Date
July 15, 2025, 11:35 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 75.442131] ================================================================== [ 75.449206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 75.456583] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 75.463961] [ 75.465442] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 75.465492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.465508] Hardware name: WinLink E850-96 board (DT) [ 75.465525] Call trace: [ 75.465537] show_stack+0x20/0x38 (C) [ 75.465569] dump_stack_lvl+0x8c/0xd0 [ 75.465600] print_report+0x118/0x5d0 [ 75.465627] kasan_report+0xdc/0x128 [ 75.465655] kasan_check_range+0x100/0x1a8 [ 75.465684] __kasan_check_write+0x20/0x30 [ 75.465713] kasan_atomics_helper+0x1128/0x4858 [ 75.465749] kasan_atomics+0x198/0x2e0 [ 75.465780] kunit_try_run_case+0x170/0x3f0 [ 75.465811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.465848] kthread+0x328/0x630 [ 75.465874] ret_from_fork+0x10/0x20 [ 75.465904] [ 75.536964] Allocated by task 346: [ 75.540350] kasan_save_stack+0x3c/0x68 [ 75.544168] kasan_save_track+0x20/0x40 [ 75.547988] kasan_save_alloc_info+0x40/0x58 [ 75.552241] __kasan_kmalloc+0xd4/0xd8 [ 75.555973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.560487] kasan_atomics+0xb8/0x2e0 [ 75.564133] kunit_try_run_case+0x170/0x3f0 [ 75.568300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.573768] kthread+0x328/0x630 [ 75.576980] ret_from_fork+0x10/0x20 [ 75.580539] [ 75.582014] The buggy address belongs to the object at ffff00080851b080 [ 75.582014] which belongs to the cache kmalloc-64 of size 64 [ 75.594342] The buggy address is located 0 bytes to the right of [ 75.594342] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 75.607188] [ 75.608664] The buggy address belongs to the physical page: [ 75.614222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 75.622205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.628716] page_type: f5(slab) [ 75.631848] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.639573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.647291] page dumped because: kasan: bad access detected [ 75.652847] [ 75.654322] Memory state around the buggy address: [ 75.659101] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.666305] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.673511] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.680711] ^ [ 75.685489] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.692694] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.699895] ================================================================== [ 67.255472] ================================================================== [ 67.262523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 67.269815] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 67.277192] [ 67.278673] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 67.278724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.278741] Hardware name: WinLink E850-96 board (DT) [ 67.278760] Call trace: [ 67.278773] show_stack+0x20/0x38 (C) [ 67.278804] dump_stack_lvl+0x8c/0xd0 [ 67.278837] print_report+0x118/0x5d0 [ 67.278864] kasan_report+0xdc/0x128 [ 67.278890] kasan_check_range+0x100/0x1a8 [ 67.278920] __kasan_check_write+0x20/0x30 [ 67.278951] kasan_atomics_helper+0x61c/0x4858 [ 67.278982] kasan_atomics+0x198/0x2e0 [ 67.279015] kunit_try_run_case+0x170/0x3f0 [ 67.279046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.279080] kthread+0x328/0x630 [ 67.279106] ret_from_fork+0x10/0x20 [ 67.279135] [ 67.350107] Allocated by task 346: [ 67.353494] kasan_save_stack+0x3c/0x68 [ 67.357312] kasan_save_track+0x20/0x40 [ 67.361131] kasan_save_alloc_info+0x40/0x58 [ 67.365385] __kasan_kmalloc+0xd4/0xd8 [ 67.369117] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.373631] kasan_atomics+0xb8/0x2e0 [ 67.377277] kunit_try_run_case+0x170/0x3f0 [ 67.381443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.386912] kthread+0x328/0x630 [ 67.390124] ret_from_fork+0x10/0x20 [ 67.393683] [ 67.395158] The buggy address belongs to the object at ffff00080851b080 [ 67.395158] which belongs to the cache kmalloc-64 of size 64 [ 67.407485] The buggy address is located 0 bytes to the right of [ 67.407485] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 67.420332] [ 67.421809] The buggy address belongs to the physical page: [ 67.427365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 67.435350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.441859] page_type: f5(slab) [ 67.444994] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.452716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.460435] page dumped because: kasan: bad access detected [ 67.465991] [ 67.467466] Memory state around the buggy address: [ 67.472244] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.479449] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.486654] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.493855] ^ [ 67.498633] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.505838] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.513039] ================================================================== [ 69.106637] ================================================================== [ 69.113711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 69.121001] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 69.128379] [ 69.129860] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 69.129910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.129927] Hardware name: WinLink E850-96 board (DT) [ 69.129944] Call trace: [ 69.129957] show_stack+0x20/0x38 (C) [ 69.129988] dump_stack_lvl+0x8c/0xd0 [ 69.130021] print_report+0x118/0x5d0 [ 69.130048] kasan_report+0xdc/0x128 [ 69.130077] kasan_check_range+0x100/0x1a8 [ 69.130107] __kasan_check_write+0x20/0x30 [ 69.130137] kasan_atomics_helper+0x934/0x4858 [ 69.130172] kasan_atomics+0x198/0x2e0 [ 69.130204] kunit_try_run_case+0x170/0x3f0 [ 69.130233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.130267] kthread+0x328/0x630 [ 69.130293] ret_from_fork+0x10/0x20 [ 69.130323] [ 69.201294] Allocated by task 346: [ 69.204682] kasan_save_stack+0x3c/0x68 [ 69.208499] kasan_save_track+0x20/0x40 [ 69.212318] kasan_save_alloc_info+0x40/0x58 [ 69.216572] __kasan_kmalloc+0xd4/0xd8 [ 69.220305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.224819] kasan_atomics+0xb8/0x2e0 [ 69.228464] kunit_try_run_case+0x170/0x3f0 [ 69.232631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.238100] kthread+0x328/0x630 [ 69.241311] ret_from_fork+0x10/0x20 [ 69.244870] [ 69.246346] The buggy address belongs to the object at ffff00080851b080 [ 69.246346] which belongs to the cache kmalloc-64 of size 64 [ 69.258672] The buggy address is located 0 bytes to the right of [ 69.258672] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 69.271519] [ 69.272995] The buggy address belongs to the physical page: [ 69.278551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 69.286538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.293046] page_type: f5(slab) [ 69.296179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.303904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.311623] page dumped because: kasan: bad access detected [ 69.317178] [ 69.318654] Memory state around the buggy address: [ 69.323432] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.330637] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.337841] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.345042] ^ [ 69.349821] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.357025] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.364226] ================================================================== [ 73.063867] ================================================================== [ 73.070943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 73.078320] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 73.085611] [ 73.087093] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 73.087141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.087156] Hardware name: WinLink E850-96 board (DT) [ 73.087175] Call trace: [ 73.087186] show_stack+0x20/0x38 (C) [ 73.087216] dump_stack_lvl+0x8c/0xd0 [ 73.087249] print_report+0x118/0x5d0 [ 73.087277] kasan_report+0xdc/0x128 [ 73.087304] __asan_report_load8_noabort+0x20/0x30 [ 73.087337] kasan_atomics_helper+0x3f58/0x4858 [ 73.087374] kasan_atomics+0x198/0x2e0 [ 73.087405] kunit_try_run_case+0x170/0x3f0 [ 73.087435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.087468] kthread+0x328/0x630 [ 73.087494] ret_from_fork+0x10/0x20 [ 73.087527] [ 73.155228] Allocated by task 346: [ 73.158615] kasan_save_stack+0x3c/0x68 [ 73.162433] kasan_save_track+0x20/0x40 [ 73.166253] kasan_save_alloc_info+0x40/0x58 [ 73.170506] __kasan_kmalloc+0xd4/0xd8 [ 73.174238] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.178752] kasan_atomics+0xb8/0x2e0 [ 73.182398] kunit_try_run_case+0x170/0x3f0 [ 73.186565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.192034] kthread+0x328/0x630 [ 73.195245] ret_from_fork+0x10/0x20 [ 73.198804] [ 73.200280] The buggy address belongs to the object at ffff00080851b080 [ 73.200280] which belongs to the cache kmalloc-64 of size 64 [ 73.212606] The buggy address is located 0 bytes to the right of [ 73.212606] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 73.225453] [ 73.226929] The buggy address belongs to the physical page: [ 73.232485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 73.240470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.246980] page_type: f5(slab) [ 73.250113] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.257838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.265557] page dumped because: kasan: bad access detected [ 73.271112] [ 73.272588] Memory state around the buggy address: [ 73.277366] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.284570] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.291775] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.298976] ^ [ 73.303754] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.310959] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.318160] ================================================================== [ 76.237430] ================================================================== [ 76.244506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 76.251884] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 76.259261] [ 76.260742] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 76.260791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.260806] Hardware name: WinLink E850-96 board (DT) [ 76.260825] Call trace: [ 76.260838] show_stack+0x20/0x38 (C) [ 76.260869] dump_stack_lvl+0x8c/0xd0 [ 76.260901] print_report+0x118/0x5d0 [ 76.260929] kasan_report+0xdc/0x128 [ 76.260957] kasan_check_range+0x100/0x1a8 [ 76.260987] __kasan_check_write+0x20/0x30 [ 76.261019] kasan_atomics_helper+0x126c/0x4858 [ 76.261055] kasan_atomics+0x198/0x2e0 [ 76.261088] kunit_try_run_case+0x170/0x3f0 [ 76.261117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.261150] kthread+0x328/0x630 [ 76.261176] ret_from_fork+0x10/0x20 [ 76.261204] [ 76.332264] Allocated by task 346: [ 76.335651] kasan_save_stack+0x3c/0x68 [ 76.339469] kasan_save_track+0x20/0x40 [ 76.343288] kasan_save_alloc_info+0x40/0x58 [ 76.347541] __kasan_kmalloc+0xd4/0xd8 [ 76.351274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.355788] kasan_atomics+0xb8/0x2e0 [ 76.359434] kunit_try_run_case+0x170/0x3f0 [ 76.363600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.369069] kthread+0x328/0x630 [ 76.372281] ret_from_fork+0x10/0x20 [ 76.375840] [ 76.377315] The buggy address belongs to the object at ffff00080851b080 [ 76.377315] which belongs to the cache kmalloc-64 of size 64 [ 76.389642] The buggy address is located 0 bytes to the right of [ 76.389642] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 76.402488] [ 76.403964] The buggy address belongs to the physical page: [ 76.409523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 76.417506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.424016] page_type: f5(slab) [ 76.427149] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.434873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.442592] page dumped because: kasan: bad access detected [ 76.448148] [ 76.449623] Memory state around the buggy address: [ 76.454401] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.461606] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.468811] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.476012] ^ [ 76.480790] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.487995] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.495196] ================================================================== [ 67.785320] ================================================================== [ 67.792376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 67.799667] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 67.807045] [ 67.808527] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 67.808577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.808591] Hardware name: WinLink E850-96 board (DT) [ 67.808609] Call trace: [ 67.808622] show_stack+0x20/0x38 (C) [ 67.808652] dump_stack_lvl+0x8c/0xd0 [ 67.808684] print_report+0x118/0x5d0 [ 67.808712] kasan_report+0xdc/0x128 [ 67.808739] kasan_check_range+0x100/0x1a8 [ 67.808769] __kasan_check_write+0x20/0x30 [ 67.808799] kasan_atomics_helper+0x6ec/0x4858 [ 67.808834] kasan_atomics+0x198/0x2e0 [ 67.808866] kunit_try_run_case+0x170/0x3f0 [ 67.808896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.808929] kthread+0x328/0x630 [ 67.808956] ret_from_fork+0x10/0x20 [ 67.808989] [ 67.879960] Allocated by task 346: [ 67.883347] kasan_save_stack+0x3c/0x68 [ 67.887165] kasan_save_track+0x20/0x40 [ 67.890985] kasan_save_alloc_info+0x40/0x58 [ 67.895238] __kasan_kmalloc+0xd4/0xd8 [ 67.898971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.903484] kasan_atomics+0xb8/0x2e0 [ 67.907130] kunit_try_run_case+0x170/0x3f0 [ 67.911297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.916765] kthread+0x328/0x630 [ 67.919977] ret_from_fork+0x10/0x20 [ 67.923536] [ 67.925012] The buggy address belongs to the object at ffff00080851b080 [ 67.925012] which belongs to the cache kmalloc-64 of size 64 [ 67.937338] The buggy address is located 0 bytes to the right of [ 67.937338] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 67.950185] [ 67.951661] The buggy address belongs to the physical page: [ 67.957218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 67.965202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.971712] page_type: f5(slab) [ 67.974845] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.982570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.990288] page dumped because: kasan: bad access detected [ 67.995844] [ 67.997319] Memory state around the buggy address: [ 68.002099] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.009302] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.016507] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.023708] ^ [ 68.028486] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.035691] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.042892] ================================================================== [ 77.032856] ================================================================== [ 77.039809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 77.047186] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 77.054475] [ 77.055959] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 77.056008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.056025] Hardware name: WinLink E850-96 board (DT) [ 77.056044] Call trace: [ 77.056058] show_stack+0x20/0x38 (C) [ 77.056093] dump_stack_lvl+0x8c/0xd0 [ 77.056127] print_report+0x118/0x5d0 [ 77.056157] kasan_report+0xdc/0x128 [ 77.056185] __asan_report_load8_noabort+0x20/0x30 [ 77.056216] kasan_atomics_helper+0x3f04/0x4858 [ 77.056251] kasan_atomics+0x198/0x2e0 [ 77.056283] kunit_try_run_case+0x170/0x3f0 [ 77.056313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.056346] kthread+0x328/0x630 [ 77.056372] ret_from_fork+0x10/0x20 [ 77.056404] [ 77.124093] Allocated by task 346: [ 77.127479] kasan_save_stack+0x3c/0x68 [ 77.131297] kasan_save_track+0x20/0x40 [ 77.135117] kasan_save_alloc_info+0x40/0x58 [ 77.139370] __kasan_kmalloc+0xd4/0xd8 [ 77.143103] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.147616] kasan_atomics+0xb8/0x2e0 [ 77.151262] kunit_try_run_case+0x170/0x3f0 [ 77.155429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.160898] kthread+0x328/0x630 [ 77.164109] ret_from_fork+0x10/0x20 [ 77.167668] [ 77.169144] The buggy address belongs to the object at ffff00080851b080 [ 77.169144] which belongs to the cache kmalloc-64 of size 64 [ 77.181470] The buggy address is located 0 bytes to the right of [ 77.181470] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 77.194317] [ 77.195795] The buggy address belongs to the physical page: [ 77.201351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 77.209334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.215844] page_type: f5(slab) [ 77.218979] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.226702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.234420] page dumped because: kasan: bad access detected [ 77.239976] [ 77.241451] Memory state around the buggy address: [ 77.246230] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.253434] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.260639] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.267840] ^ [ 77.272618] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.279823] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.287024] ================================================================== [ 79.408197] ================================================================== [ 79.415292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 79.422671] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 79.430047] [ 79.431527] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 79.431575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.431592] Hardware name: WinLink E850-96 board (DT) [ 79.431610] Call trace: [ 79.431623] show_stack+0x20/0x38 (C) [ 79.431654] dump_stack_lvl+0x8c/0xd0 [ 79.431688] print_report+0x118/0x5d0 [ 79.431716] kasan_report+0xdc/0x128 [ 79.431743] kasan_check_range+0x100/0x1a8 [ 79.431772] __kasan_check_write+0x20/0x30 [ 79.431803] kasan_atomics_helper+0x16d0/0x4858 [ 79.431838] kasan_atomics+0x198/0x2e0 [ 79.431869] kunit_try_run_case+0x170/0x3f0 [ 79.431897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.431933] kthread+0x328/0x630 [ 79.431959] ret_from_fork+0x10/0x20 [ 79.431988] [ 79.503050] Allocated by task 346: [ 79.506437] kasan_save_stack+0x3c/0x68 [ 79.510255] kasan_save_track+0x20/0x40 [ 79.514074] kasan_save_alloc_info+0x40/0x58 [ 79.518327] __kasan_kmalloc+0xd4/0xd8 [ 79.522060] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.526574] kasan_atomics+0xb8/0x2e0 [ 79.530220] kunit_try_run_case+0x170/0x3f0 [ 79.534386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.539855] kthread+0x328/0x630 [ 79.543067] ret_from_fork+0x10/0x20 [ 79.546625] [ 79.548101] The buggy address belongs to the object at ffff00080851b080 [ 79.548101] which belongs to the cache kmalloc-64 of size 64 [ 79.560427] The buggy address is located 0 bytes to the right of [ 79.560427] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 79.573274] [ 79.574750] The buggy address belongs to the physical page: [ 79.580307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 79.588293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.594802] page_type: f5(slab) [ 79.597934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.605659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.613378] page dumped because: kasan: bad access detected [ 79.618933] [ 79.620409] Memory state around the buggy address: [ 79.625187] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.632392] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.639596] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.646797] ^ [ 79.651576] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.658780] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.665981] ================================================================== [ 73.325521] ================================================================== [ 73.332571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 73.339861] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 73.347239] [ 73.348722] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 73.348769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.348784] Hardware name: WinLink E850-96 board (DT) [ 73.348801] Call trace: [ 73.348813] show_stack+0x20/0x38 (C) [ 73.348843] dump_stack_lvl+0x8c/0xd0 [ 73.348876] print_report+0x118/0x5d0 [ 73.348906] kasan_report+0xdc/0x128 [ 73.348932] kasan_check_range+0x100/0x1a8 [ 73.348961] __kasan_check_write+0x20/0x30 [ 73.348991] kasan_atomics_helper+0xe44/0x4858 [ 73.349025] kasan_atomics+0x198/0x2e0 [ 73.349058] kunit_try_run_case+0x170/0x3f0 [ 73.349088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.349124] kthread+0x328/0x630 [ 73.349150] ret_from_fork+0x10/0x20 [ 73.349179] [ 73.420155] Allocated by task 346: [ 73.423542] kasan_save_stack+0x3c/0x68 [ 73.427360] kasan_save_track+0x20/0x40 [ 73.431179] kasan_save_alloc_info+0x40/0x58 [ 73.435433] __kasan_kmalloc+0xd4/0xd8 [ 73.439165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.443679] kasan_atomics+0xb8/0x2e0 [ 73.447325] kunit_try_run_case+0x170/0x3f0 [ 73.451491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.456960] kthread+0x328/0x630 [ 73.460172] ret_from_fork+0x10/0x20 [ 73.463731] [ 73.465206] The buggy address belongs to the object at ffff00080851b080 [ 73.465206] which belongs to the cache kmalloc-64 of size 64 [ 73.477533] The buggy address is located 0 bytes to the right of [ 73.477533] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 73.490379] [ 73.491855] The buggy address belongs to the physical page: [ 73.497413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 73.505397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.511907] page_type: f5(slab) [ 73.515040] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.522764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.530483] page dumped because: kasan: bad access detected [ 73.536038] [ 73.537514] Memory state around the buggy address: [ 73.542292] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.549497] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.556702] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.563903] ^ [ 73.568681] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.575885] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.583087] ================================================================== [ 64.347843] ================================================================== [ 64.354928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 64.362220] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 64.369596] [ 64.371079] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 64.371132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.371148] Hardware name: WinLink E850-96 board (DT) [ 64.371168] Call trace: [ 64.371182] show_stack+0x20/0x38 (C) [ 64.371216] dump_stack_lvl+0x8c/0xd0 [ 64.371252] print_report+0x118/0x5d0 [ 64.371279] kasan_report+0xdc/0x128 [ 64.371306] kasan_check_range+0x100/0x1a8 [ 64.371337] __kasan_check_write+0x20/0x30 [ 64.371367] kasan_atomics_helper+0x24c/0x4858 [ 64.371400] kasan_atomics+0x198/0x2e0 [ 64.371431] kunit_try_run_case+0x170/0x3f0 [ 64.371464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.371498] kthread+0x328/0x630 [ 64.371524] ret_from_fork+0x10/0x20 [ 64.371553] [ 64.442512] Allocated by task 346: [ 64.445901] kasan_save_stack+0x3c/0x68 [ 64.449717] kasan_save_track+0x20/0x40 [ 64.453536] kasan_save_alloc_info+0x40/0x58 [ 64.457789] __kasan_kmalloc+0xd4/0xd8 [ 64.461522] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.466036] kasan_atomics+0xb8/0x2e0 [ 64.469681] kunit_try_run_case+0x170/0x3f0 [ 64.473848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.479317] kthread+0x328/0x630 [ 64.482529] ret_from_fork+0x10/0x20 [ 64.486088] [ 64.487565] The buggy address belongs to the object at ffff00080851b080 [ 64.487565] which belongs to the cache kmalloc-64 of size 64 [ 64.499890] The buggy address is located 0 bytes to the right of [ 64.499890] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 64.512737] [ 64.514214] The buggy address belongs to the physical page: [ 64.519771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 64.527754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.534264] page_type: f5(slab) [ 64.537397] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.545121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.552840] page dumped because: kasan: bad access detected [ 64.558395] [ 64.559872] Memory state around the buggy address: [ 64.564654] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.571854] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.579059] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.586260] ^ [ 64.591037] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.598242] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.605443] ================================================================== [ 77.824557] ================================================================== [ 77.831636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 77.839013] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 77.846391] [ 77.847873] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 77.847920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.847937] Hardware name: WinLink E850-96 board (DT) [ 77.847954] Call trace: [ 77.847969] show_stack+0x20/0x38 (C) [ 77.848000] dump_stack_lvl+0x8c/0xd0 [ 77.848031] print_report+0x118/0x5d0 [ 77.848060] kasan_report+0xdc/0x128 [ 77.848089] kasan_check_range+0x100/0x1a8 [ 77.848120] __kasan_check_write+0x20/0x30 [ 77.848151] kasan_atomics_helper+0x14e4/0x4858 [ 77.848186] kasan_atomics+0x198/0x2e0 [ 77.848218] kunit_try_run_case+0x170/0x3f0 [ 77.848248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.848282] kthread+0x328/0x630 [ 77.848309] ret_from_fork+0x10/0x20 [ 77.848339] [ 77.919393] Allocated by task 346: [ 77.922781] kasan_save_stack+0x3c/0x68 [ 77.926598] kasan_save_track+0x20/0x40 [ 77.930417] kasan_save_alloc_info+0x40/0x58 [ 77.934670] __kasan_kmalloc+0xd4/0xd8 [ 77.938403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.942917] kasan_atomics+0xb8/0x2e0 [ 77.946563] kunit_try_run_case+0x170/0x3f0 [ 77.950729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.956198] kthread+0x328/0x630 [ 77.959410] ret_from_fork+0x10/0x20 [ 77.962969] [ 77.964444] The buggy address belongs to the object at ffff00080851b080 [ 77.964444] which belongs to the cache kmalloc-64 of size 64 [ 77.976771] The buggy address is located 0 bytes to the right of [ 77.976771] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 77.989617] [ 77.991093] The buggy address belongs to the physical page: [ 77.996649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 78.004635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.011145] page_type: f5(slab) [ 78.014278] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.022002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.029721] page dumped because: kasan: bad access detected [ 78.035277] [ 78.036752] Memory state around the buggy address: [ 78.041530] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.048735] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.055940] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.063141] ^ [ 78.067919] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.075124] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.082324] ================================================================== [ 68.050234] ================================================================== [ 68.057303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 68.064593] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 68.071971] [ 68.073451] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 68.073500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.073516] Hardware name: WinLink E850-96 board (DT) [ 68.073534] Call trace: [ 68.073545] show_stack+0x20/0x38 (C) [ 68.073576] dump_stack_lvl+0x8c/0xd0 [ 68.073608] print_report+0x118/0x5d0 [ 68.073636] kasan_report+0xdc/0x128 [ 68.073664] kasan_check_range+0x100/0x1a8 [ 68.073692] __kasan_check_write+0x20/0x30 [ 68.073723] kasan_atomics_helper+0x760/0x4858 [ 68.073756] kasan_atomics+0x198/0x2e0 [ 68.073791] kunit_try_run_case+0x170/0x3f0 [ 68.073820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.073852] kthread+0x328/0x630 [ 68.073879] ret_from_fork+0x10/0x20 [ 68.073911] [ 68.144887] Allocated by task 346: [ 68.148274] kasan_save_stack+0x3c/0x68 [ 68.152092] kasan_save_track+0x20/0x40 [ 68.155911] kasan_save_alloc_info+0x40/0x58 [ 68.160164] __kasan_kmalloc+0xd4/0xd8 [ 68.163897] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.168411] kasan_atomics+0xb8/0x2e0 [ 68.172057] kunit_try_run_case+0x170/0x3f0 [ 68.176223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.181692] kthread+0x328/0x630 [ 68.184904] ret_from_fork+0x10/0x20 [ 68.188462] [ 68.189938] The buggy address belongs to the object at ffff00080851b080 [ 68.189938] which belongs to the cache kmalloc-64 of size 64 [ 68.202265] The buggy address is located 0 bytes to the right of [ 68.202265] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 68.215111] [ 68.216587] The buggy address belongs to the physical page: [ 68.222145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 68.230129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.236639] page_type: f5(slab) [ 68.239772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.247496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.255215] page dumped because: kasan: bad access detected [ 68.260770] [ 68.262246] Memory state around the buggy address: [ 68.267024] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.274229] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.281434] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.288635] ^ [ 68.293413] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.300617] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.307818] ================================================================== [ 70.431290] ================================================================== [ 70.438344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 70.445721] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 70.453012] [ 70.454493] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 70.454540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.454557] Hardware name: WinLink E850-96 board (DT) [ 70.454575] Call trace: [ 70.454588] show_stack+0x20/0x38 (C) [ 70.454618] dump_stack_lvl+0x8c/0xd0 [ 70.454649] print_report+0x118/0x5d0 [ 70.454675] kasan_report+0xdc/0x128 [ 70.454702] __asan_report_load4_noabort+0x20/0x30 [ 70.454735] kasan_atomics_helper+0x3dcc/0x4858 [ 70.454769] kasan_atomics+0x198/0x2e0 [ 70.454801] kunit_try_run_case+0x170/0x3f0 [ 70.454831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.454865] kthread+0x328/0x630 [ 70.454891] ret_from_fork+0x10/0x20 [ 70.454921] [ 70.522629] Allocated by task 346: [ 70.526016] kasan_save_stack+0x3c/0x68 [ 70.529833] kasan_save_track+0x20/0x40 [ 70.533653] kasan_save_alloc_info+0x40/0x58 [ 70.537907] __kasan_kmalloc+0xd4/0xd8 [ 70.541639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.546153] kasan_atomics+0xb8/0x2e0 [ 70.549799] kunit_try_run_case+0x170/0x3f0 [ 70.553965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.559434] kthread+0x328/0x630 [ 70.562645] ret_from_fork+0x10/0x20 [ 70.566205] [ 70.567680] The buggy address belongs to the object at ffff00080851b080 [ 70.567680] which belongs to the cache kmalloc-64 of size 64 [ 70.580007] The buggy address is located 0 bytes to the right of [ 70.580007] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 70.592853] [ 70.594329] The buggy address belongs to the physical page: [ 70.599888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 70.607871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.614381] page_type: f5(slab) [ 70.617516] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.625238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.632957] page dumped because: kasan: bad access detected [ 70.638513] [ 70.639988] Memory state around the buggy address: [ 70.644768] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.651971] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.659176] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.666377] ^ [ 70.671155] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.678359] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.685560] ================================================================== [ 71.484380] ================================================================== [ 71.491453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 71.498830] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 71.506121] [ 71.507604] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 71.507655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.507671] Hardware name: WinLink E850-96 board (DT) [ 71.507690] Call trace: [ 71.507703] show_stack+0x20/0x38 (C) [ 71.507732] dump_stack_lvl+0x8c/0xd0 [ 71.507765] print_report+0x118/0x5d0 [ 71.507794] kasan_report+0xdc/0x128 [ 71.507821] __asan_report_load4_noabort+0x20/0x30 [ 71.507852] kasan_atomics_helper+0x3de4/0x4858 [ 71.507887] kasan_atomics+0x198/0x2e0 [ 71.507918] kunit_try_run_case+0x170/0x3f0 [ 71.507948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.507983] kthread+0x328/0x630 [ 71.508007] ret_from_fork+0x10/0x20 [ 71.508040] [ 71.575738] Allocated by task 346: [ 71.579126] kasan_save_stack+0x3c/0x68 [ 71.582943] kasan_save_track+0x20/0x40 [ 71.586763] kasan_save_alloc_info+0x40/0x58 [ 71.591016] __kasan_kmalloc+0xd4/0xd8 [ 71.594748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.599262] kasan_atomics+0xb8/0x2e0 [ 71.602908] kunit_try_run_case+0x170/0x3f0 [ 71.607074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.612543] kthread+0x328/0x630 [ 71.615755] ret_from_fork+0x10/0x20 [ 71.619314] [ 71.620790] The buggy address belongs to the object at ffff00080851b080 [ 71.620790] which belongs to the cache kmalloc-64 of size 64 [ 71.633116] The buggy address is located 0 bytes to the right of [ 71.633116] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 71.645963] [ 71.647440] The buggy address belongs to the physical page: [ 71.652997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 71.660980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.667490] page_type: f5(slab) [ 71.670624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.678348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.686066] page dumped because: kasan: bad access detected [ 71.691622] [ 71.693097] Memory state around the buggy address: [ 71.697876] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.705080] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.712285] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.719486] ^ [ 71.724264] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.731469] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.738670] ================================================================== [ 64.612779] ================================================================== [ 64.619857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 64.627146] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 64.634436] [ 64.635918] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 64.635972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.635990] Hardware name: WinLink E850-96 board (DT) [ 64.636011] Call trace: [ 64.636023] show_stack+0x20/0x38 (C) [ 64.636057] dump_stack_lvl+0x8c/0xd0 [ 64.636092] print_report+0x118/0x5d0 [ 64.636120] kasan_report+0xdc/0x128 [ 64.636147] kasan_check_range+0x100/0x1a8 [ 64.636178] __kasan_check_read+0x20/0x30 [ 64.636207] kasan_atomics_helper+0x2b0/0x4858 [ 64.636240] kasan_atomics+0x198/0x2e0 [ 64.636272] kunit_try_run_case+0x170/0x3f0 [ 64.636301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.636337] kthread+0x328/0x630 [ 64.636365] ret_from_fork+0x10/0x20 [ 64.636396] [ 64.707265] Allocated by task 346: [ 64.710654] kasan_save_stack+0x3c/0x68 [ 64.714470] kasan_save_track+0x20/0x40 [ 64.718289] kasan_save_alloc_info+0x40/0x58 [ 64.722542] __kasan_kmalloc+0xd4/0xd8 [ 64.726275] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.730789] kasan_atomics+0xb8/0x2e0 [ 64.734435] kunit_try_run_case+0x170/0x3f0 [ 64.738601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.744070] kthread+0x328/0x630 [ 64.747282] ret_from_fork+0x10/0x20 [ 64.750841] [ 64.752318] The buggy address belongs to the object at ffff00080851b080 [ 64.752318] which belongs to the cache kmalloc-64 of size 64 [ 64.764643] The buggy address is located 0 bytes to the right of [ 64.764643] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 64.777489] [ 64.778967] The buggy address belongs to the physical page: [ 64.784525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 64.792508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.799017] page_type: f5(slab) [ 64.802153] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.809874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.817593] page dumped because: kasan: bad access detected [ 64.823149] [ 64.824624] Memory state around the buggy address: [ 64.829407] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.836607] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.843812] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.851012] ^ [ 64.855791] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.862995] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.870196] ================================================================== [ 65.665882] ================================================================== [ 65.672967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 65.680254] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 65.687632] [ 65.689115] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.689165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.689180] Hardware name: WinLink E850-96 board (DT) [ 65.689199] Call trace: [ 65.689211] show_stack+0x20/0x38 (C) [ 65.689242] dump_stack_lvl+0x8c/0xd0 [ 65.689275] print_report+0x118/0x5d0 [ 65.689302] kasan_report+0xdc/0x128 [ 65.689328] kasan_check_range+0x100/0x1a8 [ 65.689359] __kasan_check_write+0x20/0x30 [ 65.689390] kasan_atomics_helper+0x3ac/0x4858 [ 65.689425] kasan_atomics+0x198/0x2e0 [ 65.689459] kunit_try_run_case+0x170/0x3f0 [ 65.689490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.689527] kthread+0x328/0x630 [ 65.689553] ret_from_fork+0x10/0x20 [ 65.689584] [ 65.760548] Allocated by task 346: [ 65.763935] kasan_save_stack+0x3c/0x68 [ 65.767753] kasan_save_track+0x20/0x40 [ 65.771572] kasan_save_alloc_info+0x40/0x58 [ 65.775825] __kasan_kmalloc+0xd4/0xd8 [ 65.779558] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.784071] kasan_atomics+0xb8/0x2e0 [ 65.787717] kunit_try_run_case+0x170/0x3f0 [ 65.791884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.797353] kthread+0x328/0x630 [ 65.800564] ret_from_fork+0x10/0x20 [ 65.804123] [ 65.805599] The buggy address belongs to the object at ffff00080851b080 [ 65.805599] which belongs to the cache kmalloc-64 of size 64 [ 65.817926] The buggy address is located 0 bytes to the right of [ 65.817926] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 65.830772] [ 65.832251] The buggy address belongs to the physical page: [ 65.837807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 65.845790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.852299] page_type: f5(slab) [ 65.855433] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.863157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.870879] page dumped because: kasan: bad access detected [ 65.876431] [ 65.877907] Memory state around the buggy address: [ 65.882688] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.889890] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.897095] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.904296] ^ [ 65.909073] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.916278] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.923479] ================================================================== [ 73.590418] ================================================================== [ 73.597497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 73.604875] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 73.612253] [ 73.613734] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 73.613780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.613799] Hardware name: WinLink E850-96 board (DT) [ 73.613817] Call trace: [ 73.613828] show_stack+0x20/0x38 (C) [ 73.613858] dump_stack_lvl+0x8c/0xd0 [ 73.613890] print_report+0x118/0x5d0 [ 73.613917] kasan_report+0xdc/0x128 [ 73.613946] __asan_report_store8_noabort+0x20/0x30 [ 73.613980] kasan_atomics_helper+0x3e5c/0x4858 [ 73.614015] kasan_atomics+0x198/0x2e0 [ 73.614049] kunit_try_run_case+0x170/0x3f0 [ 73.614077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.614111] kthread+0x328/0x630 [ 73.614138] ret_from_fork+0x10/0x20 [ 73.614169] [ 73.681956] Allocated by task 346: [ 73.685343] kasan_save_stack+0x3c/0x68 [ 73.689161] kasan_save_track+0x20/0x40 [ 73.692981] kasan_save_alloc_info+0x40/0x58 [ 73.697234] __kasan_kmalloc+0xd4/0xd8 [ 73.700967] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.705480] kasan_atomics+0xb8/0x2e0 [ 73.709126] kunit_try_run_case+0x170/0x3f0 [ 73.713293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.718762] kthread+0x328/0x630 [ 73.721974] ret_from_fork+0x10/0x20 [ 73.725532] [ 73.727008] The buggy address belongs to the object at ffff00080851b080 [ 73.727008] which belongs to the cache kmalloc-64 of size 64 [ 73.739334] The buggy address is located 0 bytes to the right of [ 73.739334] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 73.752181] [ 73.753657] The buggy address belongs to the physical page: [ 73.759214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 73.767198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.773708] page_type: f5(slab) [ 73.776842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.784566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.792284] page dumped because: kasan: bad access detected [ 73.797840] [ 73.799316] Memory state around the buggy address: [ 73.804094] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.811299] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.818503] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.825704] ^ [ 73.830482] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.837687] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.844888] ================================================================== [ 73.852243] ================================================================== [ 73.859299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 73.866591] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 73.873968] [ 73.875451] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 73.875502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.875519] Hardware name: WinLink E850-96 board (DT) [ 73.875538] Call trace: [ 73.875550] show_stack+0x20/0x38 (C) [ 73.875580] dump_stack_lvl+0x8c/0xd0 [ 73.875612] print_report+0x118/0x5d0 [ 73.875641] kasan_report+0xdc/0x128 [ 73.875669] kasan_check_range+0x100/0x1a8 [ 73.875699] __kasan_check_write+0x20/0x30 [ 73.875729] kasan_atomics_helper+0xeb8/0x4858 [ 73.875763] kasan_atomics+0x198/0x2e0 [ 73.875795] kunit_try_run_case+0x170/0x3f0 [ 73.875825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.875862] kthread+0x328/0x630 [ 73.875889] ret_from_fork+0x10/0x20 [ 73.875920] [ 73.946883] Allocated by task 346: [ 73.950270] kasan_save_stack+0x3c/0x68 [ 73.954088] kasan_save_track+0x20/0x40 [ 73.957907] kasan_save_alloc_info+0x40/0x58 [ 73.962161] __kasan_kmalloc+0xd4/0xd8 [ 73.965893] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.970407] kasan_atomics+0xb8/0x2e0 [ 73.974053] kunit_try_run_case+0x170/0x3f0 [ 73.978220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.983688] kthread+0x328/0x630 [ 73.986900] ret_from_fork+0x10/0x20 [ 73.990459] [ 73.991934] The buggy address belongs to the object at ffff00080851b080 [ 73.991934] which belongs to the cache kmalloc-64 of size 64 [ 74.004261] The buggy address is located 0 bytes to the right of [ 74.004261] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 74.017108] [ 74.018585] The buggy address belongs to the physical page: [ 74.024142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 74.032126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.038635] page_type: f5(slab) [ 74.041770] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.049492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.057211] page dumped because: kasan: bad access detected [ 74.062767] [ 74.064242] Memory state around the buggy address: [ 74.069021] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.076225] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.083430] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.090631] ^ [ 74.095409] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.102614] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.109815] ================================================================== [ 69.901434] ================================================================== [ 69.908490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 69.915781] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 69.923159] [ 69.924639] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 69.924688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.924705] Hardware name: WinLink E850-96 board (DT) [ 69.924722] Call trace: [ 69.924735] show_stack+0x20/0x38 (C) [ 69.924767] dump_stack_lvl+0x8c/0xd0 [ 69.924799] print_report+0x118/0x5d0 [ 69.924825] kasan_report+0xdc/0x128 [ 69.924852] kasan_check_range+0x100/0x1a8 [ 69.924881] __kasan_check_write+0x20/0x30 [ 69.924913] kasan_atomics_helper+0xa6c/0x4858 [ 69.924948] kasan_atomics+0x198/0x2e0 [ 69.924980] kunit_try_run_case+0x170/0x3f0 [ 69.925014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.925048] kthread+0x328/0x630 [ 69.925076] ret_from_fork+0x10/0x20 [ 69.925107] [ 69.996074] Allocated by task 346: [ 69.999462] kasan_save_stack+0x3c/0x68 [ 70.003279] kasan_save_track+0x20/0x40 [ 70.007099] kasan_save_alloc_info+0x40/0x58 [ 70.011352] __kasan_kmalloc+0xd4/0xd8 [ 70.015085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.019598] kasan_atomics+0xb8/0x2e0 [ 70.023244] kunit_try_run_case+0x170/0x3f0 [ 70.027411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.032880] kthread+0x328/0x630 [ 70.036091] ret_from_fork+0x10/0x20 [ 70.039650] [ 70.041125] The buggy address belongs to the object at ffff00080851b080 [ 70.041125] which belongs to the cache kmalloc-64 of size 64 [ 70.053452] The buggy address is located 0 bytes to the right of [ 70.053452] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 70.066299] [ 70.067775] The buggy address belongs to the physical page: [ 70.073332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 70.081318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.087826] page_type: f5(slab) [ 70.090963] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.098684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.106402] page dumped because: kasan: bad access detected [ 70.111958] [ 70.113433] Memory state around the buggy address: [ 70.118212] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.125416] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.132621] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.139822] ^ [ 70.144600] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.151805] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.159006] ================================================================== [ 64.877495] ================================================================== [ 64.884610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 64.891986] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 64.899276] [ 64.900758] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 64.900811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.900825] Hardware name: WinLink E850-96 board (DT) [ 64.900846] Call trace: [ 64.900862] show_stack+0x20/0x38 (C) [ 64.900896] dump_stack_lvl+0x8c/0xd0 [ 64.900932] print_report+0x118/0x5d0 [ 64.900959] kasan_report+0xdc/0x128 [ 64.900985] __asan_report_load4_noabort+0x20/0x30 [ 64.901016] kasan_atomics_helper+0x40fc/0x4858 [ 64.901051] kasan_atomics+0x198/0x2e0 [ 64.901086] kunit_try_run_case+0x170/0x3f0 [ 64.901117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.901152] kthread+0x328/0x630 [ 64.901180] ret_from_fork+0x10/0x20 [ 64.901214] [ 64.968892] Allocated by task 346: [ 64.972280] kasan_save_stack+0x3c/0x68 [ 64.976098] kasan_save_track+0x20/0x40 [ 64.979917] kasan_save_alloc_info+0x40/0x58 [ 64.984171] __kasan_kmalloc+0xd4/0xd8 [ 64.987903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.992417] kasan_atomics+0xb8/0x2e0 [ 64.996063] kunit_try_run_case+0x170/0x3f0 [ 65.000229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.005698] kthread+0x328/0x630 [ 65.008910] ret_from_fork+0x10/0x20 [ 65.012469] [ 65.013946] The buggy address belongs to the object at ffff00080851b080 [ 65.013946] which belongs to the cache kmalloc-64 of size 64 [ 65.026270] The buggy address is located 0 bytes to the right of [ 65.026270] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 65.039117] [ 65.040596] The buggy address belongs to the physical page: [ 65.046152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 65.054135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.060645] page_type: f5(slab) [ 65.063781] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.071502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.079222] page dumped because: kasan: bad access detected [ 65.084776] [ 65.086252] Memory state around the buggy address: [ 65.091036] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.098235] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.105440] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.112641] ^ [ 65.117419] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.124623] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.131824] ================================================================== [ 67.520354] ================================================================== [ 67.527450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 67.534740] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 67.542118] [ 67.543599] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 67.543646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.543660] Hardware name: WinLink E850-96 board (DT) [ 67.543679] Call trace: [ 67.543690] show_stack+0x20/0x38 (C) [ 67.543723] dump_stack_lvl+0x8c/0xd0 [ 67.543753] print_report+0x118/0x5d0 [ 67.543778] kasan_report+0xdc/0x128 [ 67.543805] kasan_check_range+0x100/0x1a8 [ 67.543834] __kasan_check_write+0x20/0x30 [ 67.543865] kasan_atomics_helper+0x684/0x4858 [ 67.543900] kasan_atomics+0x198/0x2e0 [ 67.543932] kunit_try_run_case+0x170/0x3f0 [ 67.543960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.543994] kthread+0x328/0x630 [ 67.544021] ret_from_fork+0x10/0x20 [ 67.544051] [ 67.615034] Allocated by task 346: [ 67.618421] kasan_save_stack+0x3c/0x68 [ 67.622239] kasan_save_track+0x20/0x40 [ 67.626058] kasan_save_alloc_info+0x40/0x58 [ 67.630311] __kasan_kmalloc+0xd4/0xd8 [ 67.634044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.638558] kasan_atomics+0xb8/0x2e0 [ 67.642204] kunit_try_run_case+0x170/0x3f0 [ 67.646370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.651839] kthread+0x328/0x630 [ 67.655050] ret_from_fork+0x10/0x20 [ 67.658610] [ 67.660085] The buggy address belongs to the object at ffff00080851b080 [ 67.660085] which belongs to the cache kmalloc-64 of size 64 [ 67.672412] The buggy address is located 0 bytes to the right of [ 67.672412] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 67.685258] [ 67.686734] The buggy address belongs to the physical page: [ 67.692291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 67.700276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.706786] page_type: f5(slab) [ 67.709919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.717643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.725362] page dumped because: kasan: bad access detected [ 67.730917] [ 67.732393] Memory state around the buggy address: [ 67.737171] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.744376] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.751581] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.758782] ^ [ 67.763560] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.770764] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.777965] ================================================================== [ 66.725664] ================================================================== [ 66.732672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 66.739962] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 66.747338] [ 66.748824] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 66.748877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.748892] Hardware name: WinLink E850-96 board (DT) [ 66.748912] Call trace: [ 66.748924] show_stack+0x20/0x38 (C) [ 66.748956] dump_stack_lvl+0x8c/0xd0 [ 66.748989] print_report+0x118/0x5d0 [ 66.749018] kasan_report+0xdc/0x128 [ 66.749044] kasan_check_range+0x100/0x1a8 [ 66.749075] __kasan_check_write+0x20/0x30 [ 66.749107] kasan_atomics_helper+0x54c/0x4858 [ 66.749142] kasan_atomics+0x198/0x2e0 [ 66.749174] kunit_try_run_case+0x170/0x3f0 [ 66.749204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.749240] kthread+0x328/0x630 [ 66.749267] ret_from_fork+0x10/0x20 [ 66.749296] [ 66.820255] Allocated by task 346: [ 66.823641] kasan_save_stack+0x3c/0x68 [ 66.827459] kasan_save_track+0x20/0x40 [ 66.831278] kasan_save_alloc_info+0x40/0x58 [ 66.835532] __kasan_kmalloc+0xd4/0xd8 [ 66.839264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.843778] kasan_atomics+0xb8/0x2e0 [ 66.847424] kunit_try_run_case+0x170/0x3f0 [ 66.851590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.857059] kthread+0x328/0x630 [ 66.860271] ret_from_fork+0x10/0x20 [ 66.863830] [ 66.865305] The buggy address belongs to the object at ffff00080851b080 [ 66.865305] which belongs to the cache kmalloc-64 of size 64 [ 66.877632] The buggy address is located 0 bytes to the right of [ 66.877632] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 66.890479] [ 66.891956] The buggy address belongs to the physical page: [ 66.897513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 66.905496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.912006] page_type: f5(slab) [ 66.915143] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.922863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.930582] page dumped because: kasan: bad access detected [ 66.936137] [ 66.937613] Memory state around the buggy address: [ 66.942393] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.949596] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.956801] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.964002] ^ [ 66.968780] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.975984] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.983186] ================================================================== [ 65.139165] ================================================================== [ 65.146240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 65.153526] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 65.160904] [ 65.162386] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.162439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.162455] Hardware name: WinLink E850-96 board (DT) [ 65.162476] Call trace: [ 65.162489] show_stack+0x20/0x38 (C) [ 65.162524] dump_stack_lvl+0x8c/0xd0 [ 65.162558] print_report+0x118/0x5d0 [ 65.162585] kasan_report+0xdc/0x128 [ 65.162613] kasan_check_range+0x100/0x1a8 [ 65.162642] __kasan_check_write+0x20/0x30 [ 65.162674] kasan_atomics_helper+0x32c/0x4858 [ 65.162710] kasan_atomics+0x198/0x2e0 [ 65.162742] kunit_try_run_case+0x170/0x3f0 [ 65.162773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.162809] kthread+0x328/0x630 [ 65.162837] ret_from_fork+0x10/0x20 [ 65.162868] [ 65.233819] Allocated by task 346: [ 65.237207] kasan_save_stack+0x3c/0x68 [ 65.241024] kasan_save_track+0x20/0x40 [ 65.244844] kasan_save_alloc_info+0x40/0x58 [ 65.249097] __kasan_kmalloc+0xd4/0xd8 [ 65.252830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.257343] kasan_atomics+0xb8/0x2e0 [ 65.260989] kunit_try_run_case+0x170/0x3f0 [ 65.265156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.270625] kthread+0x328/0x630 [ 65.273836] ret_from_fork+0x10/0x20 [ 65.277395] [ 65.278872] The buggy address belongs to the object at ffff00080851b080 [ 65.278872] which belongs to the cache kmalloc-64 of size 64 [ 65.291198] The buggy address is located 0 bytes to the right of [ 65.291198] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 65.304044] [ 65.305522] The buggy address belongs to the physical page: [ 65.311079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 65.319061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.325571] page_type: f5(slab) [ 65.328704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.336429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.344148] page dumped because: kasan: bad access detected [ 