task 296: [ 32.584972] kasan_save_stack+0x3c/0x68 [ 32.585015] kasan_save_track+0x20/0x40 [ 32.585070] kasan_save_alloc_info+0x40/0x58 [ 32.585729] __kasan_kmalloc+0xd4/0xd8 [ 32.585825] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.585951] kasan_atomics+0xb8/0x2e0 [ 32.585994] kunit_try_run_case+0x170/0x3f0 [ 32.586311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.586540] kthread+0x328/0x630 [ 32.586785] ret_from_fork+0x10/0x20 [ 32.586847] [ 32.587028] The buggy address belongs to the object at fff00000c85f0e00 [ 32.587028] which belongs to the cache kmalloc-64 of size 64 [ 32.587488] The buggy address is located 0 bytes to the right of [ 32.587488] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.587651] [ 32.587686] The buggy address belongs to the physical page: [ 32.587720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.588076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.588317] page_type: f5(slab) [ 32.588519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.588577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.588959] page dumped because: kasan: bad access detected [ 32.589060] [ 32.589138] Memory state around the buggy address: [ 32.589492] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.589568] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.589731] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.589863] ^ [ 32.589951] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.590317] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.590433] ================================================================== [ 32.514339] ================================================================== [ 32.514454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 32.514508] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.514559] [ 32.514592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.514677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.514705] Hardware name: linux,dummy-virt (DT) [ 32.514738] Call trace: [ 32.514763] show_stack+0x20/0x38 (C) [ 32.514834] dump_stack_lvl+0x8c/0xd0 [ 32.514884] print_report+0x118/0x5d0 [ 32.514929] kasan_report+0xdc/0x128 [ 32.514973] kasan_check_range+0x100/0x1a8 [ 32.515021] __kasan_check_write+0x20/0x30 [ 32.515079] kasan_atomics_helper+0xeb8/0x4858 [ 32.515129] kasan_atomics+0x198/0x2e0 [ 32.515175] kunit_try_run_case+0x170/0x3f0 [ 32.515224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.515276] kthread+0x328/0x630 [ 32.515325] ret_from_fork+0x10/0x20 [ 32.515383] [ 32.515413] Allocated by task 296: [ 32.515443] kasan_save_stack+0x3c/0x68 [ 32.515487] kasan_save_track+0x20/0x40 [ 32.515534] kasan_save_alloc_info+0x40/0x58 [ 32.515574] __kasan_kmalloc+0xd4/0xd8 [ 32.515622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.515665] kasan_atomics+0xb8/0x2e0 [ 32.515706] kunit_try_run_case+0x170/0x3f0 [ 32.515748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.515791] kthread+0x328/0x630 [ 32.515827] ret_from_fork+0x10/0x20 [ 32.515865] [ 32.515894] The buggy address belongs to the object at fff00000c85f0e00 [ 32.515894] which belongs to the cache kmalloc-64 of size 64 [ 32.515963] The buggy address is located 0 bytes to the right of [ 32.515963] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.516031] [ 32.516845] The buggy address belongs to the physical page: [ 32.516904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.516962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.517542] page_type: f5(slab) [ 32.517602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.518067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.518117] page dumped because: kasan: bad access detected [ 32.518150] [ 32.518200] Memory state around the buggy address: [ 32.518279] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.518373] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.518644] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.518786] ^ [ 32.519087] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.519240] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.519284] ================================================================== [ 32.609948] ================================================================== [ 32.610025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 32.610088] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.610139] [ 32.610172] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.610464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.610508] Hardware name: linux,dummy-virt (DT) [ 32.610792] Call trace: [ 32.610939] show_stack+0x20/0x38 (C) [ 32.611001] dump_stack_lvl+0x8c/0xd0 [ 32.611229] print_report+0x118/0x5d0 [ 32.611282] kasan_report+0xdc/0x128 [ 32.611327] kasan_check_range+0x100/0x1a8 [ 32.611374] __kasan_check_write+0x20/0x30 [ 32.611580] kasan_atomics_helper+0x1384/0x4858 [ 32.611633] kasan_atomics+0x198/0x2e0 [ 32.611679] kunit_try_run_case+0x170/0x3f0 [ 32.612104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.612192] kthread+0x328/0x630 [ 32.612423] ret_from_fork+0x10/0x20 [ 32.612704] [ 32.612747] Allocated by task 296: [ 32.613011] kasan_save_stack+0x3c/0x68 [ 32.613203] kasan_save_track+0x20/0x40 [ 32.613263] kasan_save_alloc_info+0x40/0x58 [ 32.613305] __kasan_kmalloc+0xd4/0xd8 [ 32.613527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.613853] kasan_atomics+0xb8/0x2e0 [ 32.614090] kunit_try_run_case+0x170/0x3f0 [ 32.614311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.614558] kthread+0x328/0x630 [ 32.614650] ret_from_fork+0x10/0x20 [ 32.614834] [ 32.614857] The buggy address belongs to the object at fff00000c85f0e00 [ 32.614857] which belongs to the cache kmalloc-64 of size 64 [ 32.615089] The buggy address is located 0 bytes to the right of [ 32.615089] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.615585] [ 32.616028] The buggy address belongs to the physical page: [ 32.616089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.616474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.616627] page_type: f5(slab) [ 32.616673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.617161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.617363] page dumped because: kasan: bad access detected [ 32.617403] [ 32.617517] Memory state around the buggy address: [ 32.617774] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.617961] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.618031] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.618221] ^ [ 32.618399] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.618486] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.618824] ================================================================== [ 32.705742] ================================================================== [ 32.705895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 32.705951] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.706107] [ 32.706194] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.706280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.706328] Hardware name: linux,dummy-virt (DT) [ 32.706409] Call trace: [ 32.706435] show_stack+0x20/0x38 (C) [ 32.706550] dump_stack_lvl+0x8c/0xd0 [ 32.706672] print_report+0x118/0x5d0 [ 32.706832] kasan_report+0xdc/0x128 [ 32.706926] __asan_report_load8_noabort+0x20/0x30 [ 32.707032] kasan_atomics_helper+0x3e20/0x4858 [ 32.707126] kasan_atomics+0x198/0x2e0 [ 32.707184] kunit_try_run_case+0x170/0x3f0 [ 32.707234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.707302] kthread+0x328/0x630 [ 32.707430] ret_from_fork+0x10/0x20 [ 32.707483] [ 32.707594] Allocated by task 296: [ 32.707673] kasan_save_stack+0x3c/0x68 [ 32.707741] kasan_save_track+0x20/0x40 [ 32.707788] kasan_save_alloc_info+0x40/0x58 [ 32.707834] __kasan_kmalloc+0xd4/0xd8 [ 32.707907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.708327] kasan_atomics+0xb8/0x2e0 [ 32.708410] kunit_try_run_case+0x170/0x3f0 [ 32.708456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.708512] kthread+0x328/0x630 [ 32.708546] ret_from_fork+0x10/0x20 [ 32.708584] [ 32.709134] The buggy address belongs to the object at fff00000c85f0e00 [ 32.709134] which belongs to the cache kmalloc-64 of size 64 [ 32.709498] The buggy address is located 0 bytes to the right of [ 32.709498] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.709601] [ 32.709626] The buggy address belongs to the physical page: [ 32.709756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.709831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.710144] page_type: f5(slab) [ 32.710221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.710347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.710760] page dumped because: kasan: bad access detected [ 32.710866] [ 32.710929] Memory state around the buggy address: [ 32.710977] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.711022] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.711344] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.711517] ^ [ 32.711619] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.711945] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.712068] ================================================================== [ 32.389874] ================================================================== [ 32.390022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 32.390132] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.390225] [ 32.390261] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.390502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.390530] Hardware name: linux,dummy-virt (DT) [ 32.390900] Call trace: [ 32.390944] show_stack+0x20/0x38 (C) [ 32.391000] dump_stack_lvl+0x8c/0xd0 [ 32.391651] print_report+0x118/0x5d0 [ 32.391722] kasan_report+0xdc/0x128 [ 32.391780] kasan_check_range+0x100/0x1a8 [ 32.391849] __kasan_check_write+0x20/0x30 [ 32.391902] kasan_atomics_helper+0xa6c/0x4858 [ 32.391997] kasan_atomics+0x198/0x2e0 [ 32.392058] kunit_try_run_case+0x170/0x3f0 [ 32.392109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.392477] kthread+0x328/0x630 [ 32.392774] ret_from_fork+0x10/0x20 [ 32.392836] [ 32.392857] Allocated by task 296: [ 32.392916] kasan_save_stack+0x3c/0x68 [ 32.392962] kasan_save_track+0x20/0x40 [ 32.393020] kasan_save_alloc_info+0x40/0x58 [ 32.393071] __kasan_kmalloc+0xd4/0xd8 [ 32.393133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.393182] kasan_atomics+0xb8/0x2e0 [ 32.393222] kunit_try_run_case+0x170/0x3f0 [ 32.393264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.393305] kthread+0x328/0x630 [ 32.393341] ret_from_fork+0x10/0x20 [ 32.393378] [ 32.393405] The buggy address belongs to the object at fff00000c85f0e00 [ 32.393405] which belongs to the cache kmalloc-64 of size 64 [ 32.393464] The buggy address is located 0 bytes to the right of [ 32.393464] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.393529] [ 32.393560] The buggy address belongs to the physical page: [ 32.393606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.393659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.393708] page_type: f5(slab) [ 32.393748] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.393817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.393867] page dumped because: kasan: bad access detected [ 32.393910] [ 32.393939] Memory state around the buggy address: [ 32.393982] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.394335] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.394519] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.395060] ^ [ 32.395143] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.395415] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.395609] ================================================================== [ 32.482188] ================================================================== [ 32.482269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 32.482332] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.482383] [ 32.482521] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.482725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.482766] Hardware name: linux,dummy-virt (DT) [ 32.482801] Call trace: [ 32.482858] show_stack+0x20/0x38 (C) [ 32.482919] dump_stack_lvl+0x8c/0xd0 [ 32.483201] print_report+0x118/0x5d0 [ 32.483273] kasan_report+0xdc/0x128 [ 32.483465] kasan_check_range+0x100/0x1a8 [ 32.483527] __kasan_check_read+0x20/0x30 [ 32.483812] kasan_atomics_helper+0xdd4/0x4858 [ 32.484105] kasan_atomics+0x198/0x2e0 [ 32.484334] kunit_try_run_case+0x170/0x3f0 [ 32.484770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.484849] kthread+0x328/0x630 [ 32.484898] ret_from_fork+0x10/0x20 [ 32.484951] [ 32.484972] Allocated by task 296: [ 32.485310] kasan_save_stack+0x3c/0x68 [ 32.485532] kasan_save_track+0x20/0x40 [ 32.485629] kasan_save_alloc_info+0x40/0x58 [ 32.485831] __kasan_kmalloc+0xd4/0xd8 [ 32.485891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.485947] kasan_atomics+0xb8/0x2e0 [ 32.485986] kunit_try_run_case+0x170/0x3f0 [ 32.486033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.486095] kthread+0x328/0x630 [ 32.486135] ret_from_fork+0x10/0x20 [ 32.486172] [ 32.486194] The buggy address belongs to the object at fff00000c85f0e00 [ 32.486194] which belongs to the cache kmalloc-64 of size 64 [ 32.486255] The buggy address is located 0 bytes to the right of [ 32.486255] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.486320] [ 32.486372] The buggy address belongs to the physical page: [ 32.486429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.486484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.486535] page_type: f5(slab) [ 32.486587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.486649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.486701] page dumped because: kasan: bad access detected [ 32.486735] [ 32.486764] Memory state around the buggy address: [ 32.486816] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.486871] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.486915] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.486955] ^ [ 32.486988] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.487031] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.487415] ================================================================== [ 32.665452] ================================================================== [ 32.665518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 32.665596] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.665852] [ 32.666070] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.666181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.666435] Hardware name: linux,dummy-virt (DT) [ 32.666603] Call trace: [ 32.666637] show_stack+0x20/0x38 (C) [ 32.666693] dump_stack_lvl+0x8c/0xd0 [ 32.666935] print_report+0x118/0x5d0 [ 32.667070] kasan_report+0xdc/0x128 [ 32.667136] kasan_check_range+0x100/0x1a8 [ 32.667184] __kasan_check_write+0x20/0x30 [ 32.667398] kasan_atomics_helper+0x15b4/0x4858 [ 32.667482] kasan_atomics+0x198/0x2e0 [ 32.667740] kunit_try_run_case+0x170/0x3f0 [ 32.667866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.668044] kthread+0x328/0x630 [ 32.668112] ret_from_fork+0x10/0x20 [ 32.668621] [ 32.668675] Allocated by task 296: [ 32.668753] kasan_save_stack+0x3c/0x68 [ 32.669115] kasan_save_track+0x20/0x40 [ 32.669201] kasan_save_alloc_info+0x40/0x58 [ 32.669249] __kasan_kmalloc+0xd4/0xd8 [ 32.669608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.669742] kasan_atomics+0xb8/0x2e0 [ 32.669913] kunit_try_run_case+0x170/0x3f0 [ 32.670200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.670368] kthread+0x328/0x630 [ 32.670407] ret_from_fork+0x10/0x20 [ 32.670446] [ 32.670490] The buggy address belongs to the object at fff00000c85f0e00 [ 32.670490] which belongs to the cache kmalloc-64 of size 64 [ 32.670557] The buggy address is located 0 bytes to the right of [ 32.670557] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.670629] [ 32.670657] The buggy address belongs to the physical page: [ 32.670702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.670772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.670828] page_type: f5(slab) [ 32.670871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.670921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.670964] page dumped because: kasan: bad access detected [ 32.670998] [ 32.671034] Memory state around the buggy address: [ 32.671092] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.671148] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.671193] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.671237] ^ [ 32.671272] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671318] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671368] ================================================================== [ 32.629755] ================================================================== [ 32.630117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 32.630185] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.630379] [ 32.630456] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.630642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.630673] Hardware name: linux,dummy-virt (DT) [ 32.630704] Call trace: [ 32.630738] show_stack+0x20/0x38 (C) [ 32.630870] dump_stack_lvl+0x8c/0xd0 [ 32.630919] print_report+0x118/0x5d0 [ 32.630972] kasan_report+0xdc/0x128 [ 32.631025] kasan_check_range+0x100/0x1a8 [ 32.631084] __kasan_check_write+0x20/0x30 [ 32.631129] kasan_atomics_helper+0x1414/0x4858 [ 32.631188] kasan_atomics+0x198/0x2e0 [ 32.631242] kunit_try_run_case+0x170/0x3f0 [ 32.631292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.631344] kthread+0x328/0x630 [ 32.631387] ret_from_fork+0x10/0x20 [ 32.631435] [ 32.631466] Allocated by task 296: [ 32.631505] kasan_save_stack+0x3c/0x68 [ 32.631557] kasan_save_track+0x20/0x40 [ 32.631599] kasan_save_alloc_info+0x40/0x58 [ 32.631638] __kasan_kmalloc+0xd4/0xd8 [ 32.631684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.631726] kasan_atomics+0xb8/0x2e0 [ 32.631765] kunit_try_run_case+0x170/0x3f0 [ 32.631815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.631860] kthread+0x328/0x630 [ 32.631903] ret_from_fork+0x10/0x20 [ 32.631941] [ 32.631962] The buggy address belongs to the object at fff00000c85f0e00 [ 32.631962] which belongs to the cache kmalloc-64 of size 64 [ 32.632021] The buggy address is located 0 bytes to the right of [ 32.632021] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.632097] [ 32.632200] The buggy address belongs to the physical page: [ 32.632255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.632331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.632395] page_type: f5(slab) [ 32.632436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.633321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.633409] page dumped because: kasan: bad access detected [ 32.633461] [ 32.633508] Memory state around the buggy address: [ 32.633574] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.633655] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.633728] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.633767] ^ [ 32.634269] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.634365] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.634661] ================================================================== [ 32.556119] ================================================================== [ 32.556378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 32.556484] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.556663] [ 32.556734] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.556913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.556975] Hardware name: linux,dummy-virt (DT) [ 32.557006] Call trace: [ 32.557030] show_stack+0x20/0x38 (C) [ 32.557643] dump_stack_lvl+0x8c/0xd0 [ 32.557860] print_report+0x118/0x5d0 [ 32.557954] kasan_report+0xdc/0x128 [ 32.558076] kasan_check_range+0x100/0x1a8 [ 32.558184] __kasan_check_write+0x20/0x30 [ 32.558348] kasan_atomics_helper+0x10c0/0x4858 [ 32.558414] kasan_atomics+0x198/0x2e0 [ 32.558963] kunit_try_run_case+0x170/0x3f0 [ 32.559150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.559432] kthread+0x328/0x630 [ 32.559603] ret_from_fork+0x10/0x20 [ 32.560043] [ 32.560373] Allocated by task 296: [ 32.560426] kasan_save_stack+0x3c/0x68 [ 32.560651] kasan_save_track+0x20/0x40 [ 32.560899] kasan_save_alloc_info+0x40/0x58 [ 32.560976] __kasan_kmalloc+0xd4/0xd8 [ 32.561156] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.561215] kasan_atomics+0xb8/0x2e0 [ 32.561277] kunit_try_run_case+0x170/0x3f0 [ 32.561326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.561749] kthread+0x328/0x630 [ 32.561998] ret_from_fork+0x10/0x20 [ 32.562166] [ 32.562523] The buggy address belongs to the object at fff00000c85f0e00 [ 32.562523] which belongs to the cache kmalloc-64 of size 64 [ 32.562635] The buggy address is located 0 bytes to the right of [ 32.562635] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.562835] [ 32.562993] The buggy address belongs to the physical page: [ 32.563446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.563792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.563960] page_type: f5(slab) [ 32.564059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.564214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.564289] page dumped because: kasan: bad access detected [ 32.564530] [ 32.564627] Memory state around the buggy address: [ 32.564766] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.564826] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.565067] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.565139] ^ [ 32.565482] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.565656] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.565877] ================================================================== [ 32.676901] ================================================================== [ 32.677043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 32.677373] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.677440] [ 32.677475] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.677594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.677626] Hardware name: linux,dummy-virt (DT) [ 32.677657] Call trace: [ 32.677903] show_stack+0x20/0x38 (C) [ 32.677975] dump_stack_lvl+0x8c/0xd0 [ 32.678034] print_report+0x118/0x5d0 [ 32.678406] kasan_report+0xdc/0x128 [ 32.678502] kasan_check_range+0x100/0x1a8 [ 32.678553] __kasan_check_write+0x20/0x30 [ 32.678612] kasan_atomics_helper+0x1644/0x4858 [ 32.678676] kasan_atomics+0x198/0x2e0 [ 32.678723] kunit_try_run_case+0x170/0x3f0 [ 32.679024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.679106] kthread+0x328/0x630 [ 32.679229] ret_from_fork+0x10/0x20 [ 32.679309] [ 32.679537] Allocated by task 296: [ 32.679621] kasan_save_stack+0x3c/0x68 [ 32.679675] kasan_save_track+0x20/0x40 [ 32.679717] kasan_save_alloc_info+0x40/0x58 [ 32.679969] __kasan_kmalloc+0xd4/0xd8 [ 32.680059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.680188] kasan_atomics+0xb8/0x2e0 [ 32.680425] kunit_try_run_case+0x170/0x3f0 [ 32.680836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.681134] kthread+0x328/0x630 [ 32.681802] ret_from_fork+0x10/0x20 [ 32.681859] [ 32.681881] The buggy address belongs to the object at fff00000c85f0e00 [ 32.681881] which belongs to the cache kmalloc-64 of size 64 [ 32.682121] The buggy address is located 0 bytes to the right of [ 32.682121] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.682211] [ 32.682333] The buggy address belongs to the physical page: [ 32.682410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.682551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.682621] page_type: f5(slab) [ 32.682911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.682988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.683032] page dumped because: kasan: bad access detected [ 32.683076] [ 32.683097] Memory state around the buggy address: [ 32.683129] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.683411] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.683618] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.683682] ^ [ 32.684104] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.684227] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.684459] ================================================================== [ 32.380193] ================================================================== [ 32.380404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 32.380461] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.380520] [ 32.380698] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.381024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.381223] Hardware name: linux,dummy-virt (DT) [ 32.381274] Call trace: [ 32.381462] show_stack+0x20/0x38 (C) [ 32.381988] print_report+0x118/0x5d0 [ 32.383522] ret_from_fork+0x10/0x20 [ 32.385199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.385930] The buggy address is located 0 bytes to the right of [ 32.385930] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.386009] [ 32.386043] The buggy address belongs to the physical page: [ 32.386382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.386485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.386639] page_type: f5(slab) [ 32.386724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.386835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.387362] page dumped because: kasan: bad access detected [ 32.387519] [ 32.387608] Memory state around the buggy address: [ 32.387706] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.387995] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.388243] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.388361] ^ [ 32.388508] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.388582] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.388623] ==================================================================
[ 27.787822] ================================================================== [ 27.788078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 27.788750] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.789476] [ 27.789647] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.789813] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.790034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.790072] Call Trace: [ 27.790094] <TASK> [ 27.790116] dump_stack_lvl+0x73/0xb0 [ 27.790155] print_report+0xd1/0x610 [ 27.790181] ? __virt_addr_valid+0x1db/0x2d0 [ 27.790207] ? kasan_atomics_helper+0x1818/0x5450 [ 27.790230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.790257] ? kasan_atomics_helper+0x1818/0x5450 [ 27.790279] kasan_report+0x141/0x180 [ 27.790302] ? kasan_atomics_helper+0x1818/0x5450 [ 27.790328] kasan_check_range+0x10c/0x1c0 [ 27.790352] __kasan_check_write+0x18/0x20 [ 27.790376] kasan_atomics_helper+0x1818/0x5450 [ 27.790399] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.790422] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.790446] ? pick_task_fair+0xce/0x340 [ 27.790472] ? kasan_atomics+0x152/0x310 [ 27.790499] kasan_atomics+0x1dc/0x310 [ 27.790522] ? __pfx_kasan_atomics+0x10/0x10 [ 27.790547] ? __pfx_read_tsc+0x10/0x10 [ 27.790570] ? ktime_get_ts64+0x86/0x230 [ 27.790594] kunit_try_run_case+0x1a5/0x480 [ 27.790619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.790640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.790677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.790702] ? __kthread_parkme+0x82/0x180 [ 27.790725] ? preempt_count_sub+0x50/0x80 [ 27.790761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.790783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.790810] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.790837] kthread+0x337/0x6f0 [ 27.790857] ? trace_preempt_on+0x20/0xc0 [ 27.790882] ? __pfx_kthread+0x10/0x10 [ 27.790903] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.790926] ? calculate_sigpending+0x7b/0xa0 [ 27.790952] ? __pfx_kthread+0x10/0x10 [ 27.790974] ret_from_fork+0x116/0x1d0 [ 27.790994] ? __pfx_kthread+0x10/0x10 [ 27.791015] ret_from_fork_asm+0x1a/0x30 [ 27.791048] </TASK> [ 27.791060] [ 27.802425] Allocated by task 314: [ 27.802907] kasan_save_stack+0x45/0x70 [ 27.803215] kasan_save_track+0x18/0x40 [ 27.803514] kasan_save_alloc_info+0x3b/0x50 [ 27.803807] __kasan_kmalloc+0xb7/0xc0 [ 27.803976] __kmalloc_cache_noprof+0x189/0x420 [ 27.804342] kasan_atomics+0x95/0x310 [ 27.804577] kunit_try_run_case+0x1a5/0x480 [ 27.804786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.805197] kthread+0x337/0x6f0 [ 27.805465] ret_from_fork+0x116/0x1d0 [ 27.805668] ret_from_fork_asm+0x1a/0x30 [ 27.806060] [ 27.806283] The buggy address belongs to the object at ffff888103eb9580 [ 27.806283] which belongs to the cache kmalloc-64 of size 64 [ 27.806878] The buggy address is located 0 bytes to the right of [ 27.806878] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.807369] [ 27.807466] The buggy address belongs to the physical page: [ 27.807880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.808414] flags: 0x200000000000000(node=0|zone=2) [ 27.808927] page_type: f5(slab) [ 27.809222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.809597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.810170] page dumped because: kasan: bad access detected [ 27.810545] [ 27.810620] Memory state around the buggy address: [ 27.810931] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.811420] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.811879] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.812291] ^ [ 27.812626] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.813162] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.813566] ================================================================== [ 27.561002] ================================================================== [ 27.561578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 27.562001] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.562264] [ 27.562376] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.562446] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.562461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.562487] Call Trace: [ 27.562508] <TASK> [ 27.562538] dump_stack_lvl+0x73/0xb0 [ 27.562574] print_report+0xd1/0x610 [ 27.562599] ? __virt_addr_valid+0x1db/0x2d0 [ 27.562637] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.562669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.562696] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.562727] kasan_report+0x141/0x180 [ 27.562750] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.562777] kasan_check_range+0x10c/0x1c0 [ 27.562825] __kasan_check_read+0x15/0x20 [ 27.562849] kasan_atomics_helper+0x13b5/0x5450 [ 27.562883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.562914] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.562940] ? pick_task_fair+0xce/0x340 [ 27.562966] ? kasan_atomics+0x152/0x310 [ 27.563003] kasan_atomics+0x1dc/0x310 [ 27.563027] ? __pfx_kasan_atomics+0x10/0x10 [ 27.563051] ? __pfx_read_tsc+0x10/0x10 [ 27.563083] ? ktime_get_ts64+0x86/0x230 [ 27.563110] kunit_try_run_case+0x1a5/0x480 [ 27.563135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.563166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.563192] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.563216] ? __kthread_parkme+0x82/0x180 [ 27.563248] ? preempt_count_sub+0x50/0x80 [ 27.563273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.563295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.563332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.563359] kthread+0x337/0x6f0 [ 27.563380] ? trace_preempt_on+0x20/0xc0 [ 27.563423] ? __pfx_kthread+0x10/0x10 [ 27.563446] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.563468] ? calculate_sigpending+0x7b/0xa0 [ 27.563504] ? __pfx_kthread+0x10/0x10 [ 27.563527] ret_from_fork+0x116/0x1d0 [ 27.563547] ? __pfx_kthread+0x10/0x10 [ 27.563568] ret_from_fork_asm+0x1a/0x30 [ 27.563607] </TASK> [ 27.563620] [ 27.575514] Allocated by task 314: [ 27.575731] kasan_save_stack+0x45/0x70 [ 27.576221] kasan_save_track+0x18/0x40 [ 27.576392] kasan_save_alloc_info+0x3b/0x50 [ 27.576582] __kasan_kmalloc+0xb7/0xc0 [ 27.576969] __kmalloc_cache_noprof+0x189/0x420 [ 27.577327] kasan_atomics+0x95/0x310 [ 27.577517] kunit_try_run_case+0x1a5/0x480 [ 27.577713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.577944] kthread+0x337/0x6f0 [ 27.578103] ret_from_fork+0x116/0x1d0 [ 27.578270] ret_from_fork_asm+0x1a/0x30 [ 27.578450] [ 27.578537] The buggy address belongs to the object at ffff888103eb9580 [ 27.578537] which belongs to the cache kmalloc-64 of size 64 [ 27.578921] The buggy address is located 0 bytes to the right of [ 27.578921] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.579707] [ 27.579882] The buggy address belongs to the physical page: [ 27.580133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.580402] flags: 0x200000000000000(node=0|zone=2) [ 27.580586] page_type: f5(slab) [ 27.580753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.581199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.581420] page dumped because: kasan: bad access detected [ 27.581583] [ 27.581855] Memory state around the buggy address: [ 27.582390] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.582925] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.583238] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.583522] ^ [ 27.583736] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.584378] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.584670] ================================================================== [ 28.110216] ================================================================== [ 28.110568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 28.110924] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.111265] [ 28.111378] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.111432] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.111446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.111472] Call Trace: [ 28.111492] <TASK> [ 28.111512] dump_stack_lvl+0x73/0xb0 [ 28.111542] print_report+0xd1/0x610 [ 28.111565] ? __virt_addr_valid+0x1db/0x2d0 [ 28.111591] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.111612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.111639] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.111675] kasan_report+0x141/0x180 [ 28.111698] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.111724] __asan_report_load8_noabort+0x18/0x20 [ 28.111759] kasan_atomics_helper+0x4f98/0x5450 [ 28.111782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.111804] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.111828] ? pick_task_fair+0xce/0x340 [ 28.111854] ? kasan_atomics+0x152/0x310 [ 28.111881] kasan_atomics+0x1dc/0x310 [ 28.111905] ? __pfx_kasan_atomics+0x10/0x10 [ 28.111930] ? __pfx_read_tsc+0x10/0x10 [ 28.111953] ? ktime_get_ts64+0x86/0x230 [ 28.111979] kunit_try_run_case+0x1a5/0x480 [ 28.112003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.112024] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.112050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.112074] ? __kthread_parkme+0x82/0x180 [ 28.112097] ? preempt_count_sub+0x50/0x80 [ 28.112121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.112144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.112170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.112197] kthread+0x337/0x6f0 [ 28.112218] ? trace_preempt_on+0x20/0xc0 [ 28.112242] ? __pfx_kthread+0x10/0x10 [ 28.112264] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.112287] ? calculate_sigpending+0x7b/0xa0 [ 28.112313] ? __pfx_kthread+0x10/0x10 [ 28.112335] ret_from_fork+0x116/0x1d0 [ 28.112356] ? __pfx_kthread+0x10/0x10 [ 28.112377] ret_from_fork_asm+0x1a/0x30 [ 28.112409] </TASK> [ 28.112422] [ 28.119600] Allocated by task 314: [ 28.119859] kasan_save_stack+0x45/0x70 [ 28.120071] kasan_save_track+0x18/0x40 [ 28.120258] kasan_save_alloc_info+0x3b/0x50 [ 28.120462] __kasan_kmalloc+0xb7/0xc0 [ 28.120645] __kmalloc_cache_noprof+0x189/0x420 [ 28.120870] kasan_atomics+0x95/0x310 [ 28.121056] kunit_try_run_case+0x1a5/0x480 [ 28.121207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.121378] kthread+0x337/0x6f0 [ 28.121495] ret_from_fork+0x116/0x1d0 [ 28.121622] ret_from_fork_asm+0x1a/0x30 [ 28.121882] [ 28.121983] The buggy address belongs to the object at ffff888103eb9580 [ 28.121983] which belongs to the cache kmalloc-64 of size 64 [ 28.122507] The buggy address is located 0 bytes to the right of [ 28.122507] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.123053] [ 28.123146] The buggy address belongs to the physical page: [ 28.123314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.123549] flags: 0x200000000000000(node=0|zone=2) [ 28.123855] page_type: f5(slab) [ 28.124023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.124370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.124717] page dumped because: kasan: bad access detected [ 28.124951] [ 28.125024] Memory state around the buggy address: [ 28.125228] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.125467] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.125754] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.126059] ^ [ 28.126273] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.126546] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.126870] ================================================================== [ 27.840611] ================================================================== [ 27.841081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 27.841433] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.841787] [ 27.841907] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.841993] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.842008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.842051] Call Trace: [ 27.842072] <TASK> [ 27.842096] dump_stack_lvl+0x73/0xb0 [ 27.842130] print_report+0xd1/0x610 [ 27.842154] ? __virt_addr_valid+0x1db/0x2d0 [ 27.842179] ? kasan_atomics_helper+0x194a/0x5450 [ 27.842201] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.842227] ? kasan_atomics_helper+0x194a/0x5450 [ 27.842250] kasan_report+0x141/0x180 [ 27.842273] ? kasan_atomics_helper+0x194a/0x5450 [ 27.842299] kasan_check_range+0x10c/0x1c0 [ 27.842324] __kasan_check_write+0x18/0x20 [ 27.842348] kasan_atomics_helper+0x194a/0x5450 [ 27.842371] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.842393] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.842418] ? pick_task_fair+0xce/0x340 [ 27.842444] ? kasan_atomics+0x152/0x310 [ 27.842471] kasan_atomics+0x1dc/0x310 [ 27.842495] ? __pfx_kasan_atomics+0x10/0x10 [ 27.842520] ? __pfx_read_tsc+0x10/0x10 [ 27.842543] ? ktime_get_ts64+0x86/0x230 [ 27.842569] kunit_try_run_case+0x1a5/0x480 [ 27.842593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.842616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.842641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.842676] ? __kthread_parkme+0x82/0x180 [ 27.842699] ? preempt_count_sub+0x50/0x80 [ 27.842723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.842777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.842805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.842830] kthread+0x337/0x6f0 [ 27.842862] ? trace_preempt_on+0x20/0xc0 [ 27.842887] ? __pfx_kthread+0x10/0x10 [ 27.842909] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.842932] ? calculate_sigpending+0x7b/0xa0 [ 27.842957] ? __pfx_kthread+0x10/0x10 [ 27.842979] ret_from_fork+0x116/0x1d0 [ 27.842999] ? __pfx_kthread+0x10/0x10 [ 27.843021] ret_from_fork_asm+0x1a/0x30 [ 27.843054] </TASK> [ 27.843066] [ 27.851140] Allocated by task 314: [ 27.851335] kasan_save_stack+0x45/0x70 [ 27.851542] kasan_save_track+0x18/0x40 [ 27.851737] kasan_save_alloc_info+0x3b/0x50 [ 27.852078] __kasan_kmalloc+0xb7/0xc0 [ 27.852214] __kmalloc_cache_noprof+0x189/0x420 [ 27.852360] kasan_atomics+0x95/0x310 [ 27.852483] kunit_try_run_case+0x1a5/0x480 [ 27.852628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.853079] kthread+0x337/0x6f0 [ 27.853309] ret_from_fork+0x116/0x1d0 [ 27.853544] ret_from_fork_asm+0x1a/0x30 [ 27.854029] [ 27.854142] The buggy address belongs to the object at ffff888103eb9580 [ 27.854142] which belongs to the cache kmalloc-64 of size 64 [ 27.854815] The buggy address is located 0 bytes to the right of [ 27.854815] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.855166] [ 27.855235] The buggy address belongs to the physical page: [ 27.855484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.856162] flags: 0x200000000000000(node=0|zone=2) [ 27.856479] page_type: f5(slab) [ 27.856661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.857165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.857420] page dumped because: kasan: bad access detected [ 27.857648] [ 27.857821] Memory state around the buggy address: [ 27.858089] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.858372] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.858690] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.859049] ^ [ 27.859274] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.859600] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.859988] ================================================================== [ 28.089357] ================================================================== [ 28.089593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 28.091650] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.092578] [ 28.092936] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.092998] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.093013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.093039] Call Trace: [ 28.093061] <TASK> [ 28.093082] dump_stack_lvl+0x73/0xb0 [ 28.093123] print_report+0xd1/0x610 [ 28.093147] ? __virt_addr_valid+0x1db/0x2d0 [ 28.093173] ? kasan_atomics_helper+0x2006/0x5450 [ 28.093196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.093222] ? kasan_atomics_helper+0x2006/0x5450 [ 28.093244] kasan_report+0x141/0x180 [ 28.093267] ? kasan_atomics_helper+0x2006/0x5450 [ 28.093292] kasan_check_range+0x10c/0x1c0 [ 28.093316] __kasan_check_write+0x18/0x20 [ 28.093340] kasan_atomics_helper+0x2006/0x5450 [ 28.093363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.093385] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.093410] ? pick_task_fair+0xce/0x340 [ 28.093435] ? kasan_atomics+0x152/0x310 [ 28.093461] kasan_atomics+0x1dc/0x310 [ 28.093484] ? __pfx_kasan_atomics+0x10/0x10 [ 28.093508] ? __pfx_read_tsc+0x10/0x10 [ 28.093530] ? ktime_get_ts64+0x86/0x230 [ 28.093556] kunit_try_run_case+0x1a5/0x480 [ 28.093580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.093602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.093628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.093679] ? __kthread_parkme+0x82/0x180 [ 28.093705] ? preempt_count_sub+0x50/0x80 [ 28.093730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.093762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.093788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.093815] kthread+0x337/0x6f0 [ 28.093836] ? trace_preempt_on+0x20/0xc0 [ 28.093861] ? __pfx_kthread+0x10/0x10 [ 28.093882] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.093905] ? calculate_sigpending+0x7b/0xa0 [ 28.093930] ? __pfx_kthread+0x10/0x10 [ 28.093952] ret_from_fork+0x116/0x1d0 [ 28.093973] ? __pfx_kthread+0x10/0x10 [ 28.093994] ret_from_fork_asm+0x1a/0x30 [ 28.094027] </TASK> [ 28.094045] [ 28.102375] Allocated by task 314: [ 28.102521] kasan_save_stack+0x45/0x70 [ 28.102692] kasan_save_track+0x18/0x40 [ 28.102879] kasan_save_alloc_info+0x3b/0x50 [ 28.103089] __kasan_kmalloc+0xb7/0xc0 [ 28.103272] __kmalloc_cache_noprof+0x189/0x420 [ 28.103547] kasan_atomics+0x95/0x310 [ 28.103762] kunit_try_run_case+0x1a5/0x480 [ 28.103941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.104146] kthread+0x337/0x6f0 [ 28.104309] ret_from_fork+0x116/0x1d0 [ 28.104489] ret_from_fork_asm+0x1a/0x30 [ 28.104622] [ 28.104697] The buggy address belongs to the object at ffff888103eb9580 [ 28.104697] which belongs to the cache kmalloc-64 of size 64 [ 28.105179] The buggy address is located 0 bytes to the right of [ 28.105179] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.105730] [ 28.105801] The buggy address belongs to the physical page: [ 28.105967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.106206] flags: 0x200000000000000(node=0|zone=2) [ 28.106413] page_type: f5(slab) [ 28.106596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.107218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.107549] page dumped because: kasan: bad access detected [ 28.107844] [ 28.107913] Memory state around the buggy address: [ 28.108107] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.108316] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.108526] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.108746] ^ [ 28.108895] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.109166] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.109484] ================================================================== [ 28.169964] ================================================================== [ 28.170331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 28.170648] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.170980] [ 28.171096] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.171150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.171165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.171191] Call Trace: [ 28.171212] <TASK> [ 28.171234] dump_stack_lvl+0x73/0xb0 [ 28.171266] print_report+0xd1/0x610 [ 28.171289] ? __virt_addr_valid+0x1db/0x2d0 [ 28.171315] ? kasan_atomics_helper+0x218a/0x5450 [ 28.171336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.171362] ? kasan_atomics_helper+0x218a/0x5450 [ 28.171385] kasan_report+0x141/0x180 [ 28.171407] ? kasan_atomics_helper+0x218a/0x5450 [ 28.171433] kasan_check_range+0x10c/0x1c0 [ 28.171457] __kasan_check_write+0x18/0x20 [ 28.171480] kasan_atomics_helper+0x218a/0x5450 [ 28.171503] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.171525] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.171549] ? pick_task_fair+0xce/0x340 [ 28.171575] ? kasan_atomics+0x152/0x310 [ 28.171602] kasan_atomics+0x1dc/0x310 [ 28.171625] ? __pfx_kasan_atomics+0x10/0x10 [ 28.171650] ? __pfx_read_tsc+0x10/0x10 [ 28.171693] ? ktime_get_ts64+0x86/0x230 [ 28.171718] kunit_try_run_case+0x1a5/0x480 [ 28.171742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.171763] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.171789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.171814] ? __kthread_parkme+0x82/0x180 [ 28.171836] ? preempt_count_sub+0x50/0x80 [ 28.171861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.171889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.171918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.171946] kthread+0x337/0x6f0 [ 28.171968] ? trace_preempt_on+0x20/0xc0 [ 28.171994] ? __pfx_kthread+0x10/0x10 [ 28.172016] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.172039] ? calculate_sigpending+0x7b/0xa0 [ 28.172064] ? __pfx_kthread+0x10/0x10 [ 28.172088] ret_from_fork+0x116/0x1d0 [ 28.172109] ? __pfx_kthread+0x10/0x10 [ 28.172132] ret_from_fork_asm+0x1a/0x30 [ 28.172163] </TASK> [ 28.172176] [ 28.182598] Allocated by task 314: [ 28.182852] kasan_save_stack+0x45/0x70 [ 28.183297] kasan_save_track+0x18/0x40 [ 28.183486] kasan_save_alloc_info+0x3b/0x50 [ 28.183661] __kasan_kmalloc+0xb7/0xc0 [ 28.184024] __kmalloc_cache_noprof+0x189/0x420 [ 28.184246] kasan_atomics+0x95/0x310 [ 28.184557] kunit_try_run_case+0x1a5/0x480 [ 28.184807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.185198] kthread+0x337/0x6f0 [ 28.185439] ret_from_fork+0x116/0x1d0 [ 28.185642] ret_from_fork_asm+0x1a/0x30 [ 28.186018] [ 28.186105] The buggy address belongs to the object at ffff888103eb9580 [ 28.186105] which belongs to the cache kmalloc-64 of size 64 [ 28.186784] The buggy address is located 0 bytes to the right of [ 28.186784] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.187464] [ 28.187715] The buggy address belongs to the physical page: [ 28.187971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.188317] flags: 0x200000000000000(node=0|zone=2) [ 28.188708] page_type: f5(slab) [ 28.189019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.189413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.189766] page dumped because: kasan: bad access detected [ 28.190197] [ 28.190284] Memory state around the buggy address: [ 28.190669] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.191108] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.191413] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.191722] ^ [ 28.192118] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.192511] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.192988] ================================================================== [ 27.182822] ================================================================== [ 27.183358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 27.183674] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.183891] [ 27.184160] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.184219] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.184234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.184261] Call Trace: [ 27.184282] <TASK> [ 27.184303] dump_stack_lvl+0x73/0xb0 [ 27.184335] print_report+0xd1/0x610 [ 27.184359] ? __virt_addr_valid+0x1db/0x2d0 [ 27.184384] ? kasan_atomics_helper+0xac7/0x5450 [ 27.184406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.184434] ? kasan_atomics_helper+0xac7/0x5450 [ 27.184456] kasan_report+0x141/0x180 [ 27.184510] ? kasan_atomics_helper+0xac7/0x5450 [ 27.184537] kasan_check_range+0x10c/0x1c0 [ 27.184561] __kasan_check_write+0x18/0x20 [ 27.184584] kasan_atomics_helper+0xac7/0x5450 [ 27.184607] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.184630] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.184671] ? pick_task_fair+0xce/0x340 [ 27.184697] ? kasan_atomics+0x152/0x310 [ 27.184724] kasan_atomics+0x1dc/0x310 [ 27.184759] ? __pfx_kasan_atomics+0x10/0x10 [ 27.184784] ? __pfx_read_tsc+0x10/0x10 [ 27.184807] ? ktime_get_ts64+0x86/0x230 [ 27.184833] kunit_try_run_case+0x1a5/0x480 [ 27.184877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.184898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.184924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.184949] ? __kthread_parkme+0x82/0x180 [ 27.184972] ? preempt_count_sub+0x50/0x80 [ 27.184997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.185019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.185046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.185072] kthread+0x337/0x6f0 [ 27.185093] ? trace_preempt_on+0x20/0xc0 [ 27.185133] ? __pfx_kthread+0x10/0x10 [ 27.185155] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.185177] ? calculate_sigpending+0x7b/0xa0 [ 27.185203] ? __pfx_kthread+0x10/0x10 [ 27.185225] ret_from_fork+0x116/0x1d0 [ 27.185245] ? __pfx_kthread+0x10/0x10 [ 27.185267] ret_from_fork_asm+0x1a/0x30 [ 27.185316] </TASK> [ 27.185329] [ 27.192933] Allocated by task 314: [ 27.193338] kasan_save_stack+0x45/0x70 [ 27.193549] kasan_save_track+0x18/0x40 [ 27.193737] kasan_save_alloc_info+0x3b/0x50 [ 27.193953] __kasan_kmalloc+0xb7/0xc0 [ 27.194179] __kmalloc_cache_noprof+0x189/0x420 [ 27.194328] kasan_atomics+0x95/0x310 [ 27.194725] kunit_try_run_case+0x1a5/0x480 [ 27.194902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.195068] kthread+0x337/0x6f0 [ 27.195183] ret_from_fork+0x116/0x1d0 [ 27.195309] ret_from_fork_asm+0x1a/0x30 [ 27.195440] [ 27.195503] The buggy address belongs to the object at ffff888103eb9580 [ 27.195503] which belongs to the cache kmalloc-64 of size 64 [ 27.195961] The buggy address is located 0 bytes to the right of [ 27.195961] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.196480] [ 27.196630] The buggy address belongs to the physical page: [ 27.197096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.197332] flags: 0x200000000000000(node=0|zone=2) [ 27.197490] page_type: f5(slab) [ 27.197608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.198140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.198592] page dumped because: kasan: bad access detected [ 27.199227] [ 27.199362] Memory state around the buggy address: [ 27.199678] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.200011] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.201219] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.201455] ^ [ 27.201613] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.202613] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.202961] ================================================================== [ 26.889104] ================================================================== [ 26.889805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 26.891217] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.892267] [ 26.892380] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.892441] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.892458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.892485] Call Trace: [ 26.892505] <TASK> [ 26.892527] dump_stack_lvl+0x73/0xb0 [ 26.892572] print_report+0xd1/0x610 [ 26.892597] ? __virt_addr_valid+0x1db/0x2d0 [ 26.892622] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.892645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.892909] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.892987] kasan_report+0x141/0x180 [ 26.893014] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.893104] __asan_report_load4_noabort+0x18/0x20 [ 26.893129] kasan_atomics_helper+0x4b54/0x5450 [ 26.893153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.893177] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.893202] ? pick_task_fair+0xce/0x340 [ 26.893231] ? kasan_atomics+0x152/0x310 [ 26.893259] kasan_atomics+0x1dc/0x310 [ 26.893283] ? __pfx_kasan_atomics+0x10/0x10 [ 26.893308] ? __pfx_read_tsc+0x10/0x10 [ 26.893331] ? ktime_get_ts64+0x86/0x230 [ 26.893357] kunit_try_run_case+0x1a5/0x480 [ 26.893382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.893403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.893429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.893455] ? __kthread_parkme+0x82/0x180 [ 26.893477] ? preempt_count_sub+0x50/0x80 [ 26.893503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.893526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.893552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.893579] kthread+0x337/0x6f0 [ 26.893600] ? trace_preempt_on+0x20/0xc0 [ 26.893624] ? __pfx_kthread+0x10/0x10 [ 26.893647] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.893682] ? calculate_sigpending+0x7b/0xa0 [ 26.893708] ? __pfx_kthread+0x10/0x10 [ 26.893730] ret_from_fork+0x116/0x1d0 [ 26.893765] ? __pfx_kthread+0x10/0x10 [ 26.893788] ret_from_fork_asm+0x1a/0x30 [ 26.893855] </TASK> [ 26.893868] [ 26.908583] Allocated by task 314: [ 26.908946] kasan_save_stack+0x45/0x70 [ 26.909540] kasan_save_track+0x18/0x40 [ 26.909732] kasan_save_alloc_info+0x3b/0x50 [ 26.910076] __kasan_kmalloc+0xb7/0xc0 [ 26.910462] __kmalloc_cache_noprof+0x189/0x420 [ 26.910851] kasan_atomics+0x95/0x310 [ 26.911264] kunit_try_run_case+0x1a5/0x480 [ 26.911444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.911999] kthread+0x337/0x6f0 [ 26.912335] ret_from_fork+0x116/0x1d0 [ 26.912603] ret_from_fork_asm+0x1a/0x30 [ 26.912821] [ 26.912932] The buggy address belongs to the object at ffff888103eb9580 [ 26.912932] which belongs to the cache kmalloc-64 of size 64 [ 26.913422] The buggy address is located 0 bytes to the right of [ 26.913422] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.914382] [ 26.914522] The buggy address belongs to the physical page: [ 26.914786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.915172] flags: 0x200000000000000(node=0|zone=2) [ 26.915457] page_type: f5(slab) [ 26.915668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.916007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.916398] page dumped because: kasan: bad access detected [ 26.916615] [ 26.916739] Memory state around the buggy address: [ 26.916961] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.917601] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.917936] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.918211] ^ [ 26.918561] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.919065] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.919318] ================================================================== [ 28.054516] ================================================================== [ 28.054917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 28.055367] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.055674] [ 28.055767] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.055823] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.055838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.055867] Call Trace: [ 28.055888] <TASK> [ 28.055909] dump_stack_lvl+0x73/0xb0 [ 28.055941] print_report+0xd1/0x610 [ 28.055965] ? __virt_addr_valid+0x1db/0x2d0 [ 28.055989] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.056011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.056038] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.056060] kasan_report+0x141/0x180 [ 28.056082] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.056108] kasan_check_range+0x10c/0x1c0 [ 28.056132] __kasan_check_write+0x18/0x20 [ 28.056156] kasan_atomics_helper+0x1f43/0x5450 [ 28.056179] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.056203] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.056228] ? pick_task_fair+0xce/0x340 [ 28.056254] ? kasan_atomics+0x152/0x310 [ 28.056280] kasan_atomics+0x1dc/0x310 [ 28.056303] ? __pfx_kasan_atomics+0x10/0x10 [ 28.056328] ? __pfx_read_tsc+0x10/0x10 [ 28.056350] ? ktime_get_ts64+0x86/0x230 [ 28.056376] kunit_try_run_case+0x1a5/0x480 [ 28.056403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.056425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.056454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.056479] ? __kthread_parkme+0x82/0x180 [ 28.056502] ? preempt_count_sub+0x50/0x80 [ 28.056527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.056553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.056581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.056607] kthread+0x337/0x6f0 [ 28.056628] ? trace_preempt_on+0x20/0xc0 [ 28.056664] ? __pfx_kthread+0x10/0x10 [ 28.056687] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.056710] ? calculate_sigpending+0x7b/0xa0 [ 28.056736] ? __pfx_kthread+0x10/0x10 [ 28.056774] ret_from_fork+0x116/0x1d0 [ 28.056794] ? __pfx_kthread+0x10/0x10 [ 28.056817] ret_from_fork_asm+0x1a/0x30 [ 28.056849] </TASK> [ 28.056862] [ 28.064086] Allocated by task 314: [ 28.064294] kasan_save_stack+0x45/0x70 [ 28.064503] kasan_save_track+0x18/0x40 [ 28.064701] kasan_save_alloc_info+0x3b/0x50 [ 28.064945] __kasan_kmalloc+0xb7/0xc0 [ 28.065137] __kmalloc_cache_noprof+0x189/0x420 [ 28.065313] kasan_atomics+0x95/0x310 [ 28.065441] kunit_try_run_case+0x1a5/0x480 [ 28.065581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.065825] kthread+0x337/0x6f0 [ 28.066000] ret_from_fork+0x116/0x1d0 [ 28.066191] ret_from_fork_asm+0x1a/0x30 [ 28.066387] [ 28.066473] The buggy address belongs to the object at ffff888103eb9580 [ 28.066473] which belongs to the cache kmalloc-64 of size 64 [ 28.066888] The buggy address is located 0 bytes to the right of [ 28.066888] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.067356] [ 28.067461] The buggy address belongs to the physical page: [ 28.067723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.068080] flags: 0x200000000000000(node=0|zone=2) [ 28.068391] page_type: f5(slab) [ 28.068532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.068911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.069208] page dumped because: kasan: bad access detected [ 28.069372] [ 28.069435] Memory state around the buggy address: [ 28.069747] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.070170] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.070379] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.070585] ^ [ 28.070858] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.071185] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.071492] ================================================================== [ 27.880171] ================================================================== [ 27.880526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 27.881193] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.881526] [ 27.881647] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.881712] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.881727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.881752] Call Trace: [ 27.881773] <TASK> [ 27.881815] dump_stack_lvl+0x73/0xb0 [ 27.881864] print_report+0xd1/0x610 [ 27.881901] ? __virt_addr_valid+0x1db/0x2d0 [ 27.881940] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.881988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.882028] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.882070] kasan_report+0x141/0x180 [ 27.882106] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.882159] kasan_check_range+0x10c/0x1c0 [ 27.882208] __kasan_check_write+0x18/0x20 [ 27.882232] kasan_atomics_helper+0x1a7f/0x5450 [ 27.882255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.882278] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.882304] ? pick_task_fair+0xce/0x340 [ 27.882330] ? kasan_atomics+0x152/0x310 [ 27.882357] kasan_atomics+0x1dc/0x310 [ 27.882380] ? __pfx_kasan_atomics+0x10/0x10 [ 27.882405] ? __pfx_read_tsc+0x10/0x10 [ 27.882428] ? ktime_get_ts64+0x86/0x230 [ 27.882454] kunit_try_run_case+0x1a5/0x480 [ 27.882479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.882501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.882528] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.882563] ? __kthread_parkme+0x82/0x180 [ 27.882586] ? preempt_count_sub+0x50/0x80 [ 27.882611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.882633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.882669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.882696] kthread+0x337/0x6f0 [ 27.882718] ? trace_preempt_on+0x20/0xc0 [ 27.882743] ? __pfx_kthread+0x10/0x10 [ 27.882776] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.882798] ? calculate_sigpending+0x7b/0xa0 [ 27.882824] ? __pfx_kthread+0x10/0x10 [ 27.882858] ret_from_fork+0x116/0x1d0 [ 27.882878] ? __pfx_kthread+0x10/0x10 [ 27.882899] ret_from_fork_asm+0x1a/0x30 [ 27.882931] </TASK> [ 27.882943] [ 27.890969] Allocated by task 314: [ 27.891116] kasan_save_stack+0x45/0x70 [ 27.891951] kasan_save_track+0x18/0x40 [ 27.893525] kasan_save_alloc_info+0x3b/0x50 [ 27.893725] __kasan_kmalloc+0xb7/0xc0 [ 27.893937] __kmalloc_cache_noprof+0x189/0x420 [ 27.894215] kasan_atomics+0x95/0x310 [ 27.894453] kunit_try_run_case+0x1a5/0x480 [ 27.894606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.894871] kthread+0x337/0x6f0 [ 27.895026] ret_from_fork+0x116/0x1d0 [ 27.895233] ret_from_fork_asm+0x1a/0x30 [ 27.895462] [ 27.895554] The buggy address belongs to the object at ffff888103eb9580 [ 27.895554] which belongs to the cache kmalloc-64 of size 64 [ 27.896096] The buggy address is located 0 bytes to the right of [ 27.896096] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.896448] [ 27.896533] The buggy address belongs to the physical page: [ 27.896795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.897382] flags: 0x200000000000000(node=0|zone=2) [ 27.897553] page_type: f5(slab) [ 27.897706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.898135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.898510] page dumped because: kasan: bad access detected [ 27.898765] [ 27.898831] Memory state around the buggy address: [ 27.900243] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.900508] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.901541] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.901850] ^ [ 27.902007] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.902582] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.903125] ================================================================== [ 27.963106] ================================================================== [ 27.963479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 27.963874] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.964208] [ 27.964323] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.964378] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.964393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.964418] Call Trace: [ 27.964438] <TASK> [ 27.964459] dump_stack_lvl+0x73/0xb0 [ 27.964490] print_report+0xd1/0x610 [ 27.964514] ? __virt_addr_valid+0x1db/0x2d0 [ 27.964539] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.964561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.964588] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.964610] kasan_report+0x141/0x180 [ 27.964634] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.964671] kasan_check_range+0x10c/0x1c0 [ 27.964695] __kasan_check_write+0x18/0x20 [ 27.964719] kasan_atomics_helper+0x1ce1/0x5450 [ 27.964763] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.964785] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.964811] ? pick_task_fair+0xce/0x340 [ 27.964837] ? kasan_atomics+0x152/0x310 [ 27.964864] kasan_atomics+0x1dc/0x310 [ 27.964888] ? __pfx_kasan_atomics+0x10/0x10 [ 27.964912] ? __pfx_read_tsc+0x10/0x10 [ 27.964935] ? ktime_get_ts64+0x86/0x230 [ 27.964961] kunit_try_run_case+0x1a5/0x480 [ 27.964985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.965008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.965033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.965059] ? __kthread_parkme+0x82/0x180 [ 27.965081] ? preempt_count_sub+0x50/0x80 [ 27.965106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.965129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.965155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.965182] kthread+0x337/0x6f0 [ 27.965203] ? trace_preempt_on+0x20/0xc0 [ 27.965228] ? __pfx_kthread+0x10/0x10 [ 27.965249] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.965274] ? calculate_sigpending+0x7b/0xa0 [ 27.965299] ? __pfx_kthread+0x10/0x10 [ 27.965322] ret_from_fork+0x116/0x1d0 [ 27.965343] ? __pfx_kthread+0x10/0x10 [ 27.965364] ret_from_fork_asm+0x1a/0x30 [ 27.965396] </TASK> [ 27.965409] [ 27.972748] Allocated by task 314: [ 27.972900] kasan_save_stack+0x45/0x70 [ 27.973104] kasan_save_track+0x18/0x40 [ 27.973298] kasan_save_alloc_info+0x3b/0x50 [ 27.973471] __kasan_kmalloc+0xb7/0xc0 [ 27.973631] __kmalloc_cache_noprof+0x189/0x420 [ 27.973866] kasan_atomics+0x95/0x310 [ 27.974029] kunit_try_run_case+0x1a5/0x480 [ 27.974203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.974406] kthread+0x337/0x6f0 [ 27.974575] ret_from_fork+0x116/0x1d0 [ 27.974757] ret_from_fork_asm+0x1a/0x30 [ 27.974951] [ 27.975027] The buggy address belongs to the object at ffff888103eb9580 [ 27.975027] which belongs to the cache kmalloc-64 of size 64 [ 27.975494] The buggy address is located 0 bytes to the right of [ 27.975494] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.976013] [ 27.976092] The buggy address belongs to the physical page: [ 27.976316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.976551] flags: 0x200000000000000(node=0|zone=2) [ 27.976719] page_type: f5(slab) [ 27.976855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.977083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.977322] page dumped because: kasan: bad access detected [ 27.977564] [ 27.977660] Memory state around the buggy address: [ 27.977897] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.978219] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.978545] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.978899] ^ [ 27.979119] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.979427] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.979683] ================================================================== [ 28.127538] ================================================================== [ 28.127864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 28.128205] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.128516] [ 28.128625] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.128689] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.128703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.128729] Call Trace: [ 28.128749] <TASK> [ 28.128768] dump_stack_lvl+0x73/0xb0 [ 28.128801] print_report+0xd1/0x610 [ 28.128826] ? __virt_addr_valid+0x1db/0x2d0 [ 28.128851] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.128872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.128898] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.128921] kasan_report+0x141/0x180 [ 28.128944] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.128970] kasan_check_range+0x10c/0x1c0 [ 28.128995] __kasan_check_write+0x18/0x20 [ 28.129019] kasan_atomics_helper+0x20c8/0x5450 [ 28.129042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.129065] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.129089] ? pick_task_fair+0xce/0x340 [ 28.129115] ? kasan_atomics+0x152/0x310 [ 28.129142] kasan_atomics+0x1dc/0x310 [ 28.129165] ? __pfx_kasan_atomics+0x10/0x10 [ 28.129190] ? __pfx_read_tsc+0x10/0x10 [ 28.129213] ? ktime_get_ts64+0x86/0x230 [ 28.129237] kunit_try_run_case+0x1a5/0x480 [ 28.129261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.129283] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.129307] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.129332] ? __kthread_parkme+0x82/0x180 [ 28.129354] ? preempt_count_sub+0x50/0x80 [ 