65.349703] [ 65.351179] Memory state around the buggy address: [ 65.355962] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.363161] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.370366] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.377567] ^ [ 65.382345] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.389550] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.396751] ================================================================== [ 65.930841] ================================================================== [ 65.937891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 65.945180] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 65.952559] [ 65.954042] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.954093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.954109] Hardware name: WinLink E850-96 board (DT) [ 65.954127] Call trace: [ 65.954139] show_stack+0x20/0x38 (C) [ 65.954170] dump_stack_lvl+0x8c/0xd0 [ 65.954202] print_report+0x118/0x5d0 [ 65.954229] kasan_report+0xdc/0x128 [ 65.954257] kasan_check_range+0x100/0x1a8 [ 65.954285] __kasan_check_write+0x20/0x30 [ 65.954314] kasan_atomics_helper+0x414/0x4858 [ 65.954348] kasan_atomics+0x198/0x2e0 [ 65.954380] kunit_try_run_case+0x170/0x3f0 [ 65.954409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.954445] kthread+0x328/0x630 [ 65.954472] ret_from_fork+0x10/0x20 [ 65.954502] [ 66.025474] Allocated by task 346: [ 66.028862] kasan_save_stack+0x3c/0x68 [ 66.032679] kasan_save_track+0x20/0x40 [ 66.036498] kasan_save_alloc_info+0x40/0x58 [ 66.040752] __kasan_kmalloc+0xd4/0xd8 [ 66.044484] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.048998] kasan_atomics+0xb8/0x2e0 [ 66.052644] kunit_try_run_case+0x170/0x3f0 [ 66.056810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.062279] kthread+0x328/0x630 [ 66.065491] ret_from_fork+0x10/0x20 [ 66.069050] [ 66.070525] The buggy address belongs to the object at ffff00080851b080 [ 66.070525] which belongs to the cache kmalloc-64 of size 64 [ 66.082852] The buggy address is located 0 bytes to the right of [ 66.082852] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 66.095699] [ 66.097176] The buggy address belongs to the physical page: [ 66.102732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 66.110716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.117226] page_type: f5(slab) [ 66.120360] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.128084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.135802] page dumped because: kasan: bad access detected [ 66.141358] [ 66.142833] Memory state around the buggy address: [ 66.147614] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.154816] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.162022] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.169222] ^ [ 66.174000] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.181205] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.188406] ================================================================== [ 64.083106] ================================================================== [ 64.090179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 64.097467] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 64.104756] [ 64.106240] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 64.106297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.106314] Hardware name: WinLink E850-96 board (DT) [ 64.106335] Call trace: [ 64.106347] show_stack+0x20/0x38 (C) [ 64.106382] dump_stack_lvl+0x8c/0xd0 [ 64.106416] print_report+0x118/0x5d0 [ 64.106445] kasan_report+0xdc/0x128 [ 64.106473] kasan_check_range+0x100/0x1a8 [ 64.106505] __kasan_check_read+0x20/0x30 [ 64.106538] kasan_atomics_helper+0x1ec/0x4858 [ 64.106572] kasan_atomics+0x198/0x2e0 [ 64.106604] kunit_try_run_case+0x170/0x3f0 [ 64.106638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.106674] kthread+0x328/0x630 [ 64.106704] ret_from_fork+0x10/0x20 [ 64.106736] [ 64.177585] Allocated by task 346: [ 64.180973] kasan_save_stack+0x3c/0x68 [ 64.184790] kasan_save_track+0x20/0x40 [ 64.188610] kasan_save_alloc_info+0x40/0x58 [ 64.192863] __kasan_kmalloc+0xd4/0xd8 [ 64.196596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.201109] kasan_atomics+0xb8/0x2e0 [ 64.204755] kunit_try_run_case+0x170/0x3f0 [ 64.208921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.214390] kthread+0x328/0x630 [ 64.217602] ret_from_fork+0x10/0x20 [ 64.221161] [ 64.222638] The buggy address belongs to the object at ffff00080851b080 [ 64.222638] which belongs to the cache kmalloc-64 of size 64 [ 64.234965] The buggy address is located 0 bytes to the right of [ 64.234965] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 64.247810] [ 64.249288] The buggy address belongs to the physical page: [ 64.254845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 64.262829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.269339] page_type: f5(slab) [ 64.272476] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.280194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.287913] page dumped because: kasan: bad access detected [ 64.293469] [ 64.294944] Memory state around the buggy address: [ 64.299726] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.306927] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.314132] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.321333] ^ [ 64.326111] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.333316] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.340517] ================================================================== [ 76.502548] ================================================================== [ 76.509607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 76.516983] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 76.524362] [ 76.525843] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 76.525897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.525911] Hardware name: WinLink E850-96 board (DT) [ 76.525931] Call trace: [ 76.525944] show_stack+0x20/0x38 (C) [ 76.525976] dump_stack_lvl+0x8c/0xd0 [ 76.526010] print_report+0x118/0x5d0 [ 76.526040] kasan_report+0xdc/0x128 [ 76.526068] kasan_check_range+0x100/0x1a8 [ 76.526097] __kasan_check_write+0x20/0x30 [ 76.526127] kasan_atomics_helper+0x12d8/0x4858 [ 76.526161] kasan_atomics+0x198/0x2e0 [ 76.526194] kunit_try_run_case+0x170/0x3f0 [ 76.526227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.526261] kthread+0x328/0x630 [ 76.526288] ret_from_fork+0x10/0x20 [ 76.526319] [ 76.597364] Allocated by task 346: [ 76.600751] kasan_save_stack+0x3c/0x68 [ 76.604569] kasan_save_track+0x20/0x40 [ 76.608388] kasan_save_alloc_info+0x40/0x58 [ 76.612642] __kasan_kmalloc+0xd4/0xd8 [ 76.616374] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.620888] kasan_atomics+0xb8/0x2e0 [ 76.624534] kunit_try_run_case+0x170/0x3f0 [ 76.628700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.634169] kthread+0x328/0x630 [ 76.637381] ret_from_fork+0x10/0x20 [ 76.640940] [ 76.642415] The buggy address belongs to the object at ffff00080851b080 [ 76.642415] which belongs to the cache kmalloc-64 of size 64 [ 76.654742] The buggy address is located 0 bytes to the right of [ 76.654742] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 76.667589] [ 76.669064] The buggy address belongs to the physical page: [ 76.674622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 76.682606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.689116] page_type: f5(slab) [ 76.692249] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.699973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.707692] page dumped because: kasan: bad access detected [ 76.713248] [ 76.714723] Memory state around the buggy address: [ 76.719501] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.726706] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.733911] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.741112] ^ [ 76.745890] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.753095] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.760296] ================================================================== [ 78.089662] ================================================================== [ 78.096735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 78.104114] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 78.111491] [ 78.112973] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 78.113022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.113038] Hardware name: WinLink E850-96 board (DT) [ 78.113054] Call trace: [ 78.113067] show_stack+0x20/0x38 (C) [ 78.113097] dump_stack_lvl+0x8c/0xd0 [ 78.113130] print_report+0x118/0x5d0 [ 78.113156] kasan_report+0xdc/0x128 [ 78.113183] kasan_check_range+0x100/0x1a8 [ 78.113213] __kasan_check_write+0x20/0x30 [ 78.113243] kasan_atomics_helper+0x154c/0x4858 [ 78.113277] kasan_atomics+0x198/0x2e0 [ 78.113311] kunit_try_run_case+0x170/0x3f0 [ 78.113342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.113376] kthread+0x328/0x630 [ 78.113402] ret_from_fork+0x10/0x20 [ 78.113436] [ 78.184493] Allocated by task 346: [ 78.187880] kasan_save_stack+0x3c/0x68 [ 78.191698] kasan_save_track+0x20/0x40 [ 78.195517] kasan_save_alloc_info+0x40/0x58 [ 78.199771] __kasan_kmalloc+0xd4/0xd8 [ 78.203503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.208017] kasan_atomics+0xb8/0x2e0 [ 78.211663] kunit_try_run_case+0x170/0x3f0 [ 78.215829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.221298] kthread+0x328/0x630 [ 78.224510] ret_from_fork+0x10/0x20 [ 78.228069] [ 78.229545] The buggy address belongs to the object at ffff00080851b080 [ 78.229545] which belongs to the cache kmalloc-64 of size 64 [ 78.241871] The buggy address is located 0 bytes to the right of [ 78.241871] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 78.254718] [ 78.256194] The buggy address belongs to the physical page: [ 78.261752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 78.269735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.276245] page_type: f5(slab) [ 78.279380] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.287102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.294821] page dumped because: kasan: bad access detected [ 78.300377] [ 78.301852] Memory state around the buggy address: [ 78.306635] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.313835] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.321040] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.328241] ^ [ 78.333019] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.340223] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.347424] ================================================================== [ 63.552524] ================================================================== [ 63.566748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 63.574123] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 63.581413] [ 63.582901] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 63.582957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.582977] Hardware name: WinLink E850-96 board (DT) [ 63.582998] Call trace: [ 63.583011] show_stack+0x20/0x38 (C) [ 63.583050] dump_stack_lvl+0x8c/0xd0 [ 63.583088] print_report+0x118/0x5d0 [ 63.583122] kasan_report+0xdc/0x128 [ 63.583150] __asan_report_load4_noabort+0x20/0x30 [ 63.583182] kasan_atomics_helper+0x40a8/0x4858 [ 63.583216] kasan_atomics+0x198/0x2e0 [ 63.583249] kunit_try_run_case+0x170/0x3f0 [ 63.583283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.583319] kthread+0x328/0x630 [ 63.583349] ret_from_fork+0x10/0x20 [ 63.583388] [ 63.651034] Allocated by task 346: [ 63.654420] kasan_save_stack+0x3c/0x68 [ 63.658235] kasan_save_track+0x20/0x40 [ 63.662055] kasan_save_alloc_info+0x40/0x58 [ 63.666308] __kasan_kmalloc+0xd4/0xd8 [ 63.670041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.674554] kasan_atomics+0xb8/0x2e0 [ 63.678202] kunit_try_run_case+0x170/0x3f0 [ 63.682367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.687836] kthread+0x328/0x630 [ 63.691047] ret_from_fork+0x10/0x20 [ 63.694607] [ 63.696085] The buggy address belongs to the object at ffff00080851b080 [ 63.696085] which belongs to the cache kmalloc-64 of size 64 [ 63.708412] The buggy address is located 0 bytes to the right of [ 63.708412] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 63.721255] [ 63.722735] The buggy address belongs to the physical page: [ 63.728290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 63.736275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.742784] page_type: f5(slab) [ 63.745920] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.753640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.761362] page dumped because: kasan: bad access detected [ 63.766914] [ 63.768391] Memory state around the buggy address: [ 63.773171] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.780373] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.787579] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.794778] ^ [ 63.799557] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.806761] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.813964] ================================================================== [ 68.580085] ================================================================== [ 68.587156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 68.594446] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 68.601825] [ 68.603305] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 68.603353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.603368] Hardware name: WinLink E850-96 board (DT) [ 68.603386] Call trace: [ 68.603397] show_stack+0x20/0x38 (C) [ 68.603430] dump_stack_lvl+0x8c/0xd0 [ 68.603460] print_report+0x118/0x5d0 [ 68.603489] kasan_report+0xdc/0x128 [ 68.603517] kasan_check_range+0x100/0x1a8 [ 68.603545] __kasan_check_write+0x20/0x30 [ 68.603575] kasan_atomics_helper+0x894/0x4858 [ 68.603610] kasan_atomics+0x198/0x2e0 [ 68.603643] kunit_try_run_case+0x170/0x3f0 [ 68.603674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.603708] kthread+0x328/0x630 [ 68.603735] ret_from_fork+0x10/0x20 [ 68.603766] [ 68.674740] Allocated by task 346: [ 68.678127] kasan_save_stack+0x3c/0x68 [ 68.681945] kasan_save_track+0x20/0x40 [ 68.685764] kasan_save_alloc_info+0x40/0x58 [ 68.690018] __kasan_kmalloc+0xd4/0xd8 [ 68.693750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.698264] kasan_atomics+0xb8/0x2e0 [ 68.701910] kunit_try_run_case+0x170/0x3f0 [ 68.706076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.711545] kthread+0x328/0x630 [ 68.714757] ret_from_fork+0x10/0x20 [ 68.718316] [ 68.719791] The buggy address belongs to the object at ffff00080851b080 [ 68.719791] which belongs to the cache kmalloc-64 of size 64 [ 68.732118] The buggy address is located 0 bytes to the right of [ 68.732118] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 68.744965] [ 68.746440] The buggy address belongs to the physical page: [ 68.751998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 68.759982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.766493] page_type: f5(slab) [ 68.769625] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.777349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.785068] page dumped because: kasan: bad access detected [ 68.790623] [ 68.792099] Memory state around the buggy address: [ 68.796879] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.804082] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.811287] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.818488] ^ [ 68.823266] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.830471] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.837672] ================================================================== [ 70.957844] ================================================================== [ 70.964898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 70.972277] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 70.979567] [ 70.981049] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 70.981096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.981112] Hardware name: WinLink E850-96 board (DT) [ 70.981131] Call trace: [ 70.981144] show_stack+0x20/0x38 (C) [ 70.981177] dump_stack_lvl+0x8c/0xd0 [ 70.981211] print_report+0x118/0x5d0 [ 70.981238] kasan_report+0xdc/0x128 [ 70.981264] __asan_report_load4_noabort+0x20/0x30 [ 70.981296] kasan_atomics_helper+0x3dbc/0x4858 [ 70.981329] kasan_atomics+0x198/0x2e0 [ 70.981364] kunit_try_run_case+0x170/0x3f0 [ 70.981393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.981426] kthread+0x328/0x630 [ 70.981451] ret_from_fork+0x10/0x20 [ 70.981482] [ 71.049184] Allocated by task 346: [ 71.052571] kasan_save_stack+0x3c/0x68 [ 71.056388] kasan_save_track+0x20/0x40 [ 71.060208] kasan_save_alloc_info+0x40/0x58 [ 71.064461] __kasan_kmalloc+0xd4/0xd8 [ 71.068194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.072707] kasan_atomics+0xb8/0x2e0 [ 71.076353] kunit_try_run_case+0x170/0x3f0 [ 71.080520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.085988] kthread+0x328/0x630 [ 71.089200] ret_from_fork+0x10/0x20 [ 71.092759] [ 71.094235] The buggy address belongs to the object at ffff00080851b080 [ 71.094235] which belongs to the cache kmalloc-64 of size 64 [ 71.106562] The buggy address is located 0 bytes to the right of [ 71.106562] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 71.119408] [ 71.120885] The buggy address belongs to the physical page: [ 71.126442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 71.134425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.140935] page_type: f5(slab) [ 71.144070] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.151793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.159512] page dumped because: kasan: bad access detected [ 71.165067] [ 71.166543] Memory state around the buggy address: [ 71.171321] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.178526] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.185730] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.192931] ^ [ 71.197709] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.204914] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.212115] ================================================================== [ 72.537508] ================================================================== [ 72.544562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 72.551939] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 72.559230] [ 72.560712] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 72.560765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.560780] Hardware name: WinLink E850-96 board (DT) [ 72.560799] Call trace: [ 72.560812] show_stack+0x20/0x38 (C) [ 72.560843] dump_stack_lvl+0x8c/0xd0 [ 72.560877] print_report+0x118/0x5d0 [ 72.560902] kasan_report+0xdc/0x128 [ 72.560928] __asan_report_load4_noabort+0x20/0x30 [ 72.560959] kasan_atomics_helper+0x3e04/0x4858 [ 72.560994] kasan_atomics+0x198/0x2e0 [ 72.561026] kunit_try_run_case+0x170/0x3f0 [ 72.561058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.561091] kthread+0x328/0x630 [ 72.561117] ret_from_fork+0x10/0x20 [ 72.561147] [ 72.628848] Allocated by task 346: [ 72.632234] kasan_save_stack+0x3c/0x68 [ 72.636052] kasan_save_track+0x20/0x40 [ 72.639871] kasan_save_alloc_info+0x40/0x58 [ 72.644125] __kasan_kmalloc+0xd4/0xd8 [ 72.647858] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.652371] kasan_atomics+0xb8/0x2e0 [ 72.656017] kunit_try_run_case+0x170/0x3f0 [ 72.660184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.665652] kthread+0x328/0x630 [ 72.668864] ret_from_fork+0x10/0x20 [ 72.672423] [ 72.673898] The buggy address belongs to the object at ffff00080851b080 [ 72.673898] which belongs to the cache kmalloc-64 of size 64 [ 72.686225] The buggy address is located 0 bytes to the right of [ 72.686225] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 72.699072] [ 72.700549] The buggy address belongs to the physical page: [ 72.706106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 72.714091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.720599] page_type: f5(slab) [ 72.723735] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.731457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.739176] page dumped because: kasan: bad access detected [ 72.744731] [ 72.746206] Memory state around the buggy address: [ 72.750985] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.758189] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.765394] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.772595] ^ [ 72.777373] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.784578] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.791779] ================================================================== [ 76.767609] ================================================================== [ 76.774707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 76.782084] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 76.789462] [ 76.790944] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 76.790991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.791005] Hardware name: WinLink E850-96 board (DT) [ 76.791024] Call trace: [ 76.791037] show_stack+0x20/0x38 (C) [ 76.791068] dump_stack_lvl+0x8c/0xd0 [ 76.791101] print_report+0x118/0x5d0 [ 76.791129] kasan_report+0xdc/0x128 [ 76.791157] kasan_check_range+0x100/0x1a8 [ 76.791186] __kasan_check_write+0x20/0x30 [ 76.791217] kasan_atomics_helper+0x1384/0x4858 [ 76.791254] kasan_atomics+0x198/0x2e0 [ 76.791287] kunit_try_run_case+0x170/0x3f0 [ 76.791316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.791350] kthread+0x328/0x630 [ 76.791376] ret_from_fork+0x10/0x20 [ 76.791406] [ 76.862464] Allocated by task 346: [ 76.865851] kasan_save_stack+0x3c/0x68 [ 76.869669] kasan_save_track+0x20/0x40 [ 76.873488] kasan_save_alloc_info+0x40/0x58 [ 76.877742] __kasan_kmalloc+0xd4/0xd8 [ 76.881475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.885988] kasan_atomics+0xb8/0x2e0 [ 76.889634] kunit_try_run_case+0x170/0x3f0 [ 76.893801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.899269] kthread+0x328/0x630 [ 76.902481] ret_from_fork+0x10/0x20 [ 76.906040] [ 76.907515] The buggy address belongs to the object at ffff00080851b080 [ 76.907515] which belongs to the cache kmalloc-64 of size 64 [ 76.919842] The buggy address is located 0 bytes to the right of [ 76.919842] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 76.932689] [ 76.934165] The buggy address belongs to the physical page: [ 76.939722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 76.947706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.954216] page_type: f5(slab) [ 76.957349] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.965074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.972792] page dumped because: kasan: bad access detected [ 76.978348] [ 76.979823] Memory state around the buggy address: [ 76.984602] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.991807] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.999011] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.006212] ^ [ 77.010990] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.018195] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.025396] ================================================================== [ 72.010956] ================================================================== [ 72.018010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 72.025384] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 72.032676] [ 72.034157] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 72.034204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.034220] Hardware name: WinLink E850-96 board (DT) [ 72.034239] Call trace: [ 72.034252] show_stack+0x20/0x38 (C) [ 72.034286] dump_stack_lvl+0x8c/0xd0 [ 72.034319] print_report+0x118/0x5d0 [ 72.034347] kasan_report+0xdc/0x128 [ 72.034375] __asan_report_load4_noabort+0x20/0x30 [ 72.034407] kasan_atomics_helper+0x3dd8/0x4858 [ 72.034441] kasan_atomics+0x198/0x2e0 [ 72.034473] kunit_try_run_case+0x170/0x3f0 [ 72.034502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.034536] kthread+0x328/0x630 [ 72.034562] ret_from_fork+0x10/0x20 [ 72.034593] [ 72.102292] Allocated by task 346: [ 72.105680] kasan_save_stack+0x3c/0x68 [ 72.109498] kasan_save_track+0x20/0x40 [ 72.113317] kasan_save_alloc_info+0x40/0x58 [ 72.117570] __kasan_kmalloc+0xd4/0xd8 [ 72.121303] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.125817] kasan_atomics+0xb8/0x2e0 [ 72.129463] kunit_try_run_case+0x170/0x3f0 [ 72.133629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.139098] kthread+0x328/0x630 [ 72.142310] ret_from_fork+0x10/0x20 [ 72.145868] [ 72.147345] The buggy address belongs to the object at ffff00080851b080 [ 72.147345] which belongs to the cache kmalloc-64 of size 64 [ 72.159671] The buggy address is located 0 bytes to the right of [ 72.159671] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 72.172517] [ 72.173995] The buggy address belongs to the physical page: [ 72.179551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 72.187536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.194045] page_type: f5(slab) [ 72.197178] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.204902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.212621] page dumped because: kasan: bad access detected [ 72.218176] [ 72.219652] Memory state around the buggy address: [ 72.224430] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.231635] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.238840] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.246040] ^ [ 72.250818] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.258023] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.265224] ================================================================== [ 79.146609] ================================================================== [ 79.153664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 79.161043] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 79.168332] [ 79.169815] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 79.169864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.169880] Hardware name: WinLink E850-96 board (DT) [ 79.169897] Call trace: [ 79.169910] show_stack+0x20/0x38 (C) [ 79.169940] dump_stack_lvl+0x8c/0xd0 [ 79.169973] print_report+0x118/0x5d0 [ 79.170002] kasan_report+0xdc/0x128 [ 79.170030] __asan_report_load8_noabort+0x20/0x30 [ 79.170063] kasan_atomics_helper+0x3df4/0x4858 [ 79.170098] kasan_atomics+0x198/0x2e0 [ 79.170130] kunit_try_run_case+0x170/0x3f0 [ 79.170160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.170194] kthread+0x328/0x630 [ 79.170221] ret_from_fork+0x10/0x20 [ 79.170251] [ 79.237949] Allocated by task 346: [ 79.241336] kasan_save_stack+0x3c/0x68 [ 79.245154] kasan_save_track+0x20/0x40 [ 79.248974] kasan_save_alloc_info+0x40/0x58 [ 79.253227] __kasan_kmalloc+0xd4/0xd8 [ 79.256960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.261474] kasan_atomics+0xb8/0x2e0 [ 79.265119] kunit_try_run_case+0x170/0x3f0 [ 79.269286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.274755] kthread+0x328/0x630 [ 79.277966] ret_from_fork+0x10/0x20 [ 79.281525] [ 79.283001] The buggy address belongs to the object at ffff00080851b080 [ 79.283001] which belongs to the cache kmalloc-64 of size 64 [ 79.295327] The buggy address is located 0 bytes to the right of [ 79.295327] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 79.308174] [ 79.309650] The buggy address belongs to the physical page: [ 79.315207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 79.323193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.329701] page_type: f5(slab) [ 79.332835] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.340559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.348278] page dumped because: kasan: bad access detected [ 79.353833] [ 79.355309] Memory state around the buggy address: [ 79.360088] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.367292] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.374497] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.381697] ^ [ 79.386475] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.393680] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.400881] ================================================================== [ 69.371579] ================================================================== [ 69.378637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 69.385927] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 69.393306] [ 69.394787] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 69.394834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.394850] Hardware name: WinLink E850-96 board (DT) [ 69.394868] Call trace: [ 69.394878] show_stack+0x20/0x38 (C) [ 69.394909] dump_stack_lvl+0x8c/0xd0 [ 69.394940] print_report+0x118/0x5d0 [ 69.394970] kasan_report+0xdc/0x128 [ 69.394997] kasan_check_range+0x100/0x1a8 [ 69.395027] __kasan_check_write+0x20/0x30 [ 69.395057] kasan_atomics_helper+0x99c/0x4858 [ 69.395091] kasan_atomics+0x198/0x2e0 [ 69.395124] kunit_try_run_case+0x170/0x3f0 [ 69.395154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.395186] kthread+0x328/0x630 [ 69.395212] ret_from_fork+0x10/0x20 [ 69.395243] [ 69.466221] Allocated by task 346: [ 69.469608] kasan_save_stack+0x3c/0x68 [ 69.473426] kasan_save_track+0x20/0x40 [ 69.477245] kasan_save_alloc_info+0x40/0x58 [ 69.481499] __kasan_kmalloc+0xd4/0xd8 [ 69.485231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.489745] kasan_atomics+0xb8/0x2e0 [ 69.493391] kunit_try_run_case+0x170/0x3f0 [ 69.497558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.503026] kthread+0x328/0x630 [ 69.506238] ret_from_fork+0x10/0x20 [ 69.509797] [ 69.511272] The buggy address belongs to the object at ffff00080851b080 [ 69.511272] which belongs to the cache kmalloc-64 of size 64 [ 69.523599] The buggy address is located 0 bytes to the right of [ 69.523599] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 69.536446] [ 69.537923] The buggy address belongs to the physical page: [ 69.543480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 69.551465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.557973] page_type: f5(slab) [ 69.561106] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.568831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.576549] page dumped because: kasan: bad access detected [ 69.582105] [ 69.583580] Memory state around the buggy address: [ 69.588362] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.595563] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.602768] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.609969] ^ [ 69.614747] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.621952] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.629153] ================================================================== [ 77.294358] ================================================================== [ 77.301435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 77.308812] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 77.316190] [ 77.317672] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 77.317722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.317738] Hardware name: WinLink E850-96 board (DT) [ 77.317756] Call trace: [ 77.317771] show_stack+0x20/0x38 (C) [ 77.317803] dump_stack_lvl+0x8c/0xd0 [ 77.317835] print_report+0x118/0x5d0 [ 77.317864] kasan_report+0xdc/0x128 [ 77.317892] kasan_check_range+0x100/0x1a8 [ 77.317923] __kasan_check_write+0x20/0x30 [ 77.317954] kasan_atomics_helper+0x1414/0x4858 [ 77.317988] kasan_atomics+0x198/0x2e0 [ 77.318021] kunit_try_run_case+0x170/0x3f0 [ 77.318050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.318084] kthread+0x328/0x630 [ 77.318109] ret_from_fork+0x10/0x20 [ 77.318139] [ 77.389193] Allocated by task 346: [ 77.392579] kasan_save_stack+0x3c/0x68 [ 77.396397] kasan_save_track+0x20/0x40 [ 77.400217] kasan_save_alloc_info+0x40/0x58 [ 77.404470] __kasan_kmalloc+0xd4/0xd8 [ 77.408203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.412716] kasan_atomics+0xb8/0x2e0 [ 77.416362] kunit_try_run_case+0x170/0x3f0 [ 77.420529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.425997] kthread+0x328/0x630 [ 77.429209] ret_from_fork+0x10/0x20 [ 77.432768] [ 77.434243] The buggy address belongs to the object at ffff00080851b080 [ 77.434243] which belongs to the cache kmalloc-64 of size 64 [ 77.446571] The buggy address is located 0 bytes to the right of [ 77.446571] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 77.459417] [ 77.460893] The buggy address belongs to the physical page: [ 77.466450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 77.474435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.480944] page_type: f5(slab) [ 77.484077] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.491802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.499521] page dumped because: kasan: bad access detected [ 77.505076] [ 77.506552] Memory state around the buggy address: [ 77.511330] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.518535] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.525739] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.532940] ^ [ 77.537718] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.544923] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.552124] ================================================================== [ 70.692895] ================================================================== [ 70.699971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 70.707262] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 70.714640] [ 70.716124] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 70.716174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.716190] Hardware name: WinLink E850-96 board (DT) [ 70.716207] Call trace: [ 70.716221] show_stack+0x20/0x38 (C) [ 70.716252] dump_stack_lvl+0x8c/0xd0 [ 70.716283] print_report+0x118/0x5d0 [ 70.716311] kasan_report+0xdc/0x128 [ 70.716337] kasan_check_range+0x100/0x1a8 [ 70.716367] __kasan_check_write+0x20/0x30 [ 70.716398] kasan_atomics_helper+0xb70/0x4858 [ 70.716431] kasan_atomics+0x198/0x2e0 [ 70.716463] kunit_try_run_case+0x170/0x3f0 [ 70.716493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.716526] kthread+0x328/0x630 [ 70.716553] ret_from_fork+0x10/0x20 [ 70.716586] [ 70.787556] Allocated by task 346: [ 70.790942] kasan_save_stack+0x3c/0x68 [ 70.794760] kasan_save_track+0x20/0x40 [ 70.798579] kasan_save_alloc_info+0x40/0x58 [ 70.802833] __kasan_kmalloc+0xd4/0xd8 [ 70.806566] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.811079] kasan_atomics+0xb8/0x2e0 [ 70.814725] kunit_try_run_case+0x170/0x3f0 [ 70.818892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.824361] kthread+0x328/0x630 [ 70.827572] ret_from_fork+0x10/0x20 [ 70.831131] [ 70.832607] The buggy address belongs to the object at ffff00080851b080 [ 70.832607] which belongs to the cache kmalloc-64 of size 64 [ 70.844934] The buggy address is located 0 bytes to the right of [ 70.844934] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 70.857780] [ 70.859256] The buggy address belongs to the physical page: [ 70.864813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 70.872797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.879308] page_type: f5(slab) [ 70.882441] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.890165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.897884] page dumped because: kasan: bad access detected [ 70.903439] [ 70.904915] Memory state around the buggy address: [ 70.909694] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.916898] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.924103] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.931303] ^ [ 70.936082] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.943286] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.950487] ================================================================== [ 75.972350] ================================================================== [ 75.979407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 75.986783] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 75.994161] [ 75.995645] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 75.995693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.995708] Hardware name: WinLink E850-96 board (DT) [ 75.995726] Call trace: [ 75.995739] show_stack+0x20/0x38 (C) [ 75.995769] dump_stack_lvl+0x8c/0xd0 [ 75.995803] print_report+0x118/0x5d0 [ 75.995831] kasan_report+0xdc/0x128 [ 75.995856] kasan_check_range+0x100/0x1a8 [ 75.995885] __kasan_check_write+0x20/0x30 [ 75.995915] kasan_atomics_helper+0x11f8/0x4858 [ 75.995951] kasan_atomics+0x198/0x2e0 [ 75.995984] kunit_try_run_case+0x170/0x3f0 [ 75.996013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.996047] kthread+0x328/0x630 [ 75.996074] ret_from_fork+0x10/0x20 [ 75.996104] [ 76.067164] Allocated by task 346: [ 76.070551] kasan_save_stack+0x3c/0x68 [ 76.074369] kasan_save_track+0x20/0x40 [ 76.078188] kasan_save_alloc_info+0x40/0x58 [ 76.082441] __kasan_kmalloc+0xd4/0xd8 [ 76.086174] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.090688] kasan_atomics+0xb8/0x2e0 [ 76.094334] kunit_try_run_case+0x170/0x3f0 [ 76.098500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.103969] kthread+0x328/0x630 [ 76.107181] ret_from_fork+0x10/0x20 [ 76.110740] [ 76.112215] The buggy address belongs to the object at ffff00080851b080 [ 76.112215] which belongs to the cache kmalloc-64 of size 64 [ 76.124542] The buggy address is located 0 bytes to the right of [ 76.124542] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 76.137389] [ 76.138864] The buggy address belongs to the physical page: [ 76.144423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 76.152407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.158916] page_type: f5(slab) [ 76.162049] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.169773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.177492] page dumped because: kasan: bad access detected [ 76.183047] [ 76.184523] Memory state around the buggy address: [ 76.189301] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.196506] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.203711] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.210912] ^ [ 76.215690] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.222894] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.230095] ================================================================== [ 72.799096] ================================================================== [ 72.806190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 72.813480] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 72.820771] [ 72.822253] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 72.822301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.822318] Hardware name: WinLink E850-96 board (DT) [ 72.822336] Call trace: [ 72.822350] show_stack+0x20/0x38 (C) [ 72.822380] dump_stack_lvl+0x8c/0xd0 [ 72.822412] print_report+0x118/0x5d0 [ 72.822437] kasan_report+0xdc/0x128 [ 72.822464] kasan_check_range+0x100/0x1a8 [ 72.822493] __kasan_check_read+0x20/0x30 [ 72.822523] kasan_atomics_helper+0xdd4/0x4858 [ 72.822558] kasan_atomics+0x198/0x2e0 [ 72.822590] kunit_try_run_case+0x170/0x3f0 [ 72.822621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.822655] kthread+0x328/0x630 [ 72.822680] ret_from_fork+0x10/0x20 [ 72.822709] [ 72.893600] Allocated by task 346: [ 72.896987] kasan_save_stack+0x3c/0x68 [ 72.900805] kasan_save_track+0x20/0x40 [ 72.904625] kasan_save_alloc_info+0x40/0x58 [ 72.908878] __kasan_kmalloc+0xd4/0xd8 [ 72.912610] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.917124] kasan_atomics+0xb8/0x2e0 [ 72.920770] kunit_try_run_case+0x170/0x3f0 [ 72.924937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.930405] kthread+0x328/0x630 [ 72.933617] ret_from_fork+0x10/0x20 [ 72.937176] [ 72.938652] The buggy address belongs to the object at ffff00080851b080 [ 72.938652] which belongs to the cache kmalloc-64 of size 64 [ 72.950980] The buggy address is located 0 bytes to the right of [ 72.950980] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 72.963825] [ 72.965301] The buggy address belongs to the physical page: [ 72.970858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 72.978842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.985352] page_type: f5(slab) [ 72.988485] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.996210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.003928] page dumped because: kasan: bad access detected [ 73.009484] [ 73.010959] Memory state around the buggy address: [ 73.015738] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.022942] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.030147] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.037348] ^ [ 73.042126] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.049331] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.056532] ================================================================== [ 74.117132] ================================================================== [ 74.124226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 74.131516] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 74.138894] [ 74.140378] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 74.140426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.140443] Hardware name: WinLink E850-96 board (DT) [ 74.140462] Call trace: [ 74.140474] show_stack+0x20/0x38 (C) [ 74.140505] dump_stack_lvl+0x8c/0xd0 [ 74.140537] print_report+0x118/0x5d0 [ 74.140565] kasan_report+0xdc/0x128 [ 74.140591] kasan_check_range+0x100/0x1a8 [ 74.140621] __kasan_check_write+0x20/0x30 [ 74.140653] kasan_atomics_helper+0xf20/0x4858 [ 74.140689] kasan_atomics+0x198/0x2e0 [ 74.140721] kunit_try_run_case+0x170/0x3f0 [ 74.140750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.140783] kthread+0x328/0x630 [ 74.140810] ret_from_fork+0x10/0x20 [ 74.140840] [ 74.211810] Allocated by task 346: [ 74.215196] kasan_save_stack+0x3c/0x68 [ 74.219014] kasan_save_track+0x20/0x40 [ 74.222834] kasan_save_alloc_info+0x40/0x58 [ 74.227087] __kasan_kmalloc+0xd4/0xd8 [ 74.230820] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.235334] kasan_atomics+0xb8/0x2e0 [ 74.238979] kunit_try_run_case+0x170/0x3f0 [ 74.243146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.248615] kthread+0x328/0x630 [ 74.251826] ret_from_fork+0x10/0x20 [ 74.255385] [ 74.256861] The buggy address belongs to the object at ffff00080851b080 [ 74.256861] which belongs to the cache kmalloc-64 of size 64 [ 74.269188] The buggy address is located 0 bytes to the right of [ 74.269188] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 74.282034] [ 74.283510] The buggy address belongs to the physical page: [ 74.289067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 74.297053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.303562] page_type: f5(slab) [ 74.306695] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.314419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.322138] page dumped because: kasan: bad access detected [ 74.327693] [ 74.329169] Memory state around the buggy address: [ 74.333947] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.341152] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.348356] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.355557] ^ [ 74.360336] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.367540] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.374741] ================================================================== [ 66.195751] ================================================================== [ 66.202817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 66.210107] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 66.217485] [ 66.218966] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 66.219015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.219032] Hardware name: WinLink E850-96 board (DT) [ 66.219051] Call trace: [ 66.219064] show_stack+0x20/0x38 (C) [ 66.219096] dump_stack_lvl+0x8c/0xd0 [ 66.219128] print_report+0x118/0x5d0 [ 66.219156] kasan_report+0xdc/0x128 [ 66.219183] kasan_check_range+0x100/0x1a8 [ 66.219213] __kasan_check_write+0x20/0x30 [ 66.219243] kasan_atomics_helper+0x47c/0x4858 [ 66.219276] kasan_atomics+0x198/0x2e0 [ 66.219308] kunit_try_run_case+0x170/0x3f0 [ 66.219336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.219370] kthread+0x328/0x630 [ 66.219398] ret_from_fork+0x10/0x20 [ 66.219426] [ 66.290401] Allocated by task 346: [ 66.293788] kasan_save_stack+0x3c/0x68 [ 66.297606] kasan_save_track+0x20/0x40 [ 66.301425] kasan_save_alloc_info+0x40/0x58 [ 66.305678] __kasan_kmalloc+0xd4/0xd8 [ 66.309411] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.313925] kasan_atomics+0xb8/0x2e0 [ 66.317571] kunit_try_run_case+0x170/0x3f0 [ 66.321737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.327206] kthread+0x328/0x630 [ 66.330418] ret_from_fork+0x10/0x20 [ 66.333977] [ 66.335452] The buggy address belongs to the object at ffff00080851b080 [ 66.335452] which belongs to the cache kmalloc-64 of size 64 [ 66.347779] The buggy address is located 0 bytes to the right of [ 66.347779] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 66.360625] [ 66.362103] The buggy address belongs to the physical page: [ 66.367659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 66.375643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.382153] page_type: f5(slab) [ 66.385286] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.393010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.400730] page dumped because: kasan: bad access detected [ 66.406285] [ 66.407760] Memory state around the buggy address: [ 66.412540] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.419743] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.426948] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.434149] ^ [ 66.438926] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.446131] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.453332] ================================================================== [ 80.461693] ================================================================== [ 80.468748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 80.476126] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 80.483504] [ 80.484986] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 80.485035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.485049] Hardware name: WinLink E850-96 board (DT) [ 80.485067] Call trace: [ 80.485080] show_stack+0x20/0x38 (C) [ 80.485110] dump_stack_lvl+0x8c/0xd0 [ 80.485146] print_report+0x118/0x5d0 [ 80.485173] kasan_report+0xdc/0x128 [ 80.485201] kasan_check_range+0x100/0x1a8 [ 80.485232] __kasan_check_write+0x20/0x30 [ 80.485261] kasan_atomics_helper+0x17ec/0x4858 [ 80.485297] kasan_atomics+0x198/0x2e0 [ 80.485331] kunit_try_run_case+0x170/0x3f0 [ 80.485363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.485397] kthread+0x328/0x630 [ 80.485424] ret_from_fork+0x10/0x20 [ 80.485455] [ 80.556506] Allocated by task 346: [ 80.559893] kasan_save_stack+0x3c/0x68 [ 80.563711] kasan_save_track+0x20/0x40 [ 80.567531] kasan_save_alloc_info+0x40/0x58 [ 80.571784] __kasan_kmalloc+0xd4/0xd8 [ 80.575516] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.580030] kasan_atomics+0xb8/0x2e0 [ 80.583676] kunit_try_run_case+0x170/0x3f0 [ 80.587842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.593311] kthread+0x328/0x630 [ 80.596523] ret_from_fork+0x10/0x20 [ 80.600082] [ 80.601558] The buggy address belongs to the object at ffff00080851b080 [ 80.601558] which belongs to the cache kmalloc-64 of size 64 [ 80.613884] The buggy address is located 0 bytes to the right of [ 80.613884] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 80.626730] [ 80.628207] The buggy address belongs to the physical page: [ 80.633765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 80.641748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.648258] page_type: f5(slab) [ 80.651394] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.659115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.666834] page dumped because: kasan: bad access detected [ 80.672389] [ 80.673865] Memory state around the buggy address: [ 80.678644] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.685848] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.693052] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.700254] ^ [ 80.705032] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.712237] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.719437] ================================================================== [ 63.821307] ================================================================== [ 63.828374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 63.835751] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 63.843128] [ 63.844613] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 63.844669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.844684] Hardware name: WinLink E850-96 board (DT) [ 63.844705] Call trace: [ 63.844715] show_stack+0x20/0x38 (C) [ 63.844749] dump_stack_lvl+0x8c/0xd0 [ 63.844784] print_report+0x118/0x5d0 [ 63.844813] kasan_report+0xdc/0x128 [ 63.844842] __asan_report_store4_noabort+0x20/0x30 [ 63.844877] kasan_atomics_helper+0x3f7c/0x4858 [ 63.844911] kasan_atomics+0x198/0x2e0 [ 63.844944] kunit_try_run_case+0x170/0x3f0 [ 63.844976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.845010] kthread+0x328/0x630 [ 63.845038] ret_from_fork+0x10/0x20 [ 63.845069] [ 63.912832] Allocated by task 346: [ 63.916219] kasan_save_stack+0x3c/0x68 [ 63.920037] kasan_save_track+0x20/0x40 [ 63.923856] kasan_save_alloc_info+0x40/0x58 [ 63.928110] __kasan_kmalloc+0xd4/0xd8 [ 63.931842] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.936356] kasan_atomics+0xb8/0x2e0 [ 63.940004] kunit_try_run_case+0x170/0x3f0 [ 63.944169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.949637] kthread+0x328/0x630 [ 63.952849] ret_from_fork+0x10/0x20 [ 63.956408] [ 63.957885] The buggy address belongs to the object at ffff00080851b080 [ 63.957885] which belongs to the cache kmalloc-64 of size 64 [ 63.970210] The buggy address is located 0 bytes to the right of [ 63.970210] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 63.983057] [ 63.984535] The buggy address belongs to the physical page: [ 63.990092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 63.998076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.004584] page_type: f5(slab) [ 64.007719] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.015442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.023162] page dumped because: kasan: bad access detected [ 64.028716] [ 64.030192] Memory state around the buggy address: [ 64.034970] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.042174] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.049379] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.056580] ^ [ 64.061358] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.068563] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.075765] ================================================================== [ 71.219457] ================================================================== [ 71.226526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 71.233817] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 71.241195] [ 71.242677] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 71.242726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.242742] Hardware name: WinLink E850-96 board (DT) [ 71.242762] Call trace: [ 71.242773] show_stack+0x20/0x38 (C) [ 71.242803] dump_stack_lvl+0x8c/0xd0 [ 71.242837] print_report+0x118/0x5d0 [ 71.242865] kasan_report+0xdc/0x128 [ 71.242891] kasan_check_range+0x100/0x1a8 [ 71.242918] __kasan_check_write+0x20/0x30 [ 71.242949] kasan_atomics_helper+0xc08/0x4858 [ 71.242984] kasan_atomics+0x198/0x2e0 [ 71.243016] kunit_try_run_case+0x170/0x3f0 [ 71.243044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.243078] kthread+0x328/0x630 [ 71.243101] ret_from_fork+0x10/0x20 [ 71.243132] [ 71.314110] Allocated by task 346: [ 71.317497] kasan_save_stack+0x3c/0x68 [ 71.321315] kasan_save_track+0x20/0x40 [ 71.325134] kasan_save_alloc_info+0x40/0x58 [ 71.329388] __kasan_kmalloc+0xd4/0xd8 [ 71.333120] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.337634] kasan_atomics+0xb8/0x2e0 [ 71.341280] kunit_try_run_case+0x170/0x3f0 [ 71.345446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.350915] kthread+0x328/0x630 [ 71.354127] ret_from_fork+0x10/0x20 [ 71.357686] [ 71.359161] The buggy address belongs to the object at ffff00080851b080 [ 71.359161] which belongs to the cache kmalloc-64 of size 64 [ 71.371488] The buggy address is located 0 bytes to the right of [ 71.371488] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 71.384335] [ 71.385811] The buggy address belongs to the physical page: [ 71.391367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 71.399352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.405862] page_type: f5(slab) [ 71.408995] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.416719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.424438] page dumped because: kasan: bad access detected [ 71.429993] [ 71.431469] Memory state around the buggy address: [ 71.436248] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.443452] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.450657] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.457858] ^ [ 71.462636] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.469841] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.477041] ================================================================== [ 79.934944] ================================================================== [ 79.942020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 79.949397] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 79.956775] [ 79.958258] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 79.958304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.958322] Hardware name: WinLink E850-96 board (DT) [ 79.958340] Call trace: [ 79.958354] show_stack+0x20/0x38 (C) [ 79.958385] dump_stack_lvl+0x8c/0xd0 [ 79.958415] print_report+0x118/0x5d0 [ 79.958443] kasan_report+0xdc/0x128 [ 79.958470] kasan_check_range+0x100/0x1a8 [ 79.958499] __kasan_check_write+0x20/0x30 [ 79.958530] kasan_atomics_helper+0x175c/0x4858 [ 79.958565] kasan_atomics+0x198/0x2e0 [ 79.958596] kunit_try_run_case+0x170/0x3f0 [ 79.958625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.958658] kthread+0x328/0x630 [ 79.958685] ret_from_fork+0x10/0x20 [ 79.958714] [ 80.029779] Allocated by task 346: [ 80.033165] kasan_save_stack+0x3c/0x68 [ 80.036983] kasan_save_track+0x20/0x40 [ 80.040802] kasan_save_alloc_info+0x40/0x58 [ 80.045055] __kasan_kmalloc+0xd4/0xd8 [ 80.048788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.053302] kasan_atomics+0xb8/0x2e0 [ 80.056947] kunit_try_run_case+0x170/0x3f0 [ 80.061114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.066583] kthread+0x328/0x630 [ 80.069795] ret_from_fork+0x10/0x20 [ 80.073354] [ 80.074829] The buggy address belongs to the object at ffff00080851b080 [ 80.074829] which belongs to the cache kmalloc-64 of size 64 [ 80.087156] The buggy address is located 0 bytes to the right of [ 80.087156] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 80.100003] [ 80.101479] The buggy address belongs to the physical page: [ 80.107036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 80.115020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.121530] page_type: f5(slab) [ 80.124662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.132387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.140106] page dumped because: kasan: bad access detected [ 80.145662] [ 80.147137] Memory state around the buggy address: [ 80.151916] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.159120] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.166325] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.173526] ^ [ 80.178304] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.185508] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.192710] ================================================================== [ 65.404077] ================================================================== [ 65.411163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 65.418541] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 65.425917] [ 65.427400] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.427449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.427464] Hardware name: WinLink E850-96 board (DT) [ 65.427484] Call trace: [ 65.427495] show_stack+0x20/0x38 (C) [ 65.427524] dump_stack_lvl+0x8c/0xd0 [ 65.427559] print_report+0x118/0x5d0 [ 65.427588] kasan_report+0xdc/0x128 [ 65.427614] __asan_report_store4_noabort+0x20/0x30 [ 65.427647] kasan_atomics_helper+0x3f94/0x4858 [ 65.427681] kasan_atomics+0x198/0x2e0 [ 65.427713] kunit_try_run_case+0x170/0x3f0 [ 65.427747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.427781] kthread+0x328/0x630 [ 65.427806] ret_from_fork+0x10/0x20 [ 65.427836] [ 65.495621] Allocated by task 346: [ 65.499008] kasan_save_stack+0x3c/0x68 [ 65.502826] kasan_save_track+0x20/0x40 [ 65.506645] kasan_save_alloc_info+0x40/0x58 [ 65.510899] __kasan_kmalloc+0xd4/0xd8 [ 65.514631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.519145] kasan_atomics+0xb8/0x2e0 [ 65.522791] kunit_try_run_case+0x170/0x3f0 [ 65.526958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.532426] kthread+0x328/0x630 [ 65.535638] ret_from_fork+0x10/0x20 [ 65.539197] [ 65.540672] The buggy address belongs to the object at ffff00080851b080 [ 65.540672] which belongs to the cache kmalloc-64 of size 64 [ 65.552999] The buggy address is located 0 bytes to the right of [ 65.552999] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 65.565845] [ 65.567325] The buggy address belongs to the physical page: [ 65.572880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 65.580863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.587373] page_type: f5(slab) [ 65.590507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.598231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.605949] page dumped because: kasan: bad access detected [ 65.611505] [ 65.612980] Memory state around the buggy address: [ 65.617761] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.624963] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.632168] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.639369] ^ [ 65.644147] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.651352] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.658553] ================================================================== [ 80.200043] ================================================================== [ 80.207121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 80.214498] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 80.221789] [ 80.223270] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 80.223319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.223334] Hardware name: WinLink E850-96 board (DT) [ 80.223349] Call trace: [ 80.223362] show_stack+0x20/0x38 (C) [ 80.223393] dump_stack_lvl+0x8c/0xd0 [ 80.223426] print_report+0x118/0x5d0 [ 80.223455] kasan_report+0xdc/0x128 [ 80.223482] __asan_report_load8_noabort+0x20/0x30 [ 80.223514] kasan_atomics_helper+0x3e20/0x4858 [ 80.223551] kasan_atomics+0x198/0x2e0 [ 80.223583] kunit_try_run_case+0x170/0x3f0 [ 80.223611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.223644] kthread+0x328/0x630 [ 80.223670] ret_from_fork+0x10/0x20 [ 80.223702] [ 80.291406] Allocated by task 346: [ 80.294793] kasan_save_stack+0x3c/0x68 [ 80.298611] kasan_save_track+0x20/0x40 [ 80.302430] kasan_save_alloc_info+0x40/0x58 [ 80.306683] __kasan_kmalloc+0xd4/0xd8 [ 80.310416] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.314930] kasan_atomics+0xb8/0x2e0 [ 80.318576] kunit_try_run_case+0x170/0x3f0 [ 80.322742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.328211] kthread+0x328/0x630 [ 80.331423] ret_from_fork+0x10/0x20 [ 80.334982] [ 80.336457] The buggy address belongs to the object at ffff00080851b080 [ 80.336457] which belongs to the cache kmalloc-64 of size 64 [ 80.348784] The buggy address is located 0 bytes to the right of [ 80.348784] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 80.361630] [ 80.363106] The buggy address belongs to the physical page: [ 80.368662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 80.376648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.383158] page_type: f5(slab) [ 80.386291] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.394015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.401734] page dumped because: kasan: bad access detected [ 80.407289] [ 80.408765] Memory state around the buggy address: [ 80.413543] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.420748] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.427953] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.435154] ^ [ 80.439932] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.447137] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.454338] ================================================================== [ 68.315174] ================================================================== [ 68.322230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 68.329520] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 68.336898] [ 68.338379] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 68.338432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.338449] Hardware name: WinLink E850-96 board (DT) [ 68.338466] Call trace: [ 68.338478] show_stack+0x20/0x38 (C) [ 68.338509] dump_stack_lvl+0x8c/0xd0 [ 68.338543] print_report+0x118/0x5d0 [ 68.338570] kasan_report+0xdc/0x128 [ 68.338596] kasan_check_range+0x100/0x1a8 [ 68.338627] __kasan_check_write+0x20/0x30 [ 68.338656] kasan_atomics_helper+0x7cc/0x4858 [ 68.338690] kasan_atomics+0x198/0x2e0 [ 68.338721] kunit_try_run_case+0x170/0x3f0 [ 68.338751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.338782] kthread+0x328/0x630 [ 68.338808] ret_from_fork+0x10/0x20 [ 68.338837] [ 68.409813] Allocated by task 346: [ 68.413200] kasan_save_stack+0x3c/0x68 [ 68.417018] kasan_save_track+0x20/0x40 [ 68.420838] kasan_save_alloc_info+0x40/0x58 [ 68.425091] __kasan_kmalloc+0xd4/0xd8 [ 68.428823] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.433337] kasan_atomics+0xb8/0x2e0 [ 68.436983] kunit_try_run_case+0x170/0x3f0 [ 68.441150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.446618] kthread+0x328/0x630 [ 68.449830] ret_from_fork+0x10/0x20 [ 68.453389] [ 68.454865] The buggy address belongs to the object at ffff00080851b080 [ 68.454865] which belongs to the cache kmalloc-64 of size 64 [ 68.467191] The buggy address is located 0 bytes to the right of [ 68.467191] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 68.480038] [ 68.481516] The buggy address belongs to the physical page: [ 68.487072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 68.495055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.501566] page_type: f5(slab) [ 68.504700] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.512423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.520142] page dumped because: kasan: bad access detected [ 68.525697] [ 68.527172] Memory state around the buggy address: [ 68.531951] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.539156] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.546360] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.553561] ^ [ 68.558339] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.565544] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.572745] ================================================================== [ 74.647003] ================================================================== [ 74.654079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 74.661369] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 74.668747] [ 74.670229] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 74.670276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.670293] Hardware name: WinLink E850-96 board (DT) [ 74.670312] Call trace: [ 74.670325] show_stack+0x20/0x38 (C) [ 74.670355] dump_stack_lvl+0x8c/0xd0 [ 74.670386] print_report+0x118/0x5d0 [ 74.670414] kasan_report+0xdc/0x128 [ 74.670441] kasan_check_range+0x100/0x1a8 [ 74.670470] __kasan_check_write+0x20/0x30 [ 74.670502] kasan_atomics_helper+0xff0/0x4858 [ 74.670537] kasan_atomics+0x198/0x2e0 [ 74.670571] kunit_try_run_case+0x170/0x3f0 [ 74.670600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.670635] kthread+0x328/0x630 [ 74.670661] ret_from_fork+0x10/0x20 [ 74.670691] [ 74.741663] Allocated by task 346: [ 74.745050] kasan_save_stack+0x3c/0x68 [ 74.748868] kasan_save_track+0x20/0x40 [ 74.752687] kasan_save_alloc_info+0x40/0x58 [ 74.756940] __kasan_kmalloc+0xd4/0xd8 [ 74.760673] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.765187] kasan_atomics+0xb8/0x2e0 [ 74.768832] kunit_try_run_case+0x170/0x3f0 [ 74.772999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.778468] kthread+0x328/0x630 [ 74.781680] ret_from_fork+0x10/0x20 [ 74.785239] [ 74.786714] The buggy address belongs to the object at ffff00080851b080 [ 74.786714] which belongs to the cache kmalloc-64 of size 64 [ 74.799041] The buggy address is located 0 bytes to the right of [ 74.799041] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 74.811887] [ 74.813363] The buggy address belongs to the physical page: [ 74.818920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 74.826905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.833415] page_type: f5(slab) [ 74.836549] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.844272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.851992] page dumped because: kasan: bad access detected [ 74.857546] [ 74.859022] Memory state around the buggy address: [ 74.863800] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.871005] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.878210] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.885411] ^ [ 74.890189] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.897393] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.904595] ================================================================== [ 75.177033] ================================================================== [ 75.184106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 75.191483] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 75.198861] [ 75.200342] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 75.200392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.200407] Hardware name: WinLink E850-96 board (DT) [ 75.200426] Call trace: [ 75.200441] show_stack+0x20/0x38 (C) [ 75.200472] dump_stack_lvl+0x8c/0xd0 [ 75.200505] print_report+0x118/0x5d0 [ 75.200533] kasan_report+0xdc/0x128 [ 75.200559] kasan_check_range+0x100/0x1a8 [ 75.200588] __kasan_check_write+0x20/0x30 [ 75.200620] kasan_atomics_helper+0x10c0/0x4858 [ 75.200656] kasan_atomics+0x198/0x2e0 [ 75.200689] kunit_try_run_case+0x170/0x3f0 [ 75.200716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.200749] kthread+0x328/0x630 [ 75.200776] ret_from_fork+0x10/0x20 [ 75.200807] [ 75.271863] Allocated by task 346: [ 75.275250] kasan_save_stack+0x3c/0x68 [ 75.279068] kasan_save_track+0x20/0x40 [ 75.282887] kasan_save_alloc_info+0x40/0x58 [ 75.287141] __kasan_kmalloc+0xd4/0xd8 [ 75.290874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.295387] kasan_atomics+0xb8/0x2e0 [ 75.299033] kunit_try_run_case+0x170/0x3f0 [ 75.303200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.308668] kthread+0x328/0x630 [ 75.311880] ret_from_fork+0x10/0x20 [ 75.315439] [ 75.316914] The buggy address belongs to the object at ffff00080851b080 [ 75.316914] which belongs to the cache kmalloc-64 of size 64 [ 75.329241] The buggy address is located 0 bytes to the right of [ 75.329241] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 75.342088] [ 75.343564] The buggy address belongs to the physical page: [ 75.349121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 75.357105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.363615] page_type: f5(slab) [ 75.366748] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.374472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.382191] page dumped because: kasan: bad access detected [ 75.387747] [ 75.389223] Memory state around the buggy address: [ 75.394001] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.401206] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.408410] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.415611] ^ [ 75.420389] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.427594] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.434795] ================================================================== [ 69.636484] ================================================================== [ 69.643564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 69.650854] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 69.658232] [ 69.659713] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 69.659763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.659778] Hardware name: WinLink E850-96 board (DT) [ 69.659796] Call trace: [ 69.659809] show_stack+0x20/0x38 (C) [ 69.659839] dump_stack_lvl+0x8c/0xd0 [ 69.659870] print_report+0x118/0x5d0 [ 69.659898] kasan_report+0xdc/0x128 [ 69.659924] kasan_check_range+0x100/0x1a8 [ 69.659954] __kasan_check_write+0x20/0x30 [ 69.659984] kasan_atomics_helper+0xa04/0x4858 [ 69.660020] kasan_atomics+0x198/0x2e0 [ 69.660051] kunit_try_run_case+0x170/0x3f0 [ 69.660079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.660115] kthread+0x328/0x630 [ 69.660142] ret_from_fork+0x10/0x20 [ 69.660173] [ 69.731148] Allocated by task 346: [ 69.734535] kasan_save_stack+0x3c/0x68 [ 69.738353] kasan_save_track+0x20/0x40 [ 69.742172] kasan_save_alloc_info+0x40/0x58 [ 69.746426] __kasan_kmalloc+0xd4/0xd8 [ 69.750158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.754672] kasan_atomics+0xb8/0x2e0 [ 69.758318] kunit_try_run_case+0x170/0x3f0 [ 69.762484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.767953] kthread+0x328/0x630 [ 69.771164] ret_from_fork+0x10/0x20 [ 69.774724] [ 69.776199] The buggy address belongs to the object at ffff00080851b080 [ 69.776199] which belongs to the cache kmalloc-64 of size 64 [ 69.788526] The buggy address is located 0 bytes to the right of [ 69.788526] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 69.801372] [ 69.802848] The buggy address belongs to the physical page: [ 69.808405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 69.816390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.822900] page_type: f5(slab) [ 69.826033] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.833757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.841476] page dumped because: kasan: bad access detected [ 69.847031] [ 69.848507] Memory state around the buggy address: [ 69.853287] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.860490] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.867695] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.874896] ^ [ 69.879674] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.886879] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.894079] ================================================================== [ 66.460722] ================================================================== [ 66.467745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 66.475034] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 66.482412] [ 66.483893] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 66.483943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.483960] Hardware name: WinLink E850-96 board (DT) [ 66.483981] Call trace: [ 66.483995] show_stack+0x20/0x38 (C) [ 66.484026] dump_stack_lvl+0x8c/0xd0 [ 66.484058] print_report+0x118/0x5d0 [ 66.484087] kasan_report+0xdc/0x128 [ 66.484114] kasan_check_range+0x100/0x1a8 [ 66.484143] __kasan_check_write+0x20/0x30 [ 66.484173] kasan_atomics_helper+0x4e4/0x4858 [ 66.484207] kasan_atomics+0x198/0x2e0 [ 66.484238] kunit_try_run_case+0x170/0x3f0 [ 66.484270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.484306] kthread+0x328/0x630 [ 66.484334] ret_from_fork+0x10/0x20 [ 66.484365] [ 66.555327] Allocated by task 346: [ 66.558714] kasan_save_stack+0x3c/0x68 [ 66.562532] kasan_save_track+0x20/0x40 [ 66.566351] kasan_save_alloc_info+0x40/0x58 [ 66.570605] __kasan_kmalloc+0xd4/0xd8 [ 66.574338] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.578851] kasan_atomics+0xb8/0x2e0 [ 66.582497] kunit_try_run_case+0x170/0x3f0 [ 66.586664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.592132] kthread+0x328/0x630 [ 66.595344] ret_from_fork+0x10/0x20 [ 66.598903] [ 66.600379] The buggy address belongs to the object at ffff00080851b080 [ 66.600379] which belongs to the cache kmalloc-64 of size 64 [ 66.612705] The buggy address is located 0 bytes to the right of [ 66.612705] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 66.625552] [ 66.627029] The buggy address belongs to the physical page: [ 66.632585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 66.640571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.647079] page_type: f5(slab) [ 66.650212] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.657936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.665656] page dumped because: kasan: bad access detected [ 66.671211] [ 66.672687] Memory state around the buggy address: [ 66.677468] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.684669] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.691874] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.699075] ^ [ 66.703853] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.711058] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.718259] ================================================================== [ 75.707229] ================================================================== [ 75.714306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 75.721683] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 75.729061] [ 75.730543] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 75.730590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.730604] Hardware name: WinLink E850-96 board (DT) [ 75.730622] Call trace: [ 75.730634] show_stack+0x20/0x38 (C) [ 75.730665] dump_stack_lvl+0x8c/0xd0 [ 75.730699] print_report+0x118/0x5d0 [ 75.730727] kasan_report+0xdc/0x128 [ 75.730755] kasan_check_range+0x100/0x1a8 [ 75.730785] __kasan_check_write+0x20/0x30 [ 75.730814] kasan_atomics_helper+0x1190/0x4858 [ 75.730850] kasan_atomics+0x198/0x2e0 [ 75.730883] kunit_try_run_case+0x170/0x3f0 [ 75.730912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.730944] kthread+0x328/0x630 [ 75.730970] ret_from_fork+0x10/0x20 [ 75.731002] [ 75.802064] Allocated by task 346: [ 75.805451] kasan_save_stack+0x3c/0x68 [ 75.809268] kasan_save_track+0x20/0x40 [ 75.813088] kasan_save_alloc_info+0x40/0x58 [ 75.817341] __kasan_kmalloc+0xd4/0xd8 [ 75.821074] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.825587] kasan_atomics+0xb8/0x2e0 [ 75.829233] kunit_try_run_case+0x170/0x3f0 [ 75.833400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.838868] kthread+0x328/0x630 [ 75.842080] ret_from_fork+0x10/0x20 [ 75.845639] [ 75.847115] The buggy address belongs to the object at ffff00080851b080 [ 75.847115] which belongs to the cache kmalloc-64 of size 64 [ 75.859442] The buggy address is located 0 bytes to the right of [ 75.859442] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 75.872288] [ 75.873764] The buggy address belongs to the physical page: [ 75.879323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 75.887307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.893816] page_type: f5(slab) [ 75.896950] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.904673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.912392] page dumped because: kasan: bad access detected [ 75.917947] [ 75.919423] Memory state around the buggy address: [ 75.924201] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.931406] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.938610] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.945811] ^ [ 75.950589] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.957794] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.964995] ================================================================== [ 74.382103] ================================================================== [ 74.389152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 74.396444] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 74.403821] [ 74.405302] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 74.405350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.405366] Hardware name: WinLink E850-96 board (DT) [ 74.405384] Call trace: [ 74.405397] show_stack+0x20/0x38 (C) [ 74.405428] dump_stack_lvl+0x8c/0xd0 [ 74.405460] print_report+0x118/0x5d0 [ 74.405488] kasan_report+0xdc/0x128 [ 74.405515] kasan_check_range+0x100/0x1a8 [ 74.405544] __kasan_check_write+0x20/0x30 [ 74.405576] kasan_atomics_helper+0xf88/0x4858 [ 74.405611] kasan_atomics+0x198/0x2e0 [ 74.405644] kunit_try_run_case+0x170/0x3f0 [ 74.405674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.405708] kthread+0x328/0x630 [ 74.405735] ret_from_fork+0x10/0x20 [ 74.405768] [ 74.476736] Allocated by task 346: [ 74.480123] kasan_save_stack+0x3c/0x68 [ 74.483941] kasan_save_track+0x20/0x40 [ 74.487760] kasan_save_alloc_info+0x40/0x58 [ 74.492014] __kasan_kmalloc+0xd4/0xd8 [ 74.495746] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.500260] kasan_atomics+0xb8/0x2e0 [ 74.503906] kunit_try_run_case+0x170/0x3f0 [ 74.508073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.513541] kthread+0x328/0x630 [ 74.516753] ret_from_fork+0x10/0x20 [ 74.520312] [ 74.521788] The buggy address belongs to the object at ffff00080851b080 [ 74.521788] which belongs to the cache kmalloc-64 of size 64 [ 74.534114] The buggy address is located 0 bytes to the right of [ 74.534114] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 74.546961] [ 74.548437] The buggy address belongs to the physical page: [ 74.553996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 74.561979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.568488] page_type: f5(slab) [ 74.571624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.579346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.587065] page dumped because: kasan: bad access detected [ 74.592620] [ 74.594095] Memory state around the buggy address: [ 74.598876] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.606078] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.613283] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.620484] ^ [ 74.625262] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.632467] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.639669] ================================================================== [ 74.911950] ================================================================== [ 74.919008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 74.926384] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 74.933761] [ 74.935241] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 74.935290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.935306] Hardware name: WinLink E850-96 board (DT) [ 74.935324] Call trace: [ 74.935337] show_stack+0x20/0x38 (C) [ 74.935370] dump_stack_lvl+0x8c/0xd0 [ 74.935402] print_report+0x118/0x5d0 [ 74.935432] kasan_report+0xdc/0x128 [ 74.935458] kasan_check_range+0x100/0x1a8 [ 74.935487] __kasan_check_write+0x20/0x30 [ 74.935517] kasan_atomics_helper+0x1058/0x4858 [ 74.935552] kasan_atomics+0x198/0x2e0 [ 74.935582] kunit_try_run_case+0x170/0x3f0 [ 74.935612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.935645] kthread+0x328/0x630 [ 74.935669] ret_from_fork+0x10/0x20 [ 74.935700] [ 75.006763] Allocated by task 346: [ 75.010150] kasan_save_stack+0x3c/0x68 [ 75.013968] kasan_save_track+0x20/0x40 [ 75.017787] kasan_save_alloc_info+0x40/0x58 [ 75.022040] __kasan_kmalloc+0xd4/0xd8 [ 75.025773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.030287] kasan_atomics+0xb8/0x2e0 [ 75.033933] kunit_try_run_case+0x170/0x3f0 [ 75.038099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.043568] kthread+0x328/0x630 [ 75.046780] ret_from_fork+0x10/0x20 [ 75.050339] [ 75.051814] The buggy address belongs to the object at ffff00080851b080 [ 75.051814] which belongs to the cache kmalloc-64 of size 64 [ 75.064141] The buggy address is located 0 bytes to the right of [ 75.064141] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 75.076988] [ 75.078463] The buggy address belongs to the physical page: [ 75.084021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 75.092005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.098515] page_type: f5(slab) [ 75.101650] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.109372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.117091] page dumped because: kasan: bad access detected [ 75.122646] [ 75.124122] Memory state around the buggy address: [ 75.128900] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.136105] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.143310] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.150511] ^ [ 75.155289] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.162494] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.169695] ================================================================== [ 78.354760] ================================================================== [ 78.361836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 78.369215] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 78.376591] [ 78.378073] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 78.378121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.378137] Hardware name: WinLink E850-96 board (DT) [ 78.378156] Call trace: [ 78.378170] show_stack+0x20/0x38 (C) [ 78.378202] dump_stack_lvl+0x8c/0xd0 [ 78.378235] print_report+0x118/0x5d0 [ 78.378263] kasan_report+0xdc/0x128 [ 78.378290] kasan_check_range+0x100/0x1a8 [ 78.378319] __kasan_check_write+0x20/0x30 [ 78.378350] kasan_atomics_helper+0x15b4/0x4858 [ 78.378385] kasan_atomics+0x198/0x2e0 [ 78.378417] kunit_try_run_case+0x170/0x3f0 [ 78.378447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.378480] kthread+0x328/0x630 [ 78.378506] ret_from_fork+0x10/0x20 [ 78.378537] [ 78.449593] Allocated by task 346: [ 78.452980] kasan_save_stack+0x3c/0x68 [ 78.456798] kasan_save_track+0x20/0x40 [ 78.460618] kasan_save_alloc_info+0x40/0x58 [ 78.464871] __kasan_kmalloc+0xd4/0xd8 [ 78.468604] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.473117] kasan_atomics+0xb8/0x2e0 [ 78.476763] kunit_try_run_case+0x170/0x3f0 [ 78.480930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.486398] kthread+0x328/0x630 [ 78.489610] ret_from_fork+0x10/0x20 [ 78.493169] [ 78.494644] The buggy address belongs to the object at ffff00080851b080 [ 78.494644] which belongs to the cache kmalloc-64 of size 64 [ 78.506971] The buggy address is located 0 bytes to the right of [ 78.506971] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 78.519818] [ 78.521294] The buggy address belongs to the physical page: [ 78.526851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 78.534835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.541345] page_type: f5(slab) [ 78.544478] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.552202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.559921] page dumped because: kasan: bad access detected [ 78.565477] [ 78.566952] Memory state around the buggy address: [ 78.571731] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.578935] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.586140] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.593341] ^ [ 78.598119] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.605324] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.612525] ================================================================== [ 66.990526] ================================================================== [ 66.997597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 67.004888] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 67.012265] [ 67.013748] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 67.013795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.013811] Hardware name: WinLink E850-96 board (DT) [ 67.013830] Call trace: [ 67.013842] show_stack+0x20/0x38 (C) [ 67.013873] dump_stack_lvl+0x8c/0xd0 [ 67.013906] print_report+0x118/0x5d0 [ 67.013934] kasan_report+0xdc/0x128 [ 67.013961] kasan_check_range+0x100/0x1a8 [ 67.013990] __kasan_check_write+0x20/0x30 [ 67.014021] kasan_atomics_helper+0x5b4/0x4858 [ 67.014056] kasan_atomics+0x198/0x2e0 [ 67.014087] kunit_try_run_case+0x170/0x3f0 [ 67.014117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.014149] kthread+0x328/0x630 [ 67.014177] ret_from_fork+0x10/0x20 [ 67.014207] [ 67.085182] Allocated by task 346: [ 67.088568] kasan_save_stack+0x3c/0x68 [ 67.092385] kasan_save_track+0x20/0x40 [ 67.096205] kasan_save_alloc_info+0x40/0x58 [ 67.100458] __kasan_kmalloc+0xd4/0xd8 [ 67.104191] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.108705] kasan_atomics+0xb8/0x2e0 [ 67.112350] kunit_try_run_case+0x170/0x3f0 [ 67.116517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.121986] kthread+0x328/0x630 [ 67.125198] ret_from_fork+0x10/0x20 [ 67.128757] [ 67.130232] The buggy address belongs to the object at ffff00080851b080 [ 67.130232] which belongs to the cache kmalloc-64 of size 64 [ 67.142558] The buggy address is located 0 bytes to the right of [ 67.142558] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 67.155405] [ 67.156883] The buggy address belongs to the physical page: [ 67.162439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 67.170422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.176933] page_type: f5(slab) [ 67.180066] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.187790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.195509] page dumped because: kasan: bad access detected [ 67.201064] [ 67.202540] Memory state around the buggy address: [ 67.207318] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.214523] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.221728] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.228928] ^ [ 67.233706] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.240911] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.248112] ================================================================== [ 77.559481] ================================================================== [ 77.566535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 77.573912] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 77.581291] [ 77.582773] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 77.582822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.582838] Hardware name: WinLink E850-96 board (DT) [ 77.582858] Call trace: [ 77.582870] show_stack+0x20/0x38 (C) [ 77.582902] dump_stack_lvl+0x8c/0xd0 [ 77.582935] print_report+0x118/0x5d0 [ 77.582964] kasan_report+0xdc/0x128 [ 77.582992] kasan_check_range+0x100/0x1a8 [ 77.583023] __kasan_check_write+0x20/0x30 [ 77.583053] kasan_atomics_helper+0x147c/0x4858 [ 77.583088] kasan_atomics+0x198/0x2e0 [ 77.583122] kunit_try_run_case+0x170/0x3f0 [ 77.583151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.583184] kthread+0x328/0x630 [ 77.583212] ret_from_fork+0x10/0x20 [ 77.583242] [ 77.654293] Allocated by task 346: [ 77.657680] kasan_save_stack+0x3c/0x68 [ 77.661498] kasan_save_track+0x20/0x40 [ 77.665317] kasan_save_alloc_info+0x40/0x58 [ 77.669570] __kasan_kmalloc+0xd4/0xd8 [ 77.673303] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.677817] kasan_atomics+0xb8/0x2e0 [ 77.681462] kunit_try_run_case+0x170/0x3f0 [ 77.685629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.691097] kthread+0x328/0x630 [ 77.694309] ret_from_fork+0x10/0x20 [ 77.697868] [ 77.699344] The buggy address belongs to the object at ffff00080851b080 [ 77.699344] which belongs to the cache kmalloc-64 of size 64 [ 77.711671] The buggy address is located 0 bytes to the right of [ 77.711671] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 77.724517] [ 77.725993] The buggy address belongs to the physical page: [ 77.731552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 77.739535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.746045] page_type: f5(slab) [ 77.749179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.756902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.764621] page dumped because: kasan: bad access detected [ 77.770176] [ 77.771652] Memory state around the buggy address: [ 77.776434] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.783635] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.790839] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.798040] ^ [ 77.802818] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.810023] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.817224] ================================================================== [ 68.845010] ================================================================== [ 68.852083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 68.859461] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 68.866751] [ 68.868231] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 68.868280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.868297] Hardware name: WinLink E850-96 board (DT) [ 68.868315] Call trace: [ 68.868329] show_stack+0x20/0x38 (C) [ 68.868359] dump_stack_lvl+0x8c/0xd0 [ 68.868393] print_report+0x118/0x5d0 [ 68.868422] kasan_report+0xdc/0x128 [ 68.868449] __asan_report_load4_noabort+0x20/0x30 [ 68.868481] kasan_atomics_helper+0x42d8/0x4858 [ 68.868515] kasan_atomics+0x198/0x2e0 [ 68.868550] kunit_try_run_case+0x170/0x3f0 [ 68.868582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.868616] kthread+0x328/0x630 [ 68.868641] ret_from_fork+0x10/0x20 [ 68.868672] [ 68.936368] Allocated by task 346: [ 68.939755] kasan_save_stack+0x3c/0x68 [ 68.943573] kasan_save_track+0x20/0x40 [ 68.947392] kasan_save_alloc_info+0x40/0x58 [ 68.951646] __kasan_kmalloc+0xd4/0xd8 [ 68.955378] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.959892] kasan_atomics+0xb8/0x2e0 [ 68.963538] kunit_try_run_case+0x170/0x3f0 [ 68.967704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.973173] kthread+0x328/0x630 [ 68.976385] ret_from_fork+0x10/0x20 [ 68.979944] [ 68.981419] The buggy address belongs to the object at ffff00080851b080 [ 68.981419] which belongs to the cache kmalloc-64 of size 64 [ 68.993746] The buggy address is located 0 bytes to the right of [ 68.993746] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 69.006592] [ 69.008070] The buggy address belongs to the physical page: [ 69.013626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 69.021611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.028120] page_type: f5(slab) [ 69.031254] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.038977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.046696] page dumped because: kasan: bad access detected [ 69.052251] [ 69.053727] Memory state around the buggy address: [ 69.058506] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.065710] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.072915] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.080116] ^ [ 69.084894] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.092099] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.099300] ================================================================== [ 70.166324] ================================================================== [ 70.173417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 70.180707] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 70.188085] [ 70.189568] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 70.189619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.189634] Hardware name: WinLink E850-96 board (DT) [ 70.189652] Call trace: [ 70.189666] show_stack+0x20/0x38 (C) [ 70.189698] dump_stack_lvl+0x8c/0xd0 [ 70.189730] print_report+0x118/0x5d0 [ 70.189757] kasan_report+0xdc/0x128 [ 70.189785] kasan_check_range+0x100/0x1a8 [ 70.189816] __kasan_check_write+0x20/0x30 [ 70.189845] kasan_atomics_helper+0xad4/0x4858 [ 70.189879] kasan_atomics+0x198/0x2e0 [ 70.189910] kunit_try_run_case+0x170/0x3f0 [ 70.189940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.189974] kthread+0x328/0x630 [ 70.190000] ret_from_fork+0x10/0x20 [ 70.190030] [ 70.261001] Allocated by task 346: [ 70.264388] kasan_save_stack+0x3c/0x68 [ 70.268205] kasan_save_track+0x20/0x40 [ 70.272025] kasan_save_alloc_info+0x40/0x58 [ 70.276279] __kasan_kmalloc+0xd4/0xd8 [ 70.280011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.284525] kasan_atomics+0xb8/0x2e0 [ 70.288171] kunit_try_run_case+0x170/0x3f0 [ 70.292337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.297806] kthread+0x328/0x630 [ 70.301018] ret_from_fork+0x10/0x20 [ 70.304577] [ 70.306052] The buggy address belongs to the object at ffff00080851b080 [ 70.306052] which belongs to the cache kmalloc-64 of size 64 [ 70.318379] The buggy address is located 0 bytes to the right of [ 70.318379] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 70.331225] [ 70.332701] The buggy address belongs to the physical page: [ 70.338258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 70.346243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.352753] page_type: f5(slab) [ 70.355886] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.363610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.371329] page dumped because: kasan: bad access detected [ 70.376884] [ 70.378360] Memory state around the buggy address: [ 70.383138] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.390343] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.397548] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.404749] ^ [ 70.409526] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.416731] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.423933] ================================================================== [ 72.272557] ================================================================== [ 72.279635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 72.286926] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 72.294304] [ 72.295785] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 72.295832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.295848] Hardware name: WinLink E850-96 board (DT) [ 72.295866] Call trace: [ 72.295880] show_stack+0x20/0x38 (C) [ 72.295913] dump_stack_lvl+0x8c/0xd0 [ 72.295945] print_report+0x118/0x5d0 [ 72.295971] kasan_report+0xdc/0x128 [ 72.296000] kasan_check_range+0x100/0x1a8 [ 72.296029] __kasan_check_write+0x20/0x30 [ 72.296060] kasan_atomics_helper+0xd3c/0x4858 [ 72.296095] kasan_atomics+0x198/0x2e0 [ 72.296129] kunit_try_run_case+0x170/0x3f0 [ 72.296160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.296192] kthread+0x328/0x630 [ 72.296218] ret_from_fork+0x10/0x20 [ 72.296247] [ 72.367219] Allocated by task 346: [ 72.370606] kasan_save_stack+0x3c/0x68 [ 72.374424] kasan_save_track+0x20/0x40 [ 72.378244] kasan_save_alloc_info+0x40/0x58 [ 72.382497] __kasan_kmalloc+0xd4/0xd8 [ 72.386229] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.390743] kasan_atomics+0xb8/0x2e0 [ 72.394389] kunit_try_run_case+0x170/0x3f0 [ 72.398555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.404025] kthread+0x328/0x630 [ 72.407236] ret_from_fork+0x10/0x20 [ 72.410795] [ 72.412270] The buggy address belongs to the object at ffff00080851b080 [ 72.412270] which belongs to the cache kmalloc-64 of size 64 [ 72.424597] The buggy address is located 0 bytes to the right of [ 72.424597] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 72.437444] [ 72.438920] The buggy address belongs to the physical page: [ 72.444477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 72.452464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.458971] page_type: f5(slab) [ 72.462104] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.469829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.477548] page dumped because: kasan: bad access detected [ 72.483103] [ 72.484578] Memory state around the buggy address: [ 72.489358] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.496562] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.503766] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.510967] ^ [ 72.515745] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.522950] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.530151] ================================================================== [ 78.881488] ================================================================== [ 78.888564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 78.895941] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 78.903319] [ 78.904800] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 78.904850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.904865] Hardware name: WinLink E850-96 board (DT) [ 78.904883] Call trace: [ 78.904894] show_stack+0x20/0x38 (C) [ 78.904924] dump_stack_lvl+0x8c/0xd0 [ 78.904956] print_report+0x118/0x5d0 [ 78.904984] kasan_report+0xdc/0x128 [ 78.905009] kasan_check_range+0x100/0x1a8 [ 78.905039] __kasan_check_write+0x20/0x30 [ 78.905069] kasan_atomics_helper+0x1644/0x4858 [ 78.905106] kasan_atomics+0x198/0x2e0 [ 78.905137] kunit_try_run_case+0x170/0x3f0 [ 78.905167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.905201] kthread+0x328/0x630 [ 78.905225] ret_from_fork+0x10/0x20 [ 78.905255] [ 78.976322] Allocated by task 346: [ 78.979708] kasan_save_stack+0x3c/0x68 [ 78.983526] kasan_save_track+0x20/0x40 [ 78.987346] kasan_save_alloc_info+0x40/0x58 [ 78.991599] __kasan_kmalloc+0xd4/0xd8 [ 78.995332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.999846] kasan_atomics+0xb8/0x2e0 [ 79.003491] kunit_try_run_case+0x170/0x3f0 [ 79.007658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.013127] kthread+0x328/0x630 [ 79.016338] ret_from_fork+0x10/0x20 [ 79.019898] [ 79.021373] The buggy address belongs to the object at ffff00080851b080 [ 79.021373] which belongs to the cache kmalloc-64 of size 64 [ 79.033699] The buggy address is located 0 bytes to the right of [ 79.033699] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 79.046546] [ 79.048023] The buggy address belongs to the physical page: [ 79.053579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 79.061565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.068074] page_type: f5(slab) [ 79.071207] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.078931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.086649] page dumped because: kasan: bad access detected [ 79.092205] [ 79.093680] Memory state around the buggy address: [ 79.098459] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.105664] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.112868] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.120069] ^ [ 79.124847] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.132052] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.139253] ================================================================== [ 71.746008] ================================================================== [ 71.753081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 71.760371] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 71.767749] [ 71.769230] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 71.769277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.769293] Hardware name: WinLink E850-96 board (DT) [ 71.769311] Call trace: [ 71.769323] show_stack+0x20/0x38 (C) [ 71.769354] dump_stack_lvl+0x8c/0xd0 [ 71.769388] print_report+0x118/0x5d0 [ 71.769416] kasan_report+0xdc/0x128 [ 71.769444] kasan_check_range+0x100/0x1a8 [ 71.769473] __kasan_check_write+0x20/0x30 [ 71.769502] kasan_atomics_helper+0xca0/0x4858 [ 71.769537] kasan_atomics+0x198/0x2e0 [ 71.769568] kunit_try_run_case+0x170/0x3f0 [ 71.769596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.769628] kthread+0x328/0x630 [ 71.769655] ret_from_fork+0x10/0x20 [ 71.769685] [ 71.840665] Allocated by task 346: [ 71.844052] kasan_save_stack+0x3c/0x68 [ 71.847870] kasan_save_track+0x20/0x40 [ 71.851689] kasan_save_alloc_info+0x40/0x58 [ 71.855942] __kasan_kmalloc+0xd4/0xd8 [ 71.859675] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.864189] kasan_atomics+0xb8/0x2e0 [ 71.867835] kunit_try_run_case+0x170/0x3f0 [ 71.872001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.877470] kthread+0x328/0x630 [ 71.880682] ret_from_fork+0x10/0x20 [ 71.884240] [ 71.885716] The buggy address belongs to the object at ffff00080851b080 [ 71.885716] which belongs to the cache kmalloc-64 of size 64 [ 71.898043] The buggy address is located 0 bytes to the right of [ 71.898043] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 71.910889] [ 71.912365] The buggy address belongs to the physical page: [ 71.917922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 71.925907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.932417] page_type: f5(slab) [ 71.935550] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.943274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.950993] page dumped because: kasan: bad access detected [ 71.956548] [ 71.958024] Memory state around the buggy address: [ 71.962802] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.970007] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.977212] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.984412] ^ [ 71.989190] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.996395] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.003596] ================================================================== [ 78.619883] ================================================================== [ 78.626936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 78.634313] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 78.641604] [ 78.643086] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 78.643136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.643150] Hardware name: WinLink E850-96 board (DT) [ 78.643168] Call trace: [ 78.643182] show_stack+0x20/0x38 (C) [ 78.643214] dump_stack_lvl+0x8c/0xd0 [ 78.643248] print_report+0x118/0x5d0 [ 78.643276] kasan_report+0xdc/0x128 [ 78.643304] __asan_report_load8_noabort+0x20/0x30 [ 78.643337] kasan_atomics_helper+0x3db0/0x4858 [ 78.643372] kasan_atomics+0x198/0x2e0 [ 78.643403] kunit_try_run_case+0x170/0x3f0 [ 78.643435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.643470] kthread+0x328/0x630 [ 78.643496] ret_from_fork+0x10/0x20 [ 78.643526] [ 78.711221] Allocated by task 346: [ 78.714608] kasan_save_stack+0x3c/0x68 [ 78.718426] kasan_save_track+0x20/0x40 [ 78.722246] kasan_save_alloc_info+0x40/0x58 [ 78.726499] __kasan_kmalloc+0xd4/0xd8 [ 78.730231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.734745] kasan_atomics+0xb8/0x2e0 [ 78.738391] kunit_try_run_case+0x170/0x3f0 [ 78.742558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.748026] kthread+0x328/0x630 [ 78.751238] ret_from_fork+0x10/0x20 [ 78.754797] [ 78.756273] The buggy address belongs to the object at ffff00080851b080 [ 78.756273] which belongs to the cache kmalloc-64 of size 64 [ 78.768599] The buggy address is located 0 bytes to the right of [ 78.768599] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 78.781446] [ 78.782922] The buggy address belongs to the physical page: [ 78.788479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 78.796465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.802973] page_type: f5(slab) [ 78.806106] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.813831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.821549] page dumped because: kasan: bad access detected [ 78.827105] [ 78.828580] Memory state around the buggy address: [ 78.833360] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.840563] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.847768] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.854969] ^ [ 78.859747] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.866952] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.874153] ================================================================== [ 79.673345] ================================================================== [ 79.680392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 79.687771] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 79.695061] [ 79.696543] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 79.696592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.696608] Hardware name: WinLink E850-96 board (DT) [ 79.696628] Call trace: [ 79.696641] show_stack+0x20/0x38 (C) [ 79.696673] dump_stack_lvl+0x8c/0xd0 [ 79.696706] print_report+0x118/0x5d0 [ 79.696735] kasan_report+0xdc/0x128 [ 79.696762] __asan_report_load8_noabort+0x20/0x30 [ 79.696794] kasan_atomics_helper+0x3e10/0x4858 [ 79.696830] kasan_atomics+0x198/0x2e0 [ 79.696864] kunit_try_run_case+0x170/0x3f0 [ 79.696895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.696929] kthread+0x328/0x630 [ 79.696956] ret_from_fork+0x10/0x20 [ 79.696988] [ 79.764679] Allocated by task 346: [ 79.768065] kasan_save_stack+0x3c/0x68 [ 79.771883] kasan_save_track+0x20/0x40 [ 79.775702] kasan_save_alloc_info+0x40/0x58 [ 79.779955] __kasan_kmalloc+0xd4/0xd8 [ 79.783688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.788201] kasan_atomics+0xb8/0x2e0 [ 79.791847] kunit_try_run_case+0x170/0x3f0 [ 79.796014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.801483] kthread+0x328/0x630 [ 79.804695] ret_from_fork+0x10/0x20 [ 79.808254] [ 79.809729] The buggy address belongs to the object at ffff00080851b080 [ 79.809729] which belongs to the cache kmalloc-64 of size 64 [ 79.822056] The buggy address is located 0 bytes to the right of [ 79.822056] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 79.834902] [ 79.836378] The buggy address belongs to the physical page: [ 79.841936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 79.849921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.856430] page_type: f5(slab) [ 79.859563] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.867287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.875006] page dumped because: kasan: bad access detected [ 79.880561] [ 79.882037] Memory state around the buggy address: [ 79.886818] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.894020] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.901225] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.908426] ^ [ 79.913204] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.920408] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.927609] ==================================================================
[ 33.240841] ================================================================== [ 33.240893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.241107] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.241170] [ 33.241338] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.241470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.241507] Hardware name: linux,dummy-virt (DT) [ 33.241541] Call trace: [ 33.241586] show_stack+0x20/0x38 (C) [ 33.241648] dump_stack_lvl+0x8c/0xd0 [ 33.241698] print_report+0x118/0x5d0 [ 33.241745] kasan_report+0xdc/0x128 [ 33.241958] kasan_check_range+0x100/0x1a8 [ 33.242064] __kasan_check_write+0x20/0x30 [ 33.242196] kasan_atomics_helper+0xad4/0x4858 [ 33.242260] kasan_atomics+0x198/0x2e0 [ 33.242321] kunit_try_run_case+0x170/0x3f0 [ 33.242379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.242464] kthread+0x328/0x630 [ 33.242512] ret_from_fork+0x10/0x20 [ 33.242562] [ 33.242604] Allocated by task 297: [ 33.242634] kasan_save_stack+0x3c/0x68 [ 33.242884] kasan_save_track+0x20/0x40 [ 33.242941] kasan_save_alloc_info+0x40/0x58 [ 33.242982] __kasan_kmalloc+0xd4/0xd8 [ 33.243024] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.243121] kasan_atomics+0xb8/0x2e0 [ 33.243212] kunit_try_run_case+0x170/0x3f0 [ 33.243360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.243511] kthread+0x328/0x630 [ 33.243712] ret_from_fork+0x10/0x20 [ 33.243933] [ 33.244033] The buggy address belongs to the object at fff00000c64f7f00 [ 33.244033] which belongs to the cache kmalloc-64 of size 64 [ 33.244141] The buggy address is located 0 bytes to the right of [ 33.244141] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.244274] [ 33.244351] The buggy address belongs to the physical page: [ 33.244385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.244451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.244770] page_type: f5(slab) [ 33.244870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.244950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.245163] page dumped because: kasan: bad access detected [ 33.245199] [ 33.245326] Memory state around the buggy address: [ 33.245375] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.245467] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.245597] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.245744] ^ [ 33.245814] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.245872] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.245912] ================================================================== [ 33.446610] ================================================================== [ 33.446694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 33.447254] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.447399] [ 33.447479] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.447766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.448034] Hardware name: linux,dummy-virt (DT) [ 33.448293] Call trace: [ 33.448344] show_stack+0x20/0x38 (C) [ 33.448415] dump_stack_lvl+0x8c/0xd0 [ 33.448851] print_report+0x118/0x5d0 [ 33.449079] kasan_report+0xdc/0x128 [ 33.449144] kasan_check_range+0x100/0x1a8 [ 33.449200] __kasan_check_write+0x20/0x30 [ 33.449354] kasan_atomics_helper+0x1414/0x4858 [ 33.449783] kasan_atomics+0x198/0x2e0 [ 33.449834] kunit_try_run_case+0x170/0x3f0 [ 33.449884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.449940] kthread+0x328/0x630 [ 33.449985] ret_from_fork+0x10/0x20 [ 33.450037] [ 33.450246] Allocated by task 297: [ 33.450296] kasan_save_stack+0x3c/0x68 [ 33.450535] kasan_save_track+0x20/0x40 [ 33.451359] kasan_save_alloc_info+0x40/0x58 [ 33.451616] __kasan_kmalloc+0xd4/0xd8 [ 33.451671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.451716] kasan_atomics+0xb8/0x2e0 [ 33.451756] kunit_try_run_case+0x170/0x3f0 [ 33.452024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.452400] kthread+0x328/0x630 [ 33.452452] ret_from_fork+0x10/0x20 [ 33.452848] [ 33.452876] The buggy address belongs to the object at fff00000c64f7f00 [ 33.452876] which belongs to the cache kmalloc-64 of size 64 [ 33.453180] The buggy address is located 0 bytes to the right of [ 33.453180] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.453546] [ 33.453575] The buggy address belongs to the physical page: [ 33.453834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.454098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.454150] page_type: f5(slab) [ 33.454300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.454522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.454566] page dumped because: kasan: bad access detected [ 33.455091] [ 33.455314] Memory state around the buggy address: [ 33.455585] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.455655] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.455699] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.455738] ^ [ 33.455775] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.456407] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.456471] ================================================================== [ 33.501480] ================================================================== [ 33.501536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 33.501951] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.502019] [ 33.502058] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.502153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.502951] Hardware name: linux,dummy-virt (DT) [ 33.503018] Call trace: [ 33.503041] show_stack+0x20/0x38 (C) [ 33.503096] dump_stack_lvl+0x8c/0xd0 [ 33.503754] print_report+0x118/0x5d0 [ 33.503933] kasan_report+0xdc/0x128 [ 33.504266] __asan_report_load8_noabort+0x20/0x30 [ 33.504335] kasan_atomics_helper+0x3db0/0x4858 [ 33.504390] kasan_atomics+0x198/0x2e0 [ 33.504738] kunit_try_run_case+0x170/0x3f0 [ 33.505119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505526] kthread+0x328/0x630 [ 33.505893] ret_from_fork+0x10/0x20 [ 33.506205] [ 33.506232] Allocated by task 297: [ 33.506433] kasan_save_stack+0x3c/0x68 [ 33.506832] kasan_save_track+0x20/0x40 [ 33.507084] kasan_save_alloc_info+0x40/0x58 [ 33.507344] __kasan_kmalloc+0xd4/0xd8 [ 33.507673] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.508010] kasan_atomics+0xb8/0x2e0 [ 33.508055] kunit_try_run_case+0x170/0x3f0 [ 33.508930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.509034] kthread+0x328/0x630 [ 33.509405] ret_from_fork+0x10/0x20 [ 33.509595] [ 33.509811] The buggy address belongs to the object at fff00000c64f7f00 [ 33.509811] which belongs to the cache kmalloc-64 of size 64 [ 33.510337] The buggy address is located 0 bytes to the right of [ 33.510337] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.510465] [ 33.510489] The buggy address belongs to the physical page: [ 33.510581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.510694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.510843] page_type: f5(slab) [ 33.510987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.511059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.511102] page dumped because: kasan: bad access detected [ 33.511147] [ 33.511258] Memory state around the buggy address: [ 33.511422] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.511583] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.511735] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.511840] ^ [ 33.512007] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.512084] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.512171] ================================================================== [ 33.470015] ================================================================== [ 33.470071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 33.470125] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.470175] [ 33.470212] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.470299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.470326] Hardware name: linux,dummy-virt (DT) [ 33.470359] Call trace: [ 33.471059] show_stack+0x20/0x38 (C) [ 33.471212] dump_stack_lvl+0x8c/0xd0 [ 33.471732] print_report+0x118/0x5d0 [ 33.471783] kasan_report+0xdc/0x128 [ 33.471830] kasan_check_range+0x100/0x1a8 [ 33.471877] __kasan_check_write+0x20/0x30 [ 33.472585] kasan_atomics_helper+0x14e4/0x4858 [ 33.472688] kasan_atomics+0x198/0x2e0 [ 33.473113] kunit_try_run_case+0x170/0x3f0 [ 33.473331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.473386] kthread+0x328/0x630 [ 33.473431] ret_from_fork+0x10/0x20 [ 33.473626] [ 33.473674] Allocated by task 297: [ 33.473705] kasan_save_stack+0x3c/0x68 [ 33.473753] kasan_save_track+0x20/0x40 [ 33.474021] kasan_save_alloc_info+0x40/0x58 [ 33.474255] __kasan_kmalloc+0xd4/0xd8 [ 33.474400] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.474469] kasan_atomics+0xb8/0x2e0 [ 33.475004] kunit_try_run_case+0x170/0x3f0 [ 33.475139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.475322] kthread+0x328/0x630 [ 33.475658] ret_from_fork+0x10/0x20 [ 33.475711] [ 33.475897] The buggy address belongs to the object at fff00000c64f7f00 [ 33.475897] which belongs to the cache kmalloc-64 of size 64 [ 33.476055] The buggy address is located 0 bytes to the right of [ 33.476055] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.476228] [ 33.476251] The buggy address belongs to the physical page: [ 33.476285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.476556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.477087] page_type: f5(slab) [ 33.477237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.477544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.477716] page dumped because: kasan: bad access detected [ 33.478232] [ 33.478391] Memory state around the buggy address: [ 33.478433] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.478505] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.478657] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.478996] ^ [ 33.479161] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.479238] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.479408] ================================================================== [ 33.380961] ================================================================== [ 33.381016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 33.381068] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.381119] [ 33.381151] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.381236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.381263] Hardware name: linux,dummy-virt (DT) [ 33.381296] Call trace: [ 33.381320] show_stack+0x20/0x38 (C) [ 33.381370] dump_stack_lvl+0x8c/0xd0 [ 33.382172] print_report+0x118/0x5d0 [ 33.382255] kasan_report+0xdc/0x128 [ 33.382307] kasan_check_range+0x100/0x1a8 [ 33.382356] __kasan_check_write+0x20/0x30 [ 33.382691] kasan_atomics_helper+0x1190/0x4858 [ 33.383221] kasan_atomics+0x198/0x2e0 [ 33.383594] kunit_try_run_case+0x170/0x3f0 [ 33.383797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.383868] kthread+0x328/0x630 [ 33.384162] ret_from_fork+0x10/0x20 [ 33.384472] [ 33.384499] Allocated by task 297: [ 33.384531] kasan_save_stack+0x3c/0x68 [ 33.384580] kasan_save_track+0x20/0x40 [ 33.385019] kasan_save_alloc_info+0x40/0x58 [ 33.385347] __kasan_kmalloc+0xd4/0xd8 [ 33.385738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.385982] kasan_atomics+0xb8/0x2e0 [ 33.386035] kunit_try_run_case+0x170/0x3f0 [ 33.386198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.386246] kthread+0x328/0x630 [ 33.386283] ret_from_fork+0x10/0x20 [ 33.386530] [ 33.386603] The buggy address belongs to the object at fff00000c64f7f00 [ 33.386603] which belongs to the cache kmalloc-64 of size 64 [ 33.387019] The buggy address is located 0 bytes to the right of [ 33.387019] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.387600] [ 33.387874] The buggy address belongs to the physical page: [ 33.387971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.388471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.388524] page_type: f5(slab) [ 33.388563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.388615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.388657] page dumped because: kasan: bad access detected [ 33.389152] [ 33.389339] Memory state around the buggy address: [ 33.389420] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.389478] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.389529] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.389568] ^ [ 33.389768] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.389887] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.389935] ================================================================== [ 33.133403] ================================================================== [ 33.133516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 33.133742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.133905] Call trace: [ 33.134317] print_report+0x118/0x5d0 [ 33.134970] kasan_check_range+0x100/0x1a8 [ 33.135067] kasan_atomics_helper+0x1ec/0x4858 [ 33.135293] kthread+0x328/0x630 [ 33.135387] [ 33.135492] kasan_save_track+0x20/0x40 [ 33.136133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.136333] The buggy address is located 0 bytes to the right of [ 33.136333] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.136601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.137608] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.138507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 33.138560] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.138642] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.138911] print_report+0x118/0x5d0 [ 33.138958] kasan_report+0xdc/0x128 [ 33.139098] kasan_atomics_helper+0x24c/0x4858 [ 33.139204] kunit_try_run_case+0x170/0x3f0 [ 33.139305] kthread+0x328/0x630 [ 33.139472] kasan_save_stack+0x3c/0x68 [ 33.139776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.139982] The buggy address is located 0 bytes to the right of [ 33.139982] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.140099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.140369] [ 33.140528] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.140830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 33.140926] [ 33.140954] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.141263] kasan_report+0xdc/0x128 [ 33.141377] __kasan_check_read+0x20/0x30 [ 33.141584] kunit_try_run_case+0x170/0x3f0 [ 33.142001] [ 33.142116] kasan_save_track+0x20/0x40 [ 33.142357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.142712] The buggy address is located 0 bytes to the right of [ 33.142712] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.143777] page dumped because: kasan: bad access detected [ 33.144121] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.144160] ^ [ 33.144471] ================================================================== [ 33.402521] ================================================================== [ 33.402572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 33.402624] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.402677] [ 33.402709] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.402837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.402941] Hardware name: linux,dummy-virt (DT) [ 33.403942] Call trace: [ 33.403980] show_stack+0x20/0x38 (C) [ 33.404046] dump_stack_lvl+0x8c/0xd0 [ 33.404223] print_report+0x118/0x5d0 [ 33.404271] kasan_report+0xdc/0x128 [ 33.404699] kasan_check_range+0x100/0x1a8 [ 33.405027] __kasan_check_write+0x20/0x30 [ 33.405099] kasan_atomics_helper+0x126c/0x4858 [ 33.405510] kasan_atomics+0x198/0x2e0 [ 33.405612] kunit_try_run_case+0x170/0x3f0 [ 33.405827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.405908] kthread+0x328/0x630 [ 33.406601] ret_from_fork+0x10/0x20 [ 33.406710] [ 33.406732] Allocated by task 297: [ 33.406763] kasan_save_stack+0x3c/0x68 [ 33.406808] kasan_save_track+0x20/0x40 [ 33.407406] kasan_save_alloc_info+0x40/0x58 [ 33.407718] __kasan_kmalloc+0xd4/0xd8 [ 33.408045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.408216] kasan_atomics+0xb8/0x2e0 [ 33.408490] kunit_try_run_case+0x170/0x3f0 [ 33.408714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.408771] kthread+0x328/0x630 [ 33.409227] ret_from_fork+0x10/0x20 [ 33.409344] [ 33.409659] The buggy address belongs to the object at fff00000c64f7f00 [ 33.409659] which belongs to the cache kmalloc-64 of size 64 [ 33.409913] The buggy address is located 0 bytes to the right of [ 33.409913] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.409988] [ 33.410010] The buggy address belongs to the physical page: [ 33.410612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.410714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.411167] page_type: f5(slab) [ 33.411785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.411936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.412292] page dumped because: kasan: bad access detected [ 33.412453] [ 33.412475] Memory state around the buggy address: [ 33.412510] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.412559] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.412603] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.413239] ^ [ 33.413299] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.413678] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.413722] ================================================================== [ 33.301231] ================================================================== [ 33.301303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.301379] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.301455] [ 33.301488] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.301573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.301602] Hardware name: linux,dummy-virt (DT) [ 33.301769] Call trace: [ 33.301799] show_stack+0x20/0x38 (C) [ 33.301959] dump_stack_lvl+0x8c/0xd0 [ 33.302120] print_report+0x118/0x5d0 [ 33.302199] kasan_report+0xdc/0x128 [ 33.302525] kasan_check_range+0x100/0x1a8 [ 33.302584] __kasan_check_write+0x20/0x30 [ 33.302633] kasan_atomics_helper+0xe44/0x4858 [ 33.302685] kasan_atomics+0x198/0x2e0 [ 33.303194] kunit_try_run_case+0x170/0x3f0 [ 33.303317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.303534] kthread+0x328/0x630 [ 33.303666] ret_from_fork+0x10/0x20 [ 33.303822] [ 33.303883] Allocated by task 297: [ 33.303936] kasan_save_stack+0x3c/0x68 [ 33.303982] kasan_save_track+0x20/0x40 [ 33.304297] kasan_save_alloc_info+0x40/0x58 [ 33.304455] __kasan_kmalloc+0xd4/0xd8 [ 33.304570] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.304847] kasan_atomics+0xb8/0x2e0 [ 33.304977] kunit_try_run_case+0x170/0x3f0 [ 33.305052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.305262] kthread+0x328/0x630 [ 33.305370] ret_from_fork+0x10/0x20 [ 33.305525] [ 33.305623] The buggy address belongs to the object at fff00000c64f7f00 [ 33.305623] which belongs to the cache kmalloc-64 of size 64 [ 33.305714] The buggy address is located 0 bytes to the right of [ 33.305714] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.305999] [ 33.306106] The buggy address belongs to the physical page: [ 33.306232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.306322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.306415] page_type: f5(slab) [ 33.306482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.306556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.306599] page dumped because: kasan: bad access detected [ 33.306633] [ 33.306653] Memory state around the buggy address: [ 33.306686] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.306729] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.306977] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.307047] ^ [ 33.307143] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.307287] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.307402] ================================================================== [ 33.312925] ================================================================== [ 33.312984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.313110] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.313161] [ 33.313193] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.313317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.313575] Hardware name: linux,dummy-virt (DT) [ 33.313705] Call trace: [ 33.313741] show_stack+0x20/0x38 (C) [ 33.313806] dump_stack_lvl+0x8c/0xd0 [ 33.313857] print_report+0x118/0x5d0 [ 33.313910] kasan_report+0xdc/0x128 [ 33.313963] kasan_check_range+0x100/0x1a8 [ 33.314034] __kasan_check_write+0x20/0x30 [ 33.314094] kasan_atomics_helper+0xeb8/0x4858 [ 33.314145] kasan_atomics+0x198/0x2e0 [ 33.314194] kunit_try_run_case+0x170/0x3f0 [ 33.314259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.314312] kthread+0x328/0x630 [ 33.314358] ret_from_fork+0x10/0x20 [ 33.314413] [ 33.314454] Allocated by task 297: [ 33.314491] kasan_save_stack+0x3c/0x68 [ 33.314537] kasan_save_track+0x20/0x40 [ 33.314579] kasan_save_alloc_info+0x40/0x58 [ 33.314620] __kasan_kmalloc+0xd4/0xd8 [ 33.314669] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.314713] kasan_atomics+0xb8/0x2e0 [ 33.314761] kunit_try_run_case+0x170/0x3f0 [ 33.314804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.314851] kthread+0x328/0x630 [ 33.314887] ret_from_fork+0x10/0x20 [ 33.314935] [ 33.314977] The buggy address belongs to the object at fff00000c64f7f00 [ 33.314977] which belongs to the cache kmalloc-64 of size 64 [ 33.315037] The buggy address is located 0 bytes to the right of [ 33.315037] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.315103] [ 33.315134] The buggy address belongs to the physical page: [ 33.315182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.315232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.315289] page_type: f5(slab) [ 33.315334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.315385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.315427] page dumped because: kasan: bad access detected [ 33.315470] [ 33.315490] Memory state around the buggy address: [ 33.315524] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.315567] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.315643] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.315684] ^ [ 33.315718] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.315761] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.315801] ================================================================== [ 33.323458] ================================================================== [ 33.323506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.323556] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.323606] [ 33.323637] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.323721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.323750] Hardware name: linux,dummy-virt (DT) [ 33.323780] Call trace: [ 33.323803] show_stack+0x20/0x38 (C) [ 33.323852] dump_stack_lvl+0x8c/0xd0 [ 33.323899] print_report+0x118/0x5d0 [ 33.323946] kasan_report+0xdc/0x128 [ 33.323990] kasan_check_range+0x100/0x1a8 [ 33.324036] __kasan_check_write+0x20/0x30 [ 33.324084] kasan_atomics_helper+0xf88/0x4858 [ 33.324135] kasan_atomics+0x198/0x2e0 [ 33.324184] kunit_try_run_case+0x170/0x3f0 [ 33.324232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.324286] kthread+0x328/0x630 [ 33.324331] ret_from_fork+0x10/0x20 [ 33.324380] [ 33.324400] Allocated by task 297: [ 33.324429] kasan_save_stack+0x3c/0x68 [ 33.327217] kasan_save_track+0x20/0x40 [ 33.327263] kasan_save_alloc_info+0x40/0x58 [ 33.327304] __kasan_kmalloc+0xd4/0xd8 [ 33.327345] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.327388] kasan_atomics+0xb8/0x2e0 [ 33.327428] kunit_try_run_case+0x170/0x3f0 [ 33.327482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.327528] kthread+0x328/0x630 [ 33.327564] ret_from_fork+0x10/0x20 [ 33.327603] [ 33.327627] The buggy address belongs to the object at fff00000c64f7f00 [ 33.327627] which belongs to the cache kmalloc-64 of size 64 [ 33.327687] The buggy address is located 0 bytes to the right of [ 33.327687] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.327751] [ 33.327774] The buggy address belongs to the physical page: [ 33.327807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.327857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.327905] page_type: f5(slab) [ 33.327944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.327995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.328036] page dumped because: kasan: bad access detected [ 33.328069] [ 33.328088] Memory state around the buggy address: [ 33.328122] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.328166] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.328209] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.328250] ^ [ 33.328286] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328329] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.328369] ================================================================== [ 33.246562] ================================================================== [ 33.246783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.246853] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.246939] [ 33.246987] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.247088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.247125] Hardware name: linux,dummy-virt (DT) [ 33.247168] Call trace: [ 33.247193] show_stack+0x20/0x38 (C) [ 33.247245] dump_stack_lvl+0x8c/0xd0 [ 33.247294] print_report+0x118/0x5d0 [ 33.247341] kasan_report+0xdc/0x128 [ 33.247387] __asan_report_load4_noabort+0x20/0x30 [ 33.247459] kasan_atomics_helper+0x3dcc/0x4858 [ 33.247512] kasan_atomics+0x198/0x2e0 [ 33.247560] kunit_try_run_case+0x170/0x3f0 [ 33.247608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.247663] kthread+0x328/0x630 [ 33.247718] ret_from_fork+0x10/0x20 [ 33.247769] [ 33.247791] Allocated by task 297: [ 33.247820] kasan_save_stack+0x3c/0x68 [ 33.247869] kasan_save_track+0x20/0x40 [ 33.247911] kasan_save_alloc_info+0x40/0x58 [ 33.247952] __kasan_kmalloc+0xd4/0xd8 [ 33.247992] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.248036] kasan_atomics+0xb8/0x2e0 [ 33.248084] kunit_try_run_case+0x170/0x3f0 [ 33.248129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.248174] kthread+0x328/0x630 [ 33.248209] ret_from_fork+0x10/0x20 [ 33.248247] [ 33.248276] The buggy address belongs to the object at fff00000c64f7f00 [ 33.248276] which belongs to the cache kmalloc-64 of size 64 [ 33.248333] The buggy address is located 0 bytes to the right of [ 33.248333] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.248396] [ 33.248423] The buggy address belongs to the physical page: [ 33.248465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.248517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.248915] page_type: f5(slab) [ 33.249070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.249129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.249179] page dumped because: kasan: bad access detected [ 33.249212] [ 33.249234] Memory state around the buggy address: [ 33.249283] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.249347] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.249391] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.249449] ^ [ 33.249486] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.249675] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.249778] ================================================================== [ 33.275472] ================================================================== [ 33.275517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.275568] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.275660] [ 33.275694] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.276025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.276086] Hardware name: linux,dummy-virt (DT) [ 33.276139] Call trace: [ 33.276168] show_stack+0x20/0x38 (C) [ 33.276242] dump_stack_lvl+0x8c/0xd0 [ 33.276449] print_report+0x118/0x5d0 [ 33.276566] kasan_report+0xdc/0x128 [ 33.276619] __asan_report_load4_noabort+0x20/0x30 [ 33.276672] kasan_atomics_helper+0x3dd8/0x4858 [ 33.276764] kasan_atomics+0x198/0x2e0 [ 33.276831] kunit_try_run_case+0x170/0x3f0 [ 33.276888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.276960] kthread+0x328/0x630 [ 33.277007] ret_from_fork+0x10/0x20 [ 33.277057] [ 33.277187] Allocated by task 297: [ 33.277219] kasan_save_stack+0x3c/0x68 [ 33.277265] kasan_save_track+0x20/0x40 [ 33.277385] kasan_save_alloc_info+0x40/0x58 [ 33.277447] __kasan_kmalloc+0xd4/0xd8 [ 33.277559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.277644] kasan_atomics+0xb8/0x2e0 [ 33.277708] kunit_try_run_case+0x170/0x3f0 [ 33.277983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.278150] kthread+0x328/0x630 [ 33.278189] ret_from_fork+0x10/0x20 [ 33.278229] [ 33.278250] The buggy address belongs to the object at fff00000c64f7f00 [ 33.278250] which belongs to the cache kmalloc-64 of size 64 [ 33.278311] The buggy address is located 0 bytes to the right of [ 33.278311] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.278659] [ 33.278721] The buggy address belongs to the physical page: [ 33.278811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.278918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.279245] page_type: f5(slab) [ 33.279337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.279493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.279598] page dumped because: kasan: bad access detected [ 33.279687] [ 33.279780] Memory state around the buggy address: [ 33.280020] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.280173] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.280273] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.280366] ^ [ 33.280492] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.280585] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.280646] ================================================================== [ 33.234794] ================================================================== [ 33.234869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.234923] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.235008] [ 33.235238] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.235463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.235496] Hardware name: linux,dummy-virt (DT) [ 33.235526] Call trace: [ 33.235784] show_stack+0x20/0x38 (C) [ 33.235889] dump_stack_lvl+0x8c/0xd0 [ 33.235941] print_report+0x118/0x5d0 [ 33.235987] kasan_report+0xdc/0x128 [ 33.236063] kasan_check_range+0x100/0x1a8 [ 33.236130] __kasan_check_write+0x20/0x30 [ 33.236212] kasan_atomics_helper+0xa6c/0x4858 [ 33.236418] kasan_atomics+0x198/0x2e0 [ 33.236544] kunit_try_run_case+0x170/0x3f0 [ 33.236600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.236655] kthread+0x328/0x630 [ 33.236717] ret_from_fork+0x10/0x20 [ 33.236998] [ 33.237071] Allocated by task 297: [ 33.237109] kasan_save_stack+0x3c/0x68 [ 33.237182] kasan_save_track+0x20/0x40 [ 33.237225] kasan_save_alloc_info+0x40/0x58 [ 33.237283] __kasan_kmalloc+0xd4/0xd8 [ 33.237535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.237664] kasan_atomics+0xb8/0x2e0 [ 33.237793] kunit_try_run_case+0x170/0x3f0 [ 33.237834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.237897] kthread+0x328/0x630 [ 33.237933] ret_from_fork+0x10/0x20 [ 33.237970] [ 33.237993] The buggy address belongs to the object at fff00000c64f7f00 [ 33.237993] which belongs to the cache kmalloc-64 of size 64 [ 33.238090] The buggy address is located 0 bytes to the right of [ 33.238090] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.238153] [ 33.238176] The buggy address belongs to the physical page: [ 33.238306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.238375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.238471] page_type: f5(slab) [ 33.238528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.238647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.238938] page dumped because: kasan: bad access detected [ 33.238978] [ 33.238998] Memory state around the buggy address: [ 33.239032] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.239077] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.239270] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.239361] ^ [ 33.239445] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.239560] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.239635] ================================================================== [ 33.281054] ================================================================== [ 33.281108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.281228] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.281314] [ 33.281362] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.281629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.281738] Hardware name: linux,dummy-virt (DT) [ 33.281772] Call trace: [ 33.281813] show_stack+0x20/0x38 (C) [ 33.281948] dump_stack_lvl+0x8c/0xd0 [ 33.282057] print_report+0x118/0x5d0 [ 33.282172] kasan_report+0xdc/0x128 [ 33.282236] kasan_check_range+0x100/0x1a8 [ 33.282290] __kasan_check_write+0x20/0x30 [ 33.282348] kasan_atomics_helper+0xd3c/0x4858 [ 33.282400] kasan_atomics+0x198/0x2e0 [ 33.282476] kunit_try_run_case+0x170/0x3f0 [ 33.282536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.282591] kthread+0x328/0x630 [ 33.282638] ret_from_fork+0x10/0x20 [ 33.282706] [ 33.282733] Allocated by task 297: [ 33.282771] kasan_save_stack+0x3c/0x68 [ 33.282825] kasan_save_track+0x20/0x40 [ 33.282868] kasan_save_alloc_info+0x40/0x58 [ 33.282909] __kasan_kmalloc+0xd4/0xd8 [ 33.282957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.283001] kasan_atomics+0xb8/0x2e0 [ 33.283040] kunit_try_run_case+0x170/0x3f0 [ 33.283086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.283135] kthread+0x328/0x630 [ 33.283172] ret_from_fork+0x10/0x20 [ 33.283212] [ 33.283233] The buggy address belongs to the object at fff00000c64f7f00 [ 33.283233] which belongs to the cache kmalloc-64 of size 64 [ 33.283294] The buggy address is located 0 bytes to the right of [ 33.283294] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.283366] [ 33.283396] The buggy address belongs to the physical page: [ 33.283426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.283890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.283946] page_type: f5(slab) [ 33.283985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.284037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.284139] page dumped because: kasan: bad access detected [ 33.284175] [ 33.284370] Memory state around the buggy address: [ 33.284427] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.284593] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.284658] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.284962] ^ [ 33.285005] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.285096] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.285227] ================================================================== [ 33.516761] ================================================================== [ 33.516810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 33.516861] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.516911] [ 33.516942] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.517026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.517055] Hardware name: linux,dummy-virt (DT) [ 33.517087] Call trace: [ 33.517111] show_stack+0x20/0x38 (C) [ 33.517160] dump_stack_lvl+0x8c/0xd0 [ 33.517210] print_report+0x118/0x5d0 [ 33.517255] kasan_report+0xdc/0x128 [ 33.517301] __asan_report_load8_noabort+0x20/0x30 [ 33.517361] kasan_atomics_helper+0x3df4/0x4858 [ 33.517659] kasan_atomics+0x198/0x2e0 [ 33.517712] kunit_try_run_case+0x170/0x3f0 [ 33.517828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.517919] kthread+0x328/0x630 [ 33.517966] ret_from_fork+0x10/0x20 [ 33.518017] [ 33.518038] Allocated by task 297: [ 33.518068] kasan_save_stack+0x3c/0x68 [ 33.518192] kasan_save_track+0x20/0x40 [ 33.518235] kasan_save_alloc_info+0x40/0x58 [ 33.518275] __kasan_kmalloc+0xd4/0xd8 [ 33.518325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.518500] kasan_atomics+0xb8/0x2e0 [ 33.518541] kunit_try_run_case+0x170/0x3f0 [ 33.518581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.518626] kthread+0x328/0x630 [ 33.518661] ret_from_fork+0x10/0x20 [ 33.518710] [ 33.518805] The buggy address belongs to the object at fff00000c64f7f00 [ 33.518805] which belongs to the cache kmalloc-64 of size 64 [ 33.518960] The buggy address is located 0 bytes to the right of [ 33.518960] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.519060] [ 33.519083] The buggy address belongs to the physical page: [ 33.519123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.519225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.519287] page_type: f5(slab) [ 33.519389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.519449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.519489] page dumped because: kasan: bad access detected [ 33.519591] [ 33.519685] Memory state around the buggy address: [ 33.519719] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.519881] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.519926] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.519966] ^ [ 33.520042] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.520087] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.520128] ================================================================== [ 33.490449] ================================================================== [ 33.490505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 33.490562] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.490721] [ 33.490935] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.491034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.491068] Hardware name: linux,dummy-virt (DT) [ 33.491709] Call trace: [ 33.491736] show_stack+0x20/0x38 (C) [ 33.491990] dump_stack_lvl+0x8c/0xd0 [ 33.492151] print_report+0x118/0x5d0 [ 33.492371] kasan_report+0xdc/0x128 [ 33.492581] kasan_check_range+0x100/0x1a8 [ 33.492635] __kasan_check_write+0x20/0x30 [ 33.492682] kasan_atomics_helper+0x15b4/0x4858 [ 33.493114] kasan_atomics+0x198/0x2e0 [ 33.493367] kunit_try_run_case+0x170/0x3f0 [ 33.493637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.493755] kthread+0x328/0x630 [ 33.493855] ret_from_fork+0x10/0x20 [ 33.494161] [ 33.494226] Allocated by task 297: [ 33.494259] kasan_save_stack+0x3c/0x68 [ 33.494317] kasan_save_track+0x20/0x40 [ 33.494363] kasan_save_alloc_info+0x40/0x58 [ 33.495261] __kasan_kmalloc+0xd4/0xd8 [ 33.495328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.495681] kasan_atomics+0xb8/0x2e0 [ 33.495862] kunit_try_run_case+0x170/0x3f0 [ 33.495930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.496458] kthread+0x328/0x630 [ 33.496749] ret_from_fork+0x10/0x20 [ 33.496923] [ 33.497134] The buggy address belongs to the object at fff00000c64f7f00 [ 33.497134] which belongs to the cache kmalloc-64 of size 64 [ 33.497612] The buggy address is located 0 bytes to the right of [ 33.497612] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.497860] [ 33.497890] The buggy address belongs to the physical page: [ 33.497938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.498005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.498056] page_type: f5(slab) [ 33.498275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.498330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.498373] page dumped because: kasan: bad access detected [ 33.498806] [ 33.498896] Memory state around the buggy address: [ 33.498934] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.498981] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.499542] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.499590] ^ [ 33.499733] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.499873] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.499914] ================================================================== [ 33.215764] ================================================================== [ 33.215818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.215871] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.215921] [ 33.215952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.216044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.216072] Hardware name: linux,dummy-virt (DT) [ 33.216168] Call trace: [ 33.216240] show_stack+0x20/0x38 (C) [ 33.216296] dump_stack_lvl+0x8c/0xd0 [ 33.216344] print_report+0x118/0x5d0 [ 33.216389] kasan_report+0xdc/0x128 [ 33.216689] __asan_report_load4_noabort+0x20/0x30 [ 33.216767] kasan_atomics_helper+0x42d8/0x4858 [ 33.216852] kasan_atomics+0x198/0x2e0 [ 33.216941] kunit_try_run_case+0x170/0x3f0 [ 33.216997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.217133] kthread+0x328/0x630 [ 33.217209] ret_from_fork+0x10/0x20 [ 33.217279] [ 33.217318] Allocated by task 297: [ 33.217380] kasan_save_stack+0x3c/0x68 [ 33.217425] kasan_save_track+0x20/0x40 [ 33.217496] kasan_save_alloc_info+0x40/0x58 [ 33.217538] __kasan_kmalloc+0xd4/0xd8 [ 33.217709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.217925] kasan_atomics+0xb8/0x2e0 [ 33.218365] The buggy address is located 0 bytes to the right of [ 33.218365] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.218632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.218706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.219594] Memory state around the buggy address: [ 33.219936] ^ [ 33.220318] ================================================================== [ 33.285584] ================================================================== [ 33.285694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.285788] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.285874] [ 33.285913] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.285999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.286028] Hardware name: linux,dummy-virt (DT) [ 33.286205] Call trace: [ 33.286264] show_stack+0x20/0x38 (C) [ 33.286350] dump_stack_lvl+0x8c/0xd0 [ 33.286528] print_report+0x118/0x5d0 [ 33.286656] kasan_report+0xdc/0x128 [ 33.286764] __asan_report_load4_noabort+0x20/0x30 [ 33.287073] kasan_atomics_helper+0x3e04/0x4858 [ 33.287188] kasan_atomics+0x198/0x2e0 [ 33.287322] kunit_try_run_case+0x170/0x3f0 [ 33.287407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.287474] kthread+0x328/0x630 [ 33.287521] ret_from_fork+0x10/0x20 [ 33.287572] [ 33.287592] Allocated by task 297: [ 33.287623] kasan_save_stack+0x3c/0x68 [ 33.287843] kasan_save_track+0x20/0x40 [ 33.287931] kasan_save_alloc_info+0x40/0x58 [ 33.288056] __kasan_kmalloc+0xd4/0xd8 [ 33.288145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.288205] kasan_atomics+0xb8/0x2e0 [ 33.288493] kunit_try_run_case+0x170/0x3f0 [ 33.288634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.288682] kthread+0x328/0x630 [ 33.288977] ret_from_fork+0x10/0x20 [ 33.289104] [ 33.289169] The buggy address belongs to the object at fff00000c64f7f00 [ 33.289169] which belongs to the cache kmalloc-64 of size 64 [ 33.289456] The buggy address is located 0 bytes to the right of [ 33.289456] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.289602] [ 33.289667] The buggy address belongs to the physical page: [ 33.289728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.289825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.289974] page_type: f5(slab) [ 33.290017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.290080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.290123] page dumped because: kasan: bad access detected [ 33.290155] [ 33.290444] Memory state around the buggy address: [ 33.290613] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.290688] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.290750] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.291055] ^ [ 33.291125] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.291226] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.291304] ================================================================== [ 33.414431] ================================================================== [ 33.414493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 33.414545] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.414595] [ 33.414627] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.414713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.414742] Hardware name: linux,dummy-virt (DT) [ 33.414772] Call trace: [ 33.414798] show_stack+0x20/0x38 (C) [ 33.414846] dump_stack_lvl+0x8c/0xd0 [ 33.416564] print_report+0x118/0x5d0 [ 33.416696] kasan_report+0xdc/0x128 [ 33.416745] kasan_check_range+0x100/0x1a8 [ 33.416794] __kasan_check_write+0x20/0x30 [ 33.416871] kasan_atomics_helper+0x12d8/0x4858 [ 33.416923] kasan_atomics+0x198/0x2e0 [ 33.416970] kunit_try_run_case+0x170/0x3f0 [ 33.417018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.417074] kthread+0x328/0x630 [ 33.417122] ret_from_fork+0x10/0x20 [ 33.417173] [ 33.418071] Allocated by task 297: [ 33.418124] kasan_save_stack+0x3c/0x68 [ 33.418241] kasan_save_track+0x20/0x40 [ 33.418325] kasan_save_alloc_info+0x40/0x58 [ 33.418719] __kasan_kmalloc+0xd4/0xd8 [ 33.418770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.419286] kasan_atomics+0xb8/0x2e0 [ 33.419400] kunit_try_run_case+0x170/0x3f0 [ 33.419531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.419577] kthread+0x328/0x630 [ 33.419615] ret_from_fork+0x10/0x20 [ 33.420249] [ 33.420279] The buggy address belongs to the object at fff00000c64f7f00 [ 33.420279] which belongs to the cache kmalloc-64 of size 64 [ 33.420485] The buggy address is located 0 bytes to the right of [ 33.420485] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.420578] [ 33.420866] The buggy address belongs to the physical page: [ 33.421319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.421647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.421695] page_type: f5(slab) [ 33.421832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.421938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.422381] page dumped because: kasan: bad access detected [ 33.422429] [ 33.422589] Memory state around the buggy address: [ 33.422786] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.422907] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.423268] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.423310] ^ [ 33.423346] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.423825] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.423884] ================================================================== [ 33.524773] ================================================================== [ 33.524822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 33.524872] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.524952] [ 33.524995] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.525198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.525334] Hardware name: linux,dummy-virt (DT) [ 33.525367] Call trace: [ 33.525390] show_stack+0x20/0x38 (C) [ 33.525452] dump_stack_lvl+0x8c/0xd0 [ 33.525500] print_report+0x118/0x5d0 [ 33.525547] kasan_report+0xdc/0x128 [ 33.525599] __asan_report_load8_noabort+0x20/0x30 [ 33.525708] kasan_atomics_helper+0x3e10/0x4858 [ 33.525815] kasan_atomics+0x198/0x2e0 [ 33.525967] kunit_try_run_case+0x170/0x3f0 [ 33.526016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.526076] kthread+0x328/0x630 [ 33.526140] ret_from_fork+0x10/0x20 [ 33.526206] [ 33.526228] Allocated by task 297: [ 33.526267] kasan_save_stack+0x3c/0x68 [ 33.526515] kasan_save_track+0x20/0x40 [ 33.526559] kasan_save_alloc_info+0x40/0x58 [ 33.526599] __kasan_kmalloc+0xd4/0xd8 [ 33.526678] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.526798] kasan_atomics+0xb8/0x2e0 [ 33.526889] kunit_try_run_case+0x170/0x3f0 [ 33.526948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.527087] kthread+0x328/0x630 [ 33.527173] ret_from_fork+0x10/0x20 [ 33.527341] [ 33.527370] The buggy address belongs to the object at fff00000c64f7f00 [ 33.527370] which belongs to the cache kmalloc-64 of size 64 [ 33.527430] The buggy address is located 0 bytes to the right of [ 33.527430] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.527979] [ 33.528011] The buggy address belongs to the physical page: [ 33.528045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.528457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.528524] page_type: f5(slab) [ 33.528567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.528898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.528943] page dumped because: kasan: bad access detected [ 33.528977] [ 33.528998] Memory state around the buggy address: [ 33.529377] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.529428] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.529486] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.529667] ^ [ 33.529706] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.530074] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.530119] ================================================================== [ 33.480268] ================================================================== [ 33.480324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 33.480381] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.480432] [ 33.480480] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.480567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.480594] Hardware name: linux,dummy-virt (DT) [ 33.481323] Call trace: [ 33.481364] show_stack+0x20/0x38 (C) [ 33.481822] dump_stack_lvl+0x8c/0xd0 [ 33.482290] print_report+0x118/0x5d0 [ 33.482354] kasan_report+0xdc/0x128 [ 33.482402] kasan_check_range+0x100/0x1a8 [ 33.482625] __kasan_check_write+0x20/0x30 [ 33.482674] kasan_atomics_helper+0x154c/0x4858 [ 33.482727] kasan_atomics+0x198/0x2e0 [ 33.482776] kunit_try_run_case+0x170/0x3f0 [ 33.483303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.483401] kthread+0x328/0x630 [ 33.483463] ret_from_fork+0x10/0x20 [ 33.483931] [ 33.484101] Allocated by task 297: [ 33.484135] kasan_save_stack+0x3c/0x68 [ 33.484415] kasan_save_track+0x20/0x40 [ 33.484468] kasan_save_alloc_info+0x40/0x58 [ 33.484509] __kasan_kmalloc+0xd4/0xd8 [ 33.484551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.484596] kasan_atomics+0xb8/0x2e0 [ 33.484847] kunit_try_run_case+0x170/0x3f0 [ 33.485176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.485561] kthread+0x328/0x630 [ 33.485601] ret_from_fork+0x10/0x20 [ 33.485641] [ 33.485664] The buggy address belongs to the object at fff00000c64f7f00 [ 33.485664] which belongs to the cache kmalloc-64 of size 64 [ 33.485724] The buggy address is located 0 bytes to the right of [ 33.485724] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.485973] [ 33.486003] The buggy address belongs to the physical page: [ 33.486093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.486200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.486249] page_type: f5(slab) [ 33.486579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.486980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.487318] page dumped because: kasan: bad access detected [ 33.487357] [ 33.487913] Memory state around the buggy address: [ 33.488334] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.488623] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.488728] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.489060] ^ [ 33.489106] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.489155] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.489492] ================================================================== [ 33.368633] ================================================================== [ 33.368685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.369599] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.369681] [ 33.369719] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.370160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.370223] Hardware name: linux,dummy-virt (DT) [ 33.370256] Call trace: [ 33.370282] show_stack+0x20/0x38 (C) [ 33.370851] dump_stack_lvl+0x8c/0xd0 [ 33.371199] print_report+0x118/0x5d0 [ 33.371255] kasan_report+0xdc/0x128 [ 33.371303] kasan_check_range+0x100/0x1a8 [ 33.371350] __kasan_check_write+0x20/0x30 [ 33.371400] kasan_atomics_helper+0x1128/0x4858 [ 33.371461] kasan_atomics+0x198/0x2e0 [ 33.371509] kunit_try_run_case+0x170/0x3f0 [ 33.371558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.372369] kthread+0x328/0x630 [ 33.372546] ret_from_fork+0x10/0x20 [ 33.373176] [ 33.373205] Allocated by task 297: [ 33.373842] kasan_save_stack+0x3c/0x68 [ 33.373980] kasan_save_track+0x20/0x40 [ 33.374030] kasan_save_alloc_info+0x40/0x58 [ 33.374543] __kasan_kmalloc+0xd4/0xd8 [ 33.374595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.374640] kasan_atomics+0xb8/0x2e0 [ 33.374680] kunit_try_run_case+0x170/0x3f0 [ 33.374720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.374766] kthread+0x328/0x630 [ 33.375586] ret_from_fork+0x10/0x20 [ 33.375703] [ 33.375732] The buggy address belongs to the object at fff00000c64f7f00 [ 33.375732] which belongs to the cache kmalloc-64 of size 64 [ 33.375795] The buggy address is located 0 bytes to the right of [ 33.375795] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.375860] [ 33.375883] The buggy address belongs to the physical page: [ 33.375916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.376798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.376877] page_type: f5(slab) [ 33.377122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.377566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.377857] page dumped because: kasan: bad access detected [ 33.377896] [ 33.377916] Memory state around the buggy address: [ 33.378334] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.378655] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.378707] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.379238] ^ [ 33.379598] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.379656] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.379697] ================================================================== [ 33.457487] ================================================================== [ 33.457549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 33.457845] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.458021] [ 33.458627] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.459134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.459165] Hardware name: linux,dummy-virt (DT) [ 33.459554] Call trace: [ 33.459777] show_stack+0x20/0x38 (C) [ 33.460058] dump_stack_lvl+0x8c/0xd0 [ 33.460125] print_report+0x118/0x5d0 [ 33.460179] kasan_report+0xdc/0x128 [ 33.460388] kasan_check_range+0x100/0x1a8 [ 33.460833] __kasan_check_write+0x20/0x30 [ 33.461310] kasan_atomics_helper+0x147c/0x4858 [ 33.461493] kasan_atomics+0x198/0x2e0 [ 33.461769] kunit_try_run_case+0x170/0x3f0 [ 33.462246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.462320] kthread+0x328/0x630 [ 33.462370] ret_from_fork+0x10/0x20 [ 33.462422] [ 33.462454] Allocated by task 297: [ 33.462709] kasan_save_stack+0x3c/0x68 [ 33.462833] kasan_save_track+0x20/0x40 [ 33.463206] kasan_save_alloc_info+0x40/0x58 [ 33.463253] __kasan_kmalloc+0xd4/0xd8 [ 33.463491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.464007] kasan_atomics+0xb8/0x2e0 [ 33.464222] kunit_try_run_case+0x170/0x3f0 [ 33.464270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.464609] kthread+0x328/0x630 [ 33.464650] ret_from_fork+0x10/0x20 [ 33.464891] [ 33.464993] The buggy address belongs to the object at fff00000c64f7f00 [ 33.464993] which belongs to the cache kmalloc-64 of size 64 [ 33.465324] The buggy address is located 0 bytes to the right of [ 33.465324] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.465412] [ 33.465679] The buggy address belongs to the physical page: [ 33.465821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.466170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.466279] page_type: f5(slab) [ 33.466337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.466757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.467014] page dumped because: kasan: bad access detected [ 33.467269] [ 33.467424] Memory state around the buggy address: [ 33.467522] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.467622] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.467734] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.467773] ^ [ 33.467808] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.467854] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.468737] ================================================================== [ 33.357098] ================================================================== [ 33.357152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.357727] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.357911] [ 33.357948] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.358043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.358071] Hardware name: linux,dummy-virt (DT) [ 33.358289] Call trace: [ 33.358319] show_stack+0x20/0x38 (C) [ 33.358544] dump_stack_lvl+0x8c/0xd0 [ 33.359023] print_report+0x118/0x5d0 [ 33.359156] kasan_report+0xdc/0x128 [ 33.359204] kasan_check_range+0x100/0x1a8 [ 33.359251] __kasan_check_write+0x20/0x30 [ 33.359298] kasan_atomics_helper+0x10c0/0x4858 [ 33.359351] kasan_atomics+0x198/0x2e0 [ 33.359401] kunit_try_run_case+0x170/0x3f0 [ 33.359461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.360299] kthread+0x328/0x630 [ 33.360417] ret_from_fork+0x10/0x20 [ 33.360650] [ 33.360671] Allocated by task 297: [ 33.360702] kasan_save_stack+0x3c/0x68 [ 33.361600] kasan_save_track+0x20/0x40 [ 33.361655] kasan_save_alloc_info+0x40/0x58 [ 33.361709] __kasan_kmalloc+0xd4/0xd8 [ 33.361750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.362338] kasan_atomics+0xb8/0x2e0 [ 33.362396] kunit_try_run_case+0x170/0x3f0 [ 33.362460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.362507] kthread+0x328/0x630 [ 33.362545] ret_from_fork+0x10/0x20 [ 33.362586] [ 33.362609] The buggy address belongs to the object at fff00000c64f7f00 [ 33.362609] which belongs to the cache kmalloc-64 of size 64 [ 33.362970] The buggy address is located 0 bytes to the right of [ 33.362970] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.363599] [ 33.363785] The buggy address belongs to the physical page: [ 33.364100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.364740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.364857] page_type: f5(slab) [ 33.365168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.365396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.365824] page dumped because: kasan: bad access detected [ 33.366035] [ 33.366223] Memory state around the buggy address: [ 33.366262] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.366418] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.366473] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.367021] ^ [ 33.367348] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.367488] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.367532] ================================================================== [ 33.531188] ================================================================== [ 33.531245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 33.531297] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.531347] [ 33.531389] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.531632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.531665] Hardware name: linux,dummy-virt (DT) [ 33.531977] Call trace: [ 33.532004] show_stack+0x20/0x38 (C) [ 33.532055] dump_stack_lvl+0x8c/0xd0 [ 33.532105] print_report+0x118/0x5d0 [ 33.532150] kasan_report+0xdc/0x128 [ 33.532494] kasan_check_range+0x100/0x1a8 [ 33.532799] __kasan_check_write+0x20/0x30 [ 33.532931] kasan_atomics_helper+0x175c/0x4858 [ 33.532983] kasan_atomics+0x198/0x2e0 [ 33.533030] kunit_try_run_case+0x170/0x3f0 [ 33.533078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.533139] kthread+0x328/0x630 [ 33.533339] ret_from_fork+0x10/0x20 [ 33.533649] [ 33.533755] Allocated by task 297: [ 33.533787] kasan_save_stack+0x3c/0x68 [ 33.533951] kasan_save_track+0x20/0x40 [ 33.533994] kasan_save_alloc_info+0x40/0x58 [ 33.534035] __kasan_kmalloc+0xd4/0xd8 [ 33.534074] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.534117] kasan_atomics+0xb8/0x2e0 [ 33.534157] kunit_try_run_case+0x170/0x3f0 [ 33.534210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.534279] kthread+0x328/0x630 [ 33.534315] ret_from_fork+0x10/0x20 [ 33.534355] [ 33.534378] The buggy address belongs to the object at fff00000c64f7f00 [ 33.534378] which belongs to the cache kmalloc-64 of size 64 [ 33.534447] The buggy address is located 0 bytes to the right of [ 33.534447] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.534513] [ 33.534536] The buggy address belongs to the physical page: [ 33.534569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.534687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.534739] page_type: f5(slab) [ 33.534790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.534950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.534992] page dumped because: kasan: bad access detected [ 33.535032] [ 33.535076] Memory state around the buggy address: [ 33.535113] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.535156] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.535246] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.535452] ^ [ 33.535563] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.535639] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.535682] ================================================================== [ 33.520397] ================================================================== [ 33.520703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 33.520766] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.521051] [ 33.521091] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.521287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.521315] Hardware name: linux,dummy-virt (DT) [ 33.521347] Call trace: [ 33.521371] show_stack+0x20/0x38 (C) [ 33.521499] dump_stack_lvl+0x8c/0xd0 [ 33.521554] print_report+0x118/0x5d0 [ 33.521601] kasan_report+0xdc/0x128 [ 33.521651] kasan_check_range+0x100/0x1a8 [ 33.521700] __kasan_check_write+0x20/0x30 [ 33.521749] kasan_atomics_helper+0x16d0/0x4858 [ 33.521799] kasan_atomics+0x198/0x2e0 [ 33.521880] kunit_try_run_case+0x170/0x3f0 [ 33.521933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.521991] kthread+0x328/0x630 [ 33.522085] ret_from_fork+0x10/0x20 [ 33.522148] [ 33.522170] Allocated by task 297: [ 33.522200] kasan_save_stack+0x3c/0x68 [ 33.522244] kasan_save_track+0x20/0x40 [ 33.522285] kasan_save_alloc_info+0x40/0x58 [ 33.522325] __kasan_kmalloc+0xd4/0xd8 [ 33.522393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.522449] kasan_atomics+0xb8/0x2e0 [ 33.522490] kunit_try_run_case+0x170/0x3f0 [ 33.522530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.522633] kthread+0x328/0x630 [ 33.522773] ret_from_fork+0x10/0x20 [ 33.522816] [ 33.522864] The buggy address belongs to the object at fff00000c64f7f00 [ 33.522864] which belongs to the cache kmalloc-64 of size 64 [ 33.523144] The buggy address is located 0 bytes to the right of [ 33.523144] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.523287] [ 33.523312] The buggy address belongs to the physical page: [ 33.523395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.523542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.523591] page_type: f5(slab) [ 33.523666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.523718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.523757] page dumped because: kasan: bad access detected [ 33.523807] [ 33.523847] Memory state around the buggy address: [ 33.523935] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.524042] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.524142] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.524226] ^ [ 33.524314] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.524449] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.524490] ================================================================== [ 33.226664] ================================================================== [ 33.226753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.226807] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.226883] [ 33.226950] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.227052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.227100] Hardware name: linux,dummy-virt (DT) [ 33.227162] Call trace: [ 33.227186] show_stack+0x20/0x38 (C) [ 33.227238] dump_stack_lvl+0x8c/0xd0 [ 33.227325] print_report+0x118/0x5d0 [ 33.227505] kasan_report+0xdc/0x128 [ 33.227560] kasan_check_range+0x100/0x1a8 [ 33.227637] __kasan_check_write+0x20/0x30 [ 33.227703] kasan_atomics_helper+0x99c/0x4858 [ 33.227756] kasan_atomics+0x198/0x2e0 [ 33.227803] kunit_try_run_case+0x170/0x3f0 [ 33.227869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.227922] kthread+0x328/0x630 [ 33.227974] ret_from_fork+0x10/0x20 [ 33.228040] [ 33.228069] Allocated by task 297: [ 33.228139] kasan_save_stack+0x3c/0x68 [ 33.228185] kasan_save_track+0x20/0x40 [ 33.228231] kasan_save_alloc_info+0x40/0x58 [ 33.228480] __kasan_kmalloc+0xd4/0xd8 [ 33.228583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.228636] kasan_atomics+0xb8/0x2e0 [ 33.228706] kunit_try_run_case+0x170/0x3f0 [ 33.228787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.228852] kthread+0x328/0x630 [ 33.228903] ret_from_fork+0x10/0x20 [ 33.228967] [ 33.228990] The buggy address belongs to the object at fff00000c64f7f00 [ 33.228990] which belongs to the cache kmalloc-64 of size 64 [ 33.229265] The buggy address is located 0 bytes to the right of [ 33.229265] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.229344] [ 33.229404] The buggy address belongs to the physical page: [ 33.229471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.229526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.229602] page_type: f5(slab) [ 33.229745] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.229922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.229968] page dumped because: kasan: bad access detected [ 33.230014] [ 33.230035] Memory state around the buggy address: [ 33.230086] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.230130] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.230195] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.230237] ^ [ 33.230272] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.230348] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.230389] ================================================================== [ 33.329868] ================================================================== [ 