28.129379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.129402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.129428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.129455] kthread+0x337/0x6f0 [ 28.129476] ? trace_preempt_on+0x20/0xc0 [ 28.129500] ? __pfx_kthread+0x10/0x10 [ 28.129522] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.129545] ? calculate_sigpending+0x7b/0xa0 [ 28.129570] ? __pfx_kthread+0x10/0x10 [ 28.129592] ret_from_fork+0x116/0x1d0 [ 28.129612] ? __pfx_kthread+0x10/0x10 [ 28.129634] ret_from_fork_asm+0x1a/0x30 [ 28.129678] </TASK> [ 28.129689] [ 28.136611] Allocated by task 314: [ 28.136895] kasan_save_stack+0x45/0x70 [ 28.137101] kasan_save_track+0x18/0x40 [ 28.137285] kasan_save_alloc_info+0x3b/0x50 [ 28.137494] __kasan_kmalloc+0xb7/0xc0 [ 28.137685] __kmalloc_cache_noprof+0x189/0x420 [ 28.138101] kasan_atomics+0x95/0x310 [ 28.138288] kunit_try_run_case+0x1a5/0x480 [ 28.138489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.138698] kthread+0x337/0x6f0 [ 28.138955] ret_from_fork+0x116/0x1d0 [ 28.139119] ret_from_fork_asm+0x1a/0x30 [ 28.139285] [ 28.139365] The buggy address belongs to the object at ffff888103eb9580 [ 28.139365] which belongs to the cache kmalloc-64 of size 64 [ 28.139894] The buggy address is located 0 bytes to the right of [ 28.139894] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.140384] [ 28.140480] The buggy address belongs to the physical page: [ 28.140669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.141082] flags: 0x200000000000000(node=0|zone=2) [ 28.141292] page_type: f5(slab) [ 28.141434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.141768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.142053] page dumped because: kasan: bad access detected [ 28.142266] [ 28.142330] Memory state around the buggy address: [ 28.142532] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.142864] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.143130] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.143386] ^ [ 28.143594] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.143888] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.144164] ================================================================== [ 27.707931] ================================================================== [ 27.708217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 27.708574] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.708977] [ 27.709085] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.709152] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.709167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.709204] Call Trace: [ 27.709225] <TASK> [ 27.709247] dump_stack_lvl+0x73/0xb0 [ 27.709282] print_report+0xd1/0x610 [ 27.709315] ? __virt_addr_valid+0x1db/0x2d0 [ 27.709340] ? kasan_atomics_helper+0x164f/0x5450 [ 27.709374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.709401] ? kasan_atomics_helper+0x164f/0x5450 [ 27.709424] kasan_report+0x141/0x180 [ 27.709456] ? kasan_atomics_helper+0x164f/0x5450 [ 27.709482] kasan_check_range+0x10c/0x1c0 [ 27.709507] __kasan_check_write+0x18/0x20 [ 27.709541] kasan_atomics_helper+0x164f/0x5450 [ 27.709565] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.709587] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.709612] ? pick_task_fair+0xce/0x340 [ 27.709637] ? kasan_atomics+0x152/0x310 [ 27.709672] kasan_atomics+0x1dc/0x310 [ 27.709696] ? __pfx_kasan_atomics+0x10/0x10 [ 27.709731] ? __pfx_read_tsc+0x10/0x10 [ 27.709754] ? ktime_get_ts64+0x86/0x230 [ 27.709780] kunit_try_run_case+0x1a5/0x480 [ 27.709815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.709852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.709877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.709903] ? __kthread_parkme+0x82/0x180 [ 27.709926] ? preempt_count_sub+0x50/0x80 [ 27.709960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.709982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.710018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.710051] kthread+0x337/0x6f0 [ 27.710072] ? trace_preempt_on+0x20/0xc0 [ 27.710097] ? __pfx_kthread+0x10/0x10 [ 27.710120] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.710142] ? calculate_sigpending+0x7b/0xa0 [ 27.710177] ? __pfx_kthread+0x10/0x10 [ 27.710200] ret_from_fork+0x116/0x1d0 [ 27.710219] ? __pfx_kthread+0x10/0x10 [ 27.710252] ret_from_fork_asm+0x1a/0x30 [ 27.710285] </TASK> [ 27.710298] [ 27.721519] Allocated by task 314: [ 27.722109] kasan_save_stack+0x45/0x70 [ 27.722318] kasan_save_track+0x18/0x40 [ 27.722456] kasan_save_alloc_info+0x3b/0x50 [ 27.722602] __kasan_kmalloc+0xb7/0xc0 [ 27.723012] __kmalloc_cache_noprof+0x189/0x420 [ 27.723436] kasan_atomics+0x95/0x310 [ 27.723818] kunit_try_run_case+0x1a5/0x480 [ 27.724214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.724668] kthread+0x337/0x6f0 [ 27.724996] ret_from_fork+0x116/0x1d0 [ 27.725292] ret_from_fork_asm+0x1a/0x30 [ 27.725431] [ 27.725498] The buggy address belongs to the object at ffff888103eb9580 [ 27.725498] which belongs to the cache kmalloc-64 of size 64 [ 27.726241] The buggy address is located 0 bytes to the right of [ 27.726241] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.727355] [ 27.727521] The buggy address belongs to the physical page: [ 27.727938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.728241] flags: 0x200000000000000(node=0|zone=2) [ 27.728405] page_type: f5(slab) [ 27.728525] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.728795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.729435] page dumped because: kasan: bad access detected [ 27.729944] [ 27.730122] Memory state around the buggy address: [ 27.730549] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.730992] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.731205] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.731412] ^ [ 27.731562] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.731860] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.732210] ================================================================== [ 26.919921] ================================================================== [ 26.920257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 26.920665] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.921000] [ 26.921418] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.921497] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.921513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.921553] Call Trace: [ 26.921588] <TASK> [ 26.921611] dump_stack_lvl+0x73/0xb0 [ 26.921644] print_report+0xd1/0x610 [ 26.921681] ? __virt_addr_valid+0x1db/0x2d0 [ 26.921707] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.921729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.921755] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.921777] kasan_report+0x141/0x180 [ 26.921800] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.921826] kasan_check_range+0x10c/0x1c0 [ 26.921865] __kasan_check_write+0x18/0x20 [ 26.921889] kasan_atomics_helper+0x4a0/0x5450 [ 26.921913] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.921936] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.922020] ? pick_task_fair+0xce/0x340 [ 26.922053] ? kasan_atomics+0x152/0x310 [ 26.922081] kasan_atomics+0x1dc/0x310 [ 26.922104] ? __pfx_kasan_atomics+0x10/0x10 [ 26.922130] ? __pfx_read_tsc+0x10/0x10 [ 26.922152] ? ktime_get_ts64+0x86/0x230 [ 26.922178] kunit_try_run_case+0x1a5/0x480 [ 26.922202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.922224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.922249] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.922275] ? __kthread_parkme+0x82/0x180 [ 26.922297] ? preempt_count_sub+0x50/0x80 [ 26.922323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.922346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.922376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.922402] kthread+0x337/0x6f0 [ 26.922424] ? trace_preempt_on+0x20/0xc0 [ 26.922448] ? __pfx_kthread+0x10/0x10 [ 26.922470] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.922494] ? calculate_sigpending+0x7b/0xa0 [ 26.922520] ? __pfx_kthread+0x10/0x10 [ 26.922543] ret_from_fork+0x116/0x1d0 [ 26.922564] ? __pfx_kthread+0x10/0x10 [ 26.922586] ret_from_fork_asm+0x1a/0x30 [ 26.922619] </TASK> [ 26.922632] [ 26.933795] Allocated by task 314: [ 26.934049] kasan_save_stack+0x45/0x70 [ 26.934335] kasan_save_track+0x18/0x40 [ 26.934521] kasan_save_alloc_info+0x3b/0x50 [ 26.934771] __kasan_kmalloc+0xb7/0xc0 [ 26.934906] __kmalloc_cache_noprof+0x189/0x420 [ 26.935257] kasan_atomics+0x95/0x310 [ 26.935461] kunit_try_run_case+0x1a5/0x480 [ 26.935624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.935801] kthread+0x337/0x6f0 [ 26.936042] ret_from_fork+0x116/0x1d0 [ 26.936281] ret_from_fork_asm+0x1a/0x30 [ 26.936428] [ 26.936539] The buggy address belongs to the object at ffff888103eb9580 [ 26.936539] which belongs to the cache kmalloc-64 of size 64 [ 26.937109] The buggy address is located 0 bytes to the right of [ 26.937109] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.937556] [ 26.937651] The buggy address belongs to the physical page: [ 26.938298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.938692] flags: 0x200000000000000(node=0|zone=2) [ 26.938854] page_type: f5(slab) [ 26.939144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.939507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.939875] page dumped because: kasan: bad access detected [ 26.940219] [ 26.940318] Memory state around the buggy address: [ 26.940480] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.940742] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.941079] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.941432] ^ [ 26.941626] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.942113] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.942685] ================================================================== [ 27.163681] ================================================================== [ 27.164178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 27.164436] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.164859] [ 27.164951] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.165008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.165023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.165049] Call Trace: [ 27.165070] <TASK> [ 27.165092] dump_stack_lvl+0x73/0xb0 [ 27.165123] print_report+0xd1/0x610 [ 27.165148] ? __virt_addr_valid+0x1db/0x2d0 [ 27.165173] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.165194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.165221] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.165248] kasan_report+0x141/0x180 [ 27.165273] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.165300] kasan_check_range+0x10c/0x1c0 [ 27.165326] __kasan_check_write+0x18/0x20 [ 27.165362] kasan_atomics_helper+0xa2b/0x5450 [ 27.165386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.165408] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.165458] ? pick_task_fair+0xce/0x340 [ 27.165487] ? kasan_atomics+0x152/0x310 [ 27.165515] kasan_atomics+0x1dc/0x310 [ 27.165540] ? __pfx_kasan_atomics+0x10/0x10 [ 27.165565] ? __pfx_read_tsc+0x10/0x10 [ 27.165587] ? ktime_get_ts64+0x86/0x230 [ 27.165613] kunit_try_run_case+0x1a5/0x480 [ 27.165638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.165671] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.165697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.165722] ? __kthread_parkme+0x82/0x180 [ 27.165754] ? preempt_count_sub+0x50/0x80 [ 27.165799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.165823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.165849] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.165876] kthread+0x337/0x6f0 [ 27.165897] ? trace_preempt_on+0x20/0xc0 [ 27.165922] ? __pfx_kthread+0x10/0x10 [ 27.165963] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.165986] ? calculate_sigpending+0x7b/0xa0 [ 27.166010] ? __pfx_kthread+0x10/0x10 [ 27.166033] ret_from_fork+0x116/0x1d0 [ 27.166079] ? __pfx_kthread+0x10/0x10 [ 27.166100] ret_from_fork_asm+0x1a/0x30 [ 27.166132] </TASK> [ 27.166145] [ 27.174231] Allocated by task 314: [ 27.174381] kasan_save_stack+0x45/0x70 [ 27.174613] kasan_save_track+0x18/0x40 [ 27.174908] kasan_save_alloc_info+0x3b/0x50 [ 27.175149] __kasan_kmalloc+0xb7/0xc0 [ 27.175335] __kmalloc_cache_noprof+0x189/0x420 [ 27.175497] kasan_atomics+0x95/0x310 [ 27.175619] kunit_try_run_case+0x1a5/0x480 [ 27.175921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.176203] kthread+0x337/0x6f0 [ 27.176345] ret_from_fork+0x116/0x1d0 [ 27.176474] ret_from_fork_asm+0x1a/0x30 [ 27.176604] [ 27.176689] The buggy address belongs to the object at ffff888103eb9580 [ 27.176689] which belongs to the cache kmalloc-64 of size 64 [ 27.177643] The buggy address is located 0 bytes to the right of [ 27.177643] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.178160] [ 27.178297] The buggy address belongs to the physical page: [ 27.178458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.178751] flags: 0x200000000000000(node=0|zone=2) [ 27.179109] page_type: f5(slab) [ 27.179457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.179711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.179947] page dumped because: kasan: bad access detected [ 27.180282] [ 27.180453] Memory state around the buggy address: [ 27.180740] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.180950] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.181164] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.181366] ^ [ 27.181511] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.181816] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.182284] ================================================================== [ 27.309065] ================================================================== [ 27.309595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 27.310063] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.310617] [ 27.310765] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.310834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.310848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.310875] Call Trace: [ 27.310900] <TASK> [ 27.310919] dump_stack_lvl+0x73/0xb0 [ 27.310956] print_report+0xd1/0x610 [ 27.310979] ? __virt_addr_valid+0x1db/0x2d0 [ 27.311014] ? kasan_atomics_helper+0xde0/0x5450 [ 27.311035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.311073] ? kasan_atomics_helper+0xde0/0x5450 [ 27.311096] kasan_report+0x141/0x180 [ 27.311118] ? kasan_atomics_helper+0xde0/0x5450 [ 27.311144] kasan_check_range+0x10c/0x1c0 [ 27.311168] __kasan_check_write+0x18/0x20 [ 27.311192] kasan_atomics_helper+0xde0/0x5450 [ 27.311216] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.311238] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.311263] ? pick_task_fair+0xce/0x340 [ 27.311289] ? kasan_atomics+0x152/0x310 [ 27.311315] kasan_atomics+0x1dc/0x310 [ 27.311338] ? __pfx_kasan_atomics+0x10/0x10 [ 27.311363] ? __pfx_read_tsc+0x10/0x10 [ 27.311385] ? ktime_get_ts64+0x86/0x230 [ 27.311410] kunit_try_run_case+0x1a5/0x480 [ 27.311434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.311455] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.311481] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.311505] ? __kthread_parkme+0x82/0x180 [ 27.311527] ? preempt_count_sub+0x50/0x80 [ 27.311552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.311575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.311600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.311626] kthread+0x337/0x6f0 [ 27.311647] ? trace_preempt_on+0x20/0xc0 [ 27.311680] ? __pfx_kthread+0x10/0x10 [ 27.311702] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.311734] ? calculate_sigpending+0x7b/0xa0 [ 27.311771] ? __pfx_kthread+0x10/0x10 [ 27.311794] ret_from_fork+0x116/0x1d0 [ 27.311824] ? __pfx_kthread+0x10/0x10 [ 27.311846] ret_from_fork_asm+0x1a/0x30 [ 27.311877] </TASK> [ 27.311889] [ 27.322365] Allocated by task 314: [ 27.322695] kasan_save_stack+0x45/0x70 [ 27.322904] kasan_save_track+0x18/0x40 [ 27.323210] kasan_save_alloc_info+0x3b/0x50 [ 27.323421] __kasan_kmalloc+0xb7/0xc0 [ 27.323710] __kmalloc_cache_noprof+0x189/0x420 [ 27.323945] kasan_atomics+0x95/0x310 [ 27.324244] kunit_try_run_case+0x1a5/0x480 [ 27.324532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.324739] kthread+0x337/0x6f0 [ 27.325141] ret_from_fork+0x116/0x1d0 [ 27.325331] ret_from_fork_asm+0x1a/0x30 [ 27.325680] [ 27.325808] The buggy address belongs to the object at ffff888103eb9580 [ 27.325808] which belongs to the cache kmalloc-64 of size 64 [ 27.326469] The buggy address is located 0 bytes to the right of [ 27.326469] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.326971] [ 27.327263] The buggy address belongs to the physical page: [ 27.327563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.327938] flags: 0x200000000000000(node=0|zone=2) [ 27.328310] page_type: f5(slab) [ 27.328661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.329029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.329398] page dumped because: kasan: bad access detected [ 27.329646] [ 27.329891] Memory state around the buggy address: [ 27.330170] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.330482] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.330889] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.331293] ^ [ 27.331461] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.331947] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.332246] ================================================================== [ 27.437416] ================================================================== [ 27.437823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 27.438214] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.438529] [ 27.438661] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.438717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.438756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.438782] Call Trace: [ 27.438803] <TASK> [ 27.438837] dump_stack_lvl+0x73/0xb0 [ 27.438869] print_report+0xd1/0x610 [ 27.438903] ? __virt_addr_valid+0x1db/0x2d0 [ 27.438937] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.438959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.438996] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.439019] kasan_report+0x141/0x180 [ 27.439041] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.439068] __asan_report_load4_noabort+0x18/0x20 [ 27.439093] kasan_atomics_helper+0x4a1c/0x5450 [ 27.439116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.439139] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.439164] ? pick_task_fair+0xce/0x340 [ 27.439191] ? kasan_atomics+0x152/0x310 [ 27.439226] kasan_atomics+0x1dc/0x310 [ 27.439249] ? __pfx_kasan_atomics+0x10/0x10 [ 27.439285] ? __pfx_read_tsc+0x10/0x10 [ 27.439308] ? ktime_get_ts64+0x86/0x230 [ 27.439334] kunit_try_run_case+0x1a5/0x480 [ 27.439359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.439390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.439417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.439452] ? __kthread_parkme+0x82/0x180 [ 27.439475] ? preempt_count_sub+0x50/0x80 [ 27.439500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.439523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.439550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.439578] kthread+0x337/0x6f0 [ 27.439599] ? trace_preempt_on+0x20/0xc0 [ 27.439623] ? __pfx_kthread+0x10/0x10 [ 27.439645] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.439675] ? calculate_sigpending+0x7b/0xa0 [ 27.439701] ? __pfx_kthread+0x10/0x10 [ 27.439741] ret_from_fork+0x116/0x1d0 [ 27.439762] ? __pfx_kthread+0x10/0x10 [ 27.439784] ret_from_fork_asm+0x1a/0x30 [ 27.439825] </TASK> [ 27.439838] [ 27.447242] Allocated by task 314: [ 27.447437] kasan_save_stack+0x45/0x70 [ 27.447591] kasan_save_track+0x18/0x40 [ 27.447745] kasan_save_alloc_info+0x3b/0x50 [ 27.447890] __kasan_kmalloc+0xb7/0xc0 [ 27.448104] __kmalloc_cache_noprof+0x189/0x420 [ 27.448324] kasan_atomics+0x95/0x310 [ 27.448504] kunit_try_run_case+0x1a5/0x480 [ 27.448713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.448979] kthread+0x337/0x6f0 [ 27.449144] ret_from_fork+0x116/0x1d0 [ 27.449290] ret_from_fork_asm+0x1a/0x30 [ 27.449424] [ 27.449490] The buggy address belongs to the object at ffff888103eb9580 [ 27.449490] which belongs to the cache kmalloc-64 of size 64 [ 27.450050] The buggy address is located 0 bytes to the right of [ 27.450050] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.450510] [ 27.450580] The buggy address belongs to the physical page: [ 27.450781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.451033] flags: 0x200000000000000(node=0|zone=2) [ 27.451262] page_type: f5(slab) [ 27.451450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.451824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.452127] page dumped because: kasan: bad access detected [ 27.452291] [ 27.452353] Memory state around the buggy address: [ 27.452502] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.452777] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.453093] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.453432] ^ [ 27.453691] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.454062] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.454373] ================================================================== [ 27.586199] ================================================================== [ 27.586484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 27.586901] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.587244] [ 27.587377] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.587434] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.587451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.587477] Call Trace: [ 27.587499] <TASK> [ 27.587522] dump_stack_lvl+0x73/0xb0 [ 27.587556] print_report+0xd1/0x610 [ 27.587580] ? __virt_addr_valid+0x1db/0x2d0 [ 27.587606] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.587639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.587682] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.587705] kasan_report+0x141/0x180 [ 27.587728] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.587755] __asan_report_load8_noabort+0x18/0x20 [ 27.587781] kasan_atomics_helper+0x4eae/0x5450 [ 27.587804] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.587827] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.587861] ? pick_task_fair+0xce/0x340 [ 27.587906] ? kasan_atomics+0x152/0x310 [ 27.587943] kasan_atomics+0x1dc/0x310 [ 27.587968] ? __pfx_kasan_atomics+0x10/0x10 [ 27.587992] ? __pfx_read_tsc+0x10/0x10 [ 27.588015] ? ktime_get_ts64+0x86/0x230 [ 27.588040] kunit_try_run_case+0x1a5/0x480 [ 27.588065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.588086] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.588121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.588146] ? __kthread_parkme+0x82/0x180 [ 27.588179] ? preempt_count_sub+0x50/0x80 [ 27.588204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.588228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.588254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.588280] kthread+0x337/0x6f0 [ 27.588301] ? trace_preempt_on+0x20/0xc0 [ 27.588335] ? __pfx_kthread+0x10/0x10 [ 27.588357] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.588380] ? calculate_sigpending+0x7b/0xa0 [ 27.588416] ? __pfx_kthread+0x10/0x10 [ 27.588438] ret_from_fork+0x116/0x1d0 [ 27.588458] ? __pfx_kthread+0x10/0x10 [ 27.588480] ret_from_fork_asm+0x1a/0x30 [ 27.588512] </TASK> [ 27.588526] [ 27.597705] Allocated by task 314: [ 27.597896] kasan_save_stack+0x45/0x70 [ 27.598104] kasan_save_track+0x18/0x40 [ 27.598286] kasan_save_alloc_info+0x3b/0x50 [ 27.598476] __kasan_kmalloc+0xb7/0xc0 [ 27.598645] __kmalloc_cache_noprof+0x189/0x420 [ 27.598809] kasan_atomics+0x95/0x310 [ 27.598939] kunit_try_run_case+0x1a5/0x480 [ 27.599121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.599412] kthread+0x337/0x6f0 [ 27.599586] ret_from_fork+0x116/0x1d0 [ 27.599868] ret_from_fork_asm+0x1a/0x30 [ 27.600042] [ 27.600107] The buggy address belongs to the object at ffff888103eb9580 [ 27.600107] which belongs to the cache kmalloc-64 of size 64 [ 27.600450] The buggy address is located 0 bytes to the right of [ 27.600450] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.601054] [ 27.601156] The buggy address belongs to the physical page: [ 27.601557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.602050] flags: 0x200000000000000(node=0|zone=2) [ 27.602850] page_type: f5(slab) [ 27.603038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.603549] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.603995] page dumped because: kasan: bad access detected [ 27.604340] [ 27.604439] Memory state around the buggy address: [ 27.604995] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.605364] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.605771] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.606344] ^ [ 27.606695] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.607222] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.607627] ================================================================== [ 28.028197] ================================================================== [ 28.028522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 28.029144] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.029461] [ 28.029570] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.029626] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.029641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.029678] Call Trace: [ 28.029700] <TASK> [ 28.029722] dump_stack_lvl+0x73/0xb0 [ 28.029972] print_report+0xd1/0x610 [ 28.030000] ? __virt_addr_valid+0x1db/0x2d0 [ 28.030026] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.030054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.030249] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.030284] kasan_report+0x141/0x180 [ 28.030309] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.030336] kasan_check_range+0x10c/0x1c0 [ 28.030360] __kasan_check_write+0x18/0x20 [ 28.030384] kasan_atomics_helper+0x1eaa/0x5450 [ 28.030407] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.030430] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.030454] ? pick_task_fair+0xce/0x340 [ 28.030481] ? kasan_atomics+0x152/0x310 [ 28.030508] kasan_atomics+0x1dc/0x310 [ 28.030531] ? __pfx_kasan_atomics+0x10/0x10 [ 28.030556] ? __pfx_read_tsc+0x10/0x10 [ 28.030578] ? ktime_get_ts64+0x86/0x230 [ 28.030604] kunit_try_run_case+0x1a5/0x480 [ 28.030628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.030649] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.030688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.030713] ? __kthread_parkme+0x82/0x180 [ 28.030735] ? preempt_count_sub+0x50/0x80 [ 28.030772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.030795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.030822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.030849] kthread+0x337/0x6f0 [ 28.030870] ? trace_preempt_on+0x20/0xc0 [ 28.030895] ? __pfx_kthread+0x10/0x10 [ 28.030917] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.030941] ? calculate_sigpending+0x7b/0xa0 [ 28.030966] ? __pfx_kthread+0x10/0x10 [ 28.030989] ret_from_fork+0x116/0x1d0 [ 28.031009] ? __pfx_kthread+0x10/0x10 [ 28.031031] ret_from_fork_asm+0x1a/0x30 [ 28.031063] </TASK> [ 28.031077] [ 28.042153] Allocated by task 314: [ 28.042445] kasan_save_stack+0x45/0x70 [ 28.042824] kasan_save_track+0x18/0x40 [ 28.043013] kasan_save_alloc_info+0x3b/0x50 [ 28.043206] __kasan_kmalloc+0xb7/0xc0 [ 28.043374] __kmalloc_cache_noprof+0x189/0x420 [ 28.043570] kasan_atomics+0x95/0x310 [ 28.043747] kunit_try_run_case+0x1a5/0x480 [ 28.043934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.044164] kthread+0x337/0x6f0 [ 28.044314] ret_from_fork+0x116/0x1d0 [ 28.044483] ret_from_fork_asm+0x1a/0x30 [ 28.044650] [ 28.045186] The buggy address belongs to the object at ffff888103eb9580 [ 28.045186] which belongs to the cache kmalloc-64 of size 64 [ 28.045966] The buggy address is located 0 bytes to the right of [ 28.045966] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.046931] [ 28.047036] The buggy address belongs to the physical page: [ 28.047440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.048108] flags: 0x200000000000000(node=0|zone=2) [ 28.048461] page_type: f5(slab) [ 28.048752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.049235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.049544] page dumped because: kasan: bad access detected [ 28.049958] [ 28.050222] Memory state around the buggy address: [ 28.050485] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.051198] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.051568] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.052017] ^ [ 28.052225] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.052507] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.053149] ================================================================== [ 28.072119] ================================================================== [ 28.072428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 28.072824] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.073172] [ 28.073277] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.073332] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.073347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.073373] Call Trace: [ 28.073392] <TASK> [ 28.073414] dump_stack_lvl+0x73/0xb0 [ 28.073445] print_report+0xd1/0x610 [ 28.073469] ? __virt_addr_valid+0x1db/0x2d0 [ 28.073493] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.073515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.073541] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.073563] kasan_report+0x141/0x180 [ 28.073586] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.073613] __asan_report_load8_noabort+0x18/0x20 [ 28.073637] kasan_atomics_helper+0x4f71/0x5450 [ 28.073672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.073695] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.073719] ? pick_task_fair+0xce/0x340 [ 28.073745] ? kasan_atomics+0x152/0x310 [ 28.073772] kasan_atomics+0x1dc/0x310 [ 28.073795] ? __pfx_kasan_atomics+0x10/0x10 [ 28.073819] ? __pfx_read_tsc+0x10/0x10 [ 28.073842] ? ktime_get_ts64+0x86/0x230 [ 28.073868] kunit_try_run_case+0x1a5/0x480 [ 28.073892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.073914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.073939] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.073964] ? __kthread_parkme+0x82/0x180 [ 28.073987] ? preempt_count_sub+0x50/0x80 [ 28.074025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.074053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.074079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.074106] kthread+0x337/0x6f0 [ 28.074126] ? trace_preempt_on+0x20/0xc0 [ 28.074151] ? __pfx_kthread+0x10/0x10 [ 28.074173] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.074195] ? calculate_sigpending+0x7b/0xa0 [ 28.074221] ? __pfx_kthread+0x10/0x10 [ 28.074244] ret_from_fork+0x116/0x1d0 [ 28.074264] ? __pfx_kthread+0x10/0x10 [ 28.074286] ret_from_fork_asm+0x1a/0x30 [ 28.074318] </TASK> [ 28.074329] [ 28.081546] Allocated by task 314: [ 28.081702] kasan_save_stack+0x45/0x70 [ 28.081910] kasan_save_track+0x18/0x40 [ 28.082103] kasan_save_alloc_info+0x3b/0x50 [ 28.082311] __kasan_kmalloc+0xb7/0xc0 [ 28.082496] __kmalloc_cache_noprof+0x189/0x420 [ 28.082724] kasan_atomics+0x95/0x310 [ 28.082918] kunit_try_run_case+0x1a5/0x480 [ 28.083121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.083375] kthread+0x337/0x6f0 [ 28.083542] ret_from_fork+0x116/0x1d0 [ 28.083733] ret_from_fork_asm+0x1a/0x30 [ 28.083921] [ 28.084001] The buggy address belongs to the object at ffff888103eb9580 [ 28.084001] which belongs to the cache kmalloc-64 of size 64 [ 28.084385] The buggy address is located 0 bytes to the right of [ 28.084385] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.084770] [ 28.084877] The buggy address belongs to the physical page: [ 28.085120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.085465] flags: 0x200000000000000(node=0|zone=2) [ 28.085706] page_type: f5(slab) [ 28.085891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.086205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.086452] page dumped because: kasan: bad access detected [ 28.086617] [ 28.086705] Memory state around the buggy address: [ 28.087101] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.087418] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.087696] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.088014] ^ [ 28.088212] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.088494] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.088804] ================================================================== [ 27.333173] ================================================================== [ 27.333745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 27.334192] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.334425] [ 27.334513] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.334567] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.334582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.334607] Call Trace: [ 27.334628] <TASK> [ 27.334648] dump_stack_lvl+0x73/0xb0 [ 27.334694] print_report+0xd1/0x610 [ 27.334718] ? __virt_addr_valid+0x1db/0x2d0 [ 27.334743] ? kasan_atomics_helper+0xe78/0x5450 [ 27.334765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.334791] ? kasan_atomics_helper+0xe78/0x5450 [ 27.334812] kasan_report+0x141/0x180 [ 27.334835] ? kasan_atomics_helper+0xe78/0x5450 [ 27.335059] kasan_check_range+0x10c/0x1c0 [ 27.335095] __kasan_check_write+0x18/0x20 [ 27.335120] kasan_atomics_helper+0xe78/0x5450 [ 27.335143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.335278] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.335306] ? pick_task_fair+0xce/0x340 [ 27.335333] ? kasan_atomics+0x152/0x310 [ 27.335359] kasan_atomics+0x1dc/0x310 [ 27.335382] ? __pfx_kasan_atomics+0x10/0x10 [ 27.335407] ? __pfx_read_tsc+0x10/0x10 [ 27.335429] ? ktime_get_ts64+0x86/0x230 [ 27.335455] kunit_try_run_case+0x1a5/0x480 [ 27.335478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.335500] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.335525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.335549] ? __kthread_parkme+0x82/0x180 [ 27.335571] ? preempt_count_sub+0x50/0x80 [ 27.335596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.335618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.335644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.335679] kthread+0x337/0x6f0 [ 27.335701] ? trace_preempt_on+0x20/0xc0 [ 27.335725] ? __pfx_kthread+0x10/0x10 [ 27.335755] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.335777] ? calculate_sigpending+0x7b/0xa0 [ 27.335803] ? __pfx_kthread+0x10/0x10 [ 27.335825] ret_from_fork+0x116/0x1d0 [ 27.335845] ? __pfx_kthread+0x10/0x10 [ 27.335866] ret_from_fork_asm+0x1a/0x30 [ 27.335898] </TASK> [ 27.335910] [ 27.346577] Allocated by task 314: [ 27.347045] kasan_save_stack+0x45/0x70 [ 27.347259] kasan_save_track+0x18/0x40 [ 27.347434] kasan_save_alloc_info+0x3b/0x50 [ 27.347624] __kasan_kmalloc+0xb7/0xc0 [ 27.347806] __kmalloc_cache_noprof+0x189/0x420 [ 27.348260] kasan_atomics+0x95/0x310 [ 27.348399] kunit_try_run_case+0x1a5/0x480 [ 27.348721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.349143] kthread+0x337/0x6f0 [ 27.349276] ret_from_fork+0x116/0x1d0 [ 27.349608] ret_from_fork_asm+0x1a/0x30 [ 27.349820] [ 27.350073] The buggy address belongs to the object at ffff888103eb9580 [ 27.350073] which belongs to the cache kmalloc-64 of size 64 [ 27.350613] The buggy address is located 0 bytes to the right of [ 27.350613] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.351439] [ 27.351535] The buggy address belongs to the physical page: [ 27.351769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.352333] flags: 0x200000000000000(node=0|zone=2) [ 27.352648] page_type: f5(slab) [ 27.352848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.353261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.353650] page dumped because: kasan: bad access detected [ 27.354050] [ 27.354132] Memory state around the buggy address: [ 27.354333] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.354642] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.355165] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.355467] ^ [ 27.355818] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.356218] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.356514] ================================================================== [ 27.814779] ================================================================== [ 27.815217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 27.815600] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.816307] [ 27.816437] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.816724] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.816755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.816783] Call Trace: [ 27.816815] <TASK> [ 27.816837] dump_stack_lvl+0x73/0xb0 [ 27.816872] print_report+0xd1/0x610 [ 27.816896] ? __virt_addr_valid+0x1db/0x2d0 [ 27.816922] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.816946] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.816973] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.816996] kasan_report+0x141/0x180 [ 27.817019] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.817046] kasan_check_range+0x10c/0x1c0 [ 27.817070] __kasan_check_write+0x18/0x20 [ 27.817093] kasan_atomics_helper+0x18b1/0x5450 [ 27.817116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.817139] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.817164] ? pick_task_fair+0xce/0x340 [ 27.817190] ? kasan_atomics+0x152/0x310 [ 27.817216] kasan_atomics+0x1dc/0x310 [ 27.817239] ? __pfx_kasan_atomics+0x10/0x10 [ 27.817264] ? __pfx_read_tsc+0x10/0x10 [ 27.817287] ? ktime_get_ts64+0x86/0x230 [ 27.817313] kunit_try_run_case+0x1a5/0x480 [ 27.817336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.817357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.817382] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.817406] ? __kthread_parkme+0x82/0x180 [ 27.817429] ? preempt_count_sub+0x50/0x80 [ 27.817454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.817476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.817503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.817529] kthread+0x337/0x6f0 [ 27.817550] ? trace_preempt_on+0x20/0xc0 [ 27.817574] ? __pfx_kthread+0x10/0x10 [ 27.817597] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.817619] ? calculate_sigpending+0x7b/0xa0 [ 27.817644] ? __pfx_kthread+0x10/0x10 [ 27.817680] ret_from_fork+0x116/0x1d0 [ 27.817700] ? __pfx_kthread+0x10/0x10 [ 27.817722] ret_from_fork_asm+0x1a/0x30 [ 27.817762] </TASK> [ 27.817775] [ 27.829408] Allocated by task 314: [ 27.829626] kasan_save_stack+0x45/0x70 [ 27.830158] kasan_save_track+0x18/0x40 [ 27.830320] kasan_save_alloc_info+0x3b/0x50 [ 27.830739] __kasan_kmalloc+0xb7/0xc0 [ 27.831124] __kmalloc_cache_noprof+0x189/0x420 [ 27.831419] kasan_atomics+0x95/0x310 [ 27.831581] kunit_try_run_case+0x1a5/0x480 [ 27.832006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.832349] kthread+0x337/0x6f0 [ 27.832615] ret_from_fork+0x116/0x1d0 [ 27.832980] ret_from_fork_asm+0x1a/0x30 [ 27.833265] [ 27.833368] The buggy address belongs to the object at ffff888103eb9580 [ 27.833368] which belongs to the cache kmalloc-64 of size 64 [ 27.834136] The buggy address is located 0 bytes to the right of [ 27.834136] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.834812] [ 27.835077] The buggy address belongs to the physical page: [ 27.835413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.835875] flags: 0x200000000000000(node=0|zone=2) [ 27.836195] page_type: f5(slab) [ 27.836378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.836910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.837342] page dumped because: kasan: bad access detected [ 27.837589] [ 27.837675] Memory state around the buggy address: [ 27.837930] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.838190] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.838511] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.838829] ^ [ 27.839099] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.839402] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.839752] ================================================================== [ 28.241197] ================================================================== [ 28.241470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 28.241789] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.242945] [ 28.243155] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.243215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.243230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.243348] Call Trace: [ 28.243369] <TASK> [ 28.243390] dump_stack_lvl+0x73/0xb0 [ 28.243428] print_report+0xd1/0x610 [ 28.243452] ? __virt_addr_valid+0x1db/0x2d0 [ 28.243477] ? kasan_atomics_helper+0x5115/0x5450 [ 28.243498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.243525] ? kasan_atomics_helper+0x5115/0x5450 [ 28.243548] kasan_report+0x141/0x180 [ 28.243570] ? kasan_atomics_helper+0x5115/0x5450 [ 28.243595] __asan_report_load8_noabort+0x18/0x20 [ 28.243620] kasan_atomics_helper+0x5115/0x5450 [ 28.243644] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.243681] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.243705] ? pick_task_fair+0xce/0x340 [ 28.243733] ? kasan_atomics+0x152/0x310 [ 28.243771] kasan_atomics+0x1dc/0x310 [ 28.243795] ? __pfx_kasan_atomics+0x10/0x10 [ 28.243819] ? __pfx_read_tsc+0x10/0x10 [ 28.243842] ? ktime_get_ts64+0x86/0x230 [ 28.243867] kunit_try_run_case+0x1a5/0x480 [ 28.243891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.243913] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.243939] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.243964] ? __kthread_parkme+0x82/0x180 [ 28.243987] ? preempt_count_sub+0x50/0x80 [ 28.244012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.244034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.244060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.244086] kthread+0x337/0x6f0 [ 28.244108] ? trace_preempt_on+0x20/0xc0 [ 28.244132] ? __pfx_kthread+0x10/0x10 [ 28.244154] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.244177] ? calculate_sigpending+0x7b/0xa0 [ 28.244202] ? __pfx_kthread+0x10/0x10 [ 28.244226] ret_from_fork+0x116/0x1d0 [ 28.244246] ? __pfx_kthread+0x10/0x10 [ 28.244267] ret_from_fork_asm+0x1a/0x30 [ 28.244300] </TASK> [ 28.244312] [ 28.254649] Allocated by task 314: [ 28.254827] kasan_save_stack+0x45/0x70 [ 28.255041] kasan_save_track+0x18/0x40 [ 28.255214] kasan_save_alloc_info+0x3b/0x50 [ 28.255399] __kasan_kmalloc+0xb7/0xc0 [ 28.255562] __kmalloc_cache_noprof+0x189/0x420 [ 28.256166] kasan_atomics+0x95/0x310 [ 28.256346] kunit_try_run_case+0x1a5/0x480 [ 28.256681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.256993] kthread+0x337/0x6f0 [ 28.257300] ret_from_fork+0x116/0x1d0 [ 28.257560] ret_from_fork_asm+0x1a/0x30 [ 28.257742] [ 28.258026] The buggy address belongs to the object at ffff888103eb9580 [ 28.258026] which belongs to the cache kmalloc-64 of size 64 [ 28.258570] The buggy address is located 0 bytes to the right of [ 28.258570] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.259390] [ 28.259497] The buggy address belongs to the physical page: [ 28.259940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.260374] flags: 0x200000000000000(node=0|zone=2) [ 28.260606] page_type: f5(slab) [ 28.260771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.261328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.261734] page dumped because: kasan: bad access detected [ 28.261992] [ 28.262232] Memory state around the buggy address: [ 28.262433] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.262950] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.263303] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.263620] ^ [ 28.264027] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.264404] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.264818] ================================================================== [ 27.636480] ================================================================== [ 27.637295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 27.639018] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.640020] [ 27.640848] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.640918] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.640934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.640960] Call Trace: [ 27.640983] <TASK> [ 27.641005] dump_stack_lvl+0x73/0xb0 [ 27.641048] print_report+0xd1/0x610 [ 27.641073] ? __virt_addr_valid+0x1db/0x2d0 [ 27.641098] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.641119] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.641146] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.641168] kasan_report+0x141/0x180 [ 27.641191] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.641217] __asan_report_store8_noabort+0x1b/0x30 [ 27.641241] kasan_atomics_helper+0x50d4/0x5450 [ 27.641265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.641287] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.641311] ? pick_task_fair+0xce/0x340 [ 27.641337] ? kasan_atomics+0x152/0x310 [ 27.641364] kasan_atomics+0x1dc/0x310 [ 27.641386] ? __pfx_kasan_atomics+0x10/0x10 [ 27.641410] ? __pfx_read_tsc+0x10/0x10 [ 27.641433] ? ktime_get_ts64+0x86/0x230 [ 27.641459] kunit_try_run_case+0x1a5/0x480 [ 27.641483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.641505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.641531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.641556] ? __kthread_parkme+0x82/0x180 [ 27.641579] ? preempt_count_sub+0x50/0x80 [ 27.641604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.641626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.641666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.641692] kthread+0x337/0x6f0 [ 27.641714] ? trace_preempt_on+0x20/0xc0 [ 27.641755] ? __pfx_kthread+0x10/0x10 [ 27.641777] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.641800] ? calculate_sigpending+0x7b/0xa0 [ 27.641825] ? __pfx_kthread+0x10/0x10 [ 27.641848] ret_from_fork+0x116/0x1d0 [ 27.641868] ? __pfx_kthread+0x10/0x10 [ 27.641890] ret_from_fork_asm+0x1a/0x30 [ 27.641923] </TASK> [ 27.641936] [ 27.652280] Allocated by task 314: [ 27.652664] kasan_save_stack+0x45/0x70 [ 27.652886] kasan_save_track+0x18/0x40 [ 27.653069] kasan_save_alloc_info+0x3b/0x50 [ 27.653274] __kasan_kmalloc+0xb7/0xc0 [ 27.653459] __kmalloc_cache_noprof+0x189/0x420 [ 27.653648] kasan_atomics+0x95/0x310 [ 27.653877] kunit_try_run_case+0x1a5/0x480 [ 27.654489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.654806] kthread+0x337/0x6f0 [ 27.655005] ret_from_fork+0x116/0x1d0 [ 27.655307] ret_from_fork_asm+0x1a/0x30 [ 27.655600] [ 27.655696] The buggy address belongs to the object at ffff888103eb9580 [ 27.655696] which belongs to the cache kmalloc-64 of size 64 [ 27.656530] The buggy address is located 0 bytes to the right of [ 27.656530] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.657254] [ 27.657372] The buggy address belongs to the physical page: [ 27.657788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.658221] flags: 0x200000000000000(node=0|zone=2) [ 27.658512] page_type: f5(slab) [ 27.658720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.659110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.659520] page dumped because: kasan: bad access detected [ 27.659734] [ 27.659884] Memory state around the buggy address: [ 27.660099] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.660574] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.661006] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.661383] ^ [ 27.661568] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.661964] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.662301] ================================================================== [ 27.102539] ================================================================== [ 27.103290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 27.103692] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.104350] [ 27.104552] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.104610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.104626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.104663] Call Trace: [ 27.104695] <TASK> [ 27.104716] dump_stack_lvl+0x73/0xb0 [ 27.104750] print_report+0xd1/0x610 [ 27.104786] ? __virt_addr_valid+0x1db/0x2d0 [ 27.104821] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.104842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.104868] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.104899] kasan_report+0x141/0x180 [ 27.104922] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.104948] kasan_check_range+0x10c/0x1c0 [ 27.104982] __kasan_check_write+0x18/0x20 [ 27.105257] kasan_atomics_helper+0x8f9/0x5450 [ 27.105282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.105307] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.105332] ? pick_task_fair+0xce/0x340 [ 27.105360] ? kasan_atomics+0x152/0x310 [ 27.105387] kasan_atomics+0x1dc/0x310 [ 27.105410] ? __pfx_kasan_atomics+0x10/0x10 [ 27.105435] ? __pfx_read_tsc+0x10/0x10 [ 27.105457] ? ktime_get_ts64+0x86/0x230 [ 27.105483] kunit_try_run_case+0x1a5/0x480 [ 27.105507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.105529] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.105554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.105579] ? __kthread_parkme+0x82/0x180 [ 27.105602] ? preempt_count_sub+0x50/0x80 [ 27.105627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.105650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.105693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.105720] kthread+0x337/0x6f0 [ 27.105741] ? trace_preempt_on+0x20/0xc0 [ 27.105766] ? __pfx_kthread+0x10/0x10 [ 27.105788] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.105811] ? calculate_sigpending+0x7b/0xa0 [ 27.105837] ? __pfx_kthread+0x10/0x10 [ 27.105860] ret_from_fork+0x116/0x1d0 [ 27.105881] ? __pfx_kthread+0x10/0x10 [ 27.105902] ret_from_fork_asm+0x1a/0x30 [ 27.105936] </TASK> [ 27.105948] [ 27.117031] Allocated by task 314: [ 27.118580] kasan_save_stack+0x45/0x70 [ 27.119287] kasan_save_track+0x18/0x40 [ 27.119905] kasan_save_alloc_info+0x3b/0x50 [ 27.120481] __kasan_kmalloc+0xb7/0xc0 [ 27.120628] __kmalloc_cache_noprof+0x189/0x420 [ 27.121535] kasan_atomics+0x95/0x310 [ 27.122411] kunit_try_run_case+0x1a5/0x480 [ 27.123033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.123404] kthread+0x337/0x6f0 [ 27.123691] ret_from_fork+0x116/0x1d0 [ 27.124151] ret_from_fork_asm+0x1a/0x30 [ 27.124595] [ 27.124713] The buggy address belongs to the object at ffff888103eb9580 [ 27.124713] which belongs to the cache kmalloc-64 of size 64 [ 27.125098] The buggy address is located 0 bytes to the right of [ 27.125098] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.125469] [ 27.125538] The buggy address belongs to the physical page: [ 27.125818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.126982] flags: 0x200000000000000(node=0|zone=2) [ 27.127424] page_type: f5(slab) [ 27.127731] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.128438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.129306] page dumped because: kasan: bad access detected [ 27.129862] [ 27.130023] Memory state around the buggy address: [ 27.130500] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.131220] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.131866] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.132495] ^ [ 27.132946] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.133607] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.134152] ================================================================== [ 26.835906] ================================================================== [ 26.836229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 26.836910] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.837382] [ 26.837640] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.837713] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.837729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.837757] Call Trace: [ 26.837778] <TASK> [ 26.837801] dump_stack_lvl+0x73/0xb0 [ 26.837834] print_report+0xd1/0x610 [ 26.837858] ? __virt_addr_valid+0x1db/0x2d0 [ 26.837885] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.837907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.837933] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.838080] kasan_report+0x141/0x180 [ 26.838104] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.838131] __asan_report_store4_noabort+0x1b/0x30 [ 26.838157] kasan_atomics_helper+0x4b6e/0x5450 [ 26.838180] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.838203] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.838227] ? pick_task_fair+0xce/0x340 [ 26.838254] ? kasan_atomics+0x152/0x310 [ 26.838281] kasan_atomics+0x1dc/0x310 [ 26.838305] ? __pfx_kasan_atomics+0x10/0x10 [ 26.838329] ? __pfx_read_tsc+0x10/0x10 [ 26.838352] ? ktime_get_ts64+0x86/0x230 [ 26.838378] kunit_try_run_case+0x1a5/0x480 [ 26.838402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.838424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.838451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.838476] ? __kthread_parkme+0x82/0x180 [ 26.838499] ? preempt_count_sub+0x50/0x80 [ 26.838524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.838547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.838574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.838602] kthread+0x337/0x6f0 [ 26.838624] ? trace_preempt_on+0x20/0xc0 [ 26.838648] ? __pfx_kthread+0x10/0x10 [ 26.838681] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.838704] ? calculate_sigpending+0x7b/0xa0 [ 26.838729] ? __pfx_kthread+0x10/0x10 [ 26.838761] ret_from_fork+0x116/0x1d0 [ 26.838782] ? __pfx_kthread+0x10/0x10 [ 26.838804] ret_from_fork_asm+0x1a/0x30 [ 26.838837] </TASK> [ 26.838849] [ 26.849946] Allocated by task 314: [ 26.850181] kasan_save_stack+0x45/0x70 [ 26.850379] kasan_save_track+0x18/0x40 [ 26.850567] kasan_save_alloc_info+0x3b/0x50 [ 26.851478] __kasan_kmalloc+0xb7/0xc0 [ 26.851642] __kmalloc_cache_noprof+0x189/0x420 [ 26.852366] kasan_atomics+0x95/0x310 [ 26.852720] kunit_try_run_case+0x1a5/0x480 [ 26.853718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.854217] kthread+0x337/0x6f0 [ 26.854356] ret_from_fork+0x116/0x1d0 [ 26.854488] ret_from_fork_asm+0x1a/0x30 [ 26.854625] [ 26.855228] The buggy address belongs to the object at ffff888103eb9580 [ 26.855228] which belongs to the cache kmalloc-64 of size 64 [ 26.857080] The buggy address is located 0 bytes to the right of [ 26.857080] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.858093] [ 26.858215] The buggy address belongs to the physical page: [ 26.858451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.859410] flags: 0x200000000000000(node=0|zone=2) [ 26.859609] page_type: f5(slab) [ 26.860040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.860475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.860874] page dumped because: kasan: bad access detected [ 26.861133] [ 26.861428] Memory state around the buggy address: [ 26.861648] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.862237] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.862514] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.863104] ^ [ 26.863323] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.863606] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.863941] ================================================================== [ 26.810678] ================================================================== [ 26.811276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 26.811613] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.812089] [ 26.812190] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.812247] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.812262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.812289] Call Trace: [ 26.812310] <TASK> [ 26.812332] dump_stack_lvl+0x73/0xb0 [ 26.812547] print_report+0xd1/0x610 [ 26.812577] ? __virt_addr_valid+0x1db/0x2d0 [ 26.812603] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.812625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.812652] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.812686] kasan_report+0x141/0x180 [ 26.812708] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.812735] __asan_report_load4_noabort+0x18/0x20 [ 26.812772] kasan_atomics_helper+0x4b88/0x5450 [ 26.812794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.812817] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.812842] ? pick_task_fair+0xce/0x340 [ 26.812868] ? kasan_atomics+0x152/0x310 [ 26.812895] kasan_atomics+0x1dc/0x310 [ 26.812918] ? __pfx_kasan_atomics+0x10/0x10 [ 26.812943] ? __pfx_read_tsc+0x10/0x10 [ 26.812974] ? ktime_get_ts64+0x86/0x230 [ 26.813000] kunit_try_run_case+0x1a5/0x480 [ 26.813024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.813046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.813073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.813098] ? __kthread_parkme+0x82/0x180 [ 26.813120] ? preempt_count_sub+0x50/0x80 [ 26.813145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.813169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.813195] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.813221] kthread+0x337/0x6f0 [ 26.813242] ? trace_preempt_on+0x20/0xc0 [ 26.813267] ? __pfx_kthread+0x10/0x10 [ 26.813289] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.813312] ? calculate_sigpending+0x7b/0xa0 [ 26.813338] ? __pfx_kthread+0x10/0x10 [ 26.813360] ret_from_fork+0x116/0x1d0 [ 26.813380] ? __pfx_kthread+0x10/0x10 [ 26.813402] ret_from_fork_asm+0x1a/0x30 [ 26.813434] </TASK> [ 26.813446] [ 26.824206] Allocated by task 314: [ 26.824386] kasan_save_stack+0x45/0x70 [ 26.824599] kasan_save_track+0x18/0x40 [ 26.825120] kasan_save_alloc_info+0x3b/0x50 [ 26.825390] __kasan_kmalloc+0xb7/0xc0 [ 26.825571] __kmalloc_cache_noprof+0x189/0x420 [ 26.825928] kasan_atomics+0x95/0x310 [ 26.826309] kunit_try_run_case+0x1a5/0x480 [ 26.826521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.826792] kthread+0x337/0x6f0 [ 26.826946] ret_from_fork+0x116/0x1d0 [ 26.827517] ret_from_fork_asm+0x1a/0x30 [ 26.827692] [ 26.827879] The buggy address belongs to the object at ffff888103eb9580 [ 26.827879] which belongs to the cache kmalloc-64 of size 64 [ 26.828630] The buggy address is located 0 bytes to the right of [ 26.828630] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.829468] [ 26.829579] The buggy address belongs to the physical page: [ 26.830091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.830403] flags: 0x200000000000000(node=0|zone=2) [ 26.830748] page_type: f5(slab) [ 26.830908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.831716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.831983] page dumped because: kasan: bad access detected [ 26.832318] [ 26.832394] Memory state around the buggy address: [ 26.832616] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.832963] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.833262] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.833550] ^ [ 26.834317] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.834578] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.835175] ================================================================== [ 27.946273] ================================================================== [ 27.946586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 27.946972] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.947236] [ 27.947323] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.947377] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.947392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.947418] Call Trace: [ 27.947439] <TASK> [ 27.947461] dump_stack_lvl+0x73/0xb0 [ 27.947492] print_report+0xd1/0x610 [ 27.947516] ? __virt_addr_valid+0x1db/0x2d0 [ 27.947541] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.947563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.947589] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.947611] kasan_report+0x141/0x180 [ 27.947634] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.947670] __asan_report_load8_noabort+0x18/0x20 [ 27.947695] kasan_atomics_helper+0x4f30/0x5450 [ 27.947717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.947762] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.947786] ? pick_task_fair+0xce/0x340 [ 27.947812] ? kasan_atomics+0x152/0x310 [ 27.947839] kasan_atomics+0x1dc/0x310 [ 27.947862] ? __pfx_kasan_atomics+0x10/0x10 [ 27.947887] ? __pfx_read_tsc+0x10/0x10 [ 27.947909] ? ktime_get_ts64+0x86/0x230 [ 27.947935] kunit_try_run_case+0x1a5/0x480 [ 27.947960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.947982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.948008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.948032] ? __kthread_parkme+0x82/0x180 [ 27.948055] ? preempt_count_sub+0x50/0x80 [ 27.948079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.948102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.948129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.948155] kthread+0x337/0x6f0 [ 27.948176] ? trace_preempt_on+0x20/0xc0 [ 27.948201] ? __pfx_kthread+0x10/0x10 [ 27.948223] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.948246] ? calculate_sigpending+0x7b/0xa0 [ 27.948270] ? __pfx_kthread+0x10/0x10 [ 27.948293] ret_from_fork+0x116/0x1d0 [ 27.948312] ? __pfx_kthread+0x10/0x10 [ 27.948333] ret_from_fork_asm+0x1a/0x30 [ 27.948366] </TASK> [ 27.948378] [ 27.955349] Allocated by task 314: [ 27.955540] kasan_save_stack+0x45/0x70 [ 27.955785] kasan_save_track+0x18/0x40 [ 27.955947] kasan_save_alloc_info+0x3b/0x50 [ 27.956154] __kasan_kmalloc+0xb7/0xc0 [ 27.956322] __kmalloc_cache_noprof+0x189/0x420 [ 27.956517] kasan_atomics+0x95/0x310 [ 27.956683] kunit_try_run_case+0x1a5/0x480 [ 27.956882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.957123] kthread+0x337/0x6f0 [ 27.957261] ret_from_fork+0x116/0x1d0 [ 27.957439] ret_from_fork_asm+0x1a/0x30 [ 27.957599] [ 27.957701] The buggy address belongs to the object at ffff888103eb9580 [ 27.957701] which belongs to the cache kmalloc-64 of size 64 [ 27.958188] The buggy address is located 0 bytes to the right of [ 27.958188] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.958552] [ 27.958619] The buggy address belongs to the physical page: [ 27.958818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.959055] flags: 0x200000000000000(node=0|zone=2) [ 27.959215] page_type: f5(slab) [ 27.959334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.959559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.959897] page dumped because: kasan: bad access detected [ 27.960142] [ 27.960229] Memory state around the buggy address: [ 27.960445] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.960788] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.961104] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.961409] ^ [ 27.961630] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.961973] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.962230] ================================================================== [ 27.400744] ================================================================== [ 27.401157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 27.401574] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.401893] [ 27.402017] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.402079] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.402094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.402131] Call Trace: [ 27.402153] <TASK> [ 27.402176] dump_stack_lvl+0x73/0xb0 [ 27.402222] print_report+0xd1/0x610 [ 27.402246] ? __virt_addr_valid+0x1db/0x2d0 [ 27.402271] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.402292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.402319] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.402342] kasan_report+0x141/0x180 [ 27.402365] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.402392] __asan_report_load4_noabort+0x18/0x20 [ 27.402417] kasan_atomics_helper+0x4a36/0x5450 [ 27.402440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.402463] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.402488] ? pick_task_fair+0xce/0x340 [ 27.402514] ? kasan_atomics+0x152/0x310 [ 27.402550] kasan_atomics+0x1dc/0x310 [ 27.402573] ? __pfx_kasan_atomics+0x10/0x10 [ 27.402598] ? __pfx_read_tsc+0x10/0x10 [ 27.402631] ? ktime_get_ts64+0x86/0x230 [ 27.402666] kunit_try_run_case+0x1a5/0x480 [ 27.402691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.402711] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.402757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.402782] ? __kthread_parkme+0x82/0x180 [ 27.402805] ? preempt_count_sub+0x50/0x80 [ 27.402830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.402853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.402879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.402906] kthread+0x337/0x6f0 [ 27.402927] ? trace_preempt_on+0x20/0xc0 [ 27.402951] ? __pfx_kthread+0x10/0x10 [ 27.402973] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.402995] ? calculate_sigpending+0x7b/0xa0 [ 27.403021] ? __pfx_kthread+0x10/0x10 [ 27.403043] ret_from_fork+0x116/0x1d0 [ 27.403064] ? __pfx_kthread+0x10/0x10 [ 27.403088] ret_from_fork_asm+0x1a/0x30 [ 27.403120] </TASK> [ 27.403132] [ 27.410452] Allocated by task 314: [ 27.410613] kasan_save_stack+0x45/0x70 [ 27.410884] kasan_save_track+0x18/0x40 [ 27.411077] kasan_save_alloc_info+0x3b/0x50 [ 27.411327] __kasan_kmalloc+0xb7/0xc0 [ 27.411548] __kmalloc_cache_noprof+0x189/0x420 [ 27.411814] kasan_atomics+0x95/0x310 [ 27.412012] kunit_try_run_case+0x1a5/0x480 [ 27.412238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.412489] kthread+0x337/0x6f0 [ 27.412672] ret_from_fork+0x116/0x1d0 [ 27.412826] ret_from_fork_asm+0x1a/0x30 [ 27.412982] [ 27.413073] The buggy address belongs to the object at ffff888103eb9580 [ 27.413073] which belongs to the cache kmalloc-64 of size 64 [ 27.413619] The buggy address is located 0 bytes to the right of [ 27.413619] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.414150] [ 27.414223] The buggy address belongs to the physical page: [ 27.414487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.414847] flags: 0x200000000000000(node=0|zone=2) [ 27.415080] page_type: f5(slab) [ 27.415268] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.415592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.415919] page dumped because: kasan: bad access detected [ 27.416168] [ 27.416232] Memory state around the buggy address: [ 27.416384] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.416689] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.417060] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.417299] ^ [ 27.417544] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.417880] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.418153] ================================================================== [ 27.053636] ================================================================== [ 27.054253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 27.054605] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.054983] [ 27.055187] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.055258] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.055272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.055298] Call Trace: [ 27.055319] <TASK> [ 27.055352] dump_stack_lvl+0x73/0xb0 [ 27.055385] print_report+0xd1/0x610 [ 27.055409] ? __virt_addr_valid+0x1db/0x2d0 [ 27.055444] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.055465] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.055495] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.055529] kasan_report+0x141/0x180 [ 27.055552] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.055579] kasan_check_range+0x10c/0x1c0 [ 27.055603] __kasan_check_write+0x18/0x20 [ 27.055628] kasan_atomics_helper+0x7c7/0x5450 [ 27.055651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.055685] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.055709] ? pick_task_fair+0xce/0x340 [ 27.055739] ? kasan_atomics+0x152/0x310 [ 27.055767] kasan_atomics+0x1dc/0x310 [ 27.055792] ? __pfx_kasan_atomics+0x10/0x10 [ 27.055817] ? __pfx_read_tsc+0x10/0x10 [ 27.055840] ? ktime_get_ts64+0x86/0x230 [ 27.055868] kunit_try_run_case+0x1a5/0x480 [ 27.055894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.055915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.055942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.055967] ? __kthread_parkme+0x82/0x180 [ 27.055990] ? preempt_count_sub+0x50/0x80 [ 27.056016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.056049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.056076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.056103] kthread+0x337/0x6f0 [ 27.056135] ? trace_preempt_on+0x20/0xc0 [ 27.056160] ? __pfx_kthread+0x10/0x10 [ 27.056182] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.056205] ? calculate_sigpending+0x7b/0xa0 [ 27.056230] ? __pfx_kthread+0x10/0x10 [ 27.056253] ret_from_fork+0x116/0x1d0 [ 27.056273] ? __pfx_kthread+0x10/0x10 [ 27.056295] ret_from_fork_asm+0x1a/0x30 [ 27.056327] </TASK> [ 27.056524] [ 27.064897] Allocated by task 314: [ 27.065115] kasan_save_stack+0x45/0x70 [ 27.065332] kasan_save_track+0x18/0x40 [ 27.065520] kasan_save_alloc_info+0x3b/0x50 [ 27.066096] __kasan_kmalloc+0xb7/0xc0 [ 27.066319] __kmalloc_cache_noprof+0x189/0x420 [ 27.066481] kasan_atomics+0x95/0x310 [ 27.066693] kunit_try_run_case+0x1a5/0x480 [ 27.066897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.067115] kthread+0x337/0x6f0 [ 27.067336] ret_from_fork+0x116/0x1d0 [ 27.067570] ret_from_fork_asm+0x1a/0x30 [ 27.067719] [ 27.067906] The buggy address belongs to the object at ffff888103eb9580 [ 27.067906] which belongs to the cache kmalloc-64 of size 64 [ 27.068413] The buggy address is located 0 bytes to the right of [ 27.068413] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.068882] [ 27.068979] The buggy address belongs to the physical page: [ 27.069257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.070044] flags: 0x200000000000000(node=0|zone=2) [ 27.070347] page_type: f5(slab) [ 27.070523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.070771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.071305] page dumped because: kasan: bad access detected [ 27.071635] [ 27.071736] Memory state around the buggy address: [ 27.071936] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.072162] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.072544] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.072928] ^ [ 27.073337] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.073688] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.074201] ================================================================== [ 26.865756] ================================================================== [ 26.866261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 26.866510] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.866992] [ 26.867265] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.867322] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.867337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.867363] Call Trace: [ 26.867384] <TASK> [ 26.867408] dump_stack_lvl+0x73/0xb0 [ 26.867443] print_report+0xd1/0x610 [ 26.867467] ? __virt_addr_valid+0x1db/0x2d0 [ 26.867505] ? kasan_atomics_helper+0x3df/0x5450 [ 26.867528] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.867554] ? kasan_atomics_helper+0x3df/0x5450 [ 26.867588] kasan_report+0x141/0x180 [ 26.867610] ? kasan_atomics_helper+0x3df/0x5450 [ 26.867637] kasan_check_range+0x10c/0x1c0 [ 26.867671] __kasan_check_read+0x15/0x20 [ 26.867695] kasan_atomics_helper+0x3df/0x5450 [ 26.867717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.867759] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.867783] ? pick_task_fair+0xce/0x340 [ 26.867809] ? kasan_atomics+0x152/0x310 [ 26.867836] kasan_atomics+0x1dc/0x310 [ 26.867860] ? __pfx_kasan_atomics+0x10/0x10 [ 26.867885] ? __pfx_read_tsc+0x10/0x10 [ 26.867908] ? ktime_get_ts64+0x86/0x230 [ 26.867959] kunit_try_run_case+0x1a5/0x480 [ 26.867985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.868008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.868035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.868061] ? __kthread_parkme+0x82/0x180 [ 26.868084] ? preempt_count_sub+0x50/0x80 [ 26.868110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.868133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.868160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.868186] kthread+0x337/0x6f0 [ 26.868207] ? trace_preempt_on+0x20/0xc0 [ 26.868232] ? __pfx_kthread+0x10/0x10 [ 26.868254] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.868277] ? calculate_sigpending+0x7b/0xa0 [ 26.868302] ? __pfx_kthread+0x10/0x10 [ 26.868326] ret_from_fork+0x116/0x1d0 [ 26.868347] ? __pfx_kthread+0x10/0x10 [ 26.868369] ret_from_fork_asm+0x1a/0x30 [ 26.868401] </TASK> [ 26.868414] [ 26.877992] Allocated by task 314: [ 26.878221] kasan_save_stack+0x45/0x70 [ 26.878440] kasan_save_track+0x18/0x40 [ 26.878626] kasan_save_alloc_info+0x3b/0x50 [ 26.878867] __kasan_kmalloc+0xb7/0xc0 [ 26.879125] __kmalloc_cache_noprof+0x189/0x420 [ 26.879299] kasan_atomics+0x95/0x310 [ 26.879477] kunit_try_run_case+0x1a5/0x480 [ 26.879689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.879913] kthread+0x337/0x6f0 [ 26.880051] ret_from_fork+0x116/0x1d0 [ 26.880227] ret_from_fork_asm+0x1a/0x30 [ 26.880400] [ 26.880477] The buggy address belongs to the object at ffff888103eb9580 [ 26.880477] which belongs to the cache kmalloc-64 of size 64 [ 26.880970] The buggy address is located 0 bytes to the right of [ 26.880970] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.881777] [ 26.881881] The buggy address belongs to the physical page: [ 26.882175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.882521] flags: 0x200000000000000(node=0|zone=2) [ 26.882798] page_type: f5(slab) [ 26.882923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.883307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.883594] page dumped because: kasan: bad access detected [ 26.883861] [ 26.884021] Memory state around the buggy address: [ 26.884228] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.884513] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.884733] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.885192] ^ [ 26.885427] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.885759] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.886172] ================================================================== [ 27.266172] ================================================================== [ 27.267090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 27.267416] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.267743] [ 27.267868] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.267933] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.267959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.267986] Call Trace: [ 27.268006] <TASK> [ 27.268027] dump_stack_lvl+0x73/0xb0 [ 27.268061] print_report+0xd1/0x610 [ 27.268085] ? __virt_addr_valid+0x1db/0x2d0 [ 27.268131] ? kasan_atomics_helper+0x4a84/0x5450 [ 27.268232] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.268268] ? kasan_atomics_helper+0x4a84/0x5450 [ 27.268290] kasan_report+0x141/0x180 [ 27.268315] ? kasan_atomics_helper+0x4a84/0x5450 [ 27.268352] __asan_report_load4_noabort+0x18/0x20 [ 27.268386] kasan_atomics_helper+0x4a84/0x5450 [ 27.268409] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.268432] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.268466] ? pick_task_fair+0xce/0x340 [ 27.268493] ? kasan_atomics+0x152/0x310 [ 27.268520] kasan_atomics+0x1dc/0x310 [ 27.268543] ? __pfx_kasan_atomics+0x10/0x10 [ 27.268567] ? __pfx_read_tsc+0x10/0x10 [ 27.268590] ? ktime_get_ts64+0x86/0x230 [ 27.268616] kunit_try_run_case+0x1a5/0x480 [ 27.268640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.268671] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.268698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.268722] ? __kthread_parkme+0x82/0x180 [ 27.268745] ? preempt_count_sub+0x50/0x80 [ 27.268780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.268803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.268830] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.268856] kthread+0x337/0x6f0 [ 27.268879] ? trace_preempt_on+0x20/0xc0 [ 27.268905] ? __pfx_kthread+0x10/0x10 [ 27.268927] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.268962] ? calculate_sigpending+0x7b/0xa0 [ 27.268987] ? __pfx_kthread+0x10/0x10 [ 27.269010] ret_from_fork+0x116/0x1d0 [ 27.269030] ? __pfx_kthread+0x10/0x10 [ 27.269052] ret_from_fork_asm+0x1a/0x30 [ 27.269084] </TASK> [ 27.269098] [ 27.278364] Allocated by task 314: [ 27.278602] kasan_save_stack+0x45/0x70 [ 27.278853] kasan_save_track+0x18/0x40 [ 27.278983] kasan_save_alloc_info+0x3b/0x50 [ 27.279126] __kasan_kmalloc+0xb7/0xc0 [ 27.279280] __kmalloc_cache_noprof+0x189/0x420 [ 27.279496] kasan_atomics+0x95/0x310 [ 27.279769] kunit_try_run_case+0x1a5/0x480 [ 27.279990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.280165] kthread+0x337/0x6f0 [ 27.280283] ret_from_fork+0x116/0x1d0 [ 27.280468] ret_from_fork_asm+0x1a/0x30 [ 27.280671] [ 27.281197] The buggy address belongs to the object at ffff888103eb9580 [ 27.281197] which belongs to the cache kmalloc-64 of size 64 [ 27.281760] The buggy address is located 0 bytes to the right of [ 27.281760] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.282382] [ 27.282493] The buggy address belongs to the physical page: [ 27.282722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.283133] flags: 0x200000000000000(node=0|zone=2) [ 27.283367] page_type: f5(slab) [ 27.283557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.283905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.284512] page dumped because: kasan: bad access detected [ 27.284867] [ 27.284945] Memory state around the buggy address: [ 27.285214] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.285540] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.285868] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.286210] ^ [ 27.286359] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.286676] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.286993] ================================================================== [ 27.287499] ================================================================== [ 27.287936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 27.288630] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.289005] [ 27.289193] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.289252] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.289278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.289304] Call Trace: [ 27.289325] <TASK> [ 27.289358] dump_stack_lvl+0x73/0xb0 [ 27.289394] print_report+0xd1/0x610 [ 27.289419] ? __virt_addr_valid+0x1db/0x2d0 [ 27.289444] ? kasan_atomics_helper+0xd47/0x5450 [ 27.289466] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.289492] ? kasan_atomics_helper+0xd47/0x5450 [ 27.289513] kasan_report+0x141/0x180 [ 27.289537] ? kasan_atomics_helper+0xd47/0x5450 [ 27.289563] kasan_check_range+0x10c/0x1c0 [ 27.289587] __kasan_check_write+0x18/0x20 [ 27.289619] kasan_atomics_helper+0xd47/0x5450 [ 27.289642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.289680] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.289705] ? pick_task_fair+0xce/0x340 [ 27.289732] ? kasan_atomics+0x152/0x310 [ 27.289759] kasan_atomics+0x1dc/0x310 [ 27.289782] ? __pfx_kasan_atomics+0x10/0x10 [ 27.289806] ? __pfx_read_tsc+0x10/0x10 [ 27.289828] ? ktime_get_ts64+0x86/0x230 [ 27.289854] kunit_try_run_case+0x1a5/0x480 [ 27.289890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.289911] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.289937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.290015] ? __kthread_parkme+0x82/0x180 [ 27.290045] ? preempt_count_sub+0x50/0x80 [ 27.290070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.290094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.290132] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.290158] kthread+0x337/0x6f0 [ 27.290191] ? trace_preempt_on+0x20/0xc0 [ 27.290225] ? __pfx_kthread+0x10/0x10 [ 27.290247] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.290281] ? calculate_sigpending+0x7b/0xa0 [ 27.290307] ? __pfx_kthread+0x10/0x10 [ 27.290330] ret_from_fork+0x116/0x1d0 [ 27.290350] ? __pfx_kthread+0x10/0x10 [ 27.290372] ret_from_fork_asm+0x1a/0x30 [ 27.290403] </TASK> [ 27.290416] [ 27.299140] Allocated by task 314: [ 27.299346] kasan_save_stack+0x45/0x70 [ 27.299558] kasan_save_track+0x18/0x40 [ 27.299850] kasan_save_alloc_info+0x3b/0x50 [ 27.300280] __kasan_kmalloc+0xb7/0xc0 [ 27.300509] __kmalloc_cache_noprof+0x189/0x420 [ 27.300715] kasan_atomics+0x95/0x310 [ 27.300888] kunit_try_run_case+0x1a5/0x480 [ 27.301291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.301524] kthread+0x337/0x6f0 [ 27.301726] ret_from_fork+0x116/0x1d0 [ 27.301879] ret_from_fork_asm+0x1a/0x30 [ 27.302177] [ 27.302247] The buggy address belongs to the object at ffff888103eb9580 [ 27.302247] which belongs to the cache kmalloc-64 of size 64 [ 27.302583] The buggy address is located 0 bytes to the right of [ 27.302583] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.303276] [ 27.303369] The buggy address belongs to the physical page: [ 27.303828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.304389] flags: 0x200000000000000(node=0|zone=2) [ 27.304559] page_type: f5(slab) [ 27.304745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.305351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.305573] page dumped because: kasan: bad access detected [ 27.305797] [ 27.305886] Memory state around the buggy address: [ 27.306141] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.306552] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.306991] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.307241] ^ [ 27.307389] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.307707] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.308428] ================================================================== [ 27.473113] ================================================================== [ 27.473662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 27.474013] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.474335] [ 27.474454] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.474521] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.474536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.474562] Call Trace: [ 27.474582] <TASK> [ 27.474603] dump_stack_lvl+0x73/0xb0 [ 27.474635] print_report+0xd1/0x610 [ 27.474668] ? __virt_addr_valid+0x1db/0x2d0 [ 27.474693] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.474715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.474763] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.474785] kasan_report+0x141/0x180 [ 27.474808] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.474844] __asan_report_load4_noabort+0x18/0x20 [ 27.474870] kasan_atomics_helper+0x4a02/0x5450 [ 27.474894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.474928] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.474953] ? pick_task_fair+0xce/0x340 [ 27.474980] ? kasan_atomics+0x152/0x310 [ 27.475016] kasan_atomics+0x1dc/0x310 [ 27.475040] ? __pfx_kasan_atomics+0x10/0x10 [ 27.475065] ? __pfx_read_tsc+0x10/0x10 [ 27.475098] ? ktime_get_ts64+0x86/0x230 [ 27.475124] kunit_try_run_case+0x1a5/0x480 [ 27.475150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.475184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.475212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.475237] ? __kthread_parkme+0x82/0x180 [ 27.475271] ? preempt_count_sub+0x50/0x80 [ 27.475298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.475330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.475356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.475383] kthread+0x337/0x6f0 [ 27.475415] ? trace_preempt_on+0x20/0xc0 [ 27.475440] ? __pfx_kthread+0x10/0x10 [ 27.475462] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.475494] ? calculate_sigpending+0x7b/0xa0 [ 27.475520] ? __pfx_kthread+0x10/0x10 [ 27.475542] ret_from_fork+0x116/0x1d0 [ 27.475574] ? __pfx_kthread+0x10/0x10 [ 27.475596] ret_from_fork_asm+0x1a/0x30 [ 27.475628] </TASK> [ 27.475640] [ 27.484864] Allocated by task 314: [ 27.485068] kasan_save_stack+0x45/0x70 [ 27.485290] kasan_save_track+0x18/0x40 [ 27.485464] kasan_save_alloc_info+0x3b/0x50 [ 27.485636] __kasan_kmalloc+0xb7/0xc0 [ 27.485858] __kmalloc_cache_noprof+0x189/0x420 [ 27.486030] kasan_atomics+0x95/0x310 [ 27.486213] kunit_try_run_case+0x1a5/0x480 [ 27.486419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.486601] kthread+0x337/0x6f0 [ 27.486746] ret_from_fork+0x116/0x1d0 [ 27.486877] ret_from_fork_asm+0x1a/0x30 [ 27.487011] [ 27.487076] The buggy address belongs to the object at ffff888103eb9580 [ 27.487076] which belongs to the cache kmalloc-64 of size 64 [ 27.487595] The buggy address is located 0 bytes to the right of [ 27.487595] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.488169] [ 27.488269] The buggy address belongs to the physical page: [ 27.488457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.488703] flags: 0x200000000000000(node=0|zone=2) [ 27.488884] page_type: f5(slab) [ 27.489056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.489406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.489767] page dumped because: kasan: bad access detected [ 27.490015] [ 27.490113] Memory state around the buggy address: [ 27.490306] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.490571] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.490879] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.491169] ^ [ 27.491355] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.491564] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.491908] ================================================================== [ 27.234463] ================================================================== [ 27.234773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 27.235068] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.236228] [ 27.236577] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.236650] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.236674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.236700] Call Trace: [ 27.236722] <TASK> [ 27.236744] dump_stack_lvl+0x73/0xb0 [ 27.236779] print_report+0xd1/0x610 [ 27.236804] ? __virt_addr_valid+0x1db/0x2d0 [ 27.236829] ? kasan_atomics_helper+0xc70/0x5450 [ 27.236851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.236877] ? kasan_atomics_helper+0xc70/0x5450 [ 27.236899] kasan_report+0x141/0x180 [ 27.236922] ? kasan_atomics_helper+0xc70/0x5450 [ 27.236958] kasan_check_range+0x10c/0x1c0 [ 27.236982] __kasan_check_write+0x18/0x20 [ 27.237006] kasan_atomics_helper+0xc70/0x5450 [ 27.237029] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.237052] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.237077] ? pick_task_fair+0xce/0x340 [ 27.237103] ? kasan_atomics+0x152/0x310 [ 27.237130] kasan_atomics+0x1dc/0x310 [ 27.237153] ? __pfx_kasan_atomics+0x10/0x10 [ 27.237178] ? __pfx_read_tsc+0x10/0x10 [ 27.237201] ? ktime_get_ts64+0x86/0x230 [ 27.237227] kunit_try_run_case+0x1a5/0x480 [ 27.237251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.237272] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.237298] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.237323] ? __kthread_parkme+0x82/0x180 [ 27.237345] ? preempt_count_sub+0x50/0x80 [ 27.237370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.237393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.237420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.237446] kthread+0x337/0x6f0 [ 27.237467] ? trace_preempt_on+0x20/0xc0 [ 27.237492] ? __pfx_kthread+0x10/0x10 [ 27.237514] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.237537] ? calculate_sigpending+0x7b/0xa0 [ 27.237562] ? __pfx_kthread+0x10/0x10 [ 27.237585] ret_from_fork+0x116/0x1d0 [ 27.237606] ? __pfx_kthread+0x10/0x10 [ 27.237627] ret_from_fork_asm+0x1a/0x30 [ 27.237669] </TASK> [ 27.237682] [ 27.253480] Allocated by task 314: [ 27.253853] kasan_save_stack+0x45/0x70 [ 27.254249] kasan_save_track+0x18/0x40 [ 27.254399] kasan_save_alloc_info+0x3b/0x50 [ 27.254853] __kasan_kmalloc+0xb7/0xc0 [ 27.255435] __kmalloc_cache_noprof+0x189/0x420 [ 27.255683] kasan_atomics+0x95/0x310 [ 27.255856] kunit_try_run_case+0x1a5/0x480 [ 27.256211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.256460] kthread+0x337/0x6f0 [ 27.256868] ret_from_fork+0x116/0x1d0 [ 27.257250] ret_from_fork_asm+0x1a/0x30 [ 27.257433] [ 27.257523] The buggy address belongs to the object at ffff888103eb9580 [ 27.257523] which belongs to the cache kmalloc-64 of size 64 [ 27.258389] The buggy address is located 0 bytes to the right of [ 27.258389] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.259137] [ 27.259389] The buggy address belongs to the physical page: [ 27.259557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.260037] flags: 0x200000000000000(node=0|zone=2) [ 27.260290] page_type: f5(slab) [ 27.260419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.261176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.261589] page dumped because: kasan: bad access detected [ 27.262023] [ 27.262101] Memory state around the buggy address: [ 27.262539] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.263024] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.263680] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.264102] ^ [ 27.264556] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.265036] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.265352] ================================================================== [ 27.609022] ================================================================== [ 27.609343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 27.609864] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.610445] [ 27.610694] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.610755] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.610770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.610796] Call Trace: [ 27.610914] <TASK> [ 27.610956] dump_stack_lvl+0x73/0xb0 [ 27.610993] print_report+0xd1/0x610 [ 27.611018] ? __virt_addr_valid+0x1db/0x2d0 [ 27.611042] ? kasan_atomics_helper+0x1467/0x5450 [ 27.611065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.611092] ? kasan_atomics_helper+0x1467/0x5450 [ 27.611114] kasan_report+0x141/0x180 [ 27.611136] ? kasan_atomics_helper+0x1467/0x5450 [ 27.611162] kasan_check_range+0x10c/0x1c0 [ 27.611186] __kasan_check_write+0x18/0x20 [ 27.611209] kasan_atomics_helper+0x1467/0x5450 [ 27.611232] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.611255] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.611279] ? pick_task_fair+0xce/0x340 [ 27.611305] ? kasan_atomics+0x152/0x310 [ 27.611330] kasan_atomics+0x1dc/0x310 [ 27.611354] ? __pfx_kasan_atomics+0x10/0x10 [ 27.611378] ? __pfx_read_tsc+0x10/0x10 [ 27.611400] ? ktime_get_ts64+0x86/0x230 [ 27.611426] kunit_try_run_case+0x1a5/0x480 [ 27.611449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.611471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.611497] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.611521] ? __kthread_parkme+0x82/0x180 [ 27.611543] ? preempt_count_sub+0x50/0x80 [ 27.611568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.611591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.611616] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.611643] kthread+0x337/0x6f0 [ 27.611674] ? trace_preempt_on+0x20/0xc0 [ 27.611698] ? __pfx_kthread+0x10/0x10 [ 27.611719] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.611751] ? calculate_sigpending+0x7b/0xa0 [ 27.611776] ? __pfx_kthread+0x10/0x10 [ 27.611799] ret_from_fork+0x116/0x1d0 [ 27.611819] ? __pfx_kthread+0x10/0x10 [ 27.611841] ret_from_fork_asm+0x1a/0x30 [ 27.611873] </TASK> [ 27.611886] [ 27.623521] Allocated by task 314: [ 27.623744] kasan_save_stack+0x45/0x70 [ 27.624161] kasan_save_track+0x18/0x40 [ 27.624489] kasan_save_alloc_info+0x3b/0x50 [ 27.624710] __kasan_kmalloc+0xb7/0xc0 [ 27.624995] __kmalloc_cache_noprof+0x189/0x420 [ 27.625364] kasan_atomics+0x95/0x310 [ 27.625681] kunit_try_run_case+0x1a5/0x480 [ 27.626033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.626366] kthread+0x337/0x6f0 [ 27.626502] ret_from_fork+0x116/0x1d0 [ 27.626882] ret_from_fork_asm+0x1a/0x30 [ 27.627195] [ 27.627416] The buggy address belongs to the object at ffff888103eb9580 [ 27.627416] which belongs to the cache kmalloc-64 of size 64 [ 27.628013] The buggy address is located 0 bytes to the right of [ 27.628013] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.628768] [ 27.628910] The buggy address belongs to the physical page: [ 27.629144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.629534] flags: 0x200000000000000(node=0|zone=2) [ 27.629750] page_type: f5(slab) [ 27.629902] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.630138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.631074] page dumped because: kasan: bad access detected [ 27.631568] [ 27.631646] Memory state around the buggy address: [ 27.632905] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.633290] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.633514] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.633742] ^ [ 27.633896] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.634118] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.634325] ================================================================== [ 28.193772] ================================================================== [ 28.194552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 28.194954] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.195404] [ 28.195559] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.195630] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.195672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.195698] Call Trace: [ 28.195718] <TASK> [ 28.195742] dump_stack_lvl+0x73/0xb0 [ 28.195775] print_report+0xd1/0x610 [ 28.195801] ? __virt_addr_valid+0x1db/0x2d0 [ 28.195826] ? kasan_atomics_helper+0x4fa5/0x5450 [ 28.195848] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.195875] ? kasan_atomics_helper+0x4fa5/0x5450 [ 28.195896] kasan_report+0x141/0x180 [ 28.195920] ? kasan_atomics_helper+0x4fa5/0x5450 [ 28.195945] __asan_report_load8_noabort+0x18/0x20 [ 28.195969] kasan_atomics_helper+0x4fa5/0x5450 [ 28.195992] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.196015] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.196038] ? pick_task_fair+0xce/0x340 [ 28.196065] ? kasan_atomics+0x152/0x310 [ 28.196091] kasan_atomics+0x1dc/0x310 [ 28.196115] ? __pfx_kasan_atomics+0x10/0x10 [ 28.196139] ? __pfx_read_tsc+0x10/0x10 [ 28.196162] ? ktime_get_ts64+0x86/0x230 [ 28.196188] kunit_try_run_case+0x1a5/0x480 [ 28.196211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.196232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.196258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.196282] ? __kthread_parkme+0x82/0x180 [ 28.196304] ? preempt_count_sub+0x50/0x80 [ 28.196329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.196352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.196379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.196405] kthread+0x337/0x6f0 [ 28.196426] ? trace_preempt_on+0x20/0xc0 [ 28.196451] ? __pfx_kthread+0x10/0x10 [ 28.196474] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.196497] ? calculate_sigpending+0x7b/0xa0 [ 28.196522] ? __pfx_kthread+0x10/0x10 [ 28.196545] ret_from_fork+0x116/0x1d0 [ 28.196565] ? __pfx_kthread+0x10/0x10 [ 28.196587] ret_from_fork_asm+0x1a/0x30 [ 28.196619] </TASK> [ 28.196632] [ 28.206352] Allocated by task 314: [ 28.206697] kasan_save_stack+0x45/0x70 [ 28.206942] kasan_save_track+0x18/0x40 [ 28.207223] kasan_save_alloc_info+0x3b/0x50 [ 28.207412] __kasan_kmalloc+0xb7/0xc0 [ 28.207737] __kmalloc_cache_noprof+0x189/0x420 [ 28.208068] kasan_atomics+0x95/0x310 [ 28.208325] kunit_try_run_case+0x1a5/0x480 [ 28.208489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.208891] kthread+0x337/0x6f0 [ 28.209068] ret_from_fork+0x116/0x1d0 [ 28.209244] ret_from_fork_asm+0x1a/0x30 [ 28.209427] [ 28.209504] The buggy address belongs to the object at ffff888103eb9580 [ 28.209504] which belongs to the cache kmalloc-64 of size 64 [ 28.210350] The buggy address is located 0 bytes to the right of [ 28.210350] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.211091] [ 28.211339] The buggy address belongs to the physical page: [ 28.211637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.212115] flags: 0x200000000000000(node=0|zone=2) [ 28.212415] page_type: f5(slab) [ 28.212547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.213251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.213630] page dumped because: kasan: bad access detected [ 28.214004] [ 28.214102] Memory state around the buggy address: [ 28.214274] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.214607] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.215199] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.215550] ^ [ 28.215743] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.216327] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.216705] ================================================================== [ 27.031929] ================================================================== [ 27.032395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 27.032781] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.033203] [ 27.033323] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.033380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.033396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.033422] Call Trace: [ 27.033444] <TASK> [ 27.033467] dump_stack_lvl+0x73/0xb0 [ 27.033501] print_report+0xd1/0x610 [ 27.033525] ? __virt_addr_valid+0x1db/0x2d0 [ 27.033563] ? kasan_atomics_helper+0x72f/0x5450 [ 27.033584] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.033611] ? kasan_atomics_helper+0x72f/0x5450 [ 27.033644] kasan_report+0x141/0x180 [ 27.033680] ? kasan_atomics_helper+0x72f/0x5450 [ 27.033708] kasan_check_range+0x10c/0x1c0 [ 27.033731] __kasan_check_write+0x18/0x20 [ 27.033755] kasan_atomics_helper+0x72f/0x5450 [ 27.033778] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.033801] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.033825] ? pick_task_fair+0xce/0x340 [ 27.033861] ? kasan_atomics+0x152/0x310 [ 27.033888] kasan_atomics+0x1dc/0x310 [ 27.033911] ? __pfx_kasan_atomics+0x10/0x10 [ 27.033936] ? __pfx_read_tsc+0x10/0x10 [ 27.033976] ? ktime_get_ts64+0x86/0x230 [ 27.034002] kunit_try_run_case+0x1a5/0x480 [ 27.034027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.034146] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.034175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.034200] ? __kthread_parkme+0x82/0x180 [ 27.034256] ? preempt_count_sub+0x50/0x80 [ 27.034282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.034317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.034344] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.034371] kthread+0x337/0x6f0 [ 27.034401] ? trace_preempt_on+0x20/0xc0 [ 27.034426] ? __pfx_kthread+0x10/0x10 [ 27.034449] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.034482] ? calculate_sigpending+0x7b/0xa0 [ 27.034508] ? __pfx_kthread+0x10/0x10 [ 27.034531] ret_from_fork+0x116/0x1d0 [ 27.034560] ? __pfx_kthread+0x10/0x10 [ 27.034582] ret_from_fork_asm+0x1a/0x30 [ 27.034614] </TASK> [ 27.034637] [ 27.043829] Allocated by task 314: [ 27.044091] kasan_save_stack+0x45/0x70 [ 27.044336] kasan_save_track+0x18/0x40 [ 27.044496] kasan_save_alloc_info+0x3b/0x50 [ 27.044727] __kasan_kmalloc+0xb7/0xc0 [ 27.044917] __kmalloc_cache_noprof+0x189/0x420 [ 27.045132] kasan_atomics+0x95/0x310 [ 27.045409] kunit_try_run_case+0x1a5/0x480 [ 27.045629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.045913] kthread+0x337/0x6f0 [ 27.046152] ret_from_fork+0x116/0x1d0 [ 27.046301] ret_from_fork_asm+0x1a/0x30 [ 27.046440] [ 27.046508] The buggy address belongs to the object at ffff888103eb9580 [ 27.046508] which belongs to the cache kmalloc-64 of size 64 [ 27.047044] The buggy address is located 0 bytes to the right of [ 27.047044] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.047614] [ 27.047696] The buggy address belongs to the physical page: [ 27.048092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.048847] flags: 0x200000000000000(node=0|zone=2) [ 27.049095] page_type: f5(slab) [ 27.049219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.049869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.050232] page dumped because: kasan: bad access detected [ 27.050499] [ 27.050605] Memory state around the buggy address: [ 27.050859] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.051249] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.051548] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.051923] ^ [ 27.052158] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.052687] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.053136] ================================================================== [ 26.767636] ================================================================== [ 26.768392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 26.768733] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.769027] [ 26.769152] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.769208] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.769222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.769248] Call Trace: [ 26.769261] <TASK> [ 26.769282] dump_stack_lvl+0x73/0xb0 [ 26.769317] print_report+0xd1/0x610 [ 26.769340] ? __virt_addr_valid+0x1db/0x2d0 [ 26.769365] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.769386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.769411] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.769433] kasan_report+0x141/0x180 [ 26.769454] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.769479] __asan_report_load4_noabort+0x18/0x20 [ 26.769503] kasan_atomics_helper+0x4bbc/0x5450 [ 26.769524] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.769546] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.769570] ? pick_task_fair+0xce/0x340 [ 26.769596] ? kasan_atomics+0x152/0x310 [ 26.769621] kasan_atomics+0x1dc/0x310 [ 26.769643] ? __pfx_kasan_atomics+0x10/0x10 [ 26.769677] ? __pfx_read_tsc+0x10/0x10 [ 26.769700] ? ktime_get_ts64+0x86/0x230 [ 26.769727] kunit_try_run_case+0x1a5/0x480 [ 26.769845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.769867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.769892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.769916] ? __kthread_parkme+0x82/0x180 [ 26.769938] ? preempt_count_sub+0x50/0x80 [ 26.769962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.769984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.770009] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.770034] kthread+0x337/0x6f0 [ 26.770061] ? trace_preempt_on+0x20/0xc0 [ 26.770085] ? __pfx_kthread+0x10/0x10 [ 26.770106] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.770127] ? calculate_sigpending+0x7b/0xa0 [ 26.770152] ? __pfx_kthread+0x10/0x10 [ 26.770174] ret_from_fork+0x116/0x1d0 [ 26.770193] ? __pfx_kthread+0x10/0x10 [ 26.770213] ret_from_fork_asm+0x1a/0x30 [ 26.770244] </TASK> [ 26.770256] [ 26.778272] Allocated by task 314: [ 26.778460] kasan_save_stack+0x45/0x70 [ 26.778645] kasan_save_track+0x18/0x40 [ 26.778844] kasan_save_alloc_info+0x3b/0x50 [ 26.779129] __kasan_kmalloc+0xb7/0xc0 [ 26.779294] __kmalloc_cache_noprof+0x189/0x420 [ 26.779482] kasan_atomics+0x95/0x310 [ 26.779649] kunit_try_run_case+0x1a5/0x480 [ 26.779947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.780244] kthread+0x337/0x6f0 [ 26.780388] ret_from_fork+0x116/0x1d0 [ 26.780571] ret_from_fork_asm+0x1a/0x30 [ 26.780753] [ 26.780830] The buggy address belongs to the object at ffff888103eb9580 [ 26.780830] which belongs to the cache kmalloc-64 of size 64 [ 26.781405] The buggy address is located 0 bytes to the right of [ 