33.330079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.330147] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.330199] [ 33.330637] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.330897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.331049] Hardware name: linux,dummy-virt (DT) [ 33.331201] Call trace: [ 33.331248] show_stack+0x20/0x38 (C) [ 33.331303] dump_stack_lvl+0x8c/0xd0 [ 33.331351] print_report+0x118/0x5d0 [ 33.331398] kasan_report+0xdc/0x128 [ 33.331465] kasan_check_range+0x100/0x1a8 [ 33.331534] __kasan_check_write+0x20/0x30 [ 33.331583] kasan_atomics_helper+0xff0/0x4858 [ 33.331635] kasan_atomics+0x198/0x2e0 [ 33.331693] kunit_try_run_case+0x170/0x3f0 [ 33.331994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.332106] kthread+0x328/0x630 [ 33.332154] ret_from_fork+0x10/0x20 [ 33.333522] [ 33.333627] Allocated by task 297: [ 33.333936] kasan_save_stack+0x3c/0x68 [ 33.333996] kasan_save_track+0x20/0x40 [ 33.334355] kasan_save_alloc_info+0x40/0x58 [ 33.334887] __kasan_kmalloc+0xd4/0xd8 [ 33.335052] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.335098] kasan_atomics+0xb8/0x2e0 [ 33.335145] kunit_try_run_case+0x170/0x3f0 [ 33.335185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.335232] kthread+0x328/0x630 [ 33.335269] ret_from_fork+0x10/0x20 [ 33.336770] [ 33.336802] The buggy address belongs to the object at fff00000c64f7f00 [ 33.336802] which belongs to the cache kmalloc-64 of size 64 [ 33.337885] The buggy address is located 0 bytes to the right of [ 33.337885] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.338564] [ 33.338668] The buggy address belongs to the physical page: [ 33.338704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.338879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.339173] page_type: f5(slab) [ 33.340017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.340193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.340715] page dumped because: kasan: bad access detected [ 33.340991] [ 33.341298] Memory state around the buggy address: [ 33.341337] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.341893] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.342131] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.342205] ^ [ 33.342600] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.343132] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.344146] ================================================================== [ 33.307913] ================================================================== [ 33.307962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.308027] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.308113] [ 33.308172] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.308257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.308285] Hardware name: linux,dummy-virt (DT) [ 33.308617] Call trace: [ 33.308661] show_stack+0x20/0x38 (C) [ 33.308714] dump_stack_lvl+0x8c/0xd0 [ 33.308799] print_report+0x118/0x5d0 [ 33.308935] kasan_report+0xdc/0x128 [ 33.308984] __asan_report_store8_noabort+0x20/0x30 [ 33.309142] kasan_atomics_helper+0x3e5c/0x4858 [ 33.309225] kasan_atomics+0x198/0x2e0 [ 33.309292] kunit_try_run_case+0x170/0x3f0 [ 33.309343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.309398] kthread+0x328/0x630 [ 33.309467] ret_from_fork+0x10/0x20 [ 33.309518] [ 33.309538] Allocated by task 297: [ 33.309566] kasan_save_stack+0x3c/0x68 [ 33.309611] kasan_save_track+0x20/0x40 [ 33.309683] kasan_save_alloc_info+0x40/0x58 [ 33.309723] __kasan_kmalloc+0xd4/0xd8 [ 33.309894] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.310046] kasan_atomics+0xb8/0x2e0 [ 33.310138] kunit_try_run_case+0x170/0x3f0 [ 33.310281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.310384] kthread+0x328/0x630 [ 33.310670] ret_from_fork+0x10/0x20 [ 33.310854] [ 33.310905] The buggy address belongs to the object at fff00000c64f7f00 [ 33.310905] which belongs to the cache kmalloc-64 of size 64 [ 33.311006] The buggy address is located 0 bytes to the right of [ 33.311006] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.311072] [ 33.311094] The buggy address belongs to the physical page: [ 33.311140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.311191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.311239] page_type: f5(slab) [ 33.311282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.311335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.311573] page dumped because: kasan: bad access detected [ 33.311649] [ 33.311796] Memory state around the buggy address: [ 33.312116] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.312175] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.312240] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.312310] ^ [ 33.312422] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.312507] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.312657] ================================================================== [ 33.250222] ================================================================== [ 33.250270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 33.250319] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.250369] [ 33.250399] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.250709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.250752] Hardware name: linux,dummy-virt (DT) [ 33.250785] Call trace: [ 33.250810] show_stack+0x20/0x38 (C) [ 33.250864] dump_stack_lvl+0x8c/0xd0 [ 33.250912] print_report+0x118/0x5d0 [ 33.250958] kasan_report+0xdc/0x128 [ 33.251004] kasan_check_range+0x100/0x1a8 [ 33.251052] __kasan_check_write+0x20/0x30 [ 33.251101] kasan_atomics_helper+0xb70/0x4858 [ 33.251160] kasan_atomics+0x198/0x2e0 [ 33.251209] kunit_try_run_case+0x170/0x3f0 [ 33.251257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.251310] kthread+0x328/0x630 [ 33.251355] ret_from_fork+0x10/0x20 [ 33.251406] [ 33.251426] Allocated by task 297: [ 33.251514] kasan_save_stack+0x3c/0x68 [ 33.251570] kasan_save_track+0x20/0x40 [ 33.251612] kasan_save_alloc_info+0x40/0x58 [ 33.251659] __kasan_kmalloc+0xd4/0xd8 [ 33.251701] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.251743] kasan_atomics+0xb8/0x2e0 [ 33.251918] kunit_try_run_case+0x170/0x3f0 [ 33.251961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.252007] kthread+0x328/0x630 [ 33.252249] ret_from_fork+0x10/0x20 [ 33.252341] [ 33.252381] The buggy address belongs to the object at fff00000c64f7f00 [ 33.252381] which belongs to the cache kmalloc-64 of size 64 [ 33.252472] The buggy address is located 0 bytes to the right of [ 33.252472] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.252544] [ 33.252572] The buggy address belongs to the physical page: [ 33.252605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.252679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.252888] page_type: f5(slab) [ 33.252945] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.253086] page dumped because: kasan: bad access detected [ 33.253145] Memory state around the buggy address: [ 33.253516] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.253841] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.254955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 33.255068] [ 33.255203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.255234] Hardware name: linux,dummy-virt (DT) [ 33.256019] kasan_atomics+0x198/0x2e0 [ 33.257359] kasan_save_alloc_info+0x40/0x58 [ 33.258476] ret_from_fork+0x10/0x20 [ 33.258829] [ 33.258888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.258951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.259154] page_type: f5(slab) [ 33.259220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.259468] [ 33.259705] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.259910] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.261208] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.261484] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.261682] Call trace: [ 33.262074] kasan_report+0xdc/0x128 [ 33.262366] kasan_atomics_helper+0xc08/0x4858 [ 33.264456] [ 33.264744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.264800] page_type: f5(slab) [ 33.265076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.265770] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.266286] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.267315] ================================================================== [ 33.539994] ================================================================== [ 33.540223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 33.540326] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.540536] [ 33.540578] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.540780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.540824] Hardware name: linux,dummy-virt (DT) [ 33.540857] Call trace: [ 33.540881] show_stack+0x20/0x38 (C) [ 33.540931] dump_stack_lvl+0x8c/0xd0 [ 33.540984] print_report+0x118/0x5d0 [ 33.541210] kasan_report+0xdc/0x128 [ 33.541421] kasan_check_range+0x100/0x1a8 [ 33.541491] __kasan_check_write+0x20/0x30 [ 33.541538] kasan_atomics_helper+0x17ec/0x4858 [ 33.541591] kasan_atomics+0x198/0x2e0 [ 33.541738] kunit_try_run_case+0x170/0x3f0 [ 33.541820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.541875] kthread+0x328/0x630 [ 33.541919] ret_from_fork+0x10/0x20 [ 33.541970] [ 33.541992] Allocated by task 297: [ 33.542114] kasan_save_stack+0x3c/0x68 [ 33.542160] kasan_save_track+0x20/0x40 [ 33.542201] kasan_save_alloc_info+0x40/0x58 [ 33.542242] __kasan_kmalloc+0xd4/0xd8 [ 33.542305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.542350] kasan_atomics+0xb8/0x2e0 [ 33.542407] kunit_try_run_case+0x170/0x3f0 [ 33.542457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.542503] kthread+0x328/0x630 [ 33.542537] ret_from_fork+0x10/0x20 [ 33.542576] [ 33.542599] The buggy address belongs to the object at fff00000c64f7f00 [ 33.542599] which belongs to the cache kmalloc-64 of size 64 [ 33.542658] The buggy address is located 0 bytes to the right of [ 33.542658] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.542723] [ 33.542746] The buggy address belongs to the physical page: [ 33.542778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.542830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.543213] page_type: f5(slab) [ 33.543347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.543398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.543459] page dumped because: kasan: bad access detected [ 33.543491] [ 33.543510] Memory state around the buggy address: [ 33.543692] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.543781] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.543826] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.543932] ^ [ 33.543966] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.544011] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.544051] ================================================================== [ 33.316819] ================================================================== [ 33.316875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.316926] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.316983] [ 33.317020] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.317105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.317132] Hardware name: linux,dummy-virt (DT) [ 33.317177] Call trace: [ 33.317216] show_stack+0x20/0x38 (C) [ 33.317272] dump_stack_lvl+0x8c/0xd0 [ 33.317538] print_report+0x118/0x5d0 [ 33.317597] kasan_report+0xdc/0x128 [ 33.317907] kasan_check_range+0x100/0x1a8 [ 33.317980] __kasan_check_write+0x20/0x30 [ 33.318029] kasan_atomics_helper+0xf20/0x4858 [ 33.318081] kasan_atomics+0x198/0x2e0 [ 33.318188] kunit_try_run_case+0x170/0x3f0 [ 33.318239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.318294] kthread+0x328/0x630 [ 33.318338] ret_from_fork+0x10/0x20 [ 33.318524] [ 33.318548] Allocated by task 297: [ 33.318580] kasan_save_stack+0x3c/0x68 [ 33.318625] kasan_save_track+0x20/0x40 [ 33.318667] kasan_save_alloc_info+0x40/0x58 [ 33.318707] __kasan_kmalloc+0xd4/0xd8 [ 33.318748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.318791] kasan_atomics+0xb8/0x2e0 [ 33.318831] kunit_try_run_case+0x170/0x3f0 [ 33.318874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.318919] kthread+0x328/0x630 [ 33.318955] ret_from_fork+0x10/0x20 [ 33.318993] [ 33.319016] The buggy address belongs to the object at fff00000c64f7f00 [ 33.319016] which belongs to the cache kmalloc-64 of size 64 [ 33.320389] The buggy address is located 0 bytes to the right of [ 33.320389] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.322582] [ 33.322621] The buggy address belongs to the physical page: [ 33.322656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.322710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.322759] page_type: f5(slab) [ 33.322797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.322850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.322892] page dumped because: kasan: bad access detected [ 33.322926] [ 33.322946] Memory state around the buggy address: [ 33.322979] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323023] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323066] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.323106] ^ [ 33.323150] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.323194] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.323233] ================================================================== [ 33.535874] ================================================================== [ 33.535919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 33.536047] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.536099] [ 33.536142] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.536325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.536356] Hardware name: linux,dummy-virt (DT) [ 33.536387] Call trace: [ 33.536411] show_stack+0x20/0x38 (C) [ 33.536588] dump_stack_lvl+0x8c/0xd0 [ 33.536646] print_report+0x118/0x5d0 [ 33.536723] kasan_report+0xdc/0x128 [ 33.536769] __asan_report_load8_noabort+0x20/0x30 [ 33.536826] kasan_atomics_helper+0x3e20/0x4858 [ 33.537056] kasan_atomics+0x198/0x2e0 [ 33.537105] kunit_try_run_case+0x170/0x3f0 [ 33.537187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.537417] kthread+0x328/0x630 [ 33.537481] ret_from_fork+0x10/0x20 [ 33.537687] [ 33.537709] Allocated by task 297: [ 33.537739] kasan_save_stack+0x3c/0x68 [ 33.537815] kasan_save_track+0x20/0x40 [ 33.537935] kasan_save_alloc_info+0x40/0x58 [ 33.537989] __kasan_kmalloc+0xd4/0xd8 [ 33.538030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.538073] kasan_atomics+0xb8/0x2e0 [ 33.538136] kunit_try_run_case+0x170/0x3f0 [ 33.538177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.538222] kthread+0x328/0x630 [ 33.538257] ret_from_fork+0x10/0x20 [ 33.538297] [ 33.538384] The buggy address belongs to the object at fff00000c64f7f00 [ 33.538384] which belongs to the cache kmalloc-64 of size 64 [ 33.538463] The buggy address is located 0 bytes to the right of [ 33.538463] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.538530] [ 33.538554] The buggy address belongs to the physical page: [ 33.538586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.538664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.538742] page_type: f5(slab) [ 33.538788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.538852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.539011] page dumped because: kasan: bad access detected [ 33.539042] [ 33.539061] Memory state around the buggy address: [ 33.539095] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.539236] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.539296] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.539337] ^ [ 33.539381] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.539461] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.539610] ================================================================== [ 33.391002] ================================================================== [ 33.391135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 33.391489] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.391541] [ 33.391571] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.391656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.391684] Hardware name: linux,dummy-virt (DT) [ 33.392550] Call trace: [ 33.392741] show_stack+0x20/0x38 (C) [ 33.392933] dump_stack_lvl+0x8c/0xd0 [ 33.393129] print_report+0x118/0x5d0 [ 33.393176] kasan_report+0xdc/0x128 [ 33.393222] kasan_check_range+0x100/0x1a8 [ 33.393271] __kasan_check_write+0x20/0x30 [ 33.393317] kasan_atomics_helper+0x11f8/0x4858 [ 33.393370] kasan_atomics+0x198/0x2e0 [ 33.393925] kunit_try_run_case+0x170/0x3f0 [ 33.394132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.394666] kthread+0x328/0x630 [ 33.394730] ret_from_fork+0x10/0x20 [ 33.395182] [ 33.395423] Allocated by task 297: [ 33.395744] kasan_save_stack+0x3c/0x68 [ 33.395798] kasan_save_track+0x20/0x40 [ 33.396075] kasan_save_alloc_info+0x40/0x58 [ 33.396369] __kasan_kmalloc+0xd4/0xd8 [ 33.396422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.396817] kasan_atomics+0xb8/0x2e0 [ 33.396876] kunit_try_run_case+0x170/0x3f0 [ 33.397373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.397754] kthread+0x328/0x630 [ 33.397928] ret_from_fork+0x10/0x20 [ 33.398149] [ 33.398177] The buggy address belongs to the object at fff00000c64f7f00 [ 33.398177] which belongs to the cache kmalloc-64 of size 64 [ 33.398582] The buggy address is located 0 bytes to the right of [ 33.398582] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.398736] [ 33.398758] The buggy address belongs to the physical page: [ 33.398791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.399405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.399559] page_type: f5(slab) [ 33.399600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.399652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.399695] page dumped because: kasan: bad access detected [ 33.400770] [ 33.400997] Memory state around the buggy address: [ 33.401035] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.401126] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.401627] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.401717] ^ [ 33.401757] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.401809] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.402100] ================================================================== [ 33.344596] ================================================================== [ 33.345330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.345831] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.346193] [ 33.346230] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.346317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.346345] Hardware name: linux,dummy-virt (DT) [ 33.346774] Call trace: [ 33.346814] show_stack+0x20/0x38 (C) [ 33.347233] dump_stack_lvl+0x8c/0xd0 [ 33.347384] print_report+0x118/0x5d0 [ 33.347588] kasan_report+0xdc/0x128 [ 33.347639] kasan_check_range+0x100/0x1a8 [ 33.348027] __kasan_check_write+0x20/0x30 [ 33.348473] kasan_atomics_helper+0x1058/0x4858 [ 33.348538] kasan_atomics+0x198/0x2e0 [ 33.348588] kunit_try_run_case+0x170/0x3f0 [ 33.348638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.348692] kthread+0x328/0x630 [ 33.348740] ret_from_fork+0x10/0x20 [ 33.349953] [ 33.349999] Allocated by task 297: [ 33.350165] kasan_save_stack+0x3c/0x68 [ 33.350222] kasan_save_track+0x20/0x40 [ 33.350263] kasan_save_alloc_info+0x40/0x58 [ 33.350304] __kasan_kmalloc+0xd4/0xd8 [ 33.350344] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.350389] kasan_atomics+0xb8/0x2e0 [ 33.350429] kunit_try_run_case+0x170/0x3f0 [ 33.350482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.351170] kthread+0x328/0x630 [ 33.351355] ret_from_fork+0x10/0x20 [ 33.351779] [ 33.351805] The buggy address belongs to the object at fff00000c64f7f00 [ 33.351805] which belongs to the cache kmalloc-64 of size 64 [ 33.352310] The buggy address is located 0 bytes to the right of [ 33.352310] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.352567] [ 33.352881] The buggy address belongs to the physical page: [ 33.353043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.353106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.353504] page_type: f5(slab) [ 33.353975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.354045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.354479] page dumped because: kasan: bad access detected [ 33.354518] [ 33.354537] Memory state around the buggy address: [ 33.354715] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.355234] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.355288] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.355845] ^ [ 33.355968] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.356292] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.356335] ================================================================== [ 33.436590] ================================================================== [ 33.436650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 33.436849] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.437187] [ 33.437425] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.437527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.437555] Hardware name: linux,dummy-virt (DT) [ 33.437653] Call trace: [ 33.437683] show_stack+0x20/0x38 (C) [ 33.437787] dump_stack_lvl+0x8c/0xd0 [ 33.437990] print_report+0x118/0x5d0 [ 33.438448] kasan_report+0xdc/0x128 [ 33.438500] __asan_report_load8_noabort+0x20/0x30 [ 33.438971] kasan_atomics_helper+0x3f04/0x4858 [ 33.439167] kasan_atomics+0x198/0x2e0 [ 33.439503] kunit_try_run_case+0x170/0x3f0 [ 33.439681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.439739] kthread+0x328/0x630 [ 33.440007] ret_from_fork+0x10/0x20 [ 33.440402] [ 33.440430] Allocated by task 297: [ 33.440753] kasan_save_stack+0x3c/0x68 [ 33.440954] kasan_save_track+0x20/0x40 [ 33.441001] kasan_save_alloc_info+0x40/0x58 [ 33.441042] __kasan_kmalloc+0xd4/0xd8 [ 33.441084] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.441576] kasan_atomics+0xb8/0x2e0 [ 33.441642] kunit_try_run_case+0x170/0x3f0 [ 33.441683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.441911] kthread+0x328/0x630 [ 33.442108] ret_from_fork+0x10/0x20 [ 33.442272] [ 33.442307] The buggy address belongs to the object at fff00000c64f7f00 [ 33.442307] which belongs to the cache kmalloc-64 of size 64 [ 33.442507] The buggy address is located 0 bytes to the right of [ 33.442507] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.442598] [ 33.442799] The buggy address belongs to the physical page: [ 33.442974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.443604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.443745] page_type: f5(slab) [ 33.443787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.443839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.444632] page dumped because: kasan: bad access detected [ 33.444959] [ 33.445013] Memory state around the buggy address: [ 33.445221] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.445281] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.445379] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.445446] ^ [ 33.445481] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.445528] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.445569] ================================================================== [ 33.230691] ================================================================== [ 33.230787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.230840] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.230907] [ 33.230961] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.231048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.231076] Hardware name: linux,dummy-virt (DT) [ 33.231115] Call trace: [ 33.231141] show_stack+0x20/0x38 (C) [ 33.231341] dump_stack_lvl+0x8c/0xd0 [ 33.231397] print_report+0x118/0x5d0 [ 33.231457] kasan_report+0xdc/0x128 [ 33.231514] kasan_check_range+0x100/0x1a8 [ 33.231562] __kasan_check_write+0x20/0x30 [ 33.231609] kasan_atomics_helper+0xa04/0x4858 [ 33.231660] kasan_atomics+0x198/0x2e0 [ 33.231707] kunit_try_run_case+0x170/0x3f0 [ 33.231755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.231808] kthread+0x328/0x630 [ 33.231854] ret_from_fork+0x10/0x20 [ 33.231912] [ 33.231947] Allocated by task 297: [ 33.231993] kasan_save_stack+0x3c/0x68 [ 33.232036] kasan_save_track+0x20/0x40 [ 33.232079] kasan_save_alloc_info+0x40/0x58 [ 33.232242] kunit_try_run_case+0x170/0x3f0 [ 33.232861] The buggy address is located 0 bytes to the right of [ 33.232861] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.232981] [ 33.233019] The buggy address belongs to the physical page: [ 33.233052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.233103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.233265] page_type: f5(slab) [ 33.233429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.233502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.233570] page dumped because: kasan: bad access detected [ 33.233606] [ 33.233780] Memory state around the buggy address: [ 33.233839] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.233884] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.233944] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.233984] ^ [ 33.234052] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.234098] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.234140] ================================================================== [ 33.512664] ================================================================== [ 33.512809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 33.512866] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.512916] [ 33.512952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.513038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.513067] Hardware name: linux,dummy-virt (DT) [ 33.513098] Call trace: [ 33.513123] show_stack+0x20/0x38 (C) [ 33.513180] dump_stack_lvl+0x8c/0xd0 [ 33.513288] print_report+0x118/0x5d0 [ 33.513433] kasan_report+0xdc/0x128 [ 33.513529] kasan_check_range+0x100/0x1a8 [ 33.513578] __kasan_check_write+0x20/0x30 [ 33.513652] kasan_atomics_helper+0x1644/0x4858 [ 33.513740] kasan_atomics+0x198/0x2e0 [ 33.513789] kunit_try_run_case+0x170/0x3f0 [ 33.513849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.513904] kthread+0x328/0x630 [ 33.513949] ret_from_fork+0x10/0x20 [ 33.514016] [ 33.514038] Allocated by task 297: [ 33.514068] kasan_save_stack+0x3c/0x68 [ 33.514189] kasan_save_track+0x20/0x40 [ 33.514281] kasan_save_alloc_info+0x40/0x58 [ 33.514420] __kasan_kmalloc+0xd4/0xd8 [ 33.514471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.514515] kasan_atomics+0xb8/0x2e0 [ 33.514586] kunit_try_run_case+0x170/0x3f0 [ 33.514626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.514705] kthread+0x328/0x630 [ 33.514767] ret_from_fork+0x10/0x20 [ 33.514827] [ 33.514996] The buggy address belongs to the object at fff00000c64f7f00 [ 33.514996] which belongs to the cache kmalloc-64 of size 64 [ 33.515056] The buggy address is located 0 bytes to the right of [ 33.515056] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.515126] [ 33.515147] The buggy address belongs to the physical page: [ 33.515180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.515245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.515292] page_type: f5(slab) [ 33.515517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.515575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.515863] page dumped because: kasan: bad access detected [ 33.515899] [ 33.515969] Memory state around the buggy address: [ 33.516002] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.516048] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.516139] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.516198] ^ [ 33.516295] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.516341] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.516380] ================================================================== [ 33.425101] ================================================================== [ 33.425374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 33.425557] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.425613] [ 33.425702] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.426073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.426219] Hardware name: linux,dummy-virt (DT) [ 33.426551] Call trace: [ 33.426714] show_stack+0x20/0x38 (C) [ 33.426851] dump_stack_lvl+0x8c/0xd0 [ 33.427300] print_report+0x118/0x5d0 [ 33.427761] kasan_report+0xdc/0x128 [ 33.427825] kasan_check_range+0x100/0x1a8 [ 33.427874] __kasan_check_write+0x20/0x30 [ 33.428318] kasan_atomics_helper+0x1384/0x4858 [ 33.428466] kasan_atomics+0x198/0x2e0 [ 33.428516] kunit_try_run_case+0x170/0x3f0 [ 33.429060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.429182] kthread+0x328/0x630 [ 33.429229] ret_from_fork+0x10/0x20 [ 33.429280] [ 33.429730] Allocated by task 297: [ 33.429768] kasan_save_stack+0x3c/0x68 [ 33.430270] kasan_save_track+0x20/0x40 [ 33.430455] kasan_save_alloc_info+0x40/0x58 [ 33.430791] __kasan_kmalloc+0xd4/0xd8 [ 33.430835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.430887] kasan_atomics+0xb8/0x2e0 [ 33.430929] kunit_try_run_case+0x170/0x3f0 [ 33.431527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.431605] kthread+0x328/0x630 [ 33.431643] ret_from_fork+0x10/0x20 [ 33.431683] [ 33.431705] The buggy address belongs to the object at fff00000c64f7f00 [ 33.431705] which belongs to the cache kmalloc-64 of size 64 [ 33.432358] The buggy address is located 0 bytes to the right of [ 33.432358] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.432465] [ 33.432488] The buggy address belongs to the physical page: [ 33.432911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.433131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.433181] page_type: f5(slab) [ 33.433225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.433574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.433652] page dumped because: kasan: bad access detected [ 33.434265] [ 33.434337] Memory state around the buggy address: [ 33.434503] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.434688] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.434737] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.434814] ^ [ 33.434876] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.434922] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.435344] ================================================================== [ 33.295991] ================================================================== [ 33.296036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.296085] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.296136] [ 33.296165] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.296248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.296279] Hardware name: linux,dummy-virt (DT) [ 33.296329] Call trace: [ 33.296352] show_stack+0x20/0x38 (C) [ 33.296403] dump_stack_lvl+0x8c/0xd0 [ 33.296820] print_report+0x118/0x5d0 [ 33.296926] kasan_report+0xdc/0x128 [ 33.297002] __asan_report_load8_noabort+0x20/0x30 [ 33.297055] kasan_atomics_helper+0x3f58/0x4858 [ 33.297108] kasan_atomics+0x198/0x2e0 [ 33.297172] kunit_try_run_case+0x170/0x3f0 [ 33.297221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.297277] kthread+0x328/0x630 [ 33.297354] ret_from_fork+0x10/0x20 [ 33.297407] [ 33.297550] Allocated by task 297: [ 33.297608] kasan_save_stack+0x3c/0x68 [ 33.297694] kasan_save_track+0x20/0x40 [ 33.297772] kasan_save_alloc_info+0x40/0x58 [ 33.297853] __kasan_kmalloc+0xd4/0xd8 [ 33.298171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.298258] kasan_atomics+0xb8/0x2e0 [ 33.298337] kunit_try_run_case+0x170/0x3f0 [ 33.298514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.298602] kthread+0x328/0x630 [ 33.298638] ret_from_fork+0x10/0x20 [ 33.298699] [ 33.298722] The buggy address belongs to the object at fff00000c64f7f00 [ 33.298722] which belongs to the cache kmalloc-64 of size 64 [ 33.298781] The buggy address is located 0 bytes to the right of [ 33.298781] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.298847] [ 33.298868] The buggy address belongs to the physical page: [ 33.298898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.299065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.299172] page_type: f5(slab) [ 33.299240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.299532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.299589] page dumped because: kasan: bad access detected [ 33.299700] [ 33.299815] Memory state around the buggy address: [ 33.299882] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.299970] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.300035] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.300101] ^ [ 33.300155] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.300203] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.300291] ================================================================== [ 33.291580] ================================================================== [ 33.291630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.291743] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.291797] [ 33.291844] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.291957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.292005] Hardware name: linux,dummy-virt (DT) [ 33.292067] Call trace: [ 33.292093] show_stack+0x20/0x38 (C) [ 33.292141] dump_stack_lvl+0x8c/0xd0 [ 33.292190] print_report+0x118/0x5d0 [ 33.292520] kasan_report+0xdc/0x128 [ 33.292622] kasan_check_range+0x100/0x1a8 [ 33.292971] __kasan_check_read+0x20/0x30 [ 33.293041] kasan_atomics_helper+0xdd4/0x4858 [ 33.293135] kasan_atomics+0x198/0x2e0 [ 33.293212] kunit_try_run_case+0x170/0x3f0 [ 33.293261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.293315] kthread+0x328/0x630 [ 33.293367] ret_from_fork+0x10/0x20 [ 33.293418] [ 33.293451] Allocated by task 297: [ 33.293479] kasan_save_stack+0x3c/0x68 [ 33.293524] kasan_save_track+0x20/0x40 [ 33.293705] kasan_save_alloc_info+0x40/0x58 [ 33.293830] __kasan_kmalloc+0xd4/0xd8 [ 33.293939] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.294068] kasan_atomics+0xb8/0x2e0 [ 33.294182] kunit_try_run_case+0x170/0x3f0 [ 33.294495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.294581] kthread+0x328/0x630 [ 33.294618] ret_from_fork+0x10/0x20 [ 33.294680] [ 33.294702] The buggy address belongs to the object at fff00000c64f7f00 [ 33.294702] which belongs to the cache kmalloc-64 of size 64 [ 33.294762] The buggy address is located 0 bytes to the right of [ 33.294762] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.294825] [ 33.294847] The buggy address belongs to the physical page: [ 33.295058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.295152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.295201] page_type: f5(slab) [ 33.295249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.295300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.295342] page dumped because: kasan: bad access detected [ 33.295375] [ 33.295394] Memory state around the buggy address: [ 33.295453] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.295500] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.295563] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.295602] ^ [ 33.295645] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.295688] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.295737] ================================================================== [ 33.159051] ================================================================== [ 33.159735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 33.159897] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.160061] Call trace: [ 33.160346] __kasan_check_write+0x20/0x30 [ 33.160523] kunit_try_run_case+0x170/0x3f0 [ 33.160625] kthread+0x328/0x630 [ 33.160824] kasan_save_track+0x20/0x40 [ 33.161137] kthread+0x328/0x630 [ 33.161295] The buggy address is located 0 bytes to the right of [ 33.161295] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.161759] page dumped because: kasan: bad access detected [ 33.162247] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.162309] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.163394] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.163570] [ 33.163603] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.163773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.163858] Call trace: [ 33.163972] dump_stack_lvl+0x8c/0xd0 [ 33.164685] kthread+0x328/0x630 [ 33.164813] [ 33.165126] kasan_save_alloc_info+0x40/0x58 [ 33.165770] [ 33.166030] [ 33.166100] The buggy address belongs to the physical page: [ 33.166361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.166801] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.167022] ==================================================================
[ 27.904127] ================================================================== [ 27.904364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 27.904805] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.905477] [ 27.905593] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.905688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.905704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.905748] Call Trace: [ 27.905764] <TASK> [ 27.905781] dump_stack_lvl+0x73/0xb0 [ 27.905833] print_report+0xd1/0x610 [ 27.905881] ? __virt_addr_valid+0x1db/0x2d0 [ 27.905912] ? kasan_atomics_helper+0x5115/0x5450 [ 27.905940] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.905973] ? kasan_atomics_helper+0x5115/0x5450 [ 27.906002] kasan_report+0x141/0x180 [ 27.906032] ? kasan_atomics_helper+0x5115/0x5450 [ 27.906068] __asan_report_load8_noabort+0x18/0x20 [ 27.906099] kasan_atomics_helper+0x5115/0x5450 [ 27.906129] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.906159] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.906191] ? kasan_atomics+0x152/0x310 [ 27.906244] kasan_atomics+0x1dc/0x310 [ 27.906275] ? __pfx_kasan_atomics+0x10/0x10 [ 27.906307] ? __pfx_read_tsc+0x10/0x10 [ 27.906335] ? ktime_get_ts64+0x86/0x230 [ 27.906367] kunit_try_run_case+0x1a5/0x480 [ 27.906398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.906426] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.906455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.906493] ? __kthread_parkme+0x82/0x180 [ 27.906547] ? preempt_count_sub+0x50/0x80 [ 27.906580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.906630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.906664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.906698] kthread+0x337/0x6f0 [ 27.906724] ? trace_preempt_on+0x20/0xc0 [ 27.906773] ? __pfx_kthread+0x10/0x10 [ 27.906801] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.906833] ? calculate_sigpending+0x7b/0xa0 [ 27.906865] ? __pfx_kthread+0x10/0x10 [ 27.906894] ret_from_fork+0x116/0x1d0 [ 27.906939] ? __pfx_kthread+0x10/0x10 [ 27.906967] ret_from_fork_asm+0x1a/0x30 [ 27.907008] </TASK> [ 27.907021] [ 27.914698] Allocated by task 313: [ 27.914864] kasan_save_stack+0x45/0x70 [ 27.915037] kasan_save_track+0x18/0x40 [ 27.915251] kasan_save_alloc_info+0x3b/0x50 [ 27.915509] __kasan_kmalloc+0xb7/0xc0 [ 27.915728] __kmalloc_cache_noprof+0x189/0x420 [ 27.915948] kasan_atomics+0x95/0x310 [ 27.916140] kunit_try_run_case+0x1a5/0x480 [ 27.916355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.916541] kthread+0x337/0x6f0 [ 27.916763] ret_from_fork+0x116/0x1d0 [ 27.916998] ret_from_fork_asm+0x1a/0x30 [ 27.917196] [ 27.917288] The buggy address belongs to the object at ffff888105926b00 [ 27.917288] which belongs to the cache kmalloc-64 of size 64 [ 27.917833] The buggy address is located 0 bytes to the right of [ 27.917833] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.918369] [ 27.918461] The buggy address belongs to the physical page: [ 27.918745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.919004] flags: 0x200000000000000(node=0|zone=2) [ 27.919162] page_type: f5(slab) [ 27.919278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.919502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.919754] page dumped because: kasan: bad access detected [ 27.920017] [ 27.920111] Memory state around the buggy address: [ 27.920405] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.920838] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.921206] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.921520] ^ [ 27.921815] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.922161] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.922504] ================================================================== [ 27.429457] ================================================================== [ 27.430092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 27.430547] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.431161] [ 27.431400] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.431548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.431569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.431595] Call Trace: [ 27.431615] <TASK> [ 27.431636] dump_stack_lvl+0x73/0xb0 [ 27.431673] print_report+0xd1/0x610 [ 27.431703] ? __virt_addr_valid+0x1db/0x2d0 [ 27.431733] ? kasan_atomics_helper+0x164f/0x5450 [ 27.431761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.431795] ? kasan_atomics_helper+0x164f/0x5450 [ 27.431824] kasan_report+0x141/0x180 [ 27.431854] ? kasan_atomics_helper+0x164f/0x5450 [ 27.431889] kasan_check_range+0x10c/0x1c0 [ 27.431920] __kasan_check_write+0x18/0x20 [ 27.431951] kasan_atomics_helper+0x164f/0x5450 [ 27.431982] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.432012] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.432045] ? kasan_atomics+0x152/0x310 [ 27.432080] kasan_atomics+0x1dc/0x310 [ 27.432109] ? __pfx_kasan_atomics+0x10/0x10 [ 27.432141] ? __pfx_read_tsc+0x10/0x10 [ 27.432169] ? ktime_get_ts64+0x86/0x230 [ 27.432201] kunit_try_run_case+0x1a5/0x480 [ 27.432232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.432261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.432291] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.432321] ? __kthread_parkme+0x82/0x180 [ 27.432348] ? preempt_count_sub+0x50/0x80 [ 27.432380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.432410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.432444] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.432478] kthread+0x337/0x6f0 [ 27.432505] ? trace_preempt_on+0x20/0xc0 [ 27.432546] ? __pfx_kthread+0x10/0x10 [ 27.432574] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.432606] ? calculate_sigpending+0x7b/0xa0 [ 27.432638] ? __pfx_kthread+0x10/0x10 [ 27.432666] ret_from_fork+0x116/0x1d0 [ 27.432693] ? __pfx_kthread+0x10/0x10 [ 27.432721] ret_from_fork_asm+0x1a/0x30 [ 27.432763] </TASK> [ 27.432777] [ 27.443165] Allocated by task 313: [ 27.443339] kasan_save_stack+0x45/0x70 [ 27.443682] kasan_save_track+0x18/0x40 [ 27.443865] kasan_save_alloc_info+0x3b/0x50 [ 27.444224] __kasan_kmalloc+0xb7/0xc0 [ 27.444492] __kmalloc_cache_noprof+0x189/0x420 [ 27.444807] kasan_atomics+0x95/0x310 [ 27.445083] kunit_try_run_case+0x1a5/0x480 [ 27.445253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.445680] kthread+0x337/0x6f0 [ 27.446002] ret_from_fork+0x116/0x1d0 [ 27.446292] ret_from_fork_asm+0x1a/0x30 [ 27.446517] [ 27.446611] The buggy address belongs to the object at ffff888105926b00 [ 27.446611] which belongs to the cache kmalloc-64 of size 64 [ 27.447269] The buggy address is located 0 bytes to the right of [ 27.447269] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.448052] [ 27.448139] The buggy address belongs to the physical page: [ 27.448548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.448960] flags: 0x200000000000000(node=0|zone=2) [ 27.449263] page_type: f5(slab) [ 27.449396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.449867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.450274] page dumped because: kasan: bad access detected [ 27.450539] [ 27.450615] Memory state around the buggy address: [ 27.451007] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.451329] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.451801] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.452199] ^ [ 27.452402] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.452962] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.453342] ================================================================== [ 27.853186] ================================================================== [ 27.853490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 27.853860] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.854163] [ 27.854256] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.854307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.854323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.854348] Call Trace: [ 27.854368] <TASK> [ 27.854385] dump_stack_lvl+0x73/0xb0 [ 27.854419] print_report+0xd1/0x610 [ 27.854449] ? __virt_addr_valid+0x1db/0x2d0 [ 27.854486] ? kasan_atomics_helper+0x218a/0x5450 [ 27.854516] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.854560] ? kasan_atomics_helper+0x218a/0x5450 [ 27.854590] kasan_report+0x141/0x180 [ 27.854639] ? kasan_atomics_helper+0x218a/0x5450 [ 27.854675] kasan_check_range+0x10c/0x1c0 [ 27.854706] __kasan_check_write+0x18/0x20 [ 27.854737] kasan_atomics_helper+0x218a/0x5450 [ 27.854767] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.854796] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.854828] ? kasan_atomics+0x152/0x310 [ 27.854864] kasan_atomics+0x1dc/0x310 [ 27.854894] ? __pfx_kasan_atomics+0x10/0x10 [ 27.854926] ? __pfx_read_tsc+0x10/0x10 [ 27.854954] ? ktime_get_ts64+0x86/0x230 [ 27.854987] kunit_try_run_case+0x1a5/0x480 [ 27.855017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.855046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.855075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.855106] ? __kthread_parkme+0x82/0x180 [ 27.855133] ? preempt_count_sub+0x50/0x80 [ 27.855165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.855196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.855230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.855264] kthread+0x337/0x6f0 [ 27.855290] ? trace_preempt_on+0x20/0xc0 [ 27.855320] ? __pfx_kthread+0x10/0x10 [ 27.855349] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.855381] ? calculate_sigpending+0x7b/0xa0 [ 27.855412] ? __pfx_kthread+0x10/0x10 [ 27.855441] ret_from_fork+0x116/0x1d0 [ 27.855467] ? __pfx_kthread+0x10/0x10 [ 27.855496] ret_from_fork_asm+0x1a/0x30 [ 27.855547] </TASK> [ 27.855561] [ 27.862458] Allocated by task 313: [ 27.862674] kasan_save_stack+0x45/0x70 [ 27.862876] kasan_save_track+0x18/0x40 [ 27.863073] kasan_save_alloc_info+0x3b/0x50 [ 27.863288] __kasan_kmalloc+0xb7/0xc0 [ 27.863480] __kmalloc_cache_noprof+0x189/0x420 [ 27.863722] kasan_atomics+0x95/0x310 [ 27.863861] kunit_try_run_case+0x1a5/0x480 [ 27.864010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.864191] kthread+0x337/0x6f0 [ 27.864316] ret_from_fork+0x116/0x1d0 [ 27.864451] ret_from_fork_asm+0x1a/0x30 [ 27.864659] [ 27.864752] The buggy address belongs to the object at ffff888105926b00 [ 27.864752] which belongs to the cache kmalloc-64 of size 64 [ 27.865275] The buggy address is located 0 bytes to the right of [ 27.865275] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.865859] [ 27.865954] The buggy address belongs to the physical page: [ 27.866203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.866546] flags: 0x200000000000000(node=0|zone=2) [ 27.866732] page_type: f5(slab) [ 27.866854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.867137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.867477] page dumped because: kasan: bad access detected [ 27.867762] [ 27.867856] Memory state around the buggy address: [ 27.868081] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.868376] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.868618] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.868832] ^ [ 27.868988] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.869307] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.869653] ================================================================== [ 27.390210] ================================================================== [ 27.390594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 27.390925] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.391250] [ 27.391360] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.391415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.391442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.391469] Call Trace: [ 27.391484] <TASK> [ 27.391501] dump_stack_lvl+0x73/0xb0 [ 27.391544] print_report+0xd1/0x610 [ 27.391574] ? __virt_addr_valid+0x1db/0x2d0 [ 27.391613] ? kasan_atomics_helper+0x151d/0x5450 [ 27.391642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.391687] ? kasan_atomics_helper+0x151d/0x5450 [ 27.391716] kasan_report+0x141/0x180 [ 27.391771] ? kasan_atomics_helper+0x151d/0x5450 [ 27.391807] kasan_check_range+0x10c/0x1c0 [ 27.391839] __kasan_check_write+0x18/0x20 [ 27.391869] kasan_atomics_helper+0x151d/0x5450 [ 27.391900] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.391931] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.391963] ? kasan_atomics+0x152/0x310 [ 27.391998] kasan_atomics+0x1dc/0x310 [ 27.392028] ? __pfx_kasan_atomics+0x10/0x10 [ 27.392060] ? __pfx_read_tsc+0x10/0x10 [ 27.392088] ? ktime_get_ts64+0x86/0x230 [ 27.392120] kunit_try_run_case+0x1a5/0x480 [ 27.392160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.392188] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.392218] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.392259] ? __kthread_parkme+0x82/0x180 [ 27.392287] ? preempt_count_sub+0x50/0x80 [ 27.392318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.392348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.392381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.392414] kthread+0x337/0x6f0 [ 27.392440] ? trace_preempt_on+0x20/0xc0 [ 27.392470] ? __pfx_kthread+0x10/0x10 [ 27.392499] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.392539] ? calculate_sigpending+0x7b/0xa0 [ 27.392570] ? __pfx_kthread+0x10/0x10 [ 27.392599] ret_from_fork+0x116/0x1d0 [ 27.392633] ? __pfx_kthread+0x10/0x10 [ 27.392661] ret_from_fork_asm+0x1a/0x30 [ 27.392704] </TASK> [ 27.392717] [ 27.400451] Allocated by task 313: [ 27.400672] kasan_save_stack+0x45/0x70 [ 27.400853] kasan_save_track+0x18/0x40 [ 27.401060] kasan_save_alloc_info+0x3b/0x50 [ 27.401251] __kasan_kmalloc+0xb7/0xc0 [ 27.401446] __kmalloc_cache_noprof+0x189/0x420 [ 27.401715] kasan_atomics+0x95/0x310 [ 27.401889] kunit_try_run_case+0x1a5/0x480 [ 27.402129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.402363] kthread+0x337/0x6f0 [ 27.402552] ret_from_fork+0x116/0x1d0 [ 27.402820] ret_from_fork_asm+0x1a/0x30 [ 27.403044] [ 27.403115] The buggy address belongs to the object at ffff888105926b00 [ 27.403115] which belongs to the cache kmalloc-64 of size 64 [ 27.403609] The buggy address is located 0 bytes to the right of [ 27.403609] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.404123] [ 27.404194] The buggy address belongs to the physical page: [ 27.404446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.404855] flags: 0x200000000000000(node=0|zone=2) [ 27.405055] page_type: f5(slab) [ 27.405198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.405468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.405809] page dumped because: kasan: bad access detected [ 27.406061] [ 27.406157] Memory state around the buggy address: [ 27.406378] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.406685] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.406902] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.407115] ^ [ 27.407270] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.407705] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.408021] ================================================================== [ 26.535344] ================================================================== [ 26.536268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 26.537087] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.537907] [ 26.538247] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.538415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.538432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.538457] Call Trace: [ 26.538481] <TASK> [ 26.538499] dump_stack_lvl+0x73/0xb0 [ 26.538551] print_report+0xd1/0x610 [ 26.538596] ? __virt_addr_valid+0x1db/0x2d0 [ 26.538654] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.538682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.538713] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.538741] kasan_report+0x141/0x180 [ 26.538770] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.538803] __asan_report_load4_noabort+0x18/0x20 [ 26.538833] kasan_atomics_helper+0x4bbc/0x5450 [ 26.538861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.538889] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.538920] ? kasan_atomics+0x152/0x310 [ 26.538954] kasan_atomics+0x1dc/0x310 [ 26.538982] ? __pfx_kasan_atomics+0x10/0x10 [ 26.539012] ? __pfx_read_tsc+0x10/0x10 [ 26.539039] ? ktime_get_ts64+0x86/0x230 [ 26.539072] kunit_try_run_case+0x1a5/0x480 [ 26.539102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.539128] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.539157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.539185] ? __kthread_parkme+0x82/0x180 [ 26.539212] ? preempt_count_sub+0x50/0x80 [ 26.539244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.539272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.539305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.539338] kthread+0x337/0x6f0 [ 26.539363] ? trace_preempt_on+0x20/0xc0 [ 26.539392] ? __pfx_kthread+0x10/0x10 [ 26.539419] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.539450] ? calculate_sigpending+0x7b/0xa0 [ 26.539480] ? __pfx_kthread+0x10/0x10 [ 26.539508] ret_from_fork+0x116/0x1d0 [ 26.539543] ? __pfx_kthread+0x10/0x10 [ 26.539570] ret_from_fork_asm+0x1a/0x30 [ 26.539617] </TASK> [ 26.539629] [ 26.557135] Allocated by task 313: [ 26.557616] kasan_save_stack+0x45/0x70 [ 26.557795] kasan_save_track+0x18/0x40 [ 26.558253] kasan_save_alloc_info+0x3b/0x50 [ 26.558750] __kasan_kmalloc+0xb7/0xc0 [ 26.559144] __kmalloc_cache_noprof+0x189/0x420 [ 26.559399] kasan_atomics+0x95/0x310 [ 26.559547] kunit_try_run_case+0x1a5/0x480 [ 26.560029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.560547] kthread+0x337/0x6f0 [ 26.560910] ret_from_fork+0x116/0x1d0 [ 26.561336] ret_from_fork_asm+0x1a/0x30 [ 26.561484] [ 26.561569] The buggy address belongs to the object at ffff888105926b00 [ 26.561569] which belongs to the cache kmalloc-64 of size 64 [ 26.563009] The buggy address is located 0 bytes to the right of [ 26.563009] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.563418] [ 26.563490] The buggy address belongs to the physical page: [ 26.563978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.564888] flags: 0x200000000000000(node=0|zone=2) [ 26.565348] page_type: f5(slab) [ 26.565700] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.566246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.566487] page dumped because: kasan: bad access detected [ 26.566701] [ 26.566770] Memory state around the buggy address: [ 26.567114] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.567386] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.567833] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.568101] ^ [ 26.568427] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.568719] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.569349] ================================================================== [ 26.625205] ================================================================== [ 26.625515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 26.625800] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.626298] [ 26.626425] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.626494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.626510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.626552] Call Trace: [ 26.626569] <TASK> [ 26.626587] dump_stack_lvl+0x73/0xb0 [ 26.626686] print_report+0xd1/0x610 [ 26.626718] ? __virt_addr_valid+0x1db/0x2d0 [ 26.626759] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.626788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.626834] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.626863] kasan_report+0x141/0x180 [ 26.626893] ? kasan_atomics_helper+0x4b6e/0x5450 [ 26.626929] __asan_report_store4_noabort+0x1b/0x30 [ 26.626961] kasan_atomics_helper+0x4b6e/0x5450 [ 26.626991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.627020] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.627052] ? kasan_atomics+0x152/0x310 [ 26.627097] kasan_atomics+0x1dc/0x310 [ 26.627127] ? __pfx_kasan_atomics+0x10/0x10 [ 26.627172] ? __pfx_read_tsc+0x10/0x10 [ 26.627200] ? ktime_get_ts64+0x86/0x230 [ 26.627233] kunit_try_run_case+0x1a5/0x480 [ 26.627272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.627301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.627341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.627371] ? __kthread_parkme+0x82/0x180 [ 26.627398] ? preempt_count_sub+0x50/0x80 [ 26.627431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.627462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.627496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.627541] kthread+0x337/0x6f0 [ 26.627568] ? trace_preempt_on+0x20/0xc0 [ 26.627598] ? __pfx_kthread+0x10/0x10 [ 26.627698] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.627733] ? calculate_sigpending+0x7b/0xa0 [ 26.627765] ? __pfx_kthread+0x10/0x10 [ 26.627794] ret_from_fork+0x116/0x1d0 [ 26.627821] ? __pfx_kthread+0x10/0x10 [ 26.627850] ret_from_fork_asm+0x1a/0x30 [ 26.627892] </TASK> [ 26.627906] [ 26.636277] Allocated by task 313: [ 26.636409] kasan_save_stack+0x45/0x70 [ 26.636638] kasan_save_track+0x18/0x40 [ 26.636918] kasan_save_alloc_info+0x3b/0x50 [ 26.637170] __kasan_kmalloc+0xb7/0xc0 [ 26.637341] __kmalloc_cache_noprof+0x189/0x420 [ 26.637587] kasan_atomics+0x95/0x310 [ 26.637761] kunit_try_run_case+0x1a5/0x480 [ 26.638026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.638275] kthread+0x337/0x6f0 [ 26.638456] ret_from_fork+0x116/0x1d0 [ 26.638732] ret_from_fork_asm+0x1a/0x30 [ 26.638943] [ 26.639015] The buggy address belongs to the object at ffff888105926b00 [ 26.639015] which belongs to the cache kmalloc-64 of size 64 [ 26.639370] The buggy address is located 0 bytes to the right of [ 26.639370] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.639950] [ 26.640045] The buggy address belongs to the physical page: [ 26.640301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.640742] flags: 0x200000000000000(node=0|zone=2) [ 26.640978] page_type: f5(slab) [ 26.641102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.641337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.641697] page dumped because: kasan: bad access detected [ 26.642324] [ 26.642427] Memory state around the buggy address: [ 26.642769] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.642990] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.643401] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.643806] ^ [ 26.644005] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.644303] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.644652] ================================================================== [ 26.750926] ================================================================== [ 26.751259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 26.751659] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.752004] [ 26.752131] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.752197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.752213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.752240] Call Trace: [ 26.752271] <TASK> [ 26.752291] dump_stack_lvl+0x73/0xb0 [ 26.752327] print_report+0xd1/0x610 [ 26.752357] ? __virt_addr_valid+0x1db/0x2d0 [ 26.752388] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.752416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.752448] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.752478] kasan_report+0x141/0x180 [ 26.752507] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.752552] kasan_check_range+0x10c/0x1c0 [ 26.752643] __kasan_check_write+0x18/0x20 [ 26.752677] kasan_atomics_helper+0x5fe/0x5450 [ 26.752727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.752757] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.752790] ? kasan_atomics+0x152/0x310 [ 26.752834] kasan_atomics+0x1dc/0x310 [ 26.752864] ? __pfx_kasan_atomics+0x10/0x10 [ 26.752907] ? __pfx_read_tsc+0x10/0x10 [ 26.752937] ? ktime_get_ts64+0x86/0x230 [ 26.752981] kunit_try_run_case+0x1a5/0x480 [ 26.753013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.753048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.753092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.753125] ? __kthread_parkme+0x82/0x180 [ 26.753163] ? preempt_count_sub+0x50/0x80 [ 26.753196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.753227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.753264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.753308] kthread+0x337/0x6f0 [ 26.753336] ? trace_preempt_on+0x20/0xc0 [ 26.753378] ? __pfx_kthread+0x10/0x10 [ 26.753407] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.753440] ? calculate_sigpending+0x7b/0xa0 [ 26.753472] ? __pfx_kthread+0x10/0x10 [ 26.753504] ret_from_fork+0x116/0x1d0 [ 26.753539] ? __pfx_kthread+0x10/0x10 [ 26.753568] ret_from_fork_asm+0x1a/0x30 [ 26.753658] </TASK> [ 26.753673] [ 26.762062] Allocated by task 313: [ 26.762200] kasan_save_stack+0x45/0x70 [ 26.762353] kasan_save_track+0x18/0x40 [ 26.762522] kasan_save_alloc_info+0x3b/0x50 [ 26.762808] __kasan_kmalloc+0xb7/0xc0 [ 26.763023] __kmalloc_cache_noprof+0x189/0x420 [ 26.763251] kasan_atomics+0x95/0x310 [ 26.763469] kunit_try_run_case+0x1a5/0x480 [ 26.763833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.764149] kthread+0x337/0x6f0 [ 26.764320] ret_from_fork+0x116/0x1d0 [ 26.764516] ret_from_fork_asm+0x1a/0x30 [ 26.764863] [ 26.764965] The buggy address belongs to the object at ffff888105926b00 [ 26.764965] which belongs to the cache kmalloc-64 of size 64 [ 26.765471] The buggy address is located 0 bytes to the right of [ 26.765471] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.766085] [ 26.766167] The buggy address belongs to the physical page: [ 26.766350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.766850] flags: 0x200000000000000(node=0|zone=2) [ 26.767086] page_type: f5(slab) [ 26.767253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.767488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.767929] page dumped because: kasan: bad access detected [ 26.768219] [ 26.768327] Memory state around the buggy address: [ 26.768510] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.768740] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.769141] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.769488] ^ [ 26.769720] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.770067] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.770353] ================================================================== [ 27.622213] ================================================================== [ 27.623063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 27.623780] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.624419] [ 27.624560] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.624626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.624641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.624666] Call Trace: [ 27.624682] <TASK> [ 27.624700] dump_stack_lvl+0x73/0xb0 [ 27.624734] print_report+0xd1/0x610 [ 27.624765] ? __virt_addr_valid+0x1db/0x2d0 [ 27.624794] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.624822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.624857] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.624887] kasan_report+0x141/0x180 [ 27.624917] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.624951] kasan_check_range+0x10c/0x1c0 [ 27.624982] __kasan_check_write+0x18/0x20 [ 27.625012] kasan_atomics_helper+0x1c18/0x5450 [ 27.625043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.625072] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.625104] ? kasan_atomics+0x152/0x310 [ 27.625137] kasan_atomics+0x1dc/0x310 [ 27.625167] ? __pfx_kasan_atomics+0x10/0x10 [ 27.625198] ? __pfx_read_tsc+0x10/0x10 [ 27.625226] ? ktime_get_ts64+0x86/0x230 [ 27.625258] kunit_try_run_case+0x1a5/0x480 [ 27.625288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.625317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.625346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.625375] ? __kthread_parkme+0x82/0x180 [ 27.625402] ? preempt_count_sub+0x50/0x80 [ 27.625434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.625463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.625496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.625542] kthread+0x337/0x6f0 [ 27.625569] ? trace_preempt_on+0x20/0xc0 [ 27.625598] ? __pfx_kthread+0x10/0x10 [ 27.625634] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.625666] ? calculate_sigpending+0x7b/0xa0 [ 27.625697] ? __pfx_kthread+0x10/0x10 [ 27.625725] ret_from_fork+0x116/0x1d0 [ 27.625751] ? __pfx_kthread+0x10/0x10 [ 27.625779] ret_from_fork_asm+0x1a/0x30 [ 27.625821] </TASK> [ 27.625834] [ 27.635643] Allocated by task 313: [ 27.635824] kasan_save_stack+0x45/0x70 [ 27.636029] kasan_save_track+0x18/0x40 [ 27.636230] kasan_save_alloc_info+0x3b/0x50 [ 27.636477] __kasan_kmalloc+0xb7/0xc0 [ 27.636672] __kmalloc_cache_noprof+0x189/0x420 [ 27.636833] kasan_atomics+0x95/0x310 [ 27.636971] kunit_try_run_case+0x1a5/0x480 [ 27.637177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.637460] kthread+0x337/0x6f0 [ 27.637756] ret_from_fork+0x116/0x1d0 [ 27.637911] ret_from_fork_asm+0x1a/0x30 [ 27.638057] [ 27.638126] The buggy address belongs to the object at ffff888105926b00 [ 27.638126] which belongs to the cache kmalloc-64 of size 64 [ 27.638681] The buggy address is located 0 bytes to the right of [ 27.638681] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.639158] [ 27.639253] The buggy address belongs to the physical page: [ 27.639479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.639964] flags: 0x200000000000000(node=0|zone=2) [ 27.640127] page_type: f5(slab) [ 27.640290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.640663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.640942] page dumped because: kasan: bad access detected [ 27.641114] [ 27.641208] Memory state around the buggy address: [ 27.641428] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.641743] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.641960] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.642459] ^ [ 27.642766] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.642989] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.643233] ================================================================== [ 27.802097] ================================================================== [ 27.802431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 27.802739] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.802968] [ 27.803076] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.803128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.803144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.803169] Call Trace: [ 27.803184] <TASK> [ 27.803202] dump_stack_lvl+0x73/0xb0 [ 27.803236] print_report+0xd1/0x610 [ 27.803265] ? __virt_addr_valid+0x1db/0x2d0 [ 27.803296] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.803324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.803357] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.803387] kasan_report+0x141/0x180 [ 27.803417] ? kasan_atomics_helper+0x4f98/0x5450 [ 27.803453] __asan_report_load8_noabort+0x18/0x20 [ 27.803484] kasan_atomics_helper+0x4f98/0x5450 [ 27.803515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.803556] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.803589] ? kasan_atomics+0x152/0x310 [ 27.803644] kasan_atomics+0x1dc/0x310 [ 27.803675] ? __pfx_kasan_atomics+0x10/0x10 [ 27.803708] ? __pfx_read_tsc+0x10/0x10 [ 27.803736] ? ktime_get_ts64+0x86/0x230 [ 27.803769] kunit_try_run_case+0x1a5/0x480 [ 27.803800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.803830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.803861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.803891] ? __kthread_parkme+0x82/0x180 [ 27.803918] ? preempt_count_sub+0x50/0x80 [ 27.803950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.803982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.804016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.804049] kthread+0x337/0x6f0 [ 27.804075] ? trace_preempt_on+0x20/0xc0 [ 27.804104] ? __pfx_kthread+0x10/0x10 [ 27.804132] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.804164] ? calculate_sigpending+0x7b/0xa0 [ 27.804195] ? __pfx_kthread+0x10/0x10 [ 27.804225] ret_from_fork+0x116/0x1d0 [ 27.804251] ? __pfx_kthread+0x10/0x10 [ 27.804279] ret_from_fork_asm+0x1a/0x30 [ 27.804320] </TASK> [ 27.804334] [ 27.811385] Allocated by task 313: [ 27.811569] kasan_save_stack+0x45/0x70 [ 27.811789] kasan_save_track+0x18/0x40 [ 27.811977] kasan_save_alloc_info+0x3b/0x50 [ 27.812128] __kasan_kmalloc+0xb7/0xc0 [ 27.812301] __kmalloc_cache_noprof+0x189/0x420 [ 27.812540] kasan_atomics+0x95/0x310 [ 27.812764] kunit_try_run_case+0x1a5/0x480 [ 27.812975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.813186] kthread+0x337/0x6f0 [ 27.813336] ret_from_fork+0x116/0x1d0 [ 27.813539] ret_from_fork_asm+0x1a/0x30 [ 27.813728] [ 27.813800] The buggy address belongs to the object at ffff888105926b00 [ 27.813800] which belongs to the cache kmalloc-64 of size 64 [ 27.814153] The buggy address is located 0 bytes to the right of [ 27.814153] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.814537] [ 27.814626] The buggy address belongs to the physical page: [ 27.814833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.815191] flags: 0x200000000000000(node=0|zone=2) [ 27.815425] page_type: f5(slab) [ 27.815617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.815958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.816290] page dumped because: kasan: bad access detected [ 27.816550] [ 27.816669] Memory state around the buggy address: [ 27.816890] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.817201] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.817417] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.817663] ^ [ 27.817821] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.818122] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.818447] ================================================================== [ 27.661315] ================================================================== [ 27.661697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 27.661939] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.662165] [ 27.662247] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.662298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.662314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.662339] Call Trace: [ 27.662355] <TASK> [ 27.662374] dump_stack_lvl+0x73/0xb0 [ 27.662408] print_report+0xd1/0x610 [ 27.662438] ? __virt_addr_valid+0x1db/0x2d0 [ 27.662467] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.662503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.662547] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.662577] kasan_report+0x141/0x180 [ 27.662607] ? kasan_atomics_helper+0x1ce1/0x5450 [ 27.662641] kasan_check_range+0x10c/0x1c0 [ 27.662672] __kasan_check_write+0x18/0x20 [ 27.662702] kasan_atomics_helper+0x1ce1/0x5450 [ 27.662732] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.662761] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.662793] ? kasan_atomics+0x152/0x310 [ 27.662828] kasan_atomics+0x1dc/0x310 [ 27.662857] ? __pfx_kasan_atomics+0x10/0x10 [ 27.662889] ? __pfx_read_tsc+0x10/0x10 [ 27.662916] ? ktime_get_ts64+0x86/0x230 [ 27.662949] kunit_try_run_case+0x1a5/0x480 [ 27.662980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.663008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.663038] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.663067] ? __kthread_parkme+0x82/0x180 [ 27.663094] ? preempt_count_sub+0x50/0x80 [ 27.663125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.663156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.663189] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.663223] kthread+0x337/0x6f0 [ 27.663248] ? trace_preempt_on+0x20/0xc0 [ 27.663279] ? __pfx_kthread+0x10/0x10 [ 27.663307] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.663337] ? calculate_sigpending+0x7b/0xa0 [ 27.663369] ? __pfx_kthread+0x10/0x10 [ 27.663398] ret_from_fork+0x116/0x1d0 [ 27.663424] ? __pfx_kthread+0x10/0x10 [ 27.663451] ret_from_fork_asm+0x1a/0x30 [ 27.663493] </TASK> [ 27.663506] [ 27.671382] Allocated by task 313: [ 27.671571] kasan_save_stack+0x45/0x70 [ 27.671783] kasan_save_track+0x18/0x40 [ 27.671980] kasan_save_alloc_info+0x3b/0x50 [ 27.672206] __kasan_kmalloc+0xb7/0xc0 [ 27.672396] __kmalloc_cache_noprof+0x189/0x420 [ 27.672594] kasan_atomics+0x95/0x310 [ 27.672788] kunit_try_run_case+0x1a5/0x480 [ 27.672971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.673191] kthread+0x337/0x6f0 [ 27.673345] ret_from_fork+0x116/0x1d0 [ 27.673514] ret_from_fork_asm+0x1a/0x30 [ 27.673726] [ 27.673797] The buggy address belongs to the object at ffff888105926b00 [ 27.673797] which belongs to the cache kmalloc-64 of size 64 [ 27.674147] The buggy address is located 0 bytes to the right of [ 27.674147] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.674517] [ 27.674617] The buggy address belongs to the physical page: [ 27.674874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.675243] flags: 0x200000000000000(node=0|zone=2) [ 27.675477] page_type: f5(slab) [ 27.675651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.675991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.676301] page dumped because: kasan: bad access detected [ 27.676483] [ 27.676560] Memory state around the buggy address: [ 27.676716] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.677248] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.677582] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.678184] ^ [ 27.678342] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.678572] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.678904] ================================================================== [ 27.115319] ================================================================== [ 27.115687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 27.116269] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.116525] [ 27.116620] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.116692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.116722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.116760] Call Trace: [ 27.116779] <TASK> [ 27.116810] dump_stack_lvl+0x73/0xb0 [ 27.116859] print_report+0xd1/0x610 [ 27.116889] ? __virt_addr_valid+0x1db/0x2d0 [ 27.116921] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.116950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.116984] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.117013] kasan_report+0x141/0x180 [ 27.117044] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.117080] __asan_report_load4_noabort+0x18/0x20 [ 27.117111] kasan_atomics_helper+0x4a36/0x5450 [ 27.117141] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.117171] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.117203] ? kasan_atomics+0x152/0x310 [ 27.117237] kasan_atomics+0x1dc/0x310 [ 27.117267] ? __pfx_kasan_atomics+0x10/0x10 [ 27.117298] ? __pfx_read_tsc+0x10/0x10 [ 27.117326] ? ktime_get_ts64+0x86/0x230 [ 27.117359] kunit_try_run_case+0x1a5/0x480 [ 27.117388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.117416] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.117447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.117477] ? __kthread_parkme+0x82/0x180 [ 27.117505] ? preempt_count_sub+0x50/0x80 [ 27.117546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.117577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.117610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.117678] kthread+0x337/0x6f0 [ 27.117705] ? trace_preempt_on+0x20/0xc0 [ 27.117737] ? __pfx_kthread+0x10/0x10 [ 27.117765] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.117797] ? calculate_sigpending+0x7b/0xa0 [ 27.117829] ? __pfx_kthread+0x10/0x10 [ 27.117859] ret_from_fork+0x116/0x1d0 [ 27.117885] ? __pfx_kthread+0x10/0x10 [ 27.117913] ret_from_fork_asm+0x1a/0x30 [ 27.117956] </TASK> [ 27.117970] [ 27.125729] Allocated by task 313: [ 27.125938] kasan_save_stack+0x45/0x70 [ 27.126082] kasan_save_track+0x18/0x40 [ 27.126221] kasan_save_alloc_info+0x3b/0x50 [ 27.126482] __kasan_kmalloc+0xb7/0xc0 [ 27.126830] __kmalloc_cache_noprof+0x189/0x420 [ 27.127094] kasan_atomics+0x95/0x310 [ 27.127293] kunit_try_run_case+0x1a5/0x480 [ 27.127521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.127828] kthread+0x337/0x6f0 [ 27.128003] ret_from_fork+0x116/0x1d0 [ 27.128190] ret_from_fork_asm+0x1a/0x30 [ 27.128395] [ 27.128480] The buggy address belongs to the object at ffff888105926b00 [ 27.128480] which belongs to the cache kmalloc-64 of size 64 [ 27.129029] The buggy address is located 0 bytes to the right of [ 27.129029] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.129566] [ 27.129690] The buggy address belongs to the physical page: [ 27.129987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.130323] flags: 0x200000000000000(node=0|zone=2) [ 27.130548] page_type: f5(slab) [ 27.130837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.131097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.131449] page dumped because: kasan: bad access detected [ 27.131751] [ 27.131847] Memory state around the buggy address: [ 27.132072] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.132415] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.132732] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.133060] ^ [ 27.133294] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.133632] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.133950] ================================================================== [ 27.284678] ================================================================== [ 27.285014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 27.285350] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.285815] [ 27.285905] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.285957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.285972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.285996] Call Trace: [ 27.286011] <TASK> [ 27.286027] dump_stack_lvl+0x73/0xb0 [ 27.286063] print_report+0xd1/0x610 [ 27.286092] ? __virt_addr_valid+0x1db/0x2d0 [ 27.286122] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.286151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.286185] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.286213] kasan_report+0x141/0x180 [ 27.286243] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.286278] __asan_report_load4_noabort+0x18/0x20 [ 27.286310] kasan_atomics_helper+0x49ce/0x5450 [ 27.286339] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.286368] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.286401] ? kasan_atomics+0x152/0x310 [ 27.286436] kasan_atomics+0x1dc/0x310 [ 27.286465] ? __pfx_kasan_atomics+0x10/0x10 [ 27.286501] ? __pfx_read_tsc+0x10/0x10 [ 27.286541] ? ktime_get_ts64+0x86/0x230 [ 27.286574] kunit_try_run_case+0x1a5/0x480 [ 27.286604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.286633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.286661] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.286690] ? __kthread_parkme+0x82/0x180 [ 27.286717] ? preempt_count_sub+0x50/0x80 [ 27.286749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.286778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.286813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.286846] kthread+0x337/0x6f0 [ 27.286873] ? trace_preempt_on+0x20/0xc0 [ 27.286903] ? __pfx_kthread+0x10/0x10 [ 27.286931] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.286962] ? calculate_sigpending+0x7b/0xa0 [ 27.286993] ? __pfx_kthread+0x10/0x10 [ 27.287022] ret_from_fork+0x116/0x1d0 [ 27.287048] ? __pfx_kthread+0x10/0x10 [ 27.287075] ret_from_fork_asm+0x1a/0x30 [ 27.287118] </TASK> [ 27.287130] [ 27.300153] Allocated by task 313: [ 27.300361] kasan_save_stack+0x45/0x70 [ 27.300514] kasan_save_track+0x18/0x40 [ 27.300675] kasan_save_alloc_info+0x3b/0x50 [ 27.300829] __kasan_kmalloc+0xb7/0xc0 [ 27.301221] __kmalloc_cache_noprof+0x189/0x420 [ 27.301668] kasan_atomics+0x95/0x310 [ 27.302132] kunit_try_run_case+0x1a5/0x480 [ 27.302541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.303087] kthread+0x337/0x6f0 [ 27.303416] ret_from_fork+0x116/0x1d0 [ 27.303853] ret_from_fork_asm+0x1a/0x30 [ 27.304211] [ 27.304314] The buggy address belongs to the object at ffff888105926b00 [ 27.304314] which belongs to the cache kmalloc-64 of size 64 [ 27.304915] The buggy address is located 0 bytes to the right of [ 27.304915] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.305287] [ 27.305359] The buggy address belongs to the physical page: [ 27.305546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.306298] flags: 0x200000000000000(node=0|zone=2) [ 27.306808] page_type: f5(slab) [ 27.307120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.307800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.308570] page dumped because: kasan: bad access detected [ 27.308979] [ 27.309052] Memory state around the buggy address: [ 27.309210] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.309429] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.309677] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.309974] ^ [ 27.310222] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.310507] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.311019] ================================================================== [ 27.051904] ================================================================== [ 27.052543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 27.052915] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.053246] [ 27.053341] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.053395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.053411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.053436] Call Trace: [ 27.053452] <TASK> [ 27.053470] dump_stack_lvl+0x73/0xb0 [ 27.053505] print_report+0xd1/0x610 [ 27.053547] ? __virt_addr_valid+0x1db/0x2d0 [ 27.053577] ? kasan_atomics_helper+0xe78/0x5450 [ 27.053605] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.053961] ? kasan_atomics_helper+0xe78/0x5450 [ 27.053995] kasan_report+0x141/0x180 [ 27.054027] ? kasan_atomics_helper+0xe78/0x5450 [ 27.054062] kasan_check_range+0x10c/0x1c0 [ 27.054093] __kasan_check_write+0x18/0x20 [ 27.054123] kasan_atomics_helper+0xe78/0x5450 [ 27.054153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.054183] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.054215] ? kasan_atomics+0x152/0x310 [ 27.054250] kasan_atomics+0x1dc/0x310 [ 27.054280] ? __pfx_kasan_atomics+0x10/0x10 [ 27.054312] ? __pfx_read_tsc+0x10/0x10 [ 27.054340] ? ktime_get_ts64+0x86/0x230 [ 27.054372] kunit_try_run_case+0x1a5/0x480 [ 27.054403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.054432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.054463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.054505] ? __kthread_parkme+0x82/0x180 [ 27.054544] ? preempt_count_sub+0x50/0x80 [ 27.054577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.054607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.054650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.054685] kthread+0x337/0x6f0 [ 27.054711] ? trace_preempt_on+0x20/0xc0 [ 27.054741] ? __pfx_kthread+0x10/0x10 [ 27.054770] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.054802] ? calculate_sigpending+0x7b/0xa0 [ 27.054833] ? __pfx_kthread+0x10/0x10 [ 27.054862] ret_from_fork+0x116/0x1d0 [ 27.054889] ? __pfx_kthread+0x10/0x10 [ 27.054916] ret_from_fork_asm+0x1a/0x30 [ 27.054958] </TASK> [ 27.054972] [ 27.065241] Allocated by task 313: [ 27.065430] kasan_save_stack+0x45/0x70 [ 27.065800] kasan_save_track+0x18/0x40 [ 27.065983] kasan_save_alloc_info+0x3b/0x50 [ 27.066319] __kasan_kmalloc+0xb7/0xc0 [ 27.066618] __kmalloc_cache_noprof+0x189/0x420 [ 27.066884] kasan_atomics+0x95/0x310 [ 27.067177] kunit_try_run_case+0x1a5/0x480 [ 27.067400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.067849] kthread+0x337/0x6f0 [ 27.068096] ret_from_fork+0x116/0x1d0 [ 27.068303] ret_from_fork_asm+0x1a/0x30 [ 27.068626] [ 27.068768] The buggy address belongs to the object at ffff888105926b00 [ 27.068768] which belongs to the cache kmalloc-64 of size 64 [ 27.069438] The buggy address is located 0 bytes to the right of [ 27.069438] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.070169] [ 27.070278] The buggy address belongs to the physical page: [ 27.070650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.071029] flags: 0x200000000000000(node=0|zone=2) [ 27.071254] page_type: f5(slab) [ 27.071411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.071964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.072359] page dumped because: kasan: bad access detected [ 27.072703] [ 27.072810] Memory state around the buggy address: [ 27.073147] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.073490] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.074002] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.074396] ^ [ 27.074716] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.075123] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.075430] ================================================================== [ 27.836219] ================================================================== [ 27.836461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 27.836856] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.837134] [ 27.837221] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.837274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.837289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.837315] Call Trace: [ 27.837331] <TASK> [ 27.837349] dump_stack_lvl+0x73/0xb0 [ 27.837385] print_report+0xd1/0x610 [ 27.837415] ? __virt_addr_valid+0x1db/0x2d0 [ 27.837446] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.837474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.837507] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.837546] kasan_report+0x141/0x180 [ 27.837577] ? kasan_atomics_helper+0x4fb2/0x5450 [ 27.837631] __asan_report_load8_noabort+0x18/0x20 [ 27.837663] kasan_atomics_helper+0x4fb2/0x5450 [ 27.837694] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.837723] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.837755] ? kasan_atomics+0x152/0x310 [ 27.837789] kasan_atomics+0x1dc/0x310 [ 27.837820] ? __pfx_kasan_atomics+0x10/0x10 [ 27.837852] ? __pfx_read_tsc+0x10/0x10 [ 27.837879] ? ktime_get_ts64+0x86/0x230 [ 27.837911] kunit_try_run_case+0x1a5/0x480 [ 27.837943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.837972] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.838001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.838032] ? __kthread_parkme+0x82/0x180 [ 27.838059] ? preempt_count_sub+0x50/0x80 [ 27.838091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.838121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.838155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.838188] kthread+0x337/0x6f0 [ 27.838215] ? trace_preempt_on+0x20/0xc0 [ 27.838246] ? __pfx_kthread+0x10/0x10 [ 27.838274] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.838305] ? calculate_sigpending+0x7b/0xa0 [ 27.838336] ? __pfx_kthread+0x10/0x10 [ 27.838366] ret_from_fork+0x116/0x1d0 [ 27.838391] ? __pfx_kthread+0x10/0x10 [ 27.838419] ret_from_fork_asm+0x1a/0x30 [ 27.838461] </TASK> [ 27.838481] [ 27.845599] Allocated by task 313: [ 27.845771] kasan_save_stack+0x45/0x70 [ 27.845974] kasan_save_track+0x18/0x40 [ 27.846120] kasan_save_alloc_info+0x3b/0x50 [ 27.846273] __kasan_kmalloc+0xb7/0xc0 [ 27.846408] __kmalloc_cache_noprof+0x189/0x420 [ 27.846580] kasan_atomics+0x95/0x310 [ 27.846735] kunit_try_run_case+0x1a5/0x480 [ 27.846885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.847066] kthread+0x337/0x6f0 [ 27.847231] ret_from_fork+0x116/0x1d0 [ 27.847420] ret_from_fork_asm+0x1a/0x30 [ 27.847654] [ 27.847746] The buggy address belongs to the object at ffff888105926b00 [ 27.847746] which belongs to the cache kmalloc-64 of size 64 [ 27.848272] The buggy address is located 0 bytes to the right of [ 27.848272] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.848854] [ 27.848952] The buggy address belongs to the physical page: [ 27.849202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.849489] flags: 0x200000000000000(node=0|zone=2) [ 27.849679] page_type: f5(slab) [ 27.849803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.850039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.850346] page dumped because: kasan: bad access detected [ 27.850620] [ 27.850718] Memory state around the buggy address: [ 27.850942] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.851263] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.851587] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.851867] ^ [ 27.852062] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.852329] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.852668] ================================================================== [ 27.784981] ================================================================== [ 27.785442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 27.785804] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.786180] [ 27.786266] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.786318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.786334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.786359] Call Trace: [ 27.786375] <TASK> [ 27.786390] dump_stack_lvl+0x73/0xb0 [ 27.786424] print_report+0xd1/0x610 [ 27.786453] ? __virt_addr_valid+0x1db/0x2d0 [ 27.786487] ? kasan_atomics_helper+0x2006/0x5450 [ 27.786516] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.786559] ? kasan_atomics_helper+0x2006/0x5450 [ 27.786588] kasan_report+0x141/0x180 [ 27.786638] ? kasan_atomics_helper+0x2006/0x5450 [ 27.786673] kasan_check_range+0x10c/0x1c0 [ 27.786705] __kasan_check_write+0x18/0x20 [ 27.786735] kasan_atomics_helper+0x2006/0x5450 [ 27.786766] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.786796] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.786829] ? kasan_atomics+0x152/0x310 [ 27.786864] kasan_atomics+0x1dc/0x310 [ 27.786896] ? __pfx_kasan_atomics+0x10/0x10 [ 27.786929] ? __pfx_read_tsc+0x10/0x10 [ 27.786957] ? ktime_get_ts64+0x86/0x230 [ 27.786990] kunit_try_run_case+0x1a5/0x480 [ 27.787021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.787050] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.787080] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.787112] ? __kthread_parkme+0x82/0x180 [ 27.787138] ? preempt_count_sub+0x50/0x80 [ 27.787169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.787199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.787232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.787266] kthread+0x337/0x6f0 [ 27.787292] ? trace_preempt_on+0x20/0xc0 [ 27.787321] ? __pfx_kthread+0x10/0x10 [ 27.787350] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.787380] ? calculate_sigpending+0x7b/0xa0 [ 27.787412] ? __pfx_kthread+0x10/0x10 [ 27.787441] ret_from_fork+0x116/0x1d0 [ 27.787468] ? __pfx_kthread+0x10/0x10 [ 27.787495] ret_from_fork_asm+0x1a/0x30 [ 27.787544] </TASK> [ 27.787558] [ 27.794526] Allocated by task 313: [ 27.794713] kasan_save_stack+0x45/0x70 [ 27.794914] kasan_save_track+0x18/0x40 [ 27.795081] kasan_save_alloc_info+0x3b/0x50 [ 27.795263] __kasan_kmalloc+0xb7/0xc0 [ 27.795460] __kmalloc_cache_noprof+0x189/0x420 [ 27.795690] kasan_atomics+0x95/0x310 [ 27.795861] kunit_try_run_case+0x1a5/0x480 [ 27.796068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.796282] kthread+0x337/0x6f0 [ 27.796456] ret_from_fork+0x116/0x1d0 [ 27.796620] ret_from_fork_asm+0x1a/0x30 [ 27.796789] [ 27.796881] The buggy address belongs to the object at ffff888105926b00 [ 27.796881] which belongs to the cache kmalloc-64 of size 64 [ 27.797332] The buggy address is located 0 bytes to the right of [ 27.797332] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.797882] [ 27.797980] The buggy address belongs to the physical page: [ 27.798215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.798494] flags: 0x200000000000000(node=0|zone=2) [ 27.798760] page_type: f5(slab) [ 27.798903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.799221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.799499] page dumped because: kasan: bad access detected [ 27.799702] [ 27.799772] Memory state around the buggy address: [ 27.799928] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.800144] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.800429] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.800772] ^ [ 27.800997] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.801312] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.801665] ================================================================== [ 26.730780] ================================================================== [ 26.731131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 26.731579] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.732028] [ 26.732155] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.732221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.732239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.732264] Call Trace: [ 26.732281] <TASK> [ 26.732299] dump_stack_lvl+0x73/0xb0 [ 26.732344] print_report+0xd1/0x610 [ 26.732374] ? __virt_addr_valid+0x1db/0x2d0 [ 26.732417] ? kasan_atomics_helper+0x565/0x5450 [ 26.732444] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.732477] ? kasan_atomics_helper+0x565/0x5450 [ 26.732506] kasan_report+0x141/0x180 [ 26.732546] ? kasan_atomics_helper+0x565/0x5450 [ 26.732582] kasan_check_range+0x10c/0x1c0 [ 26.732613] __kasan_check_write+0x18/0x20 [ 26.732643] kasan_atomics_helper+0x565/0x5450 [ 26.732672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.732702] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.732735] ? kasan_atomics+0x152/0x310 [ 26.732778] kasan_atomics+0x1dc/0x310 [ 26.732807] ? __pfx_kasan_atomics+0x10/0x10 [ 26.732849] ? __pfx_read_tsc+0x10/0x10 [ 26.732877] ? ktime_get_ts64+0x86/0x230 [ 26.732909] kunit_try_run_case+0x1a5/0x480 [ 26.732940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.732969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.732997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.733027] ? __kthread_parkme+0x82/0x180 [ 26.733054] ? preempt_count_sub+0x50/0x80 [ 26.733085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.733136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.733170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.733204] kthread+0x337/0x6f0 [ 26.733230] ? trace_preempt_on+0x20/0xc0 [ 26.733260] ? __pfx_kthread+0x10/0x10 [ 26.733345] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.733390] ? calculate_sigpending+0x7b/0xa0 [ 26.733431] ? __pfx_kthread+0x10/0x10 [ 26.733460] ret_from_fork+0x116/0x1d0 [ 26.733497] ? __pfx_kthread+0x10/0x10 [ 26.733534] ret_from_fork_asm+0x1a/0x30 [ 26.733577] </TASK> [ 26.733630] [ 26.741697] Allocated by task 313: [ 26.741886] kasan_save_stack+0x45/0x70 [ 26.742088] kasan_save_track+0x18/0x40 [ 26.742283] kasan_save_alloc_info+0x3b/0x50 [ 26.742493] __kasan_kmalloc+0xb7/0xc0 [ 26.742713] __kmalloc_cache_noprof+0x189/0x420 [ 26.742958] kasan_atomics+0x95/0x310 [ 26.743097] kunit_try_run_case+0x1a5/0x480 [ 26.743335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.743626] kthread+0x337/0x6f0 [ 26.743801] ret_from_fork+0x116/0x1d0 [ 26.743941] ret_from_fork_asm+0x1a/0x30 [ 26.744085] [ 26.744156] The buggy address belongs to the object at ffff888105926b00 [ 26.744156] which belongs to the cache kmalloc-64 of size 64 [ 26.744610] The buggy address is located 0 bytes to the right of [ 26.744610] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.745290] [ 26.745366] The buggy address belongs to the physical page: [ 26.745549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.745789] flags: 0x200000000000000(node=0|zone=2) [ 26.746169] page_type: f5(slab) [ 26.746578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.747061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.747455] page dumped because: kasan: bad access detected [ 26.747816] [ 26.747891] Memory state around the buggy address: [ 26.748053] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.748392] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.748949] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.749329] ^ [ 26.749566] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.750029] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.750336] ================================================================== [ 27.096779] ================================================================== [ 27.097077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 27.097410] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.098194] [ 27.098321] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.098376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.098408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.098434] Call Trace: [ 27.098454] <TASK> [ 27.098479] dump_stack_lvl+0x73/0xb0 [ 27.098516] print_report+0xd1/0x610 [ 27.098558] ? __virt_addr_valid+0x1db/0x2d0 [ 27.098589] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.098617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.098651] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.098680] kasan_report+0x141/0x180 [ 27.098711] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.098746] kasan_check_range+0x10c/0x1c0 [ 27.098777] __kasan_check_write+0x18/0x20 [ 27.098807] kasan_atomics_helper+0xfa9/0x5450 [ 27.098837] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.098868] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.098900] ? kasan_atomics+0x152/0x310 [ 27.098934] kasan_atomics+0x1dc/0x310 [ 27.098964] ? __pfx_kasan_atomics+0x10/0x10 [ 27.098995] ? __pfx_read_tsc+0x10/0x10 [ 27.099024] ? ktime_get_ts64+0x86/0x230 [ 27.099056] kunit_try_run_case+0x1a5/0x480 [ 27.099087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.099116] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.099146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.099176] ? __kthread_parkme+0x82/0x180 [ 27.099203] ? preempt_count_sub+0x50/0x80 [ 27.099236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.099267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.099301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.099334] kthread+0x337/0x6f0 [ 27.099361] ? trace_preempt_on+0x20/0xc0 [ 27.099391] ? __pfx_kthread+0x10/0x10 [ 27.099420] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.099451] ? calculate_sigpending+0x7b/0xa0 [ 27.099482] ? __pfx_kthread+0x10/0x10 [ 27.099511] ret_from_fork+0x116/0x1d0 [ 27.099546] ? __pfx_kthread+0x10/0x10 [ 27.099574] ret_from_fork_asm+0x1a/0x30 [ 27.099616] </TASK> [ 27.099631] [ 27.107057] Allocated by task 313: [ 27.107254] kasan_save_stack+0x45/0x70 [ 27.107478] kasan_save_track+0x18/0x40 [ 27.107766] kasan_save_alloc_info+0x3b/0x50 [ 27.107995] __kasan_kmalloc+0xb7/0xc0 [ 27.108174] __kmalloc_cache_noprof+0x189/0x420 [ 27.108346] kasan_atomics+0x95/0x310 [ 27.108479] kunit_try_run_case+0x1a5/0x480 [ 27.108753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.109027] kthread+0x337/0x6f0 [ 27.109196] ret_from_fork+0x116/0x1d0 [ 27.109388] ret_from_fork_asm+0x1a/0x30 [ 27.109626] [ 27.109700] The buggy address belongs to the object at ffff888105926b00 [ 27.109700] which belongs to the cache kmalloc-64 of size 64 [ 27.110065] The buggy address is located 0 bytes to the right of [ 27.110065] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.110467] [ 27.110591] The buggy address belongs to the physical page: [ 27.110862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.111420] flags: 0x200000000000000(node=0|zone=2) [ 27.111696] page_type: f5(slab) [ 27.111880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.112200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.112577] page dumped because: kasan: bad access detected [ 27.112823] [ 27.112914] Memory state around the buggy address: [ 27.113142] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.113419] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.113701] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.114021] ^ [ 27.114261] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.114591] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.114814] ================================================================== [ 27.716682] ================================================================== [ 27.716920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 27.720271] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.720601] [ 27.722157] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.722218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.722236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.722262] Call Trace: [ 27.722280] <TASK> [ 27.722301] dump_stack_lvl+0x73/0xb0 [ 27.722338] print_report+0xd1/0x610 [ 27.722368] ? __virt_addr_valid+0x1db/0x2d0 [ 27.722398] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.722426] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.722460] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.722496] kasan_report+0x141/0x180 [ 27.722526] ? kasan_atomics_helper+0x1eaa/0x5450 [ 27.722575] kasan_check_range+0x10c/0x1c0 [ 27.722888] __kasan_check_write+0x18/0x20 [ 27.722936] kasan_atomics_helper+0x1eaa/0x5450 [ 27.722972] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.723003] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.723038] ? kasan_atomics+0x152/0x310 [ 27.723075] kasan_atomics+0x1dc/0x310 [ 27.723107] ? __pfx_kasan_atomics+0x10/0x10 [ 27.723141] ? __pfx_read_tsc+0x10/0x10 [ 27.723168] ? ktime_get_ts64+0x86/0x230 [ 27.723202] kunit_try_run_case+0x1a5/0x480 [ 27.723232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.723260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.723291] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.723322] ? __kthread_parkme+0x82/0x180 [ 27.723350] ? preempt_count_sub+0x50/0x80 [ 27.723383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.723415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.723450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.723483] kthread+0x337/0x6f0 [ 27.723509] ? trace_preempt_on+0x20/0xc0 [ 27.723554] ? __pfx_kthread+0x10/0x10 [ 27.723582] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.723620] ? calculate_sigpending+0x7b/0xa0 [ 27.723651] ? __pfx_kthread+0x10/0x10 [ 27.723680] ret_from_fork+0x116/0x1d0 [ 27.723706] ? __pfx_kthread+0x10/0x10 [ 27.723734] ret_from_fork_asm+0x1a/0x30 [ 27.723775] </TASK> [ 27.723789] [ 27.735822] Allocated by task 313: [ 27.736021] kasan_save_stack+0x45/0x70 [ 27.736328] kasan_save_track+0x18/0x40 [ 27.736555] kasan_save_alloc_info+0x3b/0x50 [ 27.736909] __kasan_kmalloc+0xb7/0xc0 [ 27.737195] __kmalloc_cache_noprof+0x189/0x420 [ 27.737489] kasan_atomics+0x95/0x310 [ 27.737813] kunit_try_run_case+0x1a5/0x480 [ 27.737985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.738378] kthread+0x337/0x6f0 [ 27.738583] ret_from_fork+0x116/0x1d0 [ 27.738808] ret_from_fork_asm+0x1a/0x30 [ 27.738999] [ 27.739084] The buggy address belongs to the object at ffff888105926b00 [ 27.739084] which belongs to the cache kmalloc-64 of size 64 [ 27.739928] The buggy address is located 0 bytes to the right of [ 27.739928] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.740891] [ 27.741152] The buggy address belongs to the physical page: [ 27.741574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.741820] flags: 0x200000000000000(node=0|zone=2) [ 27.741981] page_type: f5(slab) [ 27.742099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.742324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.742598] page dumped because: kasan: bad access detected [ 27.743065] [ 27.743176] Memory state around the buggy address: [ 27.743405] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.744017] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.744422] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.744999] ^ [ 27.745672] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.746356] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.746599] ================================================================== [ 27.311645] ================================================================== [ 27.312063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 27.312412] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.312765] [ 27.312899] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.312952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.312967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.312992] Call Trace: [ 27.313009] <TASK> [ 27.313036] dump_stack_lvl+0x73/0xb0 [ 27.313071] print_report+0xd1/0x610 [ 27.313112] ? __virt_addr_valid+0x1db/0x2d0 [ 27.313144] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.313172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.313214] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.313243] kasan_report+0x141/0x180 [ 27.313272] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.313320] kasan_check_range+0x10c/0x1c0 [ 27.313350] __kasan_check_read+0x15/0x20 [ 27.313390] kasan_atomics_helper+0x13b5/0x5450 [ 27.313421] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.313450] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.313493] ? kasan_atomics+0x152/0x310 [ 27.313537] kasan_atomics+0x1dc/0x310 [ 27.313567] ? __pfx_kasan_atomics+0x10/0x10 [ 27.313599] ? __pfx_read_tsc+0x10/0x10 [ 27.313638] ? ktime_get_ts64+0x86/0x230 [ 27.313671] kunit_try_run_case+0x1a5/0x480 [ 27.313701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.313730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.313759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.313788] ? __kthread_parkme+0x82/0x180 [ 27.313815] ? preempt_count_sub+0x50/0x80 [ 27.313847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.313876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.313911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.313945] kthread+0x337/0x6f0 [ 27.313981] ? trace_preempt_on+0x20/0xc0 [ 27.314011] ? __pfx_kthread+0x10/0x10 [ 27.314050] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.314082] ? calculate_sigpending+0x7b/0xa0 [ 27.314113] ? __pfx_kthread+0x10/0x10 [ 27.314142] ret_from_fork+0x116/0x1d0 [ 27.314167] ? __pfx_kthread+0x10/0x10 [ 27.314195] ret_from_fork_asm+0x1a/0x30 [ 27.314238] </TASK> [ 27.314252] [ 27.322042] Allocated by task 313: [ 27.322167] kasan_save_stack+0x45/0x70 [ 27.322491] kasan_save_track+0x18/0x40 [ 27.322876] kasan_save_alloc_info+0x3b/0x50 [ 27.323093] __kasan_kmalloc+0xb7/0xc0 [ 27.323282] __kmalloc_cache_noprof+0x189/0x420 [ 27.323479] kasan_atomics+0x95/0x310 [ 27.323648] kunit_try_run_case+0x1a5/0x480 [ 27.323867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.324147] kthread+0x337/0x6f0 [ 27.324284] ret_from_fork+0x116/0x1d0 [ 27.324422] ret_from_fork_asm+0x1a/0x30 [ 27.324576] [ 27.324667] The buggy address belongs to the object at ffff888105926b00 [ 27.324667] which belongs to the cache kmalloc-64 of size 64 [ 27.325218] The buggy address is located 0 bytes to the right of [ 27.325218] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.326192] [ 27.326293] The buggy address belongs to the physical page: [ 27.326535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.326780] flags: 0x200000000000000(node=0|zone=2) [ 27.326941] page_type: f5(slab) [ 27.327208] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.327585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.327929] page dumped because: kasan: bad access detected [ 27.328204] [ 27.328280] Memory state around the buggy address: [ 27.328435] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.328870] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.329187] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.329458] ^ [ 27.329662] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.329985] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.330312] ================================================================== [ 27.175032] ================================================================== [ 27.175466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 27.175854] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.176186] [ 27.176302] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.176358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.176373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.176398] Call Trace: [ 27.176418] <TASK> [ 27.176437] dump_stack_lvl+0x73/0xb0 [ 27.176473] print_report+0xd1/0x610 [ 27.176502] ? __virt_addr_valid+0x1db/0x2d0 [ 27.176546] ? kasan_atomics_helper+0x1148/0x5450 [ 27.176575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.176607] ? kasan_atomics_helper+0x1148/0x5450 [ 27.176648] kasan_report+0x141/0x180 [ 27.176698] ? kasan_atomics_helper+0x1148/0x5450 [ 27.176761] kasan_check_range+0x10c/0x1c0 [ 27.176806] __kasan_check_write+0x18/0x20 [ 27.176862] kasan_atomics_helper+0x1148/0x5450 [ 27.176907] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.176936] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.176967] ? kasan_atomics+0x152/0x310 [ 27.177003] kasan_atomics+0x1dc/0x310 [ 27.177033] ? __pfx_kasan_atomics+0x10/0x10 [ 27.177064] ? __pfx_read_tsc+0x10/0x10 [ 27.177092] ? ktime_get_ts64+0x86/0x230 [ 27.177125] kunit_try_run_case+0x1a5/0x480 [ 27.177155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.177185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.177215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.177245] ? __kthread_parkme+0x82/0x180 [ 27.177273] ? preempt_count_sub+0x50/0x80 [ 27.177305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.177336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.177369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.177405] kthread+0x337/0x6f0 [ 27.177449] ? trace_preempt_on+0x20/0xc0 [ 27.177482] ? __pfx_kthread+0x10/0x10 [ 27.177525] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.177580] ? calculate_sigpending+0x7b/0xa0 [ 27.177626] ? __pfx_kthread+0x10/0x10 [ 27.177656] ret_from_fork+0x116/0x1d0 [ 27.177696] ? __pfx_kthread+0x10/0x10 [ 27.177736] ret_from_fork_asm+0x1a/0x30 [ 27.177779] </TASK> [ 27.177793] [ 27.185300] Allocated by task 313: [ 27.185491] kasan_save_stack+0x45/0x70 [ 27.185803] kasan_save_track+0x18/0x40 [ 27.185990] kasan_save_alloc_info+0x3b/0x50 [ 27.186186] __kasan_kmalloc+0xb7/0xc0 [ 27.186365] __kmalloc_cache_noprof+0x189/0x420 [ 27.186606] kasan_atomics+0x95/0x310 [ 27.186787] kunit_try_run_case+0x1a5/0x480 [ 27.186986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.187242] kthread+0x337/0x6f0 [ 27.187395] ret_from_fork+0x116/0x1d0 [ 27.187608] ret_from_fork_asm+0x1a/0x30 [ 27.187782] [ 27.187894] The buggy address belongs to the object at ffff888105926b00 [ 27.187894] which belongs to the cache kmalloc-64 of size 64 [ 27.188344] The buggy address is located 0 bytes to the right of [ 27.188344] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.188906] [ 27.189023] The buggy address belongs to the physical page: [ 27.189286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.189589] flags: 0x200000000000000(node=0|zone=2) [ 27.189812] page_type: f5(slab) [ 27.189989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.190293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.190639] page dumped because: kasan: bad access detected [ 27.190807] [ 27.190875] Memory state around the buggy address: [ 27.191060] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.191374] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.191891] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.192103] ^ [ 27.192257] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.192576] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.193202] ================================================================== [ 26.810692] ================================================================== [ 26.811043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 26.811368] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.811918] [ 26.812060] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.812128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.812144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.812182] Call Trace: [ 26.812203] <TASK> [ 26.812223] dump_stack_lvl+0x73/0xb0 [ 26.812271] print_report+0xd1/0x610 [ 26.812301] ? __virt_addr_valid+0x1db/0x2d0 [ 26.812344] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.812372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.812413] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.812442] kasan_report+0x141/0x180 [ 26.812471] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.812516] kasan_check_range+0x10c/0x1c0 [ 26.812557] __kasan_check_write+0x18/0x20 [ 26.812641] kasan_atomics_helper+0x7c7/0x5450 [ 26.812671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.812851] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.812884] ? kasan_atomics+0x152/0x310 [ 26.813013] kasan_atomics+0x1dc/0x310 [ 26.813044] ? __pfx_kasan_atomics+0x10/0x10 [ 26.813167] ? __pfx_read_tsc+0x10/0x10 [ 26.813194] ? ktime_get_ts64+0x86/0x230 [ 26.813228] kunit_try_run_case+0x1a5/0x480 [ 26.813260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.813289] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.813320] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.813350] ? __kthread_parkme+0x82/0x180 [ 26.813377] ? preempt_count_sub+0x50/0x80 [ 26.813410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.813441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.813475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.813508] kthread+0x337/0x6f0 [ 26.813546] ? trace_preempt_on+0x20/0xc0 [ 26.813578] ? __pfx_kthread+0x10/0x10 [ 26.813605] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.814021] ? calculate_sigpending+0x7b/0xa0 [ 26.814070] ? __pfx_kthread+0x10/0x10 [ 26.814099] ret_from_fork+0x116/0x1d0 [ 26.814126] ? __pfx_kthread+0x10/0x10 [ 26.814154] ret_from_fork_asm+0x1a/0x30 [ 26.814197] </TASK> [ 26.814211] [ 26.823037] Allocated by task 313: [ 26.823164] kasan_save_stack+0x45/0x70 [ 26.823376] kasan_save_track+0x18/0x40 [ 26.823597] kasan_save_alloc_info+0x3b/0x50 [ 26.823816] __kasan_kmalloc+0xb7/0xc0 [ 26.824009] __kmalloc_cache_noprof+0x189/0x420 [ 26.824193] kasan_atomics+0x95/0x310 [ 26.824367] kunit_try_run_case+0x1a5/0x480 [ 26.824674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.825000] kthread+0x337/0x6f0 [ 26.825159] ret_from_fork+0x116/0x1d0 [ 26.825351] ret_from_fork_asm+0x1a/0x30 [ 26.825562] [ 26.825689] The buggy address belongs to the object at ffff888105926b00 [ 26.825689] which belongs to the cache kmalloc-64 of size 64 [ 26.826049] The buggy address is located 0 bytes to the right of [ 