26.781405] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.782004] [ 26.782168] The buggy address belongs to the physical page: [ 26.782436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.782790] flags: 0x200000000000000(node=0|zone=2) [ 26.783076] page_type: f5(slab) [ 26.783209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.783436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.783813] page dumped because: kasan: bad access detected [ 26.784172] [ 26.784262] Memory state around the buggy address: [ 26.784460] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.784844] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.785301] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.785620] ^ [ 26.785911] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.786223] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.786507] ================================================================== [ 27.134940] ================================================================== [ 27.135188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 27.135428] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.135649] [ 27.135764] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.135822] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.135837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.135863] Call Trace: [ 27.135884] <TASK> [ 27.135907] dump_stack_lvl+0x73/0xb0 [ 27.135939] print_report+0xd1/0x610 [ 27.135963] ? __virt_addr_valid+0x1db/0x2d0 [ 27.135988] ? kasan_atomics_helper+0x992/0x5450 [ 27.136009] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.136036] ? kasan_atomics_helper+0x992/0x5450 [ 27.136058] kasan_report+0x141/0x180 [ 27.136095] ? kasan_atomics_helper+0x992/0x5450 [ 27.136121] kasan_check_range+0x10c/0x1c0 [ 27.136146] __kasan_check_write+0x18/0x20 [ 27.136170] kasan_atomics_helper+0x992/0x5450 [ 27.136192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.136215] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.136239] ? pick_task_fair+0xce/0x340 [ 27.136266] ? kasan_atomics+0x152/0x310 [ 27.136293] kasan_atomics+0x1dc/0x310 [ 27.136316] ? __pfx_kasan_atomics+0x10/0x10 [ 27.136340] ? __pfx_read_tsc+0x10/0x10 [ 27.136363] ? ktime_get_ts64+0x86/0x230 [ 27.136388] kunit_try_run_case+0x1a5/0x480 [ 27.136412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.136433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.136459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.136483] ? __kthread_parkme+0x82/0x180 [ 27.136506] ? preempt_count_sub+0x50/0x80 [ 27.136531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.136555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.136582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.136608] kthread+0x337/0x6f0 [ 27.136629] ? trace_preempt_on+0x20/0xc0 [ 27.136663] ? __pfx_kthread+0x10/0x10 [ 27.136685] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.136708] ? calculate_sigpending+0x7b/0xa0 [ 27.136733] ? __pfx_kthread+0x10/0x10 [ 27.136755] ret_from_fork+0x116/0x1d0 [ 27.136776] ? __pfx_kthread+0x10/0x10 [ 27.136796] ret_from_fork_asm+0x1a/0x30 [ 27.136830] </TASK> [ 27.136843] [ 27.154669] Allocated by task 314: [ 27.155099] kasan_save_stack+0x45/0x70 [ 27.155539] kasan_save_track+0x18/0x40 [ 27.155959] kasan_save_alloc_info+0x3b/0x50 [ 27.156159] __kasan_kmalloc+0xb7/0xc0 [ 27.156282] __kmalloc_cache_noprof+0x189/0x420 [ 27.156429] kasan_atomics+0x95/0x310 [ 27.156551] kunit_try_run_case+0x1a5/0x480 [ 27.156712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.156878] kthread+0x337/0x6f0 [ 27.157217] ret_from_fork+0x116/0x1d0 [ 27.157399] ret_from_fork_asm+0x1a/0x30 [ 27.157535] [ 27.157625] The buggy address belongs to the object at ffff888103eb9580 [ 27.157625] which belongs to the cache kmalloc-64 of size 64 [ 27.158266] The buggy address is located 0 bytes to the right of [ 27.158266] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.158914] [ 27.158985] The buggy address belongs to the physical page: [ 27.159145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.159804] flags: 0x200000000000000(node=0|zone=2) [ 27.159979] page_type: f5(slab) [ 27.160098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.160419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.160695] page dumped because: kasan: bad access detected [ 27.160952] [ 27.161043] Memory state around the buggy address: [ 27.161268] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.161585] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.161801] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.162300] ^ [ 27.162614] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.162883] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.163089] ================================================================== [ 27.492592] ================================================================== [ 27.493188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 27.493521] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.493835] [ 27.493948] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.494004] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.494018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.494049] Call Trace: [ 27.494069] <TASK> [ 27.494091] dump_stack_lvl+0x73/0xb0 [ 27.494122] print_report+0xd1/0x610 [ 27.494147] ? __virt_addr_valid+0x1db/0x2d0 [ 27.494173] ? kasan_atomics_helper+0x1217/0x5450 [ 27.494195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.494222] ? kasan_atomics_helper+0x1217/0x5450 [ 27.494244] kasan_report+0x141/0x180 [ 27.494267] ? kasan_atomics_helper+0x1217/0x5450 [ 27.494293] kasan_check_range+0x10c/0x1c0 [ 27.494317] __kasan_check_write+0x18/0x20 [ 27.494341] kasan_atomics_helper+0x1217/0x5450 [ 27.494365] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.494388] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.494412] ? pick_task_fair+0xce/0x340 [ 27.494439] ? kasan_atomics+0x152/0x310 [ 27.494465] kasan_atomics+0x1dc/0x310 [ 27.494490] ? __pfx_kasan_atomics+0x10/0x10 [ 27.494514] ? __pfx_read_tsc+0x10/0x10 [ 27.494538] ? ktime_get_ts64+0x86/0x230 [ 27.494563] kunit_try_run_case+0x1a5/0x480 [ 27.494588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.494609] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.494635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.494670] ? __kthread_parkme+0x82/0x180 [ 27.494693] ? preempt_count_sub+0x50/0x80 [ 27.494718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.494762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.494789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.494816] kthread+0x337/0x6f0 [ 27.494838] ? trace_preempt_on+0x20/0xc0 [ 27.494863] ? __pfx_kthread+0x10/0x10 [ 27.494884] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.494907] ? calculate_sigpending+0x7b/0xa0 [ 27.494932] ? __pfx_kthread+0x10/0x10 [ 27.494955] ret_from_fork+0x116/0x1d0 [ 27.494975] ? __pfx_kthread+0x10/0x10 [ 27.494997] ret_from_fork_asm+0x1a/0x30 [ 27.495030] </TASK> [ 27.495042] [ 27.502077] Allocated by task 314: [ 27.502277] kasan_save_stack+0x45/0x70 [ 27.502486] kasan_save_track+0x18/0x40 [ 27.502679] kasan_save_alloc_info+0x3b/0x50 [ 27.502910] __kasan_kmalloc+0xb7/0xc0 [ 27.503097] __kmalloc_cache_noprof+0x189/0x420 [ 27.503289] kasan_atomics+0x95/0x310 [ 27.503416] kunit_try_run_case+0x1a5/0x480 [ 27.503555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.503766] kthread+0x337/0x6f0 [ 27.503937] ret_from_fork+0x116/0x1d0 [ 27.504121] ret_from_fork_asm+0x1a/0x30 [ 27.504314] [ 27.504407] The buggy address belongs to the object at ffff888103eb9580 [ 27.504407] which belongs to the cache kmalloc-64 of size 64 [ 27.504936] The buggy address is located 0 bytes to the right of [ 27.504936] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.505392] [ 27.505462] The buggy address belongs to the physical page: [ 27.505628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.505976] flags: 0x200000000000000(node=0|zone=2) [ 27.506200] page_type: f5(slab) [ 27.506360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.506667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.506976] page dumped because: kasan: bad access detected [ 27.507158] [ 27.507222] Memory state around the buggy address: [ 27.507371] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.507579] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.507894] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.508206] ^ [ 27.508426] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.509182] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.509511] ================================================================== [ 27.928215] ================================================================== [ 27.928451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 27.928990] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.929320] [ 27.929434] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.929490] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.929505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.929532] Call Trace: [ 27.929553] <TASK> [ 27.929574] dump_stack_lvl+0x73/0xb0 [ 27.929608] print_report+0xd1/0x610 [ 27.929631] ? __virt_addr_valid+0x1db/0x2d0 [ 27.929666] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.929690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.929716] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.929761] kasan_report+0x141/0x180 [ 27.929785] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.929811] kasan_check_range+0x10c/0x1c0 [ 27.929836] __kasan_check_write+0x18/0x20 [ 27.929859] kasan_atomics_helper+0x1c18/0x5450 [ 27.929883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.929905] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.929930] ? pick_task_fair+0xce/0x340 [ 27.929957] ? kasan_atomics+0x152/0x310 [ 27.929983] kasan_atomics+0x1dc/0x310 [ 27.930006] ? __pfx_kasan_atomics+0x10/0x10 [ 27.930031] ? __pfx_read_tsc+0x10/0x10 [ 27.930059] ? ktime_get_ts64+0x86/0x230 [ 27.930085] kunit_try_run_case+0x1a5/0x480 [ 27.930108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.930130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.930156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.930181] ? __kthread_parkme+0x82/0x180 [ 27.930204] ? preempt_count_sub+0x50/0x80 [ 27.930229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.930251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.930278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.930305] kthread+0x337/0x6f0 [ 27.930325] ? trace_preempt_on+0x20/0xc0 [ 27.930349] ? __pfx_kthread+0x10/0x10 [ 27.930371] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.930393] ? calculate_sigpending+0x7b/0xa0 [ 27.930418] ? __pfx_kthread+0x10/0x10 [ 27.930441] ret_from_fork+0x116/0x1d0 [ 27.930460] ? __pfx_kthread+0x10/0x10 [ 27.930482] ret_from_fork_asm+0x1a/0x30 [ 27.930514] </TASK> [ 27.930526] [ 27.938307] Allocated by task 314: [ 27.938475] kasan_save_stack+0x45/0x70 [ 27.938695] kasan_save_track+0x18/0x40 [ 27.938878] kasan_save_alloc_info+0x3b/0x50 [ 27.939087] __kasan_kmalloc+0xb7/0xc0 [ 27.939255] __kmalloc_cache_noprof+0x189/0x420 [ 27.939431] kasan_atomics+0x95/0x310 [ 27.939608] kunit_try_run_case+0x1a5/0x480 [ 27.939834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.940032] kthread+0x337/0x6f0 [ 27.940196] ret_from_fork+0x116/0x1d0 [ 27.940357] ret_from_fork_asm+0x1a/0x30 [ 27.940544] [ 27.940635] The buggy address belongs to the object at ffff888103eb9580 [ 27.940635] which belongs to the cache kmalloc-64 of size 64 [ 27.941016] The buggy address is located 0 bytes to the right of [ 27.941016] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.941549] [ 27.941646] The buggy address belongs to the physical page: [ 27.941923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.942253] flags: 0x200000000000000(node=0|zone=2) [ 27.942413] page_type: f5(slab) [ 27.942532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.942869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.943204] page dumped because: kasan: bad access detected [ 27.943450] [ 27.943538] Memory state around the buggy address: [ 27.943788] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.944111] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.944400] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.944691] ^ [ 27.944898] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.945128] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.945438] ================================================================== [ 26.787184] ================================================================== [ 26.787798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 26.788536] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.788954] [ 26.789067] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.789120] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.789135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.789161] Call Trace: [ 26.789176] <TASK> [ 26.789196] dump_stack_lvl+0x73/0xb0 [ 26.789229] print_report+0xd1/0x610 [ 26.789253] ? __virt_addr_valid+0x1db/0x2d0 [ 26.789279] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.789302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.789329] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.789351] kasan_report+0x141/0x180 [ 26.789374] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.789400] __asan_report_store4_noabort+0x1b/0x30 [ 26.789425] kasan_atomics_helper+0x4ba2/0x5450 [ 26.789448] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.789471] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.789496] ? pick_task_fair+0xce/0x340 [ 26.789521] ? kasan_atomics+0x152/0x310 [ 26.789548] kasan_atomics+0x1dc/0x310 [ 26.789572] ? __pfx_kasan_atomics+0x10/0x10 [ 26.789597] ? __pfx_read_tsc+0x10/0x10 [ 26.789619] ? ktime_get_ts64+0x86/0x230 [ 26.789645] kunit_try_run_case+0x1a5/0x480 [ 26.789679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.789701] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.789727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.789752] ? __kthread_parkme+0x82/0x180 [ 26.789775] ? preempt_count_sub+0x50/0x80 [ 26.789800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.789824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.789850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.789876] kthread+0x337/0x6f0 [ 26.789897] ? trace_preempt_on+0x20/0xc0 [ 26.789922] ? __pfx_kthread+0x10/0x10 [ 26.789965] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.789988] ? calculate_sigpending+0x7b/0xa0 [ 26.790014] ? __pfx_kthread+0x10/0x10 [ 26.790036] ret_from_fork+0x116/0x1d0 [ 26.790065] ? __pfx_kthread+0x10/0x10 [ 26.790086] ret_from_fork_asm+0x1a/0x30 [ 26.790118] </TASK> [ 26.790131] [ 26.798465] Allocated by task 314: [ 26.798621] kasan_save_stack+0x45/0x70 [ 26.798791] kasan_save_track+0x18/0x40 [ 26.798924] kasan_save_alloc_info+0x3b/0x50 [ 26.799068] __kasan_kmalloc+0xb7/0xc0 [ 26.799252] __kmalloc_cache_noprof+0x189/0x420 [ 26.799543] kasan_atomics+0x95/0x310 [ 26.799743] kunit_try_run_case+0x1a5/0x480 [ 26.799945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.800193] kthread+0x337/0x6f0 [ 26.800357] ret_from_fork+0x116/0x1d0 [ 26.800505] ret_from_fork_asm+0x1a/0x30 [ 26.800641] [ 26.800717] The buggy address belongs to the object at ffff888103eb9580 [ 26.800717] which belongs to the cache kmalloc-64 of size 64 [ 26.801065] The buggy address is located 0 bytes to the right of [ 26.801065] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.802148] [ 26.802258] The buggy address belongs to the physical page: [ 26.802795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.804568] flags: 0x200000000000000(node=0|zone=2) [ 26.804894] page_type: f5(slab) [ 26.805394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.805756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.806163] page dumped because: kasan: bad access detected [ 26.806345] [ 26.806437] Memory state around the buggy address: [ 26.806672] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.807599] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.807924] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.808472] ^ [ 26.808726] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.809507] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.809818] ================================================================== [ 27.760759] ================================================================== [ 27.761120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 27.762092] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.762747] [ 27.762875] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.762933] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.762948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.762975] Call Trace: [ 27.762997] <TASK> [ 27.763019] dump_stack_lvl+0x73/0xb0 [ 27.763057] print_report+0xd1/0x610 [ 27.763093] ? __virt_addr_valid+0x1db/0x2d0 [ 27.763120] ? kasan_atomics_helper+0x177f/0x5450 [ 27.763142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.763327] ? kasan_atomics_helper+0x177f/0x5450 [ 27.763358] kasan_report+0x141/0x180 [ 27.763506] ? kasan_atomics_helper+0x177f/0x5450 [ 27.763535] kasan_check_range+0x10c/0x1c0 [ 27.763563] __kasan_check_write+0x18/0x20 [ 27.763589] kasan_atomics_helper+0x177f/0x5450 [ 27.763612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.763635] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.763673] ? pick_task_fair+0xce/0x340 [ 27.763700] ? kasan_atomics+0x152/0x310 [ 27.763726] kasan_atomics+0x1dc/0x310 [ 27.763757] ? __pfx_kasan_atomics+0x10/0x10 [ 27.763782] ? __pfx_read_tsc+0x10/0x10 [ 27.763804] ? ktime_get_ts64+0x86/0x230 [ 27.763829] kunit_try_run_case+0x1a5/0x480 [ 27.763854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.763875] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.763900] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.763925] ? __kthread_parkme+0x82/0x180 [ 27.763948] ? preempt_count_sub+0x50/0x80 [ 27.763972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.763994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.764020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.764046] kthread+0x337/0x6f0 [ 27.764067] ? trace_preempt_on+0x20/0xc0 [ 27.764092] ? __pfx_kthread+0x10/0x10 [ 27.764113] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.764136] ? calculate_sigpending+0x7b/0xa0 [ 27.764161] ? __pfx_kthread+0x10/0x10 [ 27.764183] ret_from_fork+0x116/0x1d0 [ 27.764203] ? __pfx_kthread+0x10/0x10 [ 27.764224] ret_from_fork_asm+0x1a/0x30 [ 27.764257] </TASK> [ 27.764271] [ 27.775578] Allocated by task 314: [ 27.776000] kasan_save_stack+0x45/0x70 [ 27.776226] kasan_save_track+0x18/0x40 [ 27.776380] kasan_save_alloc_info+0x3b/0x50 [ 27.776837] __kasan_kmalloc+0xb7/0xc0 [ 27.777185] __kmalloc_cache_noprof+0x189/0x420 [ 27.777510] kasan_atomics+0x95/0x310 [ 27.777854] kunit_try_run_case+0x1a5/0x480 [ 27.778027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.778434] kthread+0x337/0x6f0 [ 27.778709] ret_from_fork+0x116/0x1d0 [ 27.779140] ret_from_fork_asm+0x1a/0x30 [ 27.779445] [ 27.779544] The buggy address belongs to the object at ffff888103eb9580 [ 27.779544] which belongs to the cache kmalloc-64 of size 64 [ 27.780455] The buggy address is located 0 bytes to the right of [ 27.780455] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.781263] [ 27.781365] The buggy address belongs to the physical page: [ 27.781705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.782314] flags: 0x200000000000000(node=0|zone=2) [ 27.782638] page_type: f5(slab) [ 27.782941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.783390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.783878] page dumped because: kasan: bad access detected [ 27.784246] [ 27.784348] Memory state around the buggy address: [ 27.784742] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.785092] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.785515] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.785888] ^ [ 27.786264] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.786687] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.787094] ================================================================== [ 26.987504] ================================================================== [ 26.988091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 26.988435] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.988754] [ 26.988942] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.989000] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.989015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.989095] Call Trace: [ 26.989129] <TASK> [ 26.989151] dump_stack_lvl+0x73/0xb0 [ 26.989186] print_report+0xd1/0x610 [ 26.989210] ? __virt_addr_valid+0x1db/0x2d0 [ 26.989245] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.989267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.989305] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.989327] kasan_report+0x141/0x180 [ 26.989349] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.989375] kasan_check_range+0x10c/0x1c0 [ 26.989408] __kasan_check_write+0x18/0x20 [ 26.989431] kasan_atomics_helper+0x5fe/0x5450 [ 26.989464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.989487] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.989512] ? pick_task_fair+0xce/0x340 [ 26.989538] ? kasan_atomics+0x152/0x310 [ 26.989565] kasan_atomics+0x1dc/0x310 [ 26.989589] ? __pfx_kasan_atomics+0x10/0x10 [ 26.989613] ? __pfx_read_tsc+0x10/0x10 [ 26.989637] ? ktime_get_ts64+0x86/0x230 [ 26.989673] kunit_try_run_case+0x1a5/0x480 [ 26.989697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.989720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.989757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.989782] ? __kthread_parkme+0x82/0x180 [ 26.989806] ? preempt_count_sub+0x50/0x80 [ 26.989840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.989863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.989890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.989927] kthread+0x337/0x6f0 [ 26.990080] ? trace_preempt_on+0x20/0xc0 [ 26.990107] ? __pfx_kthread+0x10/0x10 [ 26.990143] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.990166] ? calculate_sigpending+0x7b/0xa0 [ 26.990192] ? __pfx_kthread+0x10/0x10 [ 26.990214] ret_from_fork+0x116/0x1d0 [ 26.990328] ? __pfx_kthread+0x10/0x10 [ 26.990351] ret_from_fork_asm+0x1a/0x30 [ 26.990472] </TASK> [ 26.990487] [ 26.999673] Allocated by task 314: [ 26.999931] kasan_save_stack+0x45/0x70 [ 27.000298] kasan_save_track+0x18/0x40 [ 27.000494] kasan_save_alloc_info+0x3b/0x50 [ 27.000644] __kasan_kmalloc+0xb7/0xc0 [ 27.000944] __kmalloc_cache_noprof+0x189/0x420 [ 27.001338] kasan_atomics+0x95/0x310 [ 27.001519] kunit_try_run_case+0x1a5/0x480 [ 27.001672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.001844] kthread+0x337/0x6f0 [ 27.002014] ret_from_fork+0x116/0x1d0 [ 27.002200] ret_from_fork_asm+0x1a/0x30 [ 27.002484] [ 27.002581] The buggy address belongs to the object at ffff888103eb9580 [ 27.002581] which belongs to the cache kmalloc-64 of size 64 [ 27.003525] The buggy address is located 0 bytes to the right of [ 27.003525] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.004217] [ 27.004323] The buggy address belongs to the physical page: [ 27.004567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.005035] flags: 0x200000000000000(node=0|zone=2) [ 27.005209] page_type: f5(slab) [ 27.005333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.005711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.006125] page dumped because: kasan: bad access detected [ 27.006339] [ 27.006594] Memory state around the buggy address: [ 27.006772] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.007076] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.007786] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.008149] ^ [ 27.008356] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.008800] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.009160] ================================================================== [ 27.455339] ================================================================== [ 27.455770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 27.456164] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.456466] [ 27.456582] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.456637] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.456668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.456701] Call Trace: [ 27.456722] <TASK> [ 27.456769] dump_stack_lvl+0x73/0xb0 [ 27.456801] print_report+0xd1/0x610 [ 27.456825] ? __virt_addr_valid+0x1db/0x2d0 [ 27.456850] ? kasan_atomics_helper+0x1148/0x5450 [ 27.456872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.456898] ? kasan_atomics_helper+0x1148/0x5450 [ 27.456920] kasan_report+0x141/0x180 [ 27.456944] ? kasan_atomics_helper+0x1148/0x5450 [ 27.456970] kasan_check_range+0x10c/0x1c0 [ 27.456995] __kasan_check_write+0x18/0x20 [ 27.457019] kasan_atomics_helper+0x1148/0x5450 [ 27.457043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.457066] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.457101] ? pick_task_fair+0xce/0x340 [ 27.457128] ? kasan_atomics+0x152/0x310 [ 27.457154] kasan_atomics+0x1dc/0x310 [ 27.457188] ? __pfx_kasan_atomics+0x10/0x10 [ 27.457213] ? __pfx_read_tsc+0x10/0x10 [ 27.457236] ? ktime_get_ts64+0x86/0x230 [ 27.457262] kunit_try_run_case+0x1a5/0x480 [ 27.457286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.457308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.457333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.457358] ? __kthread_parkme+0x82/0x180 [ 27.457383] ? preempt_count_sub+0x50/0x80 [ 27.457407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.457430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.457456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.457483] kthread+0x337/0x6f0 [ 27.457504] ? trace_preempt_on+0x20/0xc0 [ 27.457538] ? __pfx_kthread+0x10/0x10 [ 27.457560] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.457583] ? calculate_sigpending+0x7b/0xa0 [ 27.457621] ? __pfx_kthread+0x10/0x10 [ 27.457643] ret_from_fork+0x116/0x1d0 [ 27.457673] ? __pfx_kthread+0x10/0x10 [ 27.457695] ret_from_fork_asm+0x1a/0x30 [ 27.457743] </TASK> [ 27.457756] [ 27.465092] Allocated by task 314: [ 27.465234] kasan_save_stack+0x45/0x70 [ 27.465386] kasan_save_track+0x18/0x40 [ 27.465515] kasan_save_alloc_info+0x3b/0x50 [ 27.465764] __kasan_kmalloc+0xb7/0xc0 [ 27.465975] __kmalloc_cache_noprof+0x189/0x420 [ 27.466201] kasan_atomics+0x95/0x310 [ 27.466386] kunit_try_run_case+0x1a5/0x480 [ 27.466599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.466869] kthread+0x337/0x6f0 [ 27.467054] ret_from_fork+0x116/0x1d0 [ 27.467227] ret_from_fork_asm+0x1a/0x30 [ 27.467413] [ 27.467507] The buggy address belongs to the object at ffff888103eb9580 [ 27.467507] which belongs to the cache kmalloc-64 of size 64 [ 27.467908] The buggy address is located 0 bytes to the right of [ 27.467908] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.468270] [ 27.468340] The buggy address belongs to the physical page: [ 27.468611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.468992] flags: 0x200000000000000(node=0|zone=2) [ 27.469228] page_type: f5(slab) [ 27.469404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.469775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.470063] page dumped because: kasan: bad access detected [ 27.470318] [ 27.470386] Memory state around the buggy address: [ 27.470538] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.470782] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.471098] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.471439] ^ [ 27.471687] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.472035] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.472342] ================================================================== [ 27.684850] ================================================================== [ 27.685223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 27.685500] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.685833] [ 27.685927] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.685982] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.685997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.686023] Call Trace: [ 27.686073] <TASK> [ 27.686095] dump_stack_lvl+0x73/0xb0 [ 27.686129] print_report+0xd1/0x610 [ 27.686153] ? __virt_addr_valid+0x1db/0x2d0 [ 27.686179] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.686211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.686238] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.686260] kasan_report+0x141/0x180 [ 27.686283] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.686328] kasan_check_range+0x10c/0x1c0 [ 27.686353] __kasan_check_write+0x18/0x20 [ 27.686378] kasan_atomics_helper+0x15b6/0x5450 [ 27.686401] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.686424] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.686449] ? pick_task_fair+0xce/0x340 [ 27.686493] ? kasan_atomics+0x152/0x310 [ 27.686520] kasan_atomics+0x1dc/0x310 [ 27.686544] ? __pfx_kasan_atomics+0x10/0x10 [ 27.686569] ? __pfx_read_tsc+0x10/0x10 [ 27.686592] ? ktime_get_ts64+0x86/0x230 [ 27.686618] kunit_try_run_case+0x1a5/0x480 [ 27.686669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.686692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.686718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.686742] ? __kthread_parkme+0x82/0x180 [ 27.686773] ? preempt_count_sub+0x50/0x80 [ 27.686799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.686839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.686866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.686892] kthread+0x337/0x6f0 [ 27.686914] ? trace_preempt_on+0x20/0xc0 [ 27.686939] ? __pfx_kthread+0x10/0x10 [ 27.686961] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.686984] ? calculate_sigpending+0x7b/0xa0 [ 27.687010] ? __pfx_kthread+0x10/0x10 [ 27.687034] ret_from_fork+0x116/0x1d0 [ 27.687054] ? __pfx_kthread+0x10/0x10 [ 27.687077] ret_from_fork_asm+0x1a/0x30 [ 27.687109] </TASK> [ 27.687140] [ 27.698505] Allocated by task 314: [ 27.698932] kasan_save_stack+0x45/0x70 [ 27.699329] kasan_save_track+0x18/0x40 [ 27.699697] kasan_save_alloc_info+0x3b/0x50 [ 27.700173] __kasan_kmalloc+0xb7/0xc0 [ 27.700520] __kmalloc_cache_noprof+0x189/0x420 [ 27.700874] kasan_atomics+0x95/0x310 [ 27.701008] kunit_try_run_case+0x1a5/0x480 [ 27.701150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.701321] kthread+0x337/0x6f0 [ 27.701444] ret_from_fork+0x116/0x1d0 [ 27.701576] ret_from_fork_asm+0x1a/0x30 [ 27.701729] [ 27.701798] The buggy address belongs to the object at ffff888103eb9580 [ 27.701798] which belongs to the cache kmalloc-64 of size 64 [ 27.702334] The buggy address is located 0 bytes to the right of [ 27.702334] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.702844] [ 27.702941] The buggy address belongs to the physical page: [ 27.703222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.703562] flags: 0x200000000000000(node=0|zone=2) [ 27.703801] page_type: f5(slab) [ 27.703960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.704263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.704555] page dumped because: kasan: bad access detected [ 27.704835] [ 27.704915] Memory state around the buggy address: [ 27.705139] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.705371] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.705598] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.705935] ^ [ 27.706162] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.706453] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.706670] ================================================================== [ 27.980422] ================================================================== [ 27.980823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 27.981206] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.981538] [ 27.981649] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.981712] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.981748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.981777] Call Trace: [ 27.981797] <TASK> [ 27.981819] dump_stack_lvl+0x73/0xb0 [ 27.981852] print_report+0xd1/0x610 [ 27.981876] ? __virt_addr_valid+0x1db/0x2d0 [ 27.981902] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.981925] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.981952] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.981974] kasan_report+0x141/0x180 [ 27.981998] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.982025] kasan_check_range+0x10c/0x1c0 [ 27.982059] __kasan_check_write+0x18/0x20 [ 27.982084] kasan_atomics_helper+0x1d7a/0x5450 [ 27.982108] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.982131] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.982156] ? pick_task_fair+0xce/0x340 [ 27.982182] ? kasan_atomics+0x152/0x310 [ 27.982209] kasan_atomics+0x1dc/0x310 [ 27.982232] ? __pfx_kasan_atomics+0x10/0x10 [ 27.982257] ? __pfx_read_tsc+0x10/0x10 [ 27.982280] ? ktime_get_ts64+0x86/0x230 [ 27.982306] kunit_try_run_case+0x1a5/0x480 [ 27.982330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.982352] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.982378] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.982403] ? __kthread_parkme+0x82/0x180 [ 27.982426] ? preempt_count_sub+0x50/0x80 [ 27.982451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.982474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.982501] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.982527] kthread+0x337/0x6f0 [ 27.982547] ? trace_preempt_on+0x20/0xc0 [ 27.982572] ? __pfx_kthread+0x10/0x10 [ 27.982594] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.982617] ? calculate_sigpending+0x7b/0xa0 [ 27.982642] ? __pfx_kthread+0x10/0x10 [ 27.982674] ret_from_fork+0x116/0x1d0 [ 27.982694] ? __pfx_kthread+0x10/0x10 [ 27.982716] ret_from_fork_asm+0x1a/0x30 [ 27.982769] </TASK> [ 27.982782] [ 27.989947] Allocated by task 314: [ 27.990148] kasan_save_stack+0x45/0x70 [ 27.990359] kasan_save_track+0x18/0x40 [ 27.990545] kasan_save_alloc_info+0x3b/0x50 [ 27.990790] __kasan_kmalloc+0xb7/0xc0 [ 27.990948] __kmalloc_cache_noprof+0x189/0x420 [ 27.991100] kasan_atomics+0x95/0x310 [ 27.991227] kunit_try_run_case+0x1a5/0x480 [ 27.991370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.991600] kthread+0x337/0x6f0 [ 27.991802] ret_from_fork+0x116/0x1d0 [ 27.991991] ret_from_fork_asm+0x1a/0x30 [ 27.992186] [ 27.992278] The buggy address belongs to the object at ffff888103eb9580 [ 27.992278] which belongs to the cache kmalloc-64 of size 64 [ 27.992826] The buggy address is located 0 bytes to the right of [ 27.992826] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.993186] [ 27.993254] The buggy address belongs to the physical page: [ 27.993420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.993665] flags: 0x200000000000000(node=0|zone=2) [ 27.993918] page_type: f5(slab) [ 