26.826049] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.826564] [ 26.826730] The buggy address belongs to the physical page: [ 26.826993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.827359] flags: 0x200000000000000(node=0|zone=2) [ 26.827585] page_type: f5(slab) [ 26.827930] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.828291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.828540] page dumped because: kasan: bad access detected [ 26.828718] [ 26.828859] Memory state around the buggy address: [ 26.829253] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.829588] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.829991] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.830318] ^ [ 26.830538] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.830821] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.831271] ================================================================== [ 27.371169] ================================================================== [ 27.371661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 27.372057] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.372771] [ 27.373004] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.373076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.373093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.373118] Call Trace: [ 27.373163] <TASK> [ 27.373182] dump_stack_lvl+0x73/0xb0 [ 27.373219] print_report+0xd1/0x610 [ 27.373250] ? __virt_addr_valid+0x1db/0x2d0 [ 27.373280] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.373309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.373343] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.373372] kasan_report+0x141/0x180 [ 27.373402] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.373437] __asan_report_store8_noabort+0x1b/0x30 [ 27.373469] kasan_atomics_helper+0x50d4/0x5450 [ 27.373500] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.373540] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.373573] ? kasan_atomics+0x152/0x310 [ 27.373608] kasan_atomics+0x1dc/0x310 [ 27.373646] ? __pfx_kasan_atomics+0x10/0x10 [ 27.373679] ? __pfx_read_tsc+0x10/0x10 [ 27.373707] ? ktime_get_ts64+0x86/0x230 [ 27.373740] kunit_try_run_case+0x1a5/0x480 [ 27.373770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.373799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.373829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.373859] ? __kthread_parkme+0x82/0x180 [ 27.373887] ? preempt_count_sub+0x50/0x80 [ 27.373920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.373951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.373984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.374018] kthread+0x337/0x6f0 [ 27.374044] ? trace_preempt_on+0x20/0xc0 [ 27.374074] ? __pfx_kthread+0x10/0x10 [ 27.374102] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.374134] ? calculate_sigpending+0x7b/0xa0 [ 27.374165] ? __pfx_kthread+0x10/0x10 [ 27.374193] ret_from_fork+0x116/0x1d0 [ 27.374218] ? __pfx_kthread+0x10/0x10 [ 27.374246] ret_from_fork_asm+0x1a/0x30 [ 27.374289] </TASK> [ 27.374303] [ 27.381615] Allocated by task 313: [ 27.381815] kasan_save_stack+0x45/0x70 [ 27.381962] kasan_save_track+0x18/0x40 [ 27.382103] kasan_save_alloc_info+0x3b/0x50 [ 27.382576] __kasan_kmalloc+0xb7/0xc0 [ 27.382776] __kmalloc_cache_noprof+0x189/0x420 [ 27.383004] kasan_atomics+0x95/0x310 [ 27.383205] kunit_try_run_case+0x1a5/0x480 [ 27.383378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.383661] kthread+0x337/0x6f0 [ 27.383819] ret_from_fork+0x116/0x1d0 [ 27.384001] ret_from_fork_asm+0x1a/0x30 [ 27.384204] [ 27.384302] The buggy address belongs to the object at ffff888105926b00 [ 27.384302] which belongs to the cache kmalloc-64 of size 64 [ 27.384953] The buggy address is located 0 bytes to the right of [ 27.384953] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.385443] [ 27.385517] The buggy address belongs to the physical page: [ 27.385699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.385990] flags: 0x200000000000000(node=0|zone=2) [ 27.386247] page_type: f5(slab) [ 27.386414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.386769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.387256] page dumped because: kasan: bad access detected [ 27.387428] [ 27.387497] Memory state around the buggy address: [ 27.387662] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.387999] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.388345] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.388779] ^ [ 27.389023] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.389339] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.389591] ================================================================== [ 26.600786] ================================================================== [ 26.601081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 26.601367] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.601719] [ 26.601896] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.601955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.601971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.601998] Call Trace: [ 26.602021] <TASK> [ 26.602042] dump_stack_lvl+0x73/0xb0 [ 26.602078] print_report+0xd1/0x610 [ 26.602108] ? __virt_addr_valid+0x1db/0x2d0 [ 26.602138] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.602167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.602200] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.602230] kasan_report+0x141/0x180 [ 26.602260] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.602295] __asan_report_load4_noabort+0x18/0x20 [ 26.602326] kasan_atomics_helper+0x4b88/0x5450 [ 26.602356] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.602386] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.602418] ? kasan_atomics+0x152/0x310 [ 26.602452] kasan_atomics+0x1dc/0x310 [ 26.602489] ? __pfx_kasan_atomics+0x10/0x10 [ 26.602521] ? __pfx_read_tsc+0x10/0x10 [ 26.602562] ? ktime_get_ts64+0x86/0x230 [ 26.602595] kunit_try_run_case+0x1a5/0x480 [ 26.602627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.602655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.602685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.602715] ? __kthread_parkme+0x82/0x180 [ 26.602741] ? preempt_count_sub+0x50/0x80 [ 26.602773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.602861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.602903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.602937] kthread+0x337/0x6f0 [ 26.602964] ? trace_preempt_on+0x20/0xc0 [ 26.602995] ? __pfx_kthread+0x10/0x10 [ 26.603023] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.603055] ? calculate_sigpending+0x7b/0xa0 [ 26.603088] ? __pfx_kthread+0x10/0x10 [ 26.603118] ret_from_fork+0x116/0x1d0 [ 26.603144] ? __pfx_kthread+0x10/0x10 [ 26.603172] ret_from_fork_asm+0x1a/0x30 [ 26.603215] </TASK> [ 26.603228] [ 26.612498] Allocated by task 313: [ 26.612826] kasan_save_stack+0x45/0x70 [ 26.613031] kasan_save_track+0x18/0x40 [ 26.613213] kasan_save_alloc_info+0x3b/0x50 [ 26.613412] __kasan_kmalloc+0xb7/0xc0 [ 26.613630] __kmalloc_cache_noprof+0x189/0x420 [ 26.613839] kasan_atomics+0x95/0x310 [ 26.614008] kunit_try_run_case+0x1a5/0x480 [ 26.614200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.614436] kthread+0x337/0x6f0 [ 26.615085] ret_from_fork+0x116/0x1d0 [ 26.615590] ret_from_fork_asm+0x1a/0x30 [ 26.615926] [ 26.616007] The buggy address belongs to the object at ffff888105926b00 [ 26.616007] which belongs to the cache kmalloc-64 of size 64 [ 26.616364] The buggy address is located 0 bytes to the right of [ 26.616364] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.617685] [ 26.617792] The buggy address belongs to the physical page: [ 26.618007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.618305] flags: 0x200000000000000(node=0|zone=2) [ 26.618506] page_type: f5(slab) [ 26.618806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.619115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.619419] page dumped because: kasan: bad access detected [ 26.620180] [ 26.620369] Memory state around the buggy address: [ 26.620824] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.621781] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.622238] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.622767] ^ [ 26.623277] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.624119] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.624559] ================================================================== [ 27.480197] ================================================================== [ 27.480959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 27.481323] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.481880] [ 27.481999] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.482286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.482305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.482332] Call Trace: [ 27.482350] <TASK> [ 27.482370] dump_stack_lvl+0x73/0xb0 [ 27.482405] print_report+0xd1/0x610 [ 27.482436] ? __virt_addr_valid+0x1db/0x2d0 [ 27.482466] ? kasan_atomics_helper+0x177f/0x5450 [ 27.482501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.482546] ? kasan_atomics_helper+0x177f/0x5450 [ 27.482574] kasan_report+0x141/0x180 [ 27.482603] ? kasan_atomics_helper+0x177f/0x5450 [ 27.482649] kasan_check_range+0x10c/0x1c0 [ 27.482681] __kasan_check_write+0x18/0x20 [ 27.482710] kasan_atomics_helper+0x177f/0x5450 [ 27.482743] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.482774] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.482807] ? kasan_atomics+0x152/0x310 [ 27.482842] kasan_atomics+0x1dc/0x310 [ 27.482872] ? __pfx_kasan_atomics+0x10/0x10 [ 27.482904] ? __pfx_read_tsc+0x10/0x10 [ 27.482932] ? ktime_get_ts64+0x86/0x230 [ 27.482964] kunit_try_run_case+0x1a5/0x480 [ 27.482995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.483023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.483053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.483082] ? __kthread_parkme+0x82/0x180 [ 27.483109] ? preempt_count_sub+0x50/0x80 [ 27.483141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.483172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.483206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.483240] kthread+0x337/0x6f0 [ 27.483266] ? trace_preempt_on+0x20/0xc0 [ 27.483296] ? __pfx_kthread+0x10/0x10 [ 27.483324] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.483355] ? calculate_sigpending+0x7b/0xa0 [ 27.483386] ? __pfx_kthread+0x10/0x10 [ 27.483416] ret_from_fork+0x116/0x1d0 [ 27.483441] ? __pfx_kthread+0x10/0x10 [ 27.483469] ret_from_fork_asm+0x1a/0x30 [ 27.483511] </TASK> [ 27.483525] [ 27.493619] Allocated by task 313: [ 27.493825] kasan_save_stack+0x45/0x70 [ 27.494247] kasan_save_track+0x18/0x40 [ 27.494455] kasan_save_alloc_info+0x3b/0x50 [ 27.494868] __kasan_kmalloc+0xb7/0xc0 [ 27.495126] __kmalloc_cache_noprof+0x189/0x420 [ 27.495459] kasan_atomics+0x95/0x310 [ 27.495792] kunit_try_run_case+0x1a5/0x480 [ 27.496022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.496389] kthread+0x337/0x6f0 [ 27.496579] ret_from_fork+0x116/0x1d0 [ 27.496912] ret_from_fork_asm+0x1a/0x30 [ 27.497094] [ 27.497182] The buggy address belongs to the object at ffff888105926b00 [ 27.497182] which belongs to the cache kmalloc-64 of size 64 [ 27.498002] The buggy address is located 0 bytes to the right of [ 27.498002] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.498673] [ 27.498777] The buggy address belongs to the physical page: [ 27.499164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.499595] flags: 0x200000000000000(node=0|zone=2) [ 27.499878] page_type: f5(slab) [ 27.500148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.500556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.501078] page dumped because: kasan: bad access detected [ 27.501286] [ 27.501513] Memory state around the buggy address: [ 27.501820] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.502177] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.502514] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.503075] ^ [ 27.503363] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.503800] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.504212] ================================================================== [ 26.770817] ================================================================== [ 26.771248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 26.771641] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.772002] [ 26.772196] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.772252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.772279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.772304] Call Trace: [ 26.772322] <TASK> [ 26.772350] dump_stack_lvl+0x73/0xb0 [ 26.772386] print_report+0xd1/0x610 [ 26.772414] ? __virt_addr_valid+0x1db/0x2d0 [ 26.772454] ? kasan_atomics_helper+0x697/0x5450 [ 26.772482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.772537] ? kasan_atomics_helper+0x697/0x5450 [ 26.772566] kasan_report+0x141/0x180 [ 26.772651] ? kasan_atomics_helper+0x697/0x5450 [ 26.772688] kasan_check_range+0x10c/0x1c0 [ 26.772732] __kasan_check_write+0x18/0x20 [ 26.772762] kasan_atomics_helper+0x697/0x5450 [ 26.772792] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.772830] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.772863] ? kasan_atomics+0x152/0x310 [ 26.772909] kasan_atomics+0x1dc/0x310 [ 26.772939] ? __pfx_kasan_atomics+0x10/0x10 [ 26.772970] ? __pfx_read_tsc+0x10/0x10 [ 26.772998] ? ktime_get_ts64+0x86/0x230 [ 26.773030] kunit_try_run_case+0x1a5/0x480 [ 26.773061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.773089] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.773126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.773156] ? __kthread_parkme+0x82/0x180 [ 26.773193] ? preempt_count_sub+0x50/0x80 [ 26.773225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.773255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.773290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.773323] kthread+0x337/0x6f0 [ 26.773350] ? trace_preempt_on+0x20/0xc0 [ 26.773380] ? __pfx_kthread+0x10/0x10 [ 26.773409] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.773441] ? calculate_sigpending+0x7b/0xa0 [ 26.773480] ? __pfx_kthread+0x10/0x10 [ 26.773510] ret_from_fork+0x116/0x1d0 [ 26.773552] ? __pfx_kthread+0x10/0x10 [ 26.773630] ret_from_fork_asm+0x1a/0x30 [ 26.773674] </TASK> [ 26.773699] [ 26.781769] Allocated by task 313: [ 26.781973] kasan_save_stack+0x45/0x70 [ 26.782179] kasan_save_track+0x18/0x40 [ 26.782372] kasan_save_alloc_info+0x3b/0x50 [ 26.782876] __kasan_kmalloc+0xb7/0xc0 [ 26.783033] __kmalloc_cache_noprof+0x189/0x420 [ 26.783262] kasan_atomics+0x95/0x310 [ 26.783454] kunit_try_run_case+0x1a5/0x480 [ 26.783769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.783962] kthread+0x337/0x6f0 [ 26.784087] ret_from_fork+0x116/0x1d0 [ 26.784244] ret_from_fork_asm+0x1a/0x30 [ 26.784473] [ 26.784578] The buggy address belongs to the object at ffff888105926b00 [ 26.784578] which belongs to the cache kmalloc-64 of size 64 [ 26.785118] The buggy address is located 0 bytes to the right of [ 26.785118] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.785582] [ 26.785748] The buggy address belongs to the physical page: [ 26.786005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.786322] flags: 0x200000000000000(node=0|zone=2) [ 26.786593] page_type: f5(slab) [ 26.786782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.787028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.787346] page dumped because: kasan: bad access detected [ 26.787725] [ 26.787842] Memory state around the buggy address: [ 26.788106] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.788354] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.788772] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.789079] ^ [ 26.789276] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.789594] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.790053] ================================================================== [ 27.601155] ================================================================== [ 27.601589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 27.601932] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.602400] [ 27.602518] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.602580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.602595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.602620] Call Trace: [ 27.602647] <TASK> [ 27.602664] dump_stack_lvl+0x73/0xb0 [ 27.602697] print_report+0xd1/0x610 [ 27.602726] ? __virt_addr_valid+0x1db/0x2d0 [ 27.602757] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.602785] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.602818] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.602846] kasan_report+0x141/0x180 [ 27.602876] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.602912] kasan_check_range+0x10c/0x1c0 [ 27.602942] __kasan_check_write+0x18/0x20 [ 27.602972] kasan_atomics_helper+0x1b22/0x5450 [ 27.603002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.603030] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.603062] ? kasan_atomics+0x152/0x310 [ 27.603097] kasan_atomics+0x1dc/0x310 [ 27.603127] ? __pfx_kasan_atomics+0x10/0x10 [ 27.603158] ? __pfx_read_tsc+0x10/0x10 [ 27.603186] ? ktime_get_ts64+0x86/0x230 [ 27.603218] kunit_try_run_case+0x1a5/0x480 [ 27.603248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.603276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.603305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.603335] ? __kthread_parkme+0x82/0x180 [ 27.603361] ? preempt_count_sub+0x50/0x80 [ 27.603394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.603423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.603457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.603489] kthread+0x337/0x6f0 [ 27.603516] ? trace_preempt_on+0x20/0xc0 [ 27.603557] ? __pfx_kthread+0x10/0x10 [ 27.603584] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.603614] ? calculate_sigpending+0x7b/0xa0 [ 27.603656] ? __pfx_kthread+0x10/0x10 [ 27.603686] ret_from_fork+0x116/0x1d0 [ 27.603712] ? __pfx_kthread+0x10/0x10 [ 27.603740] ret_from_fork_asm+0x1a/0x30 [ 27.603782] </TASK> [ 27.603795] [ 27.610809] Allocated by task 313: [ 27.610951] kasan_save_stack+0x45/0x70 [ 27.611092] kasan_save_track+0x18/0x40 [ 27.611226] kasan_save_alloc_info+0x3b/0x50 [ 27.611376] __kasan_kmalloc+0xb7/0xc0 [ 27.611584] __kmalloc_cache_noprof+0x189/0x420 [ 27.611812] kasan_atomics+0x95/0x310 [ 27.612009] kunit_try_run_case+0x1a5/0x480 [ 27.612222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.612487] kthread+0x337/0x6f0 [ 27.612669] ret_from_fork+0x116/0x1d0 [ 27.612863] ret_from_fork_asm+0x1a/0x30 [ 27.613067] [ 27.613137] The buggy address belongs to the object at ffff888105926b00 [ 27.613137] which belongs to the cache kmalloc-64 of size 64 [ 27.613491] The buggy address is located 0 bytes to the right of [ 27.613491] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.615088] [ 27.615177] The buggy address belongs to the physical page: [ 27.615358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.615649] flags: 0x200000000000000(node=0|zone=2) [ 27.615868] page_type: f5(slab) [ 27.616030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.616343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.617112] page dumped because: kasan: bad access detected [ 27.617436] [ 27.617800] Memory state around the buggy address: [ 27.618242] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.618967] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.619418] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.620108] ^ [ 27.620473] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.621194] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.621609] ================================================================== [ 27.870098] ================================================================== [ 27.870712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 27.871001] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.871229] [ 27.871310] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.871361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.871377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.871401] Call Trace: [ 27.871417] <TASK> [ 27.871434] dump_stack_lvl+0x73/0xb0 [ 27.871468] print_report+0xd1/0x610 [ 27.871498] ? __virt_addr_valid+0x1db/0x2d0 [ 27.871527] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.871566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.871620] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.871649] kasan_report+0x141/0x180 [ 27.871680] ? kasan_atomics_helper+0x4fa5/0x5450 [ 27.871715] __asan_report_load8_noabort+0x18/0x20 [ 27.871747] kasan_atomics_helper+0x4fa5/0x5450 [ 27.871777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.871806] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.871838] ? kasan_atomics+0x152/0x310 [ 27.871874] kasan_atomics+0x1dc/0x310 [ 27.871904] ? __pfx_kasan_atomics+0x10/0x10 [ 27.871936] ? __pfx_read_tsc+0x10/0x10 [ 27.871964] ? ktime_get_ts64+0x86/0x230 [ 27.871997] kunit_try_run_case+0x1a5/0x480 [ 27.872027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.872055] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.872084] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.872114] ? __kthread_parkme+0x82/0x180 [ 27.872142] ? preempt_count_sub+0x50/0x80 [ 27.872174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.872205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.872239] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.872273] kthread+0x337/0x6f0 [ 27.872299] ? trace_preempt_on+0x20/0xc0 [ 27.872329] ? __pfx_kthread+0x10/0x10 [ 27.872357] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.872389] ? calculate_sigpending+0x7b/0xa0 [ 27.872420] ? __pfx_kthread+0x10/0x10 [ 27.872449] ret_from_fork+0x116/0x1d0 [ 27.872475] ? __pfx_kthread+0x10/0x10 [ 27.872504] ret_from_fork_asm+0x1a/0x30 [ 27.872553] </TASK> [ 27.872567] [ 27.879575] Allocated by task 313: [ 27.879760] kasan_save_stack+0x45/0x70 [ 27.879952] kasan_save_track+0x18/0x40 [ 27.880124] kasan_save_alloc_info+0x3b/0x50 [ 27.880299] __kasan_kmalloc+0xb7/0xc0 [ 27.880485] __kmalloc_cache_noprof+0x189/0x420 [ 27.880720] kasan_atomics+0x95/0x310 [ 27.880900] kunit_try_run_case+0x1a5/0x480 [ 27.881068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.881301] kthread+0x337/0x6f0 [ 27.881427] ret_from_fork+0x116/0x1d0 [ 27.881574] ret_from_fork_asm+0x1a/0x30 [ 27.881738] [ 27.881808] The buggy address belongs to the object at ffff888105926b00 [ 27.881808] which belongs to the cache kmalloc-64 of size 64 [ 27.882159] The buggy address is located 0 bytes to the right of [ 27.882159] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.882620] [ 27.882712] The buggy address belongs to the physical page: [ 27.882963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.883314] flags: 0x200000000000000(node=0|zone=2) [ 27.883551] page_type: f5(slab) [ 27.883741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.884077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.884304] page dumped because: kasan: bad access detected [ 27.884475] [ 27.884553] Memory state around the buggy address: [ 27.884730] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.884949] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.885164] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.885483] ^ [ 27.885740] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.886061] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.886374] ================================================================== [ 27.076207] ================================================================== [ 27.076873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 27.077243] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.077827] [ 27.077940] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.078015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.078031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.078114] Call Trace: [ 27.078133] <TASK> [ 27.078151] dump_stack_lvl+0x73/0xb0 [ 27.078189] print_report+0xd1/0x610 [ 27.078220] ? __virt_addr_valid+0x1db/0x2d0 [ 27.078251] ? kasan_atomics_helper+0xf10/0x5450 [ 27.078279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.078312] ? kasan_atomics_helper+0xf10/0x5450 [ 27.078341] kasan_report+0x141/0x180 [ 27.078371] ? kasan_atomics_helper+0xf10/0x5450 [ 27.078406] kasan_check_range+0x10c/0x1c0 [ 27.078438] __kasan_check_write+0x18/0x20 [ 27.078468] kasan_atomics_helper+0xf10/0x5450 [ 27.078506] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.078546] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.078580] ? kasan_atomics+0x152/0x310 [ 27.078615] kasan_atomics+0x1dc/0x310 [ 27.078645] ? __pfx_kasan_atomics+0x10/0x10 [ 27.078677] ? __pfx_read_tsc+0x10/0x10 [ 27.078706] ? ktime_get_ts64+0x86/0x230 [ 27.078739] kunit_try_run_case+0x1a5/0x480 [ 27.078773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.078802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.078833] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.078864] ? __kthread_parkme+0x82/0x180 [ 27.078892] ? preempt_count_sub+0x50/0x80 [ 27.078924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.078955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.078990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.079025] kthread+0x337/0x6f0 [ 27.079052] ? trace_preempt_on+0x20/0xc0 [ 27.079083] ? __pfx_kthread+0x10/0x10 [ 27.079111] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.079142] ? calculate_sigpending+0x7b/0xa0 [ 27.079174] ? __pfx_kthread+0x10/0x10 [ 27.079203] ret_from_fork+0x116/0x1d0 [ 27.079229] ? __pfx_kthread+0x10/0x10 [ 27.079258] ret_from_fork_asm+0x1a/0x30 [ 27.079301] </TASK> [ 27.079315] [ 27.086717] Allocated by task 313: [ 27.086896] kasan_save_stack+0x45/0x70 [ 27.087136] kasan_save_track+0x18/0x40 [ 27.087333] kasan_save_alloc_info+0x3b/0x50 [ 27.087568] __kasan_kmalloc+0xb7/0xc0 [ 27.087900] __kmalloc_cache_noprof+0x189/0x420 [ 27.088065] kasan_atomics+0x95/0x310 [ 27.088260] kunit_try_run_case+0x1a5/0x480 [ 27.088406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.088671] kthread+0x337/0x6f0 [ 27.088856] ret_from_fork+0x116/0x1d0 [ 27.089072] ret_from_fork_asm+0x1a/0x30 [ 27.089259] [ 27.089329] The buggy address belongs to the object at ffff888105926b00 [ 27.089329] which belongs to the cache kmalloc-64 of size 64 [ 27.089979] The buggy address is located 0 bytes to the right of [ 27.089979] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.090422] [ 27.090496] The buggy address belongs to the physical page: [ 27.090686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.091057] flags: 0x200000000000000(node=0|zone=2) [ 27.091320] page_type: f5(slab) [ 27.091512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.091992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.092312] page dumped because: kasan: bad access detected [ 27.092524] [ 27.092604] Memory state around the buggy address: [ 27.092755] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.093097] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.093428] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.093819] ^ [ 27.094272] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.095323] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.095896] ================================================================== [ 27.680695] ================================================================== [ 27.681059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 27.681375] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.681745] [ 27.681859] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.681914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.681930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.681956] Call Trace: [ 27.681977] <TASK> [ 27.681998] dump_stack_lvl+0x73/0xb0 [ 27.682030] print_report+0xd1/0x610 [ 27.682060] ? __virt_addr_valid+0x1db/0x2d0 [ 27.682091] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.682119] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.682152] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.682180] kasan_report+0x141/0x180 [ 27.682209] ? kasan_atomics_helper+0x1d7a/0x5450 [ 27.682244] kasan_check_range+0x10c/0x1c0 [ 27.682275] __kasan_check_write+0x18/0x20 [ 27.682305] kasan_atomics_helper+0x1d7a/0x5450 [ 27.682335] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.682364] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.682397] ? kasan_atomics+0x152/0x310 [ 27.682435] kasan_atomics+0x1dc/0x310 [ 27.682465] ? __pfx_kasan_atomics+0x10/0x10 [ 27.682501] ? __pfx_read_tsc+0x10/0x10 [ 27.682542] ? ktime_get_ts64+0x86/0x230 [ 27.682574] kunit_try_run_case+0x1a5/0x480 [ 27.682603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.682651] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.682681] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.682710] ? __kthread_parkme+0x82/0x180 [ 27.682737] ? preempt_count_sub+0x50/0x80 [ 27.682769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.682799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.682833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.682867] kthread+0x337/0x6f0 [ 27.682893] ? trace_preempt_on+0x20/0xc0 [ 27.682923] ? __pfx_kthread+0x10/0x10 [ 27.682950] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.682982] ? calculate_sigpending+0x7b/0xa0 [ 27.683012] ? __pfx_kthread+0x10/0x10 [ 27.683041] ret_from_fork+0x116/0x1d0 [ 27.683066] ? __pfx_kthread+0x10/0x10 [ 27.683093] ret_from_fork_asm+0x1a/0x30 [ 27.683136] </TASK> [ 27.683149] [ 27.690949] Allocated by task 313: [ 27.691126] kasan_save_stack+0x45/0x70 [ 27.691333] kasan_save_track+0x18/0x40 [ 27.691521] kasan_save_alloc_info+0x3b/0x50 [ 27.691740] __kasan_kmalloc+0xb7/0xc0 [ 27.691939] __kmalloc_cache_noprof+0x189/0x420 [ 27.692156] kasan_atomics+0x95/0x310 [ 27.692290] kunit_try_run_case+0x1a5/0x480 [ 27.692436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.692737] kthread+0x337/0x6f0 [ 27.692910] ret_from_fork+0x116/0x1d0 [ 27.693126] ret_from_fork_asm+0x1a/0x30 [ 27.693347] [ 27.693464] The buggy address belongs to the object at ffff888105926b00 [ 27.693464] which belongs to the cache kmalloc-64 of size 64 [ 27.693907] The buggy address is located 0 bytes to the right of [ 27.693907] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.694367] [ 27.694463] The buggy address belongs to the physical page: [ 27.694906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.695248] flags: 0x200000000000000(node=0|zone=2) [ 27.695494] page_type: f5(slab) [ 27.695664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.695979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.696320] page dumped because: kasan: bad access detected [ 27.696549] [ 27.696658] Memory state around the buggy address: [ 27.696860] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.697169] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.697462] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.697832] ^ [ 27.698028] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.698354] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.698693] ================================================================== [ 27.563073] ================================================================== [ 27.563812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 27.564161] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.564396] [ 27.564487] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.564571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.564587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.564613] Call Trace: [ 27.564641] <TASK> [ 27.564676] dump_stack_lvl+0x73/0xb0 [ 27.564728] print_report+0xd1/0x610 [ 27.564758] ? __virt_addr_valid+0x1db/0x2d0 [ 27.564788] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.564817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.564851] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.564879] kasan_report+0x141/0x180 [ 27.564909] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.564960] kasan_check_range+0x10c/0x1c0 [ 27.564991] __kasan_check_write+0x18/0x20 [ 27.565035] kasan_atomics_helper+0x19e3/0x5450 [ 27.565065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.565095] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.565125] ? kasan_atomics+0x152/0x310 [ 27.565160] kasan_atomics+0x1dc/0x310 [ 27.565189] ? __pfx_kasan_atomics+0x10/0x10 [ 27.565221] ? __pfx_read_tsc+0x10/0x10 [ 27.565248] ? ktime_get_ts64+0x86/0x230 [ 27.565280] kunit_try_run_case+0x1a5/0x480 [ 27.565310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.565356] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.565385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.565415] ? __kthread_parkme+0x82/0x180 [ 27.565441] ? preempt_count_sub+0x50/0x80 [ 27.565473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.565519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.565576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.565632] kthread+0x337/0x6f0 [ 27.565658] ? trace_preempt_on+0x20/0xc0 [ 27.565690] ? __pfx_kthread+0x10/0x10 [ 27.565717] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.565749] ? calculate_sigpending+0x7b/0xa0 [ 27.565780] ? __pfx_kthread+0x10/0x10 [ 27.565809] ret_from_fork+0x116/0x1d0 [ 27.565834] ? __pfx_kthread+0x10/0x10 [ 27.565863] ret_from_fork_asm+0x1a/0x30 [ 27.565922] </TASK> [ 27.565936] [ 27.573699] Allocated by task 313: [ 27.573866] kasan_save_stack+0x45/0x70 [ 27.574063] kasan_save_track+0x18/0x40 [ 27.574308] kasan_save_alloc_info+0x3b/0x50 [ 27.574469] __kasan_kmalloc+0xb7/0xc0 [ 27.574625] __kmalloc_cache_noprof+0x189/0x420 [ 27.574849] kasan_atomics+0x95/0x310 [ 27.575036] kunit_try_run_case+0x1a5/0x480 [ 27.575242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.575504] kthread+0x337/0x6f0 [ 27.575702] ret_from_fork+0x116/0x1d0 [ 27.575890] ret_from_fork_asm+0x1a/0x30 [ 27.576087] [ 27.576179] The buggy address belongs to the object at ffff888105926b00 [ 27.576179] which belongs to the cache kmalloc-64 of size 64 [ 27.576581] The buggy address is located 0 bytes to the right of [ 27.576581] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.576935] [ 27.577004] The buggy address belongs to the physical page: [ 27.577476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.578137] flags: 0x200000000000000(node=0|zone=2) [ 27.578392] page_type: f5(slab) [ 27.578593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.578980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.579324] page dumped because: kasan: bad access detected [ 27.579576] [ 27.579702] Memory state around the buggy address: [ 27.579858] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.580091] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.580432] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.580901] ^ [ 27.581082] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.581385] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.581711] ================================================================== [ 26.689967] ================================================================== [ 26.690312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 26.690731] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.691083] [ 26.691201] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.691268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.691285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.691323] Call Trace: [ 26.691345] <TASK> [ 26.691364] dump_stack_lvl+0x73/0xb0 [ 26.691400] print_report+0xd1/0x610 [ 26.691440] ? __virt_addr_valid+0x1db/0x2d0 [ 26.691472] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.691511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.691561] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.691648] kasan_report+0x141/0x180 [ 26.691680] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.691729] kasan_check_range+0x10c/0x1c0 [ 26.691761] __kasan_check_write+0x18/0x20 [ 26.691792] kasan_atomics_helper+0x4a0/0x5450 [ 26.691823] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.691851] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.691884] ? kasan_atomics+0x152/0x310 [ 26.691919] kasan_atomics+0x1dc/0x310 [ 26.691948] ? __pfx_kasan_atomics+0x10/0x10 [ 26.691990] ? __pfx_read_tsc+0x10/0x10 [ 26.692020] ? ktime_get_ts64+0x86/0x230 [ 26.692063] kunit_try_run_case+0x1a5/0x480 [ 26.692094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.692123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.692162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.692192] ? __kthread_parkme+0x82/0x180 [ 26.692230] ? preempt_count_sub+0x50/0x80 [ 26.692264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.692295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.692328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.692361] kthread+0x337/0x6f0 [ 26.692388] ? trace_preempt_on+0x20/0xc0 [ 26.692419] ? __pfx_kthread+0x10/0x10 [ 26.692447] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.692479] ? calculate_sigpending+0x7b/0xa0 [ 26.692518] ? __pfx_kthread+0x10/0x10 [ 26.692567] ret_from_fork+0x116/0x1d0 [ 26.692637] ? __pfx_kthread+0x10/0x10 [ 26.692666] ret_from_fork_asm+0x1a/0x30 [ 26.692708] </TASK> [ 26.692723] [ 26.701328] Allocated by task 313: [ 26.701509] kasan_save_stack+0x45/0x70 [ 26.702064] kasan_save_track+0x18/0x40 [ 26.702250] kasan_save_alloc_info+0x3b/0x50 [ 26.702464] __kasan_kmalloc+0xb7/0xc0 [ 26.702768] __kmalloc_cache_noprof+0x189/0x420 [ 26.702930] kasan_atomics+0x95/0x310 [ 26.703077] kunit_try_run_case+0x1a5/0x480 [ 26.703521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.703940] kthread+0x337/0x6f0 [ 26.704070] ret_from_fork+0x116/0x1d0 [ 26.704207] ret_from_fork_asm+0x1a/0x30 [ 26.704348] [ 26.704442] The buggy address belongs to the object at ffff888105926b00 [ 26.704442] which belongs to the cache kmalloc-64 of size 64 [ 26.705105] The buggy address is located 0 bytes to the right of [ 26.705105] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.705591] [ 26.705662] The buggy address belongs to the physical page: [ 26.706000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.706394] flags: 0x200000000000000(node=0|zone=2) [ 26.706795] page_type: f5(slab) [ 26.707082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.707438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.707835] page dumped because: kasan: bad access detected [ 26.708084] [ 26.708200] Memory state around the buggy address: [ 26.708398] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.708779] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.709087] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.709305] ^ [ 26.709461] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.709804] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.710120] ================================================================== [ 27.455216] ================================================================== [ 27.455590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 27.455989] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.456226] [ 27.456311] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.456365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.456382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.456405] Call Trace: [ 27.456423] <TASK> [ 27.456441] dump_stack_lvl+0x73/0xb0 [ 27.456476] print_report+0xd1/0x610 [ 27.456505] ? __virt_addr_valid+0x1db/0x2d0 [ 27.456548] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.456578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.456612] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.456653] kasan_report+0x141/0x180 [ 27.456683] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.456718] kasan_check_range+0x10c/0x1c0 [ 27.456749] __kasan_check_write+0x18/0x20 [ 27.456780] kasan_atomics_helper+0x16e7/0x5450 [ 27.456810] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.456839] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.456871] ? kasan_atomics+0x152/0x310 [ 27.456906] kasan_atomics+0x1dc/0x310 [ 27.456936] ? __pfx_kasan_atomics+0x10/0x10 [ 27.456967] ? __pfx_read_tsc+0x10/0x10 [ 27.456995] ? ktime_get_ts64+0x86/0x230 [ 27.457027] kunit_try_run_case+0x1a5/0x480 [ 27.457568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.457605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.457650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.457681] ? __kthread_parkme+0x82/0x180 [ 27.457708] ? preempt_count_sub+0x50/0x80 [ 27.457740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.457771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.457804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.457839] kthread+0x337/0x6f0 [ 27.457865] ? trace_preempt_on+0x20/0xc0 [ 27.457895] ? __pfx_kthread+0x10/0x10 [ 27.457923] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.457955] ? calculate_sigpending+0x7b/0xa0 [ 27.457986] ? __pfx_kthread+0x10/0x10 [ 27.458015] ret_from_fork+0x116/0x1d0 [ 27.458041] ? __pfx_kthread+0x10/0x10 [ 27.458069] ret_from_fork_asm+0x1a/0x30 [ 27.458111] </TASK> [ 27.458124] [ 27.469578] Allocated by task 313: [ 27.469920] kasan_save_stack+0x45/0x70 [ 27.470123] kasan_save_track+0x18/0x40 [ 27.470305] kasan_save_alloc_info+0x3b/0x50 [ 27.470507] __kasan_kmalloc+0xb7/0xc0 [ 27.470731] __kmalloc_cache_noprof+0x189/0x420 [ 27.470893] kasan_atomics+0x95/0x310 [ 27.471124] kunit_try_run_case+0x1a5/0x480 [ 27.471338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.471583] kthread+0x337/0x6f0 [ 27.471781] ret_from_fork+0x116/0x1d0 [ 27.471939] ret_from_fork_asm+0x1a/0x30 [ 27.472093] [ 27.472188] The buggy address belongs to the object at ffff888105926b00 [ 27.472188] which belongs to the cache kmalloc-64 of size 64 [ 27.472961] The buggy address is located 0 bytes to the right of [ 27.472961] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.473881] [ 27.473981] The buggy address belongs to the physical page: [ 27.474378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.474917] flags: 0x200000000000000(node=0|zone=2) [ 27.475129] page_type: f5(slab) [ 27.475428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.475895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.476236] page dumped because: kasan: bad access detected [ 27.476481] [ 27.476580] Memory state around the buggy address: [ 27.477079] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.477459] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.477942] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.478377] ^ [ 27.478593] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.479033] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.479344] ================================================================== [ 27.218231] ================================================================== [ 27.218564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 27.218872] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.219201] [ 27.219311] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.219363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.219380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.219404] Call Trace: [ 27.219421] <TASK> [ 27.219438] dump_stack_lvl+0x73/0xb0 [ 27.219471] print_report+0xd1/0x610 [ 27.219501] ? __virt_addr_valid+0x1db/0x2d0 [ 27.219543] ? kasan_atomics_helper+0x1217/0x5450 [ 27.219571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.219605] ? kasan_atomics_helper+0x1217/0x5450 [ 27.219646] kasan_report+0x141/0x180 [ 27.219677] ? kasan_atomics_helper+0x1217/0x5450 [ 27.219712] kasan_check_range+0x10c/0x1c0 [ 27.219743] __kasan_check_write+0x18/0x20 [ 27.219772] kasan_atomics_helper+0x1217/0x5450 [ 27.219804] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.219833] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.219863] ? kasan_atomics+0x152/0x310 [ 27.219898] kasan_atomics+0x1dc/0x310 [ 27.219928] ? __pfx_kasan_atomics+0x10/0x10 [ 27.219959] ? __pfx_read_tsc+0x10/0x10 [ 27.219987] ? ktime_get_ts64+0x86/0x230 [ 27.220019] kunit_try_run_case+0x1a5/0x480 [ 27.220049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.220078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.220107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.220138] ? __kthread_parkme+0x82/0x180 [ 27.220165] ? preempt_count_sub+0x50/0x80 [ 27.220197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.220227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.220261] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.220295] kthread+0x337/0x6f0 [ 27.220321] ? trace_preempt_on+0x20/0xc0 [ 27.220351] ? __pfx_kthread+0x10/0x10 [ 27.220379] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.220410] ? calculate_sigpending+0x7b/0xa0 [ 27.220440] ? __pfx_kthread+0x10/0x10 [ 27.220470] ret_from_fork+0x116/0x1d0 [ 27.220495] ? __pfx_kthread+0x10/0x10 [ 27.220523] ret_from_fork_asm+0x1a/0x30 [ 27.220574] </TASK> [ 27.220588] [ 27.228304] Allocated by task 313: [ 27.228489] kasan_save_stack+0x45/0x70 [ 27.228809] kasan_save_track+0x18/0x40 [ 27.228954] kasan_save_alloc_info+0x3b/0x50 [ 27.229154] __kasan_kmalloc+0xb7/0xc0 [ 27.229332] __kmalloc_cache_noprof+0x189/0x420 [ 27.230047] kasan_atomics+0x95/0x310 [ 27.230365] kunit_try_run_case+0x1a5/0x480 [ 27.230705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.231163] kthread+0x337/0x6f0 [ 27.231447] ret_from_fork+0x116/0x1d0 [ 27.231767] ret_from_fork_asm+0x1a/0x30 [ 27.232153] [ 27.232395] The buggy address belongs to the object at ffff888105926b00 [ 27.232395] which belongs to the cache kmalloc-64 of size 64 [ 27.232970] The buggy address is located 0 bytes to the right of [ 27.232970] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.233469] [ 27.233572] The buggy address belongs to the physical page: [ 27.234170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.234876] flags: 0x200000000000000(node=0|zone=2) [ 27.235326] page_type: f5(slab) [ 27.235581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.236083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.236415] page dumped because: kasan: bad access detected [ 27.236852] [ 27.236940] Memory state around the buggy address: [ 27.237381] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.237889] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.238194] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.238492] ^ [ 27.238802] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.239095] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.239379] ================================================================== [ 27.408707] ================================================================== [ 27.408998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 27.409348] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.409680] [ 27.409775] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.409829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.409844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.409878] Call Trace: [ 27.409895] <TASK> [ 27.409913] dump_stack_lvl+0x73/0xb0 [ 27.409948] print_report+0xd1/0x610 [ 27.409978] ? __virt_addr_valid+0x1db/0x2d0 [ 27.410009] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.410038] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.410083] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.410113] kasan_report+0x141/0x180 [ 27.410142] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.410190] kasan_check_range+0x10c/0x1c0 [ 27.410221] __kasan_check_write+0x18/0x20 [ 27.410251] kasan_atomics_helper+0x15b6/0x5450 [ 27.410282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.410311] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.410344] ? kasan_atomics+0x152/0x310 [ 27.410379] kasan_atomics+0x1dc/0x310 [ 27.410408] ? __pfx_kasan_atomics+0x10/0x10 [ 27.410440] ? __pfx_read_tsc+0x10/0x10 [ 27.410469] ? ktime_get_ts64+0x86/0x230 [ 27.410509] kunit_try_run_case+0x1a5/0x480 [ 27.410559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.410588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.410641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.410672] ? __kthread_parkme+0x82/0x180 [ 27.410700] ? preempt_count_sub+0x50/0x80 [ 27.410732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.410771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.410806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.410850] kthread+0x337/0x6f0 [ 27.410876] ? trace_preempt_on+0x20/0xc0 [ 27.410915] ? __pfx_kthread+0x10/0x10 [ 27.410943] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.410985] ? calculate_sigpending+0x7b/0xa0 [ 27.411018] ? __pfx_kthread+0x10/0x10 [ 27.411047] ret_from_fork+0x116/0x1d0 [ 27.411082] ? __pfx_kthread+0x10/0x10 [ 27.411111] ret_from_fork_asm+0x1a/0x30 [ 27.411164] </TASK> [ 27.411178] [ 27.419089] Allocated by task 313: [ 27.419285] kasan_save_stack+0x45/0x70 [ 27.419487] kasan_save_track+0x18/0x40 [ 27.419708] kasan_save_alloc_info+0x3b/0x50 [ 27.419911] __kasan_kmalloc+0xb7/0xc0 [ 27.420102] __kmalloc_cache_noprof+0x189/0x420 [ 27.420265] kasan_atomics+0x95/0x310 [ 27.420402] kunit_try_run_case+0x1a5/0x480 [ 27.420561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.420742] kthread+0x337/0x6f0 [ 27.420864] ret_from_fork+0x116/0x1d0 [ 27.421028] ret_from_fork_asm+0x1a/0x30 [ 27.421258] [ 27.421352] The buggy address belongs to the object at ffff888105926b00 [ 27.421352] which belongs to the cache kmalloc-64 of size 64 [ 27.422110] The buggy address is located 0 bytes to the right of [ 27.422110] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.423022] [ 27.423104] The buggy address belongs to the physical page: [ 27.423282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.423535] flags: 0x200000000000000(node=0|zone=2) [ 27.423700] page_type: f5(slab) [ 27.423912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.424259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.424640] page dumped because: kasan: bad access detected [ 27.424905] [ 27.425001] Memory state around the buggy address: [ 27.425233] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.425519] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.427014] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.427623] ^ [ 27.427930] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.428287] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.428687] ================================================================== [ 27.193770] ================================================================== [ 27.194112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 27.194423] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.194657] [ 27.196636] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.196697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.196716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.196741] Call Trace: [ 27.196761] <TASK> [ 27.196779] dump_stack_lvl+0x73/0xb0 [ 27.196816] print_report+0xd1/0x610 [ 27.196846] ? __virt_addr_valid+0x1db/0x2d0 [ 27.196878] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.196908] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.196942] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.196971] kasan_report+0x141/0x180 [ 27.197001] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.197038] __asan_report_load4_noabort+0x18/0x20 [ 27.197069] kasan_atomics_helper+0x4a02/0x5450 [ 27.197099] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.197129] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.197161] ? kasan_atomics+0x152/0x310 [ 27.197195] kasan_atomics+0x1dc/0x310 [ 27.197225] ? __pfx_kasan_atomics+0x10/0x10 [ 27.197257] ? __pfx_read_tsc+0x10/0x10 [ 27.197286] ? ktime_get_ts64+0x86/0x230 [ 27.197317] kunit_try_run_case+0x1a5/0x480 [ 27.197348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.197376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.197406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.197435] ? __kthread_parkme+0x82/0x180 [ 27.197463] ? preempt_count_sub+0x50/0x80 [ 27.197495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.197540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.197575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.197610] kthread+0x337/0x6f0 [ 27.197649] ? trace_preempt_on+0x20/0xc0 [ 27.197681] ? __pfx_kthread+0x10/0x10 [ 27.197708] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.197740] ? calculate_sigpending+0x7b/0xa0 [ 27.197772] ? __pfx_kthread+0x10/0x10 [ 27.197801] ret_from_fork+0x116/0x1d0 [ 27.197827] ? __pfx_kthread+0x10/0x10 [ 27.197855] ret_from_fork_asm+0x1a/0x30 [ 27.197896] </TASK> [ 27.197911] [ 27.209589] Allocated by task 313: [ 27.209889] kasan_save_stack+0x45/0x70 [ 27.210104] kasan_save_track+0x18/0x40 [ 27.210290] kasan_save_alloc_info+0x3b/0x50 [ 27.210492] __kasan_kmalloc+0xb7/0xc0 [ 27.210683] __kmalloc_cache_noprof+0x189/0x420 [ 27.210842] kasan_atomics+0x95/0x310 [ 27.211131] kunit_try_run_case+0x1a5/0x480 [ 27.211327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.211556] kthread+0x337/0x6f0 [ 27.211859] ret_from_fork+0x116/0x1d0 [ 27.212024] ret_from_fork_asm+0x1a/0x30 [ 27.212213] [ 27.212285] The buggy address belongs to the object at ffff888105926b00 [ 27.212285] which belongs to the cache kmalloc-64 of size 64 [ 27.212786] The buggy address is located 0 bytes to the right of [ 27.212786] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.213271] [ 27.213371] The buggy address belongs to the physical page: [ 27.213613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.213909] flags: 0x200000000000000(node=0|zone=2) [ 27.214145] page_type: f5(slab) [ 27.214297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.214602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.214930] page dumped because: kasan: bad access detected [ 27.215148] [ 27.215218] Memory state around the buggy address: [ 27.215373] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.215677] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.216010] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.216225] ^ [ 27.216428] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.216942] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.217224] ================================================================== [ 27.330804] ================================================================== [ 27.331426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 27.331852] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.332141] [ 27.332271] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.332324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.332341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.332365] Call Trace: [ 27.332381] <TASK> [ 27.332409] dump_stack_lvl+0x73/0xb0 [ 27.332443] print_report+0xd1/0x610 [ 27.332486] ? __virt_addr_valid+0x1db/0x2d0 [ 27.332517] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.332556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.332597] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.332626] kasan_report+0x141/0x180 [ 27.332675] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.332710] __asan_report_load8_noabort+0x18/0x20 [ 27.332741] kasan_atomics_helper+0x4eae/0x5450 [ 27.332782] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.332811] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.332855] ? kasan_atomics+0x152/0x310 [ 27.332890] kasan_atomics+0x1dc/0x310 [ 27.332929] ? __pfx_kasan_atomics+0x10/0x10 [ 27.332961] ? __pfx_read_tsc+0x10/0x10 [ 27.332999] ? ktime_get_ts64+0x86/0x230 [ 27.333032] kunit_try_run_case+0x1a5/0x480 [ 27.333072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.333100] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.333130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.333170] ? __kthread_parkme+0x82/0x180 [ 27.333198] ? preempt_count_sub+0x50/0x80 [ 27.333239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.333270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.333313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.333347] kthread+0x337/0x6f0 [ 27.333373] ? trace_preempt_on+0x20/0xc0 [ 27.333413] ? __pfx_kthread+0x10/0x10 [ 27.333441] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.333483] ? calculate_sigpending+0x7b/0xa0 [ 27.333515] ? __pfx_kthread+0x10/0x10 [ 27.333554] ret_from_fork+0x116/0x1d0 [ 27.333580] ? __pfx_kthread+0x10/0x10 [ 27.333608] ret_from_fork_asm+0x1a/0x30 [ 27.333670] </TASK> [ 27.333685] [ 27.341095] Allocated by task 313: [ 27.341339] kasan_save_stack+0x45/0x70 [ 27.341736] kasan_save_track+0x18/0x40 [ 27.342006] kasan_save_alloc_info+0x3b/0x50 [ 27.342232] __kasan_kmalloc+0xb7/0xc0 [ 27.342426] __kmalloc_cache_noprof+0x189/0x420 [ 27.342649] kasan_atomics+0x95/0x310 [ 27.342862] kunit_try_run_case+0x1a5/0x480 [ 27.343058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.343300] kthread+0x337/0x6f0 [ 27.343496] ret_from_fork+0x116/0x1d0 [ 27.343720] ret_from_fork_asm+0x1a/0x30 [ 27.343928] [ 27.344003] The buggy address belongs to the object at ffff888105926b00 [ 27.344003] which belongs to the cache kmalloc-64 of size 64 [ 27.344481] The buggy address is located 0 bytes to the right of [ 27.344481] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.345061] [ 27.345136] The buggy address belongs to the physical page: [ 27.345309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.345563] flags: 0x200000000000000(node=0|zone=2) [ 27.345793] page_type: f5(slab) [ 27.345970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.346333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.346683] page dumped because: kasan: bad access detected [ 27.346938] [ 27.347106] Memory state around the buggy address: [ 27.347328] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.347554] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.348130] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.348442] ^ [ 27.348706] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.348923] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.349184] ================================================================== [ 