27.994097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.994441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.994830] page dumped because: kasan: bad access detected [ 27.995079] [ 27.995165] Memory state around the buggy address: [ 27.995376] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.995701] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.996045] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.996248] ^ [ 27.996393] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.996595] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.997912] ================================================================== [ 28.217636] ================================================================== [ 28.217960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 28.218241] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.219010] [ 28.219144] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.219306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.219325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.219351] Call Trace: [ 28.219373] <TASK> [ 28.219396] dump_stack_lvl+0x73/0xb0 [ 28.219430] print_report+0xd1/0x610 [ 28.219455] ? __virt_addr_valid+0x1db/0x2d0 [ 28.219481] ? kasan_atomics_helper+0x224c/0x5450 [ 28.219503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.219530] ? kasan_atomics_helper+0x224c/0x5450 [ 28.219552] kasan_report+0x141/0x180 [ 28.219575] ? kasan_atomics_helper+0x224c/0x5450 [ 28.219600] kasan_check_range+0x10c/0x1c0 [ 28.219624] __kasan_check_write+0x18/0x20 [ 28.219648] kasan_atomics_helper+0x224c/0x5450 [ 28.219687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.219709] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.219735] ? pick_task_fair+0xce/0x340 [ 28.219834] ? kasan_atomics+0x152/0x310 [ 28.219861] kasan_atomics+0x1dc/0x310 [ 28.219885] ? __pfx_kasan_atomics+0x10/0x10 [ 28.219909] ? __pfx_read_tsc+0x10/0x10 [ 28.219932] ? ktime_get_ts64+0x86/0x230 [ 28.219957] kunit_try_run_case+0x1a5/0x480 [ 28.219982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.220003] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.220029] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.220053] ? __kthread_parkme+0x82/0x180 [ 28.220076] ? preempt_count_sub+0x50/0x80 [ 28.220101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.220124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.220151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.220177] kthread+0x337/0x6f0 [ 28.220198] ? trace_preempt_on+0x20/0xc0 [ 28.220223] ? __pfx_kthread+0x10/0x10 [ 28.220245] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.220268] ? calculate_sigpending+0x7b/0xa0 [ 28.220293] ? __pfx_kthread+0x10/0x10 [ 28.220316] ret_from_fork+0x116/0x1d0 [ 28.220336] ? __pfx_kthread+0x10/0x10 [ 28.220357] ret_from_fork_asm+0x1a/0x30 [ 28.220389] </TASK> [ 28.220402] [ 28.230186] Allocated by task 314: [ 28.230530] kasan_save_stack+0x45/0x70 [ 28.230903] kasan_save_track+0x18/0x40 [ 28.231179] kasan_save_alloc_info+0x3b/0x50 [ 28.231349] __kasan_kmalloc+0xb7/0xc0 [ 28.231662] __kmalloc_cache_noprof+0x189/0x420 [ 28.232074] kasan_atomics+0x95/0x310 [ 28.232393] kunit_try_run_case+0x1a5/0x480 [ 28.232552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.232741] kthread+0x337/0x6f0 [ 28.232869] ret_from_fork+0x116/0x1d0 [ 28.232999] ret_from_fork_asm+0x1a/0x30 [ 28.233189] [ 28.233290] The buggy address belongs to the object at ffff888103eb9580 [ 28.233290] which belongs to the cache kmalloc-64 of size 64 [ 28.234303] The buggy address is located 0 bytes to the right of [ 28.234303] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.235074] [ 28.235264] The buggy address belongs to the physical page: [ 28.235618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.236100] flags: 0x200000000000000(node=0|zone=2) [ 28.236409] page_type: f5(slab) [ 28.236581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.237125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.237491] page dumped because: kasan: bad access detected [ 28.237815] [ 28.237913] Memory state around the buggy address: [ 28.238131] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.238671] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.239075] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.239469] ^ [ 28.239682] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.240111] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.240484] ================================================================== [ 27.203498] ================================================================== [ 27.203884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 27.205282] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.205540] [ 27.205628] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.205697] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.205712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.205737] Call Trace: [ 27.206244] <TASK> [ 27.206269] dump_stack_lvl+0x73/0xb0 [ 27.206311] print_report+0xd1/0x610 [ 27.206337] ? __virt_addr_valid+0x1db/0x2d0 [ 27.206372] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.206395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.206421] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.206443] kasan_report+0x141/0x180 [ 27.206466] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.206491] kasan_check_range+0x10c/0x1c0 [ 27.206516] __kasan_check_write+0x18/0x20 [ 27.206539] kasan_atomics_helper+0xb6a/0x5450 [ 27.206561] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.206585] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.206609] ? pick_task_fair+0xce/0x340 [ 27.206635] ? kasan_atomics+0x152/0x310 [ 27.206671] kasan_atomics+0x1dc/0x310 [ 27.206694] ? __pfx_kasan_atomics+0x10/0x10 [ 27.206719] ? __pfx_read_tsc+0x10/0x10 [ 27.206742] ? ktime_get_ts64+0x86/0x230 [ 27.206767] kunit_try_run_case+0x1a5/0x480 [ 27.206803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.206824] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.206850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.206874] ? __kthread_parkme+0x82/0x180 [ 27.206897] ? preempt_count_sub+0x50/0x80 [ 27.206922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.206944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.206973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.207000] kthread+0x337/0x6f0 [ 27.207021] ? trace_preempt_on+0x20/0xc0 [ 27.207045] ? __pfx_kthread+0x10/0x10 [ 27.207068] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.207090] ? calculate_sigpending+0x7b/0xa0 [ 27.207115] ? __pfx_kthread+0x10/0x10 [ 27.207138] ret_from_fork+0x116/0x1d0 [ 27.207158] ? __pfx_kthread+0x10/0x10 [ 27.207180] ret_from_fork_asm+0x1a/0x30 [ 27.207212] </TASK> [ 27.207225] [ 27.218938] Allocated by task 314: [ 27.219111] kasan_save_stack+0x45/0x70 [ 27.219272] kasan_save_track+0x18/0x40 [ 27.219404] kasan_save_alloc_info+0x3b/0x50 [ 27.219547] __kasan_kmalloc+0xb7/0xc0 [ 27.220057] __kmalloc_cache_noprof+0x189/0x420 [ 27.220603] kasan_atomics+0x95/0x310 [ 27.221214] kunit_try_run_case+0x1a5/0x480 [ 27.221569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.221775] kthread+0x337/0x6f0 [ 27.221898] ret_from_fork+0x116/0x1d0 [ 27.222035] ret_from_fork_asm+0x1a/0x30 [ 27.222699] [ 27.222903] The buggy address belongs to the object at ffff888103eb9580 [ 27.222903] which belongs to the cache kmalloc-64 of size 64 [ 27.224081] The buggy address is located 0 bytes to the right of [ 27.224081] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.225406] [ 27.225582] The buggy address belongs to the physical page: [ 27.226337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.226590] flags: 0x200000000000000(node=0|zone=2) [ 27.226778] page_type: f5(slab) [ 27.226911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.227682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.228455] page dumped because: kasan: bad access detected [ 27.229157] [ 27.229346] Memory state around the buggy address: [ 27.229983] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.230729] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.231444] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.231936] ^ [ 27.232393] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.232975] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.233550] ================================================================== [ 27.009650] ================================================================== [ 27.010006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 27.010402] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.010905] [ 27.011288] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.011351] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.011366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.011392] Call Trace: [ 27.011412] <TASK> [ 27.011434] dump_stack_lvl+0x73/0xb0 [ 27.011472] print_report+0xd1/0x610 [ 27.011508] ? __virt_addr_valid+0x1db/0x2d0 [ 27.011534] ? kasan_atomics_helper+0x697/0x5450 [ 27.011567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.011593] ? kasan_atomics_helper+0x697/0x5450 [ 27.011616] kasan_report+0x141/0x180 [ 27.011640] ? kasan_atomics_helper+0x697/0x5450 [ 27.011685] kasan_check_range+0x10c/0x1c0 [ 27.011710] __kasan_check_write+0x18/0x20 [ 27.011733] kasan_atomics_helper+0x697/0x5450 [ 27.011768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.011792] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.011816] ? pick_task_fair+0xce/0x340 [ 27.011842] ? kasan_atomics+0x152/0x310 [ 27.011879] kasan_atomics+0x1dc/0x310 [ 27.011901] ? __pfx_kasan_atomics+0x10/0x10 [ 27.011926] ? __pfx_read_tsc+0x10/0x10 [ 27.012066] ? ktime_get_ts64+0x86/0x230 [ 27.012095] kunit_try_run_case+0x1a5/0x480 [ 27.012122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.012144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.012170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.012194] ? __kthread_parkme+0x82/0x180 [ 27.012217] ? preempt_count_sub+0x50/0x80 [ 27.012242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.012265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.012360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.012392] kthread+0x337/0x6f0 [ 27.012427] ? trace_preempt_on+0x20/0xc0 [ 27.012453] ? __pfx_kthread+0x10/0x10 [ 27.012475] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.012498] ? calculate_sigpending+0x7b/0xa0 [ 27.012524] ? __pfx_kthread+0x10/0x10 [ 27.012548] ret_from_fork+0x116/0x1d0 [ 27.012569] ? __pfx_kthread+0x10/0x10 [ 27.012590] ret_from_fork_asm+0x1a/0x30 [ 27.012623] </TASK> [ 27.012637] [ 27.021739] Allocated by task 314: [ 27.022069] kasan_save_stack+0x45/0x70 [ 27.022237] kasan_save_track+0x18/0x40 [ 27.022414] kasan_save_alloc_info+0x3b/0x50 [ 27.022621] __kasan_kmalloc+0xb7/0xc0 [ 27.022875] __kmalloc_cache_noprof+0x189/0x420 [ 27.023320] kasan_atomics+0x95/0x310 [ 27.023511] kunit_try_run_case+0x1a5/0x480 [ 27.023849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.024283] kthread+0x337/0x6f0 [ 27.024467] ret_from_fork+0x116/0x1d0 [ 27.024678] ret_from_fork_asm+0x1a/0x30 [ 27.024927] [ 27.025040] The buggy address belongs to the object at ffff888103eb9580 [ 27.025040] which belongs to the cache kmalloc-64 of size 64 [ 27.025576] The buggy address is located 0 bytes to the right of [ 27.025576] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.026331] [ 27.026464] The buggy address belongs to the physical page: [ 27.026687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.027277] flags: 0x200000000000000(node=0|zone=2) [ 27.027563] page_type: f5(slab) [ 27.027719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.028213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.028573] page dumped because: kasan: bad access detected [ 27.028861] [ 27.028950] Memory state around the buggy address: [ 27.029208] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.029513] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.029746] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.029997] ^ [ 27.030222] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.030650] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.031279] ================================================================== [ 27.382703] ================================================================== [ 27.383046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 27.383387] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.383707] [ 27.383828] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.383885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.383900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.383926] Call Trace: [ 27.383947] <TASK> [ 27.383982] dump_stack_lvl+0x73/0xb0 [ 27.384016] print_report+0xd1/0x610 [ 27.384040] ? __virt_addr_valid+0x1db/0x2d0 [ 27.384080] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.384101] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.384138] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.384161] kasan_report+0x141/0x180 [ 27.384183] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.384221] kasan_check_range+0x10c/0x1c0 [ 27.384246] __kasan_check_write+0x18/0x20 [ 27.384269] kasan_atomics_helper+0xfa9/0x5450 [ 27.384314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.384337] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.384372] ? pick_task_fair+0xce/0x340 [ 27.384399] ? kasan_atomics+0x152/0x310 [ 27.384426] kasan_atomics+0x1dc/0x310 [ 27.384449] ? __pfx_kasan_atomics+0x10/0x10 [ 27.384474] ? __pfx_read_tsc+0x10/0x10 [ 27.384498] ? ktime_get_ts64+0x86/0x230 [ 27.384523] kunit_try_run_case+0x1a5/0x480 [ 27.384548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.384569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.384594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.384619] ? __kthread_parkme+0x82/0x180 [ 27.384641] ? preempt_count_sub+0x50/0x80 [ 27.384675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.384697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.384742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.384772] kthread+0x337/0x6f0 [ 27.384794] ? trace_preempt_on+0x20/0xc0 [ 27.384819] ? __pfx_kthread+0x10/0x10 [ 27.384841] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.384863] ? calculate_sigpending+0x7b/0xa0 [ 27.384889] ? __pfx_kthread+0x10/0x10 [ 27.384911] ret_from_fork+0x116/0x1d0 [ 27.384932] ? __pfx_kthread+0x10/0x10 [ 27.384953] ret_from_fork_asm+0x1a/0x30 [ 27.384984] </TASK> [ 27.384996] [ 27.392533] Allocated by task 314: [ 27.392788] kasan_save_stack+0x45/0x70 [ 27.393001] kasan_save_track+0x18/0x40 [ 27.393191] kasan_save_alloc_info+0x3b/0x50 [ 27.393396] __kasan_kmalloc+0xb7/0xc0 [ 27.393578] __kmalloc_cache_noprof+0x189/0x420 [ 27.393788] kasan_atomics+0x95/0x310 [ 27.393922] kunit_try_run_case+0x1a5/0x480 [ 27.394135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.394416] kthread+0x337/0x6f0 [ 27.394582] ret_from_fork+0x116/0x1d0 [ 27.394785] ret_from_fork_asm+0x1a/0x30 [ 27.394928] [ 27.394995] The buggy address belongs to the object at ffff888103eb9580 [ 27.394995] which belongs to the cache kmalloc-64 of size 64 [ 27.395404] The buggy address is located 0 bytes to the right of [ 27.395404] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.395995] [ 27.396092] The buggy address belongs to the physical page: [ 27.396330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.396567] flags: 0x200000000000000(node=0|zone=2) [ 27.396818] page_type: f5(slab) [ 27.396988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.397347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.397671] page dumped because: kasan: bad access detected [ 27.397893] [ 27.397961] Memory state around the buggy address: [ 27.398187] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.398508] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.398851] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.399126] ^ [ 27.399351] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.399640] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.399947] ================================================================== [ 27.527403] ================================================================== [ 27.527801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 27.528079] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.528302] [ 27.528389] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.528445] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.528460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.528485] Call Trace: [ 27.528507] <TASK> [ 27.528527] dump_stack_lvl+0x73/0xb0 [ 27.528559] print_report+0xd1/0x610 [ 27.528583] ? __virt_addr_valid+0x1db/0x2d0 [ 27.528608] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.528630] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.528677] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.528700] kasan_report+0x141/0x180 [ 27.528745] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.528773] kasan_check_range+0x10c/0x1c0 [ 27.528797] __kasan_check_write+0x18/0x20 [ 27.528821] kasan_atomics_helper+0x12e6/0x5450 [ 27.528845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.528867] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.528892] ? pick_task_fair+0xce/0x340 [ 27.528919] ? kasan_atomics+0x152/0x310 [ 27.528946] kasan_atomics+0x1dc/0x310 [ 27.528969] ? __pfx_kasan_atomics+0x10/0x10 [ 27.528994] ? __pfx_read_tsc+0x10/0x10 [ 27.529017] ? ktime_get_ts64+0x86/0x230 [ 27.529044] kunit_try_run_case+0x1a5/0x480 [ 27.529069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.529090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.529116] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.529141] ? __kthread_parkme+0x82/0x180 [ 27.529164] ? preempt_count_sub+0x50/0x80 [ 27.529188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.529211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.529237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.529263] kthread+0x337/0x6f0 [ 27.529285] ? trace_preempt_on+0x20/0xc0 [ 27.529311] ? __pfx_kthread+0x10/0x10 [ 27.529333] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.529356] ? calculate_sigpending+0x7b/0xa0 [ 27.529380] ? __pfx_kthread+0x10/0x10 [ 27.529402] ret_from_fork+0x116/0x1d0 [ 27.529423] ? __pfx_kthread+0x10/0x10 [ 27.529444] ret_from_fork_asm+0x1a/0x30 [ 27.529477] </TASK> [ 27.529490] [ 27.536646] Allocated by task 314: [ 27.536876] kasan_save_stack+0x45/0x70 [ 27.537087] kasan_save_track+0x18/0x40 [ 27.537275] kasan_save_alloc_info+0x3b/0x50 [ 27.537484] __kasan_kmalloc+0xb7/0xc0 [ 27.537651] __kmalloc_cache_noprof+0x189/0x420 [ 27.537883] kasan_atomics+0x95/0x310 [ 27.538063] kunit_try_run_case+0x1a5/0x480 [ 27.538258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.538463] kthread+0x337/0x6f0 [ 27.538635] ret_from_fork+0x116/0x1d0 [ 27.538819] ret_from_fork_asm+0x1a/0x30 [ 27.539018] [ 27.539092] The buggy address belongs to the object at ffff888103eb9580 [ 27.539092] which belongs to the cache kmalloc-64 of size 64 [ 27.539473] The buggy address is located 0 bytes to the right of [ 27.539473] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.540027] [ 27.540125] The buggy address belongs to the physical page: [ 27.540381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.540624] flags: 0x200000000000000(node=0|zone=2) [ 27.540892] page_type: f5(slab) [ 27.541063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.541379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.541679] page dumped because: kasan: bad access detected [ 27.541869] [ 27.541935] Memory state around the buggy address: [ 27.542095] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.542306] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.542515] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.542838] ^ [ 27.543067] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.543382] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.543707] ================================================================== [ 27.663712] ================================================================== [ 27.664071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 27.664589] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.665495] [ 27.665719] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.665788] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.665803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.665830] Call Trace: [ 27.665852] <TASK> [ 27.665874] dump_stack_lvl+0x73/0xb0 [ 27.665908] print_report+0xd1/0x610 [ 27.665934] ? __virt_addr_valid+0x1db/0x2d0 [ 27.665982] ? kasan_atomics_helper+0x151d/0x5450 [ 27.666006] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.666032] ? kasan_atomics_helper+0x151d/0x5450 [ 27.666062] kasan_report+0x141/0x180 [ 27.666085] ? kasan_atomics_helper+0x151d/0x5450 [ 27.666111] kasan_check_range+0x10c/0x1c0 [ 27.666135] __kasan_check_write+0x18/0x20 [ 27.666159] kasan_atomics_helper+0x151d/0x5450 [ 27.666182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.666205] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.666229] ? pick_task_fair+0xce/0x340 [ 27.666255] ? kasan_atomics+0x152/0x310 [ 27.666282] kasan_atomics+0x1dc/0x310 [ 27.666305] ? __pfx_kasan_atomics+0x10/0x10 [ 27.666330] ? __pfx_read_tsc+0x10/0x10 [ 27.666353] ? ktime_get_ts64+0x86/0x230 [ 27.666379] kunit_try_run_case+0x1a5/0x480 [ 27.666404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.666425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.666450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.666475] ? __kthread_parkme+0x82/0x180 [ 27.666499] ? preempt_count_sub+0x50/0x80 [ 27.666524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.666547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.666577] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.666608] kthread+0x337/0x6f0 [ 27.666631] ? trace_preempt_on+0x20/0xc0 [ 27.666667] ? __pfx_kthread+0x10/0x10 [ 27.666690] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.666714] ? calculate_sigpending+0x7b/0xa0 [ 27.666740] ? __pfx_kthread+0x10/0x10 [ 27.666775] ret_from_fork+0x116/0x1d0 [ 27.666796] ? __pfx_kthread+0x10/0x10 [ 27.666820] ret_from_fork_asm+0x1a/0x30 [ 27.666853] </TASK> [ 27.666866] [ 27.675977] Allocated by task 314: [ 27.676135] kasan_save_stack+0x45/0x70 [ 27.676309] kasan_save_track+0x18/0x40 [ 27.676517] kasan_save_alloc_info+0x3b/0x50 [ 27.676740] __kasan_kmalloc+0xb7/0xc0 [ 27.676920] __kmalloc_cache_noprof+0x189/0x420 [ 27.677157] kasan_atomics+0x95/0x310 [ 27.677365] kunit_try_run_case+0x1a5/0x480 [ 27.677605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.677856] kthread+0x337/0x6f0 [ 27.678199] ret_from_fork+0x116/0x1d0 [ 27.678382] ret_from_fork_asm+0x1a/0x30 [ 27.678570] [ 27.678668] The buggy address belongs to the object at ffff888103eb9580 [ 27.678668] which belongs to the cache kmalloc-64 of size 64 [ 27.679150] The buggy address is located 0 bytes to the right of [ 27.679150] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.679988] [ 27.680095] The buggy address belongs to the physical page: [ 27.680325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.680629] flags: 0x200000000000000(node=0|zone=2) [ 27.680926] page_type: f5(slab) [ 27.681094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.681421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.681698] page dumped because: kasan: bad access detected [ 27.681994] [ 27.682097] Memory state around the buggy address: [ 27.682320] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.682617] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.682934] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.683244] ^ [ 27.683457] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.683740] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.684107] ================================================================== [ 27.860597] ================================================================== [ 27.860953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 27.861551] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.861923] [ 27.862049] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.862105] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.862120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.862146] Call Trace: [ 27.862166] <TASK> [ 27.862209] dump_stack_lvl+0x73/0xb0 [ 27.862256] print_report+0xd1/0x610 [ 27.862294] ? __virt_addr_valid+0x1db/0x2d0 [ 27.862331] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.862367] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.862407] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.862456] kasan_report+0x141/0x180 [ 27.862493] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.862533] kasan_check_range+0x10c/0x1c0 [ 27.862571] __kasan_check_write+0x18/0x20 [ 27.862594] kasan_atomics_helper+0x19e3/0x5450 [ 27.862618] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.862641] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.862677] ? pick_task_fair+0xce/0x340 [ 27.862703] ? kasan_atomics+0x152/0x310 [ 27.862730] kasan_atomics+0x1dc/0x310 [ 27.862753] ? __pfx_kasan_atomics+0x10/0x10 [ 27.862778] ? __pfx_read_tsc+0x10/0x10 [ 27.862800] ? ktime_get_ts64+0x86/0x230 [ 27.862826] kunit_try_run_case+0x1a5/0x480 [ 27.862849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.862882] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.862917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.862953] ? __kthread_parkme+0x82/0x180 [ 27.862975] ? preempt_count_sub+0x50/0x80 [ 27.862999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.863022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.863048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.863074] kthread+0x337/0x6f0 [ 27.863095] ? trace_preempt_on+0x20/0xc0 [ 27.863119] ? __pfx_kthread+0x10/0x10 [ 27.863141] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.863164] ? calculate_sigpending+0x7b/0xa0 [ 27.863189] ? __pfx_kthread+0x10/0x10 [ 27.863211] ret_from_fork+0x116/0x1d0 [ 27.863232] ? __pfx_kthread+0x10/0x10 [ 27.863254] ret_from_fork_asm+0x1a/0x30 [ 27.863287] </TASK> [ 27.863299] [ 27.871280] Allocated by task 314: [ 27.871495] kasan_save_stack+0x45/0x70 [ 27.871737] kasan_save_track+0x18/0x40 [ 27.871944] kasan_save_alloc_info+0x3b/0x50 [ 27.872170] __kasan_kmalloc+0xb7/0xc0 [ 27.872349] __kmalloc_cache_noprof+0x189/0x420 [ 27.872574] kasan_atomics+0x95/0x310 [ 27.872820] kunit_try_run_case+0x1a5/0x480 [ 27.873026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.873333] kthread+0x337/0x6f0 [ 27.873543] ret_from_fork+0x116/0x1d0 [ 27.873735] ret_from_fork_asm+0x1a/0x30 [ 27.874010] [ 27.874095] The buggy address belongs to the object at ffff888103eb9580 [ 27.874095] which belongs to the cache kmalloc-64 of size 64 [ 27.874574] The buggy address is located 0 bytes to the right of [ 27.874574] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.875158] [ 27.875262] The buggy address belongs to the physical page: [ 27.875507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.875936] flags: 0x200000000000000(node=0|zone=2) [ 27.876194] page_type: f5(slab) [ 27.876351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.876715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.877048] page dumped because: kasan: bad access detected [ 27.877318] [ 27.877405] Memory state around the buggy address: [ 27.877630] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.878058] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.878397] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.878760] ^ [ 27.879060] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.879268] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.879467] ================================================================== [ 27.999586] ================================================================== [ 28.000808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 28.001886] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.002294] [ 28.002403] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.002463] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.002478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.002504] Call Trace: [ 28.002526] <TASK> [ 28.002548] dump_stack_lvl+0x73/0xb0 [ 28.002586] print_report+0xd1/0x610 [ 28.002610] ? __virt_addr_valid+0x1db/0x2d0 [ 28.002635] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.002672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.002699] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.002722] kasan_report+0x141/0x180 [ 28.002899] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.002930] kasan_check_range+0x10c/0x1c0 [ 28.002956] __kasan_check_write+0x18/0x20 [ 28.002980] kasan_atomics_helper+0x1e12/0x5450 [ 28.003003] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.003071] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.003098] ? pick_task_fair+0xce/0x340 [ 28.003126] ? kasan_atomics+0x152/0x310 [ 28.003153] kasan_atomics+0x1dc/0x310 [ 28.003176] ? __pfx_kasan_atomics+0x10/0x10 [ 28.003200] ? __pfx_read_tsc+0x10/0x10 [ 28.003223] ? ktime_get_ts64+0x86/0x230 [ 28.003248] kunit_try_run_case+0x1a5/0x480 [ 28.003273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.003294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.003320] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.003344] ? __kthread_parkme+0x82/0x180 [ 28.003367] ? preempt_count_sub+0x50/0x80 [ 28.003393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.003415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.003442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.003469] kthread+0x337/0x6f0 [ 28.003490] ? trace_preempt_on+0x20/0xc0 [ 28.003515] ? __pfx_kthread+0x10/0x10 [ 28.003537] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.003560] ? calculate_sigpending+0x7b/0xa0 [ 28.003585] ? __pfx_kthread+0x10/0x10 [ 28.003608] ret_from_fork+0x116/0x1d0 [ 28.003629] ? __pfx_kthread+0x10/0x10 [ 28.003661] ret_from_fork_asm+0x1a/0x30 [ 28.003693] </TASK> [ 28.003706] [ 28.015456] Allocated by task 314: [ 28.015663] kasan_save_stack+0x45/0x70 [ 28.016018] kasan_save_track+0x18/0x40 [ 28.016500] kasan_save_alloc_info+0x3b/0x50 [ 28.016827] __kasan_kmalloc+0xb7/0xc0 [ 28.017135] __kmalloc_cache_noprof+0x189/0x420 [ 28.017536] kasan_atomics+0x95/0x310 [ 28.017734] kunit_try_run_case+0x1a5/0x480 [ 28.018103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.018337] kthread+0x337/0x6f0 [ 28.018491] ret_from_fork+0x116/0x1d0 [ 28.018670] ret_from_fork_asm+0x1a/0x30 [ 28.019073] [ 28.019299] The buggy address belongs to the object at ffff888103eb9580 [ 28.019299] which belongs to the cache kmalloc-64 of size 64 [ 28.020176] The buggy address is located 0 bytes to the right of [ 28.020176] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.020942] [ 28.021041] The buggy address belongs to the physical page: [ 28.021273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.021593] flags: 0x200000000000000(node=0|zone=2) [ 28.022184] page_type: f5(slab) [ 28.022499] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.023007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.023510] page dumped because: kasan: bad access detected [ 28.023971] [ 28.024197] Memory state around the buggy address: [ 28.024421] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.024720] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.025005] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.025280] ^ [ 28.025480] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.026194] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.026535] ================================================================== [ 26.965116] ================================================================== [ 26.965466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 26.965861] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.966208] [ 26.966352] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.966408] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.966423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.966449] Call Trace: [ 26.966472] <TASK> [ 26.966493] dump_stack_lvl+0x73/0xb0 [ 26.966526] print_report+0xd1/0x610 [ 26.966549] ? __virt_addr_valid+0x1db/0x2d0 [ 26.966704] ? kasan_atomics_helper+0x565/0x5450 [ 26.966725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.966775] ? kasan_atomics_helper+0x565/0x5450 [ 26.966806] kasan_report+0x141/0x180 [ 26.966830] ? kasan_atomics_helper+0x565/0x5450 [ 26.966857] kasan_check_range+0x10c/0x1c0 [ 26.966891] __kasan_check_write+0x18/0x20 [ 26.966915] kasan_atomics_helper+0x565/0x5450 [ 26.966938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.967002] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.967026] ? pick_task_fair+0xce/0x340 [ 26.967077] ? kasan_atomics+0x152/0x310 [ 26.967104] kasan_atomics+0x1dc/0x310 [ 26.967129] ? __pfx_kasan_atomics+0x10/0x10 [ 26.967154] ? __pfx_read_tsc+0x10/0x10 [ 26.967177] ? ktime_get_ts64+0x86/0x230 [ 26.967203] kunit_try_run_case+0x1a5/0x480 [ 26.967228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.967249] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.967285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.967310] ? __kthread_parkme+0x82/0x180 [ 26.967332] ? preempt_count_sub+0x50/0x80 [ 26.967368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.967392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.967418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.967453] kthread+0x337/0x6f0 [ 26.967475] ? trace_preempt_on+0x20/0xc0 [ 26.967499] ? __pfx_kthread+0x10/0x10 [ 26.967531] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.967555] ? calculate_sigpending+0x7b/0xa0 [ 26.967579] ? __pfx_kthread+0x10/0x10 [ 26.967602] ret_from_fork+0x116/0x1d0 [ 26.967630] ? __pfx_kthread+0x10/0x10 [ 26.967652] ret_from_fork_asm+0x1a/0x30 [ 26.967701] </TASK> [ 26.967714] [ 26.976940] Allocated by task 314: [ 26.977159] kasan_save_stack+0x45/0x70 [ 26.977540] kasan_save_track+0x18/0x40 [ 26.977715] kasan_save_alloc_info+0x3b/0x50 [ 26.977936] __kasan_kmalloc+0xb7/0xc0 [ 26.978124] __kmalloc_cache_noprof+0x189/0x420 [ 26.978676] kasan_atomics+0x95/0x310 [ 26.978905] kunit_try_run_case+0x1a5/0x480 [ 26.979189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.979451] kthread+0x337/0x6f0 [ 26.979631] ret_from_fork+0x116/0x1d0 [ 26.979868] ret_from_fork_asm+0x1a/0x30 [ 26.980189] [ 26.980299] The buggy address belongs to the object at ffff888103eb9580 [ 26.980299] which belongs to the cache kmalloc-64 of size 64 [ 26.980699] The buggy address is located 0 bytes to the right of [ 26.980699] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.981358] [ 26.981459] The buggy address belongs to the physical page: [ 26.981687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.982483] flags: 0x200000000000000(node=0|zone=2) [ 26.982736] page_type: f5(slab) [ 26.982886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.983474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.983915] page dumped because: kasan: bad access detected [ 26.984227] [ 26.984442] Memory state around the buggy address: [ 26.984619] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.984904] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.985250] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.985695] ^ [ 26.986060] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.986485] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.986914] ================================================================== [ 27.510096] ================================================================== [ 27.510402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 27.510736] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.511014] [ 27.511101] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.511154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.511168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.511193] Call Trace: [ 27.511214] <TASK> [ 27.511235] dump_stack_lvl+0x73/0xb0 [ 27.511265] print_report+0xd1/0x610 [ 27.511288] ? __virt_addr_valid+0x1db/0x2d0 [ 27.511313] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.511334] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.511361] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.511383] kasan_report+0x141/0x180 [ 27.511406] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.511432] __asan_report_load4_noabort+0x18/0x20 [ 27.511456] kasan_atomics_helper+0x49e8/0x5450 [ 27.511479] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.511502] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.511527] ? pick_task_fair+0xce/0x340 [ 27.511554] ? kasan_atomics+0x152/0x310 [ 27.511581] kasan_atomics+0x1dc/0x310 [ 27.511604] ? __pfx_kasan_atomics+0x10/0x10 [ 27.511632] ? __pfx_read_tsc+0x10/0x10 [ 27.511867] ? ktime_get_ts64+0x86/0x230 [ 27.511903] kunit_try_run_case+0x1a5/0x480 [ 27.511930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.511952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.511979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.512004] ? __kthread_parkme+0x82/0x180 [ 27.512027] ? preempt_count_sub+0x50/0x80 [ 27.512053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.512076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.512103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.512130] kthread+0x337/0x6f0 [ 27.512150] ? trace_preempt_on+0x20/0xc0 [ 27.512175] ? __pfx_kthread+0x10/0x10 [ 27.512197] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.512220] ? calculate_sigpending+0x7b/0xa0 [ 27.512246] ? __pfx_kthread+0x10/0x10 [ 27.512269] ret_from_fork+0x116/0x1d0 [ 27.512290] ? __pfx_kthread+0x10/0x10 [ 27.512311] ret_from_fork_asm+0x1a/0x30 [ 27.512345] </TASK> [ 27.512357] [ 27.519424] Allocated by task 314: [ 27.519575] kasan_save_stack+0x45/0x70 [ 27.519780] kasan_save_track+0x18/0x40 [ 27.519947] kasan_save_alloc_info+0x3b/0x50 [ 27.520093] __kasan_kmalloc+0xb7/0xc0 [ 27.520269] __kmalloc_cache_noprof+0x189/0x420 [ 27.520487] kasan_atomics+0x95/0x310 [ 27.520680] kunit_try_run_case+0x1a5/0x480 [ 27.520887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.521078] kthread+0x337/0x6f0 [ 27.521198] ret_from_fork+0x116/0x1d0 [ 27.521380] ret_from_fork_asm+0x1a/0x30 [ 27.521558] [ 27.521644] The buggy address belongs to the object at ffff888103eb9580 [ 27.521644] which belongs to the cache kmalloc-64 of size 64 [ 27.522025] The buggy address is located 0 bytes to the right of [ 27.522025] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.522391] [ 27.522460] The buggy address belongs to the physical page: [ 27.522627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.522924] flags: 0x200000000000000(node=0|zone=2) [ 27.523157] page_type: f5(slab) [ 27.523324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.523670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.524014] page dumped because: kasan: bad access detected [ 27.524243] [ 27.524330] Memory state around the buggy address: [ 27.524548] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.524893] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.525160] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.525365] ^ [ 27.525516] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.525795] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.526121] ================================================================== [ 27.357359] ================================================================== [ 27.357705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 27.358392] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.358847] [ 27.358946] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.359002] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.359017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.359308] Call Trace: [ 27.359332] <TASK> [ 27.359353] dump_stack_lvl+0x73/0xb0 [ 27.359390] print_report+0xd1/0x610 [ 27.359414] ? __virt_addr_valid+0x1db/0x2d0 [ 27.359439] ? kasan_atomics_helper+0xf10/0x5450 [ 27.359461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.359487] ? kasan_atomics_helper+0xf10/0x5450 [ 27.359510] kasan_report+0x141/0x180 [ 27.359533] ? kasan_atomics_helper+0xf10/0x5450 [ 27.359560] kasan_check_range+0x10c/0x1c0 [ 27.359583] __kasan_check_write+0x18/0x20 [ 27.359607] kasan_atomics_helper+0xf10/0x5450 [ 27.359630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.359666] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.359691] ? pick_task_fair+0xce/0x340 [ 27.359717] ? kasan_atomics+0x152/0x310 [ 27.359743] kasan_atomics+0x1dc/0x310 [ 27.359766] ? __pfx_kasan_atomics+0x10/0x10 [ 27.359790] ? __pfx_read_tsc+0x10/0x10 [ 27.359813] ? ktime_get_ts64+0x86/0x230 [ 27.359838] kunit_try_run_case+0x1a5/0x480 [ 27.359862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.359884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.359910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.359934] ? __kthread_parkme+0x82/0x180 [ 27.359957] ? preempt_count_sub+0x50/0x80 [ 27.359981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.360004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.360029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.360055] kthread+0x337/0x6f0 [ 27.360076] ? trace_preempt_on+0x20/0xc0 [ 27.360101] ? __pfx_kthread+0x10/0x10 [ 27.360122] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.360145] ? calculate_sigpending+0x7b/0xa0 [ 27.360170] ? __pfx_kthread+0x10/0x10 [ 27.360193] ret_from_fork+0x116/0x1d0 [ 27.360213] ? __pfx_kthread+0x10/0x10 [ 27.360234] ret_from_fork_asm+0x1a/0x30 [ 27.360266] </TASK> [ 27.360279] [ 27.369649] Allocated by task 314: [ 27.370017] kasan_save_stack+0x45/0x70 [ 27.370291] kasan_save_track+0x18/0x40 [ 27.370421] kasan_save_alloc_info+0x3b/0x50 [ 27.370563] __kasan_kmalloc+0xb7/0xc0 [ 27.370698] __kmalloc_cache_noprof+0x189/0x420 [ 27.371210] kasan_atomics+0x95/0x310 [ 27.371401] kunit_try_run_case+0x1a5/0x480 [ 27.371603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.371817] kthread+0x337/0x6f0 [ 27.373395] ret_from_fork+0x116/0x1d0 [ 27.373549] ret_from_fork_asm+0x1a/0x30 [ 27.373705] [ 27.373782] The buggy address belongs to the object at ffff888103eb9580 [ 27.373782] which belongs to the cache kmalloc-64 of size 64 [ 27.374141] The buggy address is located 0 bytes to the right of [ 27.374141] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.374504] [ 27.374574] The buggy address belongs to the physical page: [ 27.374762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.375001] flags: 0x200000000000000(node=0|zone=2) [ 27.375164] page_type: f5(slab) [ 27.375289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.375523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.377931] page dumped because: kasan: bad access detected [ 27.378615] [ 27.379110] Memory state around the buggy address: [ 27.379770] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.380328] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.380574] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.380934] ^ [ 27.381176] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.381463] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.381796] ================================================================== [ 28.144755] ================================================================== [ 28.145083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 28.145387] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 28.145706] [ 28.145869] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 28.145923] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.145937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.145962] Call Trace: [ 28.145982] <TASK> [ 28.146001] dump_stack_lvl+0x73/0xb0 [ 28.146031] print_report+0xd1/0x610 [ 28.146060] ? __virt_addr_valid+0x1db/0x2d0 [ 28.146084] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.146105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.146132] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.146154] kasan_report+0x141/0x180 [ 28.146177] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.146203] __asan_report_load8_noabort+0x18/0x20 [ 28.146227] kasan_atomics_helper+0x4fb2/0x5450 [ 28.146252] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.146277] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.146302] ? pick_task_fair+0xce/0x340 [ 28.146327] ? kasan_atomics+0x152/0x310 [ 28.146355] kasan_atomics+0x1dc/0x310 [ 28.146380] ? __pfx_kasan_atomics+0x10/0x10 [ 28.146404] ? __pfx_read_tsc+0x10/0x10 [ 28.146427] ? ktime_get_ts64+0x86/0x230 [ 28.146453] kunit_try_run_case+0x1a5/0x480 [ 28.146477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.146498] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.146524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.146549] ? __kthread_parkme+0x82/0x180 [ 28.146571] ? preempt_count_sub+0x50/0x80 [ 28.146596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.146618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.146644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.146681] kthread+0x337/0x6f0 [ 28.146702] ? trace_preempt_on+0x20/0xc0 [ 28.146726] ? __pfx_kthread+0x10/0x10 [ 28.146758] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.146781] ? calculate_sigpending+0x7b/0xa0 [ 28.146806] ? __pfx_kthread+0x10/0x10 [ 28.146828] ret_from_fork+0x116/0x1d0 [ 28.146849] ? __pfx_kthread+0x10/0x10 [ 28.146871] ret_from_fork_asm+0x1a/0x30 [ 28.146903] </TASK> [ 28.146915] [ 28.154119] Allocated by task 314: [ 28.154261] kasan_save_stack+0x45/0x70 [ 28.154408] kasan_save_track+0x18/0x40 [ 28.154557] kasan_save_alloc_info+0x3b/0x50 [ 28.154780] __kasan_kmalloc+0xb7/0xc0 [ 28.154971] __kmalloc_cache_noprof+0x189/0x420 [ 28.155185] kasan_atomics+0x95/0x310 [ 28.155818] kunit_try_run_case+0x1a5/0x480 [ 28.156057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.156470] kthread+0x337/0x6f0 [ 28.156645] ret_from_fork+0x116/0x1d0 [ 28.161818] ret_from_fork_asm+0x1a/0x30 [ 28.162081] [ 28.162182] The buggy address belongs to the object at ffff888103eb9580 [ 28.162182] which belongs to the cache kmalloc-64 of size 64 [ 28.162648] The buggy address is located 0 bytes to the right of [ 28.162648] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 28.164752] [ 28.165335] The buggy address belongs to the physical page: [ 28.165904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 28.166153] flags: 0x200000000000000(node=0|zone=2) [ 28.166315] page_type: f5(slab) [ 28.166433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.166690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.167069] page dumped because: kasan: bad access detected [ 28.167329] [ 28.167419] Memory state around the buggy address: [ 28.167645] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.167983] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.168275] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.168538] ^ [ 28.168753] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.169041] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.169322] ================================================================== [ 27.419351] ================================================================== [ 27.419623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 27.420069] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.420409] [ 27.420521] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.420630] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.420646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.420680] Call Trace: [ 27.420701] <TASK> [ 27.420741] dump_stack_lvl+0x73/0xb0 [ 27.420776] print_report+0xd1/0x610 [ 27.420800] ? __virt_addr_valid+0x1db/0x2d0 [ 27.420827] ? kasan_atomics_helper+0x1079/0x5450 [ 27.420849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.420877] ? kasan_atomics_helper+0x1079/0x5450 [ 27.420899] kasan_report+0x141/0x180 [ 27.420922] ? kasan_atomics_helper+0x1079/0x5450 [ 27.420948] kasan_check_range+0x10c/0x1c0 [ 27.420973] __kasan_check_write+0x18/0x20 [ 27.420998] kasan_atomics_helper+0x1079/0x5450 [ 27.421020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.421043] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.421079] ? pick_task_fair+0xce/0x340 [ 27.421104] ? kasan_atomics+0x152/0x310 [ 27.421143] kasan_atomics+0x1dc/0x310 [ 27.421166] ? __pfx_kasan_atomics+0x10/0x10 [ 27.421191] ? __pfx_read_tsc+0x10/0x10 [ 27.421213] ? ktime_get_ts64+0x86/0x230 [ 27.421238] kunit_try_run_case+0x1a5/0x480 [ 27.421263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.421284] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.421310] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.421334] ? __kthread_parkme+0x82/0x180 [ 27.421356] ? preempt_count_sub+0x50/0x80 [ 27.421381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.421405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.421431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.421457] kthread+0x337/0x6f0 [ 27.421479] ? trace_preempt_on+0x20/0xc0 [ 27.421503] ? __pfx_kthread+0x10/0x10 [ 27.421525] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.421549] ? calculate_sigpending+0x7b/0xa0 [ 27.421574] ? __pfx_kthread+0x10/0x10 [ 27.421597] ret_from_fork+0x116/0x1d0 [ 27.421617] ? __pfx_kthread+0x10/0x10 [ 27.421639] ret_from_fork_asm+0x1a/0x30 [ 27.421691] </TASK> [ 27.421703] [ 27.429093] Allocated by task 314: [ 27.429293] kasan_save_stack+0x45/0x70 [ 27.429536] kasan_save_track+0x18/0x40 [ 27.429780] kasan_save_alloc_info+0x3b/0x50 [ 27.429991] __kasan_kmalloc+0xb7/0xc0 [ 27.430196] __kmalloc_cache_noprof+0x189/0x420 [ 27.430449] kasan_atomics+0x95/0x310 [ 27.430643] kunit_try_run_case+0x1a5/0x480 [ 27.430875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.431074] kthread+0x337/0x6f0 [ 27.431244] ret_from_fork+0x116/0x1d0 [ 27.431454] ret_from_fork_asm+0x1a/0x30 [ 27.431620] [ 27.431703] The buggy address belongs to the object at ffff888103eb9580 [ 27.431703] which belongs to the cache kmalloc-64 of size 64 [ 27.432213] The buggy address is located 0 bytes to the right of [ 27.432213] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.432668] [ 27.432767] The buggy address belongs to the physical page: [ 27.432937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.433179] flags: 0x200000000000000(node=0|zone=2) [ 27.433432] page_type: f5(slab) [ 27.433599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.433970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.434311] page dumped because: kasan: bad access detected [ 27.434557] [ 27.434650] Memory state around the buggy address: [ 27.434913] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.435153] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.435362] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.435617] ^ [ 27.435888] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.436215] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.436552] ================================================================== [ 27.904398] ================================================================== [ 27.905130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 27.905481] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.905854] [ 27.905959] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.906016] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.906030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.906066] Call Trace: [ 27.906087] <TASK> [ 27.906109] dump_stack_lvl+0x73/0xb0 [ 27.906141] print_report+0xd1/0x610 [ 27.906164] ? __virt_addr_valid+0x1db/0x2d0 [ 27.906189] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.906211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.906238] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.906260] kasan_report+0x141/0x180 [ 27.906283] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.906309] kasan_check_range+0x10c/0x1c0 [ 27.906333] __kasan_check_write+0x18/0x20 [ 27.906357] kasan_atomics_helper+0x1b22/0x5450 [ 27.906381] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.906405] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.906430] ? pick_task_fair+0xce/0x340 [ 27.906456] ? kasan_atomics+0x152/0x310 [ 27.906484] kasan_atomics+0x1dc/0x310 [ 27.906507] ? __pfx_kasan_atomics+0x10/0x10 [ 27.906532] ? __pfx_read_tsc+0x10/0x10 [ 27.906555] ? ktime_get_ts64+0x86/0x230 [ 27.906580] kunit_try_run_case+0x1a5/0x480 [ 27.906605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.906626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.906666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.906691] ? __kthread_parkme+0x82/0x180 [ 27.906715] ? preempt_count_sub+0x50/0x80 [ 27.906740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.906763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.906792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.906818] kthread+0x337/0x6f0 [ 27.906840] ? trace_preempt_on+0x20/0xc0 [ 27.906864] ? __pfx_kthread+0x10/0x10 [ 27.906885] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.906908] ? calculate_sigpending+0x7b/0xa0 [ 27.906934] ? __pfx_kthread+0x10/0x10 [ 27.906955] ret_from_fork+0x116/0x1d0 [ 27.906976] ? __pfx_kthread+0x10/0x10 [ 27.906996] ret_from_fork_asm+0x1a/0x30 [ 27.907029] </TASK> [ 27.907042] [ 27.916122] Allocated by task 314: [ 27.916289] kasan_save_stack+0x45/0x70 [ 27.916453] kasan_save_track+0x18/0x40 [ 27.916581] kasan_save_alloc_info+0x3b/0x50 [ 27.916955] __kasan_kmalloc+0xb7/0xc0 [ 27.917327] __kmalloc_cache_noprof+0x189/0x420 [ 27.917826] kasan_atomics+0x95/0x310 [ 27.918212] kunit_try_run_case+0x1a5/0x480 [ 27.918628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.919163] kthread+0x337/0x6f0 [ 27.919497] ret_from_fork+0x116/0x1d0 [ 27.919890] ret_from_fork_asm+0x1a/0x30 [ 27.920287] [ 27.920451] The buggy address belongs to the object at ffff888103eb9580 [ 27.920451] which belongs to the cache kmalloc-64 of size 64 [ 27.921118] The buggy address is located 0 bytes to the right of [ 27.921118] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.921473] [ 27.921542] The buggy address belongs to the physical page: [ 27.921878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.922575] flags: 0x200000000000000(node=0|zone=2) [ 27.923052] page_type: f5(slab) [ 27.923376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.924071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.924719] page dumped because: kasan: bad access detected [ 27.925236] [ 27.925385] Memory state around the buggy address: [ 27.925791] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.926146] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.926721] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.927062] ^ [ 27.927213] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.927415] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.927615] ================================================================== [ 26.943314] ================================================================== [ 26.943623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 26.944238] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 26.944560] [ 26.944682] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.944747] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.944762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.944798] Call Trace: [ 26.944820] <TASK> [ 26.944842] dump_stack_lvl+0x73/0xb0 [ 26.944875] print_report+0xd1/0x610 [ 26.944899] ? __virt_addr_valid+0x1db/0x2d0 [ 26.944925] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.944947] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.944973] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.945043] kasan_report+0x141/0x180 [ 26.945069] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.945095] __asan_report_store4_noabort+0x1b/0x30 [ 26.945144] kasan_atomics_helper+0x4b3a/0x5450 [ 26.945168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.945190] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.945215] ? pick_task_fair+0xce/0x340 [ 26.945242] ? kasan_atomics+0x152/0x310 [ 26.945269] kasan_atomics+0x1dc/0x310 [ 26.945293] ? __pfx_kasan_atomics+0x10/0x10 [ 26.945318] ? __pfx_read_tsc+0x10/0x10 [ 26.945350] ? ktime_get_ts64+0x86/0x230 [ 26.945376] kunit_try_run_case+0x1a5/0x480 [ 26.945400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.945433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.945459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.945484] ? __kthread_parkme+0x82/0x180 [ 26.945510] ? preempt_count_sub+0x50/0x80 [ 26.945535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.945558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.945585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.945611] kthread+0x337/0x6f0 [ 26.945632] ? trace_preempt_on+0x20/0xc0 [ 26.945667] ? __pfx_kthread+0x10/0x10 [ 26.945689] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.945712] ? calculate_sigpending+0x7b/0xa0 [ 26.945737] ? __pfx_kthread+0x10/0x10 [ 26.945760] ret_from_fork+0x116/0x1d0 [ 26.945790] ? __pfx_kthread+0x10/0x10 [ 26.945812] ret_from_fork_asm+0x1a/0x30 [ 26.945845] </TASK> [ 26.945867] [ 26.954868] Allocated by task 314: [ 26.955036] kasan_save_stack+0x45/0x70 [ 26.955401] kasan_save_track+0x18/0x40 [ 26.955753] kasan_save_alloc_info+0x3b/0x50 [ 26.956012] __kasan_kmalloc+0xb7/0xc0 [ 26.956213] __kmalloc_cache_noprof+0x189/0x420 [ 26.956762] kasan_atomics+0x95/0x310 [ 26.956948] kunit_try_run_case+0x1a5/0x480 [ 26.957220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.957450] kthread+0x337/0x6f0 [ 26.957643] ret_from_fork+0x116/0x1d0 [ 26.957840] ret_from_fork_asm+0x1a/0x30 [ 26.958071] [ 26.958141] The buggy address belongs to the object at ffff888103eb9580 [ 26.958141] which belongs to the cache kmalloc-64 of size 64 [ 26.958724] The buggy address is located 0 bytes to the right of [ 26.958724] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 26.959479] [ 26.959581] The buggy address belongs to the physical page: [ 26.959835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 26.960394] flags: 0x200000000000000(node=0|zone=2) [ 26.960576] page_type: f5(slab) [ 26.960781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.961206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.961636] page dumped because: kasan: bad access detected [ 26.961934] [ 26.962102] Memory state around the buggy address: [ 26.962317] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.962565] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.962970] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.963326] ^ [ 26.963472] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.964023] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.964587] ================================================================== [ 27.544536] ================================================================== [ 27.544947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 27.545299] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.545622] [ 27.545754] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.545810] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.545824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.545851] Call Trace: [ 27.545872] <TASK> [ 27.545894] dump_stack_lvl+0x73/0xb0 [ 27.545926] print_report+0xd1/0x610 [ 27.545950] ? __virt_addr_valid+0x1db/0x2d0 [ 27.545976] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.545997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.546025] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.546054] kasan_report+0x141/0x180 [ 27.546077] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.546103] __asan_report_load4_noabort+0x18/0x20 [ 27.546128] kasan_atomics_helper+0x49ce/0x5450 [ 27.546152] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.546176] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.546201] ? pick_task_fair+0xce/0x340 [ 27.546227] ? kasan_atomics+0x152/0x310 [ 27.546253] kasan_atomics+0x1dc/0x310 [ 27.546277] ? __pfx_kasan_atomics+0x10/0x10 [ 27.546301] ? __pfx_read_tsc+0x10/0x10 [ 27.546325] ? ktime_get_ts64+0x86/0x230 [ 27.546351] kunit_try_run_case+0x1a5/0x480 [ 27.546376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.546397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.546423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.546448] ? __kthread_parkme+0x82/0x180 [ 27.546471] ? preempt_count_sub+0x50/0x80 [ 27.546496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.546519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.546547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.546573] kthread+0x337/0x6f0 [ 27.546594] ? trace_preempt_on+0x20/0xc0 [ 27.546620] ? __pfx_kthread+0x10/0x10 [ 27.546641] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.546674] ? calculate_sigpending+0x7b/0xa0 [ 27.546699] ? __pfx_kthread+0x10/0x10 [ 27.546722] ret_from_fork+0x116/0x1d0 [ 27.546762] ? __pfx_kthread+0x10/0x10 [ 27.546783] ret_from_fork_asm+0x1a/0x30 [ 27.546816] </TASK> [ 27.546828] [ 27.553906] Allocated by task 314: [ 27.554101] kasan_save_stack+0x45/0x70 [ 27.554287] kasan_save_track+0x18/0x40 [ 27.554453] kasan_save_alloc_info+0x3b/0x50 [ 27.554627] __kasan_kmalloc+0xb7/0xc0 [ 27.554843] __kmalloc_cache_noprof+0x189/0x420 [ 27.555037] kasan_atomics+0x95/0x310 [ 27.555218] kunit_try_run_case+0x1a5/0x480 [ 27.555393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.555608] kthread+0x337/0x6f0 [ 27.555789] ret_from_fork+0x116/0x1d0 [ 27.555951] ret_from_fork_asm+0x1a/0x30 [ 27.556136] [ 27.556209] The buggy address belongs to the object at ffff888103eb9580 [ 27.556209] which belongs to the cache kmalloc-64 of size 64 [ 27.556665] The buggy address is located 0 bytes to the right of [ 27.556665] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.557045] [ 27.557115] The buggy address belongs to the physical page: [ 27.557282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.557516] flags: 0x200000000000000(node=0|zone=2) [ 27.557684] page_type: f5(slab) [ 27.557827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.558122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.558453] page dumped because: kasan: bad access detected [ 27.558703] [ 27.558814] Memory state around the buggy address: [ 27.559035] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.559348] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.559687] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.559897] ^ [ 27.560044] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.560246] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.560445] ================================================================== [ 27.074581] ================================================================== [ 27.075251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 27.075598] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.075973] [ 27.076087] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.076142] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.076157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.076183] Call Trace: [ 27.076257] <TASK> [ 27.076293] dump_stack_lvl+0x73/0xb0 [ 27.076328] print_report+0xd1/0x610 [ 27.076351] ? __virt_addr_valid+0x1db/0x2d0 [ 27.076386] ? kasan_atomics_helper+0x860/0x5450 [ 27.076408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.076446] ? kasan_atomics_helper+0x860/0x5450 [ 27.076467] kasan_report+0x141/0x180 [ 27.076491] ? kasan_atomics_helper+0x860/0x5450 [ 27.076516] kasan_check_range+0x10c/0x1c0 [ 27.076549] __kasan_check_write+0x18/0x20 [ 27.076574] kasan_atomics_helper+0x860/0x5450 [ 27.076606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.076629] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.076665] ? pick_task_fair+0xce/0x340 [ 27.076691] ? kasan_atomics+0x152/0x310 [ 27.076726] kasan_atomics+0x1dc/0x310 [ 27.076759] ? __pfx_kasan_atomics+0x10/0x10 [ 27.076794] ? __pfx_read_tsc+0x10/0x10 [ 27.076817] ? ktime_get_ts64+0x86/0x230 [ 27.076842] kunit_try_run_case+0x1a5/0x480 [ 27.076867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.076889] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.076915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.076939] ? __kthread_parkme+0x82/0x180 [ 27.077250] ? preempt_count_sub+0x50/0x80 [ 27.077275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.077299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.077328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.077354] kthread+0x337/0x6f0 [ 27.077376] ? trace_preempt_on+0x20/0xc0 [ 27.077415] ? __pfx_kthread+0x10/0x10 [ 27.077438] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.077461] ? calculate_sigpending+0x7b/0xa0 [ 27.077500] ? __pfx_kthread+0x10/0x10 [ 27.077523] ret_from_fork+0x116/0x1d0 [ 27.077544] ? __pfx_kthread+0x10/0x10 [ 27.077566] ret_from_fork_asm+0x1a/0x30 [ 27.077598] </TASK> [ 27.077612] [ 27.086864] Allocated by task 314: [ 27.087076] kasan_save_stack+0x45/0x70 [ 27.087331] kasan_save_track+0x18/0x40 [ 27.087474] kasan_save_alloc_info+0x3b/0x50 [ 27.087694] __kasan_kmalloc+0xb7/0xc0 [ 27.088076] __kmalloc_cache_noprof+0x189/0x420 [ 27.088303] kasan_atomics+0x95/0x310 [ 27.088494] kunit_try_run_case+0x1a5/0x480 [ 27.088770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.089451] kthread+0x337/0x6f0 [ 27.089757] ret_from_fork+0x116/0x1d0 [ 27.089951] ret_from_fork_asm+0x1a/0x30 [ 27.090093] [ 27.090160] The buggy address belongs to the object at ffff888103eb9580 [ 27.090160] which belongs to the cache kmalloc-64 of size 64 [ 27.091360] The buggy address is located 0 bytes to the right of [ 27.091360] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.092487] [ 27.092575] The buggy address belongs to the physical page: [ 27.092761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.093095] flags: 0x200000000000000(node=0|zone=2) [ 27.093871] page_type: f5(slab) [ 27.094224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.094922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.095627] page dumped because: kasan: bad access detected [ 27.096200] [ 27.096400] Memory state around the buggy address: [ 27.096929] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.097806] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.098504] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.099198] ^ [ 27.099630] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.100340] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.101414] ================================================================== [ 27.733063] ================================================================== [ 27.733438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 27.733786] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314 [ 27.734276] [ 27.734381] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 27.734437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.734473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.734499] Call Trace: [ 27.734535] <TASK> [ 27.734569] dump_stack_lvl+0x73/0xb0 [ 27.734617] print_report+0xd1/0x610 [ 27.734641] ? __virt_addr_valid+0x1db/0x2d0 [ 27.734678] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.734701] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.734741] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.734778] kasan_report+0x141/0x180 [ 27.734801] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.734945] kasan_check_range+0x10c/0x1c0 [ 27.734972] __kasan_check_write+0x18/0x20 [ 27.734996] kasan_atomics_helper+0x16e7/0x5450 [ 27.735019] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.735041] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.735067] ? pick_task_fair+0xce/0x340 [ 27.735093] ? kasan_atomics+0x152/0x310 [ 27.735119] kasan_atomics+0x1dc/0x310 [ 27.735143] ? __pfx_kasan_atomics+0x10/0x10 [ 27.735167] ? __pfx_read_tsc+0x10/0x10 [ 27.735191] ? ktime_get_ts64+0x86/0x230 [ 27.735216] kunit_try_run_case+0x1a5/0x480 [ 27.735240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.735261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.735286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.735311] ? __kthread_parkme+0x82/0x180 [ 27.735334] ? preempt_count_sub+0x50/0x80 [ 27.735358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.735381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.735407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.735433] kthread+0x337/0x6f0 [ 27.735454] ? trace_preempt_on+0x20/0xc0 [ 27.735479] ? __pfx_kthread+0x10/0x10 [ 27.735500] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.735523] ? calculate_sigpending+0x7b/0xa0 [ 27.735548] ? __pfx_kthread+0x10/0x10 [ 27.735570] ret_from_fork+0x116/0x1d0 [ 27.735591] ? __pfx_kthread+0x10/0x10 [ 27.735612] ret_from_fork_asm+0x1a/0x30 [ 27.735644] </TASK> [ 27.735668] [ 27.748549] Allocated by task 314: [ 27.748938] kasan_save_stack+0x45/0x70 [ 27.749266] kasan_save_track+0x18/0x40 [ 27.749450] kasan_save_alloc_info+0x3b/0x50 [ 27.749642] __kasan_kmalloc+0xb7/0xc0 [ 27.749804] __kmalloc_cache_noprof+0x189/0x420 [ 27.750139] kasan_atomics+0x95/0x310 [ 27.750710] kunit_try_run_case+0x1a5/0x480 [ 27.750952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.751213] kthread+0x337/0x6f0 [ 27.751588] ret_from_fork+0x116/0x1d0 [ 27.751904] ret_from_fork_asm+0x1a/0x30 [ 27.752314] [ 27.752523] The buggy address belongs to the object at ffff888103eb9580 [ 27.752523] which belongs to the cache kmalloc-64 of size 64 [ 27.753152] The buggy address is located 0 bytes to the right of [ 27.753152] allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0) [ 27.753833] [ 27.754101] The buggy address belongs to the physical page: [ 27.754445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 27.754795] flags: 0x200000000000000(node=0|zone=2) [ 27.755231] page_type: f5(slab) [ 27.755502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.755977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.756410] page dumped because: kasan: bad access detected [ 27.756756] [ 27.756857] Memory state around the buggy address: [ 27.757222] ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.757624] ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.758181] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.758587] ^ [ 27.758937] ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.759352] ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.759683] ==================================================================