27.267277] ================================================================== [ 27.267760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 27.268130] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.268425] [ 27.268540] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.268596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.268611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.268638] Call Trace: [ 27.268657] <TASK> [ 27.268675] dump_stack_lvl+0x73/0xb0 [ 27.268709] print_report+0xd1/0x610 [ 27.268739] ? __virt_addr_valid+0x1db/0x2d0 [ 27.268769] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.268807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.268839] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.268868] kasan_report+0x141/0x180 [ 27.268898] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.268933] kasan_check_range+0x10c/0x1c0 [ 27.268963] __kasan_check_write+0x18/0x20 [ 27.268993] kasan_atomics_helper+0x12e6/0x5450 [ 27.269023] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.269052] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.269084] ? kasan_atomics+0x152/0x310 [ 27.269120] kasan_atomics+0x1dc/0x310 [ 27.269149] ? __pfx_kasan_atomics+0x10/0x10 [ 27.269183] ? __pfx_read_tsc+0x10/0x10 [ 27.269211] ? ktime_get_ts64+0x86/0x230 [ 27.269243] kunit_try_run_case+0x1a5/0x480 [ 27.269274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.269302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.269331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.269361] ? __kthread_parkme+0x82/0x180 [ 27.269388] ? preempt_count_sub+0x50/0x80 [ 27.269420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.269450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.269484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.269517] kthread+0x337/0x6f0 [ 27.269555] ? trace_preempt_on+0x20/0xc0 [ 27.269584] ? __pfx_kthread+0x10/0x10 [ 27.269612] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.269653] ? calculate_sigpending+0x7b/0xa0 [ 27.269684] ? __pfx_kthread+0x10/0x10 [ 27.269714] ret_from_fork+0x116/0x1d0 [ 27.269739] ? __pfx_kthread+0x10/0x10 [ 27.269767] ret_from_fork_asm+0x1a/0x30 [ 27.269809] </TASK> [ 27.269823] [ 27.276843] Allocated by task 313: [ 27.277024] kasan_save_stack+0x45/0x70 [ 27.277234] kasan_save_track+0x18/0x40 [ 27.277430] kasan_save_alloc_info+0x3b/0x50 [ 27.277709] __kasan_kmalloc+0xb7/0xc0 [ 27.277891] __kmalloc_cache_noprof+0x189/0x420 [ 27.278128] kasan_atomics+0x95/0x310 [ 27.278276] kunit_try_run_case+0x1a5/0x480 [ 27.278425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.278662] kthread+0x337/0x6f0 [ 27.278832] ret_from_fork+0x116/0x1d0 [ 27.279026] ret_from_fork_asm+0x1a/0x30 [ 27.279331] [ 27.279437] The buggy address belongs to the object at ffff888105926b00 [ 27.279437] which belongs to the cache kmalloc-64 of size 64 [ 27.279888] The buggy address is located 0 bytes to the right of [ 27.279888] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.280407] [ 27.280505] The buggy address belongs to the physical page: [ 27.280857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.281172] flags: 0x200000000000000(node=0|zone=2) [ 27.281358] page_type: f5(slab) [ 27.281478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.281815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.282192] page dumped because: kasan: bad access detected [ 27.282385] [ 27.282453] Memory state around the buggy address: [ 27.282744] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.283033] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.283312] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.283609] ^ [ 27.283796] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.284100] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.284315] ================================================================== [ 26.969320] ================================================================== [ 26.969690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 26.969969] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.970294] [ 26.970402] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.970454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.970469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.970500] Call Trace: [ 26.970517] <TASK> [ 26.970544] dump_stack_lvl+0x73/0xb0 [ 26.970579] print_report+0xd1/0x610 [ 26.970608] ? __virt_addr_valid+0x1db/0x2d0 [ 26.970639] ? kasan_atomics_helper+0xc70/0x5450 [ 26.970667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.970700] ? kasan_atomics_helper+0xc70/0x5450 [ 26.970728] kasan_report+0x141/0x180 [ 26.970758] ? kasan_atomics_helper+0xc70/0x5450 [ 26.970804] kasan_check_range+0x10c/0x1c0 [ 26.970835] __kasan_check_write+0x18/0x20 [ 26.970865] kasan_atomics_helper+0xc70/0x5450 [ 26.970918] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.970947] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.970979] ? kasan_atomics+0x152/0x310 [ 26.971014] kasan_atomics+0x1dc/0x310 [ 26.971061] ? __pfx_kasan_atomics+0x10/0x10 [ 26.971093] ? __pfx_read_tsc+0x10/0x10 [ 26.971120] ? ktime_get_ts64+0x86/0x230 [ 26.971154] kunit_try_run_case+0x1a5/0x480 [ 26.971184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.971227] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.971257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.971287] ? __kthread_parkme+0x82/0x180 [ 26.971314] ? preempt_count_sub+0x50/0x80 [ 26.971346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.971376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.971409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.971461] kthread+0x337/0x6f0 [ 26.971487] ? trace_preempt_on+0x20/0xc0 [ 26.971517] ? __pfx_kthread+0x10/0x10 [ 26.971556] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.971587] ? calculate_sigpending+0x7b/0xa0 [ 26.971644] ? __pfx_kthread+0x10/0x10 [ 26.971674] ret_from_fork+0x116/0x1d0 [ 26.971699] ? __pfx_kthread+0x10/0x10 [ 26.971727] ret_from_fork_asm+0x1a/0x30 [ 26.971770] </TASK> [ 26.971783] [ 26.979082] Allocated by task 313: [ 26.979260] kasan_save_stack+0x45/0x70 [ 26.979464] kasan_save_track+0x18/0x40 [ 26.979778] kasan_save_alloc_info+0x3b/0x50 [ 26.979962] __kasan_kmalloc+0xb7/0xc0 [ 26.980116] __kmalloc_cache_noprof+0x189/0x420 [ 26.980336] kasan_atomics+0x95/0x310 [ 26.980514] kunit_try_run_case+0x1a5/0x480 [ 26.980812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.981057] kthread+0x337/0x6f0 [ 26.981209] ret_from_fork+0x116/0x1d0 [ 26.981421] ret_from_fork_asm+0x1a/0x30 [ 26.981614] [ 26.981713] The buggy address belongs to the object at ffff888105926b00 [ 26.981713] which belongs to the cache kmalloc-64 of size 64 [ 26.982187] The buggy address is located 0 bytes to the right of [ 26.982187] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.982664] [ 26.982775] The buggy address belongs to the physical page: [ 26.983063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.983486] flags: 0x200000000000000(node=0|zone=2) [ 26.983833] page_type: f5(slab) [ 26.984126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.984458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.984692] page dumped because: kasan: bad access detected [ 26.984858] [ 26.984924] Memory state around the buggy address: [ 26.985074] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.985284] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.985786] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.986104] ^ [ 26.986351] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.986743] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.987096] ================================================================== [ 26.918883] ================================================================== [ 26.919239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 26.919843] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.920171] [ 26.920290] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.920354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.920370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.920395] Call Trace: [ 26.920423] <TASK> [ 26.920442] dump_stack_lvl+0x73/0xb0 [ 26.920478] print_report+0xd1/0x610 [ 26.920507] ? __virt_addr_valid+0x1db/0x2d0 [ 26.920549] ? kasan_atomics_helper+0xac7/0x5450 [ 26.920587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.920631] ? kasan_atomics_helper+0xac7/0x5450 [ 26.920661] kasan_report+0x141/0x180 [ 26.920700] ? kasan_atomics_helper+0xac7/0x5450 [ 26.920735] kasan_check_range+0x10c/0x1c0 [ 26.920776] __kasan_check_write+0x18/0x20 [ 26.920807] kasan_atomics_helper+0xac7/0x5450 [ 26.920836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.920875] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.920911] ? kasan_atomics+0x152/0x310 [ 26.920958] kasan_atomics+0x1dc/0x310 [ 26.920987] ? __pfx_kasan_atomics+0x10/0x10 [ 26.921029] ? __pfx_read_tsc+0x10/0x10 [ 26.921061] ? ktime_get_ts64+0x86/0x230 [ 26.921104] kunit_try_run_case+0x1a5/0x480 [ 26.921137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.921166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.921197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.921230] ? __kthread_parkme+0x82/0x180 [ 26.921258] ? preempt_count_sub+0x50/0x80 [ 26.921290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.921323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.921358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.921393] kthread+0x337/0x6f0 [ 26.921419] ? trace_preempt_on+0x20/0xc0 [ 26.921460] ? __pfx_kthread+0x10/0x10 [ 26.921488] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.921539] ? calculate_sigpending+0x7b/0xa0 [ 26.921571] ? __pfx_kthread+0x10/0x10 [ 26.921600] ret_from_fork+0x116/0x1d0 [ 26.921635] ? __pfx_kthread+0x10/0x10 [ 26.921672] ret_from_fork_asm+0x1a/0x30 [ 26.921726] </TASK> [ 26.921740] [ 26.929412] Allocated by task 313: [ 26.929620] kasan_save_stack+0x45/0x70 [ 26.929824] kasan_save_track+0x18/0x40 [ 26.929997] kasan_save_alloc_info+0x3b/0x50 [ 26.930219] __kasan_kmalloc+0xb7/0xc0 [ 26.930426] __kmalloc_cache_noprof+0x189/0x420 [ 26.930644] kasan_atomics+0x95/0x310 [ 26.930851] kunit_try_run_case+0x1a5/0x480 [ 26.931064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.931248] kthread+0x337/0x6f0 [ 26.931500] ret_from_fork+0x116/0x1d0 [ 26.931708] ret_from_fork_asm+0x1a/0x30 [ 26.932029] [ 26.932117] The buggy address belongs to the object at ffff888105926b00 [ 26.932117] which belongs to the cache kmalloc-64 of size 64 [ 26.932575] The buggy address is located 0 bytes to the right of [ 26.932575] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.933110] [ 26.933200] The buggy address belongs to the physical page: [ 26.933460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.933868] flags: 0x200000000000000(node=0|zone=2) [ 26.934096] page_type: f5(slab) [ 26.934274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.934628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.934956] page dumped because: kasan: bad access detected [ 26.935196] [ 26.935292] Memory state around the buggy address: [ 26.935501] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.935741] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.938313] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.939384] ^ [ 26.940160] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.941226] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.941952] ================================================================== [ 27.887020] ================================================================== [ 27.887368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 27.887856] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.888196] [ 27.888310] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.888363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.888379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.888403] Call Trace: [ 27.888418] <TASK> [ 27.888435] dump_stack_lvl+0x73/0xb0 [ 27.888469] print_report+0xd1/0x610 [ 27.888499] ? __virt_addr_valid+0x1db/0x2d0 [ 27.888539] ? kasan_atomics_helper+0x224c/0x5450 [ 27.888568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.888621] ? kasan_atomics_helper+0x224c/0x5450 [ 27.888651] kasan_report+0x141/0x180 [ 27.888680] ? kasan_atomics_helper+0x224c/0x5450 [ 27.888716] kasan_check_range+0x10c/0x1c0 [ 27.888747] __kasan_check_write+0x18/0x20 [ 27.888778] kasan_atomics_helper+0x224c/0x5450 [ 27.888808] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.888838] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.888870] ? kasan_atomics+0x152/0x310 [ 27.888906] kasan_atomics+0x1dc/0x310 [ 27.888936] ? __pfx_kasan_atomics+0x10/0x10 [ 27.888968] ? __pfx_read_tsc+0x10/0x10 [ 27.888997] ? ktime_get_ts64+0x86/0x230 [ 27.889029] kunit_try_run_case+0x1a5/0x480 [ 27.889059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.889088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.889117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.889148] ? __kthread_parkme+0x82/0x180 [ 27.889176] ? preempt_count_sub+0x50/0x80 [ 27.889208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.889239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.889273] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.889306] kthread+0x337/0x6f0 [ 27.889333] ? trace_preempt_on+0x20/0xc0 [ 27.889363] ? __pfx_kthread+0x10/0x10 [ 27.889392] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.889423] ? calculate_sigpending+0x7b/0xa0 [ 27.889454] ? __pfx_kthread+0x10/0x10 [ 27.889484] ret_from_fork+0x116/0x1d0 [ 27.889511] ? __pfx_kthread+0x10/0x10 [ 27.889546] ret_from_fork_asm+0x1a/0x30 [ 27.889619] </TASK> [ 27.889633] [ 27.896575] Allocated by task 313: [ 27.896770] kasan_save_stack+0x45/0x70 [ 27.896971] kasan_save_track+0x18/0x40 [ 27.897167] kasan_save_alloc_info+0x3b/0x50 [ 27.897381] __kasan_kmalloc+0xb7/0xc0 [ 27.897547] __kmalloc_cache_noprof+0x189/0x420 [ 27.897731] kasan_atomics+0x95/0x310 [ 27.897871] kunit_try_run_case+0x1a5/0x480 [ 27.898021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.898202] kthread+0x337/0x6f0 [ 27.898372] ret_from_fork+0x116/0x1d0 [ 27.898577] ret_from_fork_asm+0x1a/0x30 [ 27.898795] [ 27.898891] The buggy address belongs to the object at ffff888105926b00 [ 27.898891] which belongs to the cache kmalloc-64 of size 64 [ 27.899433] The buggy address is located 0 bytes to the right of [ 27.899433] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.900015] [ 27.900110] The buggy address belongs to the physical page: [ 27.900319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.900572] flags: 0x200000000000000(node=0|zone=2) [ 27.900754] page_type: f5(slab) [ 27.900874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.901109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.901335] page dumped because: kasan: bad access detected [ 27.901579] [ 27.901698] Memory state around the buggy address: [ 27.901920] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.902229] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.902548] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.902886] ^ [ 27.903112] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.903426] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.903732] ================================================================== [ 26.900155] ================================================================== [ 26.900454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 26.900915] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.901242] [ 26.901344] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.901405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.901421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.901446] Call Trace: [ 26.901473] <TASK> [ 26.901492] dump_stack_lvl+0x73/0xb0 [ 26.901536] print_report+0xd1/0x610 [ 26.901566] ? __virt_addr_valid+0x1db/0x2d0 [ 26.901690] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.901718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.901752] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.901901] kasan_report+0x141/0x180 [ 26.901933] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.902039] kasan_check_range+0x10c/0x1c0 [ 26.902070] __kasan_check_write+0x18/0x20 [ 26.902101] kasan_atomics_helper+0xa2b/0x5450 [ 26.902131] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.902161] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.902193] ? kasan_atomics+0x152/0x310 [ 26.902228] kasan_atomics+0x1dc/0x310 [ 26.902257] ? __pfx_kasan_atomics+0x10/0x10 [ 26.902289] ? __pfx_read_tsc+0x10/0x10 [ 26.902318] ? ktime_get_ts64+0x86/0x230 [ 26.902350] kunit_try_run_case+0x1a5/0x480 [ 26.902381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.902409] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.902438] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.902468] ? __kthread_parkme+0x82/0x180 [ 26.902500] ? preempt_count_sub+0x50/0x80 [ 26.902543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.902575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.902608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.902653] kthread+0x337/0x6f0 [ 26.902680] ? trace_preempt_on+0x20/0xc0 [ 26.902711] ? __pfx_kthread+0x10/0x10 [ 26.902739] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.902772] ? calculate_sigpending+0x7b/0xa0 [ 26.902803] ? __pfx_kthread+0x10/0x10 [ 26.902832] ret_from_fork+0x116/0x1d0 [ 26.902858] ? __pfx_kthread+0x10/0x10 [ 26.902886] ret_from_fork_asm+0x1a/0x30 [ 26.902929] </TASK> [ 26.902943] [ 26.910429] Allocated by task 313: [ 26.910635] kasan_save_stack+0x45/0x70 [ 26.910866] kasan_save_track+0x18/0x40 [ 26.911091] kasan_save_alloc_info+0x3b/0x50 [ 26.911331] __kasan_kmalloc+0xb7/0xc0 [ 26.911539] __kmalloc_cache_noprof+0x189/0x420 [ 26.911821] kasan_atomics+0x95/0x310 [ 26.911958] kunit_try_run_case+0x1a5/0x480 [ 26.912205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.912445] kthread+0x337/0x6f0 [ 26.912582] ret_from_fork+0x116/0x1d0 [ 26.912723] ret_from_fork_asm+0x1a/0x30 [ 26.912867] [ 26.912938] The buggy address belongs to the object at ffff888105926b00 [ 26.912938] which belongs to the cache kmalloc-64 of size 64 [ 26.913541] The buggy address is located 0 bytes to the right of [ 26.913541] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.914086] [ 26.914179] The buggy address belongs to the physical page: [ 26.914378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.914632] flags: 0x200000000000000(node=0|zone=2) [ 26.914885] page_type: f5(slab) [ 26.915055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.915476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.915851] page dumped because: kasan: bad access detected [ 26.916102] [ 26.916196] Memory state around the buggy address: [ 26.916403] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.916652] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.917032] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.917347] ^ [ 26.917503] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.917981] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.918276] ================================================================== [ 26.710541] ================================================================== [ 26.711244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 26.711598] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.712107] [ 26.712236] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.712300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.712316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.712341] Call Trace: [ 26.712368] <TASK> [ 26.712385] dump_stack_lvl+0x73/0xb0 [ 26.712420] print_report+0xd1/0x610 [ 26.712450] ? __virt_addr_valid+0x1db/0x2d0 [ 26.712481] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.712508] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.712554] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.712583] kasan_report+0x141/0x180 [ 26.712612] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.712649] __asan_report_store4_noabort+0x1b/0x30 [ 26.712737] kasan_atomics_helper+0x4b3a/0x5450 [ 26.712769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.712809] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.712841] ? kasan_atomics+0x152/0x310 [ 26.712896] kasan_atomics+0x1dc/0x310 [ 26.712926] ? __pfx_kasan_atomics+0x10/0x10 [ 26.712958] ? __pfx_read_tsc+0x10/0x10 [ 26.712996] ? ktime_get_ts64+0x86/0x230 [ 26.713029] kunit_try_run_case+0x1a5/0x480 [ 26.713059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.713087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.713118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.713147] ? __kthread_parkme+0x82/0x180 [ 26.713174] ? preempt_count_sub+0x50/0x80 [ 26.713206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.713235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.713269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.713302] kthread+0x337/0x6f0 [ 26.713329] ? trace_preempt_on+0x20/0xc0 [ 26.713360] ? __pfx_kthread+0x10/0x10 [ 26.713388] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.713418] ? calculate_sigpending+0x7b/0xa0 [ 26.713459] ? __pfx_kthread+0x10/0x10 [ 26.713489] ret_from_fork+0x116/0x1d0 [ 26.713536] ? __pfx_kthread+0x10/0x10 [ 26.713564] ret_from_fork_asm+0x1a/0x30 [ 26.713607] </TASK> [ 26.713620] [ 26.721699] Allocated by task 313: [ 26.721883] kasan_save_stack+0x45/0x70 [ 26.722180] kasan_save_track+0x18/0x40 [ 26.722405] kasan_save_alloc_info+0x3b/0x50 [ 26.722581] __kasan_kmalloc+0xb7/0xc0 [ 26.722720] __kmalloc_cache_noprof+0x189/0x420 [ 26.723038] kasan_atomics+0x95/0x310 [ 26.723391] kunit_try_run_case+0x1a5/0x480 [ 26.723624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.723934] kthread+0x337/0x6f0 [ 26.724100] ret_from_fork+0x116/0x1d0 [ 26.724309] ret_from_fork_asm+0x1a/0x30 [ 26.724524] [ 26.724687] The buggy address belongs to the object at ffff888105926b00 [ 26.724687] which belongs to the cache kmalloc-64 of size 64 [ 26.725187] The buggy address is located 0 bytes to the right of [ 26.725187] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.725583] [ 26.725806] The buggy address belongs to the physical page: [ 26.726115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.726467] flags: 0x200000000000000(node=0|zone=2) [ 26.726867] page_type: f5(slab) [ 26.727035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.727271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.727621] page dumped because: kasan: bad access detected [ 26.727878] [ 26.728160] Memory state around the buggy address: [ 26.728421] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.728805] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.729128] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.729438] ^ [ 26.729741] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.730069] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.730380] ================================================================== [ 27.544338] ================================================================== [ 27.544872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 27.545205] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.545514] [ 27.545605] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.545668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.545684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.545708] Call Trace: [ 27.545723] <TASK> [ 27.545740] dump_stack_lvl+0x73/0xb0 [ 27.545799] print_report+0xd1/0x610 [ 27.545830] ? __virt_addr_valid+0x1db/0x2d0 [ 27.545860] ? kasan_atomics_helper+0x194a/0x5450 [ 27.545887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.545920] ? kasan_atomics_helper+0x194a/0x5450 [ 27.545949] kasan_report+0x141/0x180 [ 27.545978] ? kasan_atomics_helper+0x194a/0x5450 [ 27.546014] kasan_check_range+0x10c/0x1c0 [ 27.546044] __kasan_check_write+0x18/0x20 [ 27.546074] kasan_atomics_helper+0x194a/0x5450 [ 27.546103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.546132] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.546164] ? kasan_atomics+0x152/0x310 [ 27.546198] kasan_atomics+0x1dc/0x310 [ 27.546247] ? __pfx_kasan_atomics+0x10/0x10 [ 27.546278] ? __pfx_read_tsc+0x10/0x10 [ 27.546322] ? ktime_get_ts64+0x86/0x230 [ 27.546367] kunit_try_run_case+0x1a5/0x480 [ 27.546412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.546452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.546511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.546567] ? __kthread_parkme+0x82/0x180 [ 27.546596] ? preempt_count_sub+0x50/0x80 [ 27.546642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.546674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.546709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.546742] kthread+0x337/0x6f0 [ 27.546769] ? trace_preempt_on+0x20/0xc0 [ 27.546799] ? __pfx_kthread+0x10/0x10 [ 27.546827] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.546859] ? calculate_sigpending+0x7b/0xa0 [ 27.546889] ? __pfx_kthread+0x10/0x10 [ 27.546919] ret_from_fork+0x116/0x1d0 [ 27.546944] ? __pfx_kthread+0x10/0x10 [ 27.546972] ret_from_fork_asm+0x1a/0x30 [ 27.547014] </TASK> [ 27.547028] [ 27.554895] Allocated by task 313: [ 27.555067] kasan_save_stack+0x45/0x70 [ 27.555224] kasan_save_track+0x18/0x40 [ 27.555385] kasan_save_alloc_info+0x3b/0x50 [ 27.555634] __kasan_kmalloc+0xb7/0xc0 [ 27.555822] __kmalloc_cache_noprof+0x189/0x420 [ 27.556036] kasan_atomics+0x95/0x310 [ 27.556237] kunit_try_run_case+0x1a5/0x480 [ 27.556441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.556701] kthread+0x337/0x6f0 [ 27.556862] ret_from_fork+0x116/0x1d0 [ 27.557069] ret_from_fork_asm+0x1a/0x30 [ 27.557248] [ 27.557361] The buggy address belongs to the object at ffff888105926b00 [ 27.557361] which belongs to the cache kmalloc-64 of size 64 [ 27.557841] The buggy address is located 0 bytes to the right of [ 27.557841] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.558398] [ 27.558495] The buggy address belongs to the physical page: [ 27.558752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.559069] flags: 0x200000000000000(node=0|zone=2) [ 27.559337] page_type: f5(slab) [ 27.559557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.559896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.560230] page dumped because: kasan: bad access detected [ 27.560479] [ 27.560593] Memory state around the buggy address: [ 27.560815] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.561028] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.561239] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.561481] ^ [ 27.561822] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.562166] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.562489] ================================================================== [ 27.766709] ================================================================== [ 27.767089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 27.767460] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.767837] [ 27.767952] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.768015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.768031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.768068] Call Trace: [ 27.768088] <TASK> [ 27.768106] dump_stack_lvl+0x73/0xb0 [ 27.768150] print_report+0xd1/0x610 [ 27.768181] ? __virt_addr_valid+0x1db/0x2d0 [ 27.768211] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.768250] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.768284] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.768314] kasan_report+0x141/0x180 [ 27.768344] ? kasan_atomics_helper+0x4f71/0x5450 [ 27.768380] __asan_report_load8_noabort+0x18/0x20 [ 27.768411] kasan_atomics_helper+0x4f71/0x5450 [ 27.768442] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.768471] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.768502] ? kasan_atomics+0x152/0x310 [ 27.768552] kasan_atomics+0x1dc/0x310 [ 27.768582] ? __pfx_kasan_atomics+0x10/0x10 [ 27.768639] ? __pfx_read_tsc+0x10/0x10 [ 27.768669] ? ktime_get_ts64+0x86/0x230 [ 27.768703] kunit_try_run_case+0x1a5/0x480 [ 27.768744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.768772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.768811] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.768841] ? __kthread_parkme+0x82/0x180 [ 27.768869] ? preempt_count_sub+0x50/0x80 [ 27.768901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.768933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.768966] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.769000] kthread+0x337/0x6f0 [ 27.769027] ? trace_preempt_on+0x20/0xc0 [ 27.769057] ? __pfx_kthread+0x10/0x10 [ 27.769094] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.769126] ? calculate_sigpending+0x7b/0xa0 [ 27.769157] ? __pfx_kthread+0x10/0x10 [ 27.769197] ret_from_fork+0x116/0x1d0 [ 27.769224] ? __pfx_kthread+0x10/0x10 [ 27.769263] ret_from_fork_asm+0x1a/0x30 [ 27.769305] </TASK> [ 27.769330] [ 27.776504] Allocated by task 313: [ 27.776737] kasan_save_stack+0x45/0x70 [ 27.776941] kasan_save_track+0x18/0x40 [ 27.777153] kasan_save_alloc_info+0x3b/0x50 [ 27.777381] __kasan_kmalloc+0xb7/0xc0 [ 27.777585] __kmalloc_cache_noprof+0x189/0x420 [ 27.777804] kasan_atomics+0x95/0x310 [ 27.777945] kunit_try_run_case+0x1a5/0x480 [ 27.778092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.778377] kthread+0x337/0x6f0 [ 27.778588] ret_from_fork+0x116/0x1d0 [ 27.778801] ret_from_fork_asm+0x1a/0x30 [ 27.779025] [ 27.779123] The buggy address belongs to the object at ffff888105926b00 [ 27.779123] which belongs to the cache kmalloc-64 of size 64 [ 27.779638] The buggy address is located 0 bytes to the right of [ 27.779638] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.780158] [ 27.780276] The buggy address belongs to the physical page: [ 27.780504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.780865] flags: 0x200000000000000(node=0|zone=2) [ 27.781086] page_type: f5(slab) [ 27.781207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.781444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.781708] page dumped because: kasan: bad access detected [ 27.781988] [ 27.782080] Memory state around the buggy address: [ 27.782301] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.782655] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.782960] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.783174] ^ [ 27.783331] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.783556] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.783927] ================================================================== [ 26.853001] ================================================================== [ 26.853321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 26.853737] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.854084] [ 26.854258] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.854328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.854346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.854371] Call Trace: [ 26.854421] <TASK> [ 26.854441] dump_stack_lvl+0x73/0xb0 [ 26.854495] print_report+0xd1/0x610 [ 26.854536] ? __virt_addr_valid+0x1db/0x2d0 [ 26.854566] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.854636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.854670] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.854698] kasan_report+0x141/0x180 [ 26.854763] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.854810] kasan_check_range+0x10c/0x1c0 [ 26.854842] __kasan_check_write+0x18/0x20 [ 26.854873] kasan_atomics_helper+0x8f9/0x5450 [ 26.854904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.854934] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.854995] ? kasan_atomics+0x152/0x310 [ 26.855040] kasan_atomics+0x1dc/0x310 [ 26.855071] ? __pfx_kasan_atomics+0x10/0x10 [ 26.855103] ? __pfx_read_tsc+0x10/0x10 [ 26.855131] ? ktime_get_ts64+0x86/0x230 [ 26.855165] kunit_try_run_case+0x1a5/0x480 [ 26.855194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.855222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.855252] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.855282] ? __kthread_parkme+0x82/0x180 [ 26.855310] ? preempt_count_sub+0x50/0x80 [ 26.855341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.855371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.855404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.855438] kthread+0x337/0x6f0 [ 26.855464] ? trace_preempt_on+0x20/0xc0 [ 26.855494] ? __pfx_kthread+0x10/0x10 [ 26.855521] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.855564] ? calculate_sigpending+0x7b/0xa0 [ 26.855640] ? __pfx_kthread+0x10/0x10 [ 26.855669] ret_from_fork+0x116/0x1d0 [ 26.855696] ? __pfx_kthread+0x10/0x10 [ 26.855724] ret_from_fork_asm+0x1a/0x30 [ 26.855766] </TASK> [ 26.855780] [ 26.864346] Allocated by task 313: [ 26.864479] kasan_save_stack+0x45/0x70 [ 26.864938] kasan_save_track+0x18/0x40 [ 26.865127] kasan_save_alloc_info+0x3b/0x50 [ 26.865320] __kasan_kmalloc+0xb7/0xc0 [ 26.865484] __kmalloc_cache_noprof+0x189/0x420 [ 26.866306] kasan_atomics+0x95/0x310 [ 26.866466] kunit_try_run_case+0x1a5/0x480 [ 26.866803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.867360] kthread+0x337/0x6f0 [ 26.867914] ret_from_fork+0x116/0x1d0 [ 26.868136] ret_from_fork_asm+0x1a/0x30 [ 26.868323] [ 26.868410] The buggy address belongs to the object at ffff888105926b00 [ 26.868410] which belongs to the cache kmalloc-64 of size 64 [ 26.869571] The buggy address is located 0 bytes to the right of [ 26.869571] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.870705] [ 26.870895] The buggy address belongs to the physical page: [ 26.871397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.872040] flags: 0x200000000000000(node=0|zone=2) [ 26.872407] page_type: f5(slab) [ 26.872763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.873103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.873411] page dumped because: kasan: bad access detected [ 26.873767] [ 26.873857] Memory state around the buggy address: [ 26.874064] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.874359] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.875213] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.876168] ^ [ 26.876540] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.877117] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.877763] ================================================================== [ 26.570021] ================================================================== [ 26.570339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 26.570698] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.571165] [ 26.571264] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.571339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.571353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.571377] Call Trace: [ 26.571391] <TASK> [ 26.571410] dump_stack_lvl+0x73/0xb0 [ 26.571444] print_report+0xd1/0x610 [ 26.571493] ? __virt_addr_valid+0x1db/0x2d0 [ 26.571524] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.571562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.571867] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.571897] kasan_report+0x141/0x180 [ 26.571926] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.571960] __asan_report_store4_noabort+0x1b/0x30 [ 26.572010] kasan_atomics_helper+0x4ba2/0x5450 [ 26.572039] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.572067] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.572099] ? kasan_atomics+0x152/0x310 [ 26.572132] kasan_atomics+0x1dc/0x310 [ 26.572161] ? __pfx_kasan_atomics+0x10/0x10 [ 26.572191] ? __pfx_read_tsc+0x10/0x10 [ 26.572219] ? ktime_get_ts64+0x86/0x230 [ 26.572251] kunit_try_run_case+0x1a5/0x480 [ 26.572281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.572308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.572357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.572386] ? __kthread_parkme+0x82/0x180 [ 26.572413] ? preempt_count_sub+0x50/0x80 [ 26.572443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.572472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.572505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.572550] kthread+0x337/0x6f0 [ 26.572575] ? trace_preempt_on+0x20/0xc0 [ 26.572607] ? __pfx_kthread+0x10/0x10 [ 26.572633] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.572664] ? calculate_sigpending+0x7b/0xa0 [ 26.572695] ? __pfx_kthread+0x10/0x10 [ 26.572722] ret_from_fork+0x116/0x1d0 [ 26.572748] ? __pfx_kthread+0x10/0x10 [ 26.572774] ret_from_fork_asm+0x1a/0x30 [ 26.572815] </TASK> [ 26.572828] [ 26.585958] Allocated by task 313: [ 26.586298] kasan_save_stack+0x45/0x70 [ 26.586669] kasan_save_track+0x18/0x40 [ 26.587257] kasan_save_alloc_info+0x3b/0x50 [ 26.587690] __kasan_kmalloc+0xb7/0xc0 [ 26.588138] __kmalloc_cache_noprof+0x189/0x420 [ 26.588549] kasan_atomics+0x95/0x310 [ 26.588961] kunit_try_run_case+0x1a5/0x480 [ 26.589349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.589871] kthread+0x337/0x6f0 [ 26.590171] ret_from_fork+0x116/0x1d0 [ 26.590540] ret_from_fork_asm+0x1a/0x30 [ 26.590938] [ 26.591095] The buggy address belongs to the object at ffff888105926b00 [ 26.591095] which belongs to the cache kmalloc-64 of size 64 [ 26.592004] The buggy address is located 0 bytes to the right of [ 26.592004] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.592962] [ 26.593131] The buggy address belongs to the physical page: [ 26.593629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.593988] flags: 0x200000000000000(node=0|zone=2) [ 26.594155] page_type: f5(slab) [ 26.594278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.594521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.595289] page dumped because: kasan: bad access detected [ 26.595828] [ 26.595984] Memory state around the buggy address: [ 26.596394] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.597484] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.598234] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.598650] ^ [ 26.599163] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.599671] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.600294] ================================================================== [ 26.878460] ================================================================== [ 26.879056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 26.879375] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.879813] [ 26.879917] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.879970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.879987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.880011] Call Trace: [ 26.880028] <TASK> [ 26.880046] dump_stack_lvl+0x73/0xb0 [ 26.880080] print_report+0xd1/0x610 [ 26.880110] ? __virt_addr_valid+0x1db/0x2d0 [ 26.880141] ? kasan_atomics_helper+0x992/0x5450 [ 26.880169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.880202] ? kasan_atomics_helper+0x992/0x5450 [ 26.880232] kasan_report+0x141/0x180 [ 26.880262] ? kasan_atomics_helper+0x992/0x5450 [ 26.880297] kasan_check_range+0x10c/0x1c0 [ 26.880328] __kasan_check_write+0x18/0x20 [ 26.880359] kasan_atomics_helper+0x992/0x5450 [ 26.880390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.880419] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.880453] ? kasan_atomics+0x152/0x310 [ 26.880488] kasan_atomics+0x1dc/0x310 [ 26.880518] ? __pfx_kasan_atomics+0x10/0x10 [ 26.880611] ? __pfx_read_tsc+0x10/0x10 [ 26.880640] ? ktime_get_ts64+0x86/0x230 [ 26.880673] kunit_try_run_case+0x1a5/0x480 [ 26.880704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.880732] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.880762] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.880792] ? __kthread_parkme+0x82/0x180 [ 26.880820] ? preempt_count_sub+0x50/0x80 [ 26.880852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.880883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.880916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.880950] kthread+0x337/0x6f0 [ 26.880977] ? trace_preempt_on+0x20/0xc0 [ 26.881007] ? __pfx_kthread+0x10/0x10 [ 26.881051] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.881094] ? calculate_sigpending+0x7b/0xa0 [ 26.881125] ? __pfx_kthread+0x10/0x10 [ 26.881167] ret_from_fork+0x116/0x1d0 [ 26.881193] ? __pfx_kthread+0x10/0x10 [ 26.881221] ret_from_fork_asm+0x1a/0x30 [ 26.881263] </TASK> [ 26.881278] [ 26.889270] Allocated by task 313: [ 26.889480] kasan_save_stack+0x45/0x70 [ 26.889689] kasan_save_track+0x18/0x40 [ 26.889886] kasan_save_alloc_info+0x3b/0x50 [ 26.890117] __kasan_kmalloc+0xb7/0xc0 [ 26.890400] __kmalloc_cache_noprof+0x189/0x420 [ 26.890583] kasan_atomics+0x95/0x310 [ 26.890958] kunit_try_run_case+0x1a5/0x480 [ 26.891175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.891433] kthread+0x337/0x6f0 [ 26.891696] ret_from_fork+0x116/0x1d0 [ 26.891882] ret_from_fork_asm+0x1a/0x30 [ 26.892031] [ 26.892103] The buggy address belongs to the object at ffff888105926b00 [ 26.892103] which belongs to the cache kmalloc-64 of size 64 [ 26.892550] The buggy address is located 0 bytes to the right of [ 26.892550] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.893303] [ 26.893490] The buggy address belongs to the physical page: [ 26.893771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.894026] flags: 0x200000000000000(node=0|zone=2) [ 26.894263] page_type: f5(slab) [ 26.894460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.894999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.895330] page dumped because: kasan: bad access detected [ 26.895585] [ 26.895690] Memory state around the buggy address: [ 26.896033] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.896262] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.896643] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.897126] ^ [ 26.897301] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.897518] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.898133] ================================================================== [ 27.023987] ================================================================== [ 27.024515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 27.024768] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.025319] [ 27.025444] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.025499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.025515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.025550] Call Trace: [ 27.025568] <TASK> [ 27.025585] dump_stack_lvl+0x73/0xb0 [ 27.025619] print_report+0xd1/0x610 [ 27.025651] ? __virt_addr_valid+0x1db/0x2d0 [ 27.025682] ? kasan_atomics_helper+0xde0/0x5450 [ 27.025736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.025771] ? kasan_atomics_helper+0xde0/0x5450 [ 27.025801] kasan_report+0x141/0x180 [ 27.025849] ? kasan_atomics_helper+0xde0/0x5450 [ 27.025885] kasan_check_range+0x10c/0x1c0 [ 27.025932] __kasan_check_write+0x18/0x20 [ 27.025968] kasan_atomics_helper+0xde0/0x5450 [ 27.026016] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.026046] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.026095] ? kasan_atomics+0x152/0x310 [ 27.026130] kasan_atomics+0x1dc/0x310 [ 27.026160] ? __pfx_kasan_atomics+0x10/0x10 [ 27.026192] ? __pfx_read_tsc+0x10/0x10 [ 27.026221] ? ktime_get_ts64+0x86/0x230 [ 27.026272] kunit_try_run_case+0x1a5/0x480 [ 27.026303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.026331] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.026360] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.026408] ? __kthread_parkme+0x82/0x180 [ 27.026435] ? preempt_count_sub+0x50/0x80 [ 27.026468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.026502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.026546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.026598] kthread+0x337/0x6f0 [ 27.026632] ? trace_preempt_on+0x20/0xc0 [ 27.026661] ? __pfx_kthread+0x10/0x10 [ 27.026689] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.026720] ? calculate_sigpending+0x7b/0xa0 [ 27.026766] ? __pfx_kthread+0x10/0x10 [ 27.026810] ret_from_fork+0x116/0x1d0 [ 27.026861] ? __pfx_kthread+0x10/0x10 [ 27.026903] ret_from_fork_asm+0x1a/0x30 [ 27.026970] </TASK> [ 27.026997] [ 27.040925] Allocated by task 313: [ 27.041061] kasan_save_stack+0x45/0x70 [ 27.041210] kasan_save_track+0x18/0x40 [ 27.041345] kasan_save_alloc_info+0x3b/0x50 [ 27.041496] __kasan_kmalloc+0xb7/0xc0 [ 27.041801] __kmalloc_cache_noprof+0x189/0x420 [ 27.042305] kasan_atomics+0x95/0x310 [ 27.042588] kunit_try_run_case+0x1a5/0x480 [ 27.042835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.043086] kthread+0x337/0x6f0 [ 27.043425] ret_from_fork+0x116/0x1d0 [ 27.043712] ret_from_fork_asm+0x1a/0x30 [ 27.044043] [ 27.044282] The buggy address belongs to the object at ffff888105926b00 [ 27.044282] which belongs to the cache kmalloc-64 of size 64 [ 27.044941] The buggy address is located 0 bytes to the right of [ 27.044941] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.045592] [ 27.045725] The buggy address belongs to the physical page: [ 27.046155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.046508] flags: 0x200000000000000(node=0|zone=2) [ 27.046909] page_type: f5(slab) [ 27.047175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.047493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.048078] page dumped because: kasan: bad access detected [ 27.048389] [ 27.048514] Memory state around the buggy address: [ 27.048906] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.049225] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.049693] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.050092] ^ [ 27.050408] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.050863] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.051145] ================================================================== [ 26.831701] ================================================================== [ 26.832225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 26.832658] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.833019] [ 26.833123] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.833179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.833195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.833222] Call Trace: [ 26.833276] <TASK> [ 26.833294] dump_stack_lvl+0x73/0xb0 [ 26.833343] print_report+0xd1/0x610 [ 26.833402] ? __virt_addr_valid+0x1db/0x2d0 [ 26.833434] ? kasan_atomics_helper+0x860/0x5450 [ 26.833473] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.833506] ? kasan_atomics_helper+0x860/0x5450 [ 26.833544] kasan_report+0x141/0x180 [ 26.833611] ? kasan_atomics_helper+0x860/0x5450 [ 26.833683] kasan_check_range+0x10c/0x1c0 [ 26.833715] __kasan_check_write+0x18/0x20 [ 26.833756] kasan_atomics_helper+0x860/0x5450 [ 26.833786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.833815] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.833849] ? kasan_atomics+0x152/0x310 [ 26.833883] kasan_atomics+0x1dc/0x310 [ 26.833943] ? __pfx_kasan_atomics+0x10/0x10 [ 26.833975] ? __pfx_read_tsc+0x10/0x10 [ 26.834014] ? ktime_get_ts64+0x86/0x230 [ 26.834048] kunit_try_run_case+0x1a5/0x480 [ 26.834079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.834107] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.834137] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.834167] ? __kthread_parkme+0x82/0x180 [ 26.834194] ? preempt_count_sub+0x50/0x80 [ 26.834226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.834257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.834290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.834324] kthread+0x337/0x6f0 [ 26.834350] ? trace_preempt_on+0x20/0xc0 [ 26.834382] ? __pfx_kthread+0x10/0x10 [ 26.834411] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.834442] ? calculate_sigpending+0x7b/0xa0 [ 26.834480] ? __pfx_kthread+0x10/0x10 [ 26.834509] ret_from_fork+0x116/0x1d0 [ 26.834544] ? __pfx_kthread+0x10/0x10 [ 26.834571] ret_from_fork_asm+0x1a/0x30 [ 26.834662] </TASK> [ 26.834676] [ 26.843581] Allocated by task 313: [ 26.843859] kasan_save_stack+0x45/0x70 [ 26.844073] kasan_save_track+0x18/0x40 [ 26.844239] kasan_save_alloc_info+0x3b/0x50 [ 26.844439] __kasan_kmalloc+0xb7/0xc0 [ 26.844734] __kmalloc_cache_noprof+0x189/0x420 [ 26.844902] kasan_atomics+0x95/0x310 [ 26.845096] kunit_try_run_case+0x1a5/0x480 [ 26.845357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.845789] kthread+0x337/0x6f0 [ 26.845950] ret_from_fork+0x116/0x1d0 [ 26.846090] ret_from_fork_asm+0x1a/0x30 [ 26.846296] [ 26.846391] The buggy address belongs to the object at ffff888105926b00 [ 26.846391] which belongs to the cache kmalloc-64 of size 64 [ 26.847154] The buggy address is located 0 bytes to the right of [ 26.847154] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.847559] [ 26.847895] The buggy address belongs to the physical page: [ 26.848227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.848591] flags: 0x200000000000000(node=0|zone=2) [ 26.848779] page_type: f5(slab) [ 26.848944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.849283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.849585] page dumped because: kasan: bad access detected [ 26.849904] [ 26.849980] Memory state around the buggy address: [ 26.850161] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.850484] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.850921] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.851263] ^ [ 26.851437] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.852019] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.852330] ================================================================== [ 26.943422] ================================================================== [ 26.944240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 26.944496] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.945230] [ 26.945337] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.945396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.945413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.945439] Call Trace: [ 26.945461] <TASK> [ 26.945484] dump_stack_lvl+0x73/0xb0 [ 26.945523] print_report+0xd1/0x610 [ 26.945565] ? __virt_addr_valid+0x1db/0x2d0 [ 26.945603] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.945880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.945917] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.945947] kasan_report+0x141/0x180 [ 26.945979] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.946014] kasan_check_range+0x10c/0x1c0 [ 26.946047] __kasan_check_write+0x18/0x20 [ 26.946076] kasan_atomics_helper+0xb6a/0x5450 [ 26.946105] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.946135] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.946167] ? kasan_atomics+0x152/0x310 [ 26.946201] kasan_atomics+0x1dc/0x310 [ 26.946232] ? __pfx_kasan_atomics+0x10/0x10 [ 26.946264] ? __pfx_read_tsc+0x10/0x10 [ 26.946292] ? ktime_get_ts64+0x86/0x230 [ 26.946325] kunit_try_run_case+0x1a5/0x480 [ 26.946356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.946384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.946414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.946444] ? __kthread_parkme+0x82/0x180 [ 26.946477] ? preempt_count_sub+0x50/0x80 [ 26.946509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.946553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.946586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.946634] kthread+0x337/0x6f0 [ 26.946661] ? trace_preempt_on+0x20/0xc0 [ 26.946692] ? __pfx_kthread+0x10/0x10 [ 26.946720] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.946752] ? calculate_sigpending+0x7b/0xa0 [ 26.946784] ? __pfx_kthread+0x10/0x10 [ 26.946813] ret_from_fork+0x116/0x1d0 [ 26.946839] ? __pfx_kthread+0x10/0x10 [ 26.946867] ret_from_fork_asm+0x1a/0x30 [ 26.946911] </TASK> [ 26.946926] [ 26.960619] Allocated by task 313: [ 26.961050] kasan_save_stack+0x45/0x70 [ 26.961206] kasan_save_track+0x18/0x40 [ 26.961343] kasan_save_alloc_info+0x3b/0x50 [ 26.961492] __kasan_kmalloc+0xb7/0xc0 [ 26.961681] __kmalloc_cache_noprof+0x189/0x420 [ 26.961948] kasan_atomics+0x95/0x310 [ 26.962134] kunit_try_run_case+0x1a5/0x480 [ 26.962341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.962540] kthread+0x337/0x6f0 [ 26.962722] ret_from_fork+0x116/0x1d0 [ 26.963083] ret_from_fork_asm+0x1a/0x30 [ 26.963236] [ 26.963333] The buggy address belongs to the object at ffff888105926b00 [ 26.963333] which belongs to the cache kmalloc-64 of size 64 [ 26.963864] The buggy address is located 0 bytes to the right of [ 26.963864] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.964360] [ 26.964430] The buggy address belongs to the physical page: [ 26.964609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.965067] flags: 0x200000000000000(node=0|zone=2) [ 26.965333] page_type: f5(slab) [ 26.965545] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.965911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.966210] page dumped because: kasan: bad access detected [ 26.966382] [ 26.966480] Memory state around the buggy address: [ 26.966728] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.967069] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.967391] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.967763] ^ [ 26.967963] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.968171] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.968482] ================================================================== [ 27.643787] ================================================================== [ 27.644131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 27.644467] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.644792] [ 27.644893] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.644945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.644961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.644986] Call Trace: [ 27.645001] <TASK> [ 27.645019] dump_stack_lvl+0x73/0xb0 [ 27.645051] print_report+0xd1/0x610 [ 27.645079] ? __virt_addr_valid+0x1db/0x2d0 [ 27.645110] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.645137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.645170] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.645199] kasan_report+0x141/0x180 [ 27.645229] ? kasan_atomics_helper+0x4f30/0x5450 [ 27.645264] __asan_report_load8_noabort+0x18/0x20 [ 27.645295] kasan_atomics_helper+0x4f30/0x5450 [ 27.645324] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.645353] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.645385] ? kasan_atomics+0x152/0x310 [ 27.645420] kasan_atomics+0x1dc/0x310 [ 27.645451] ? __pfx_kasan_atomics+0x10/0x10 [ 27.645481] ? __pfx_read_tsc+0x10/0x10 [ 27.645509] ? ktime_get_ts64+0x86/0x230 [ 27.645554] kunit_try_run_case+0x1a5/0x480 [ 27.645584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.645612] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.645642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.645671] ? __kthread_parkme+0x82/0x180 [ 27.645698] ? preempt_count_sub+0x50/0x80 [ 27.645730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.645759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.645793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.645826] kthread+0x337/0x6f0 [ 27.645852] ? trace_preempt_on+0x20/0xc0 [ 27.645882] ? __pfx_kthread+0x10/0x10 [ 27.645910] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.645941] ? calculate_sigpending+0x7b/0xa0 [ 27.645971] ? __pfx_kthread+0x10/0x10 [ 27.645999] ret_from_fork+0x116/0x1d0 [ 27.646025] ? __pfx_kthread+0x10/0x10 [ 27.646053] ret_from_fork_asm+0x1a/0x30 [ 27.646094] </TASK> [ 27.646107] [ 27.653337] Allocated by task 313: [ 27.653496] kasan_save_stack+0x45/0x70 [ 27.653718] kasan_save_track+0x18/0x40 [ 27.653904] kasan_save_alloc_info+0x3b/0x50 [ 27.654090] __kasan_kmalloc+0xb7/0xc0 [ 27.654225] __kmalloc_cache_noprof+0x189/0x420 [ 27.654382] kasan_atomics+0x95/0x310 [ 27.654541] kunit_try_run_case+0x1a5/0x480 [ 27.654814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.655075] kthread+0x337/0x6f0 [ 27.655244] ret_from_fork+0x116/0x1d0 [ 27.655403] ret_from_fork_asm+0x1a/0x30 [ 27.655552] [ 27.655623] The buggy address belongs to the object at ffff888105926b00 [ 27.655623] which belongs to the cache kmalloc-64 of size 64 [ 27.656165] The buggy address is located 0 bytes to the right of [ 27.656165] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.656677] [ 27.656771] The buggy address belongs to the physical page: [ 27.657005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.657284] flags: 0x200000000000000(node=0|zone=2) [ 27.657506] page_type: f5(slab) [ 27.657659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.658000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.658240] page dumped because: kasan: bad access detected [ 27.658497] [ 27.658579] Memory state around the buggy address: [ 27.658868] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.659139] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.659364] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.659911] ^ [ 27.660123] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.660410] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.660765] ================================================================== [ 26.790559] ================================================================== [ 26.790965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 26.791277] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.791720] [ 26.791818] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.791877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.791893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.791921] Call Trace: [ 26.791937] <TASK> [ 26.791953] dump_stack_lvl+0x73/0xb0 [ 26.791997] print_report+0xd1/0x610 [ 26.792027] ? __virt_addr_valid+0x1db/0x2d0 [ 26.792058] ? kasan_atomics_helper+0x72f/0x5450 [ 26.792088] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.792135] ? kasan_atomics_helper+0x72f/0x5450 [ 26.792165] kasan_report+0x141/0x180 [ 26.792195] ? kasan_atomics_helper+0x72f/0x5450 [ 26.792243] kasan_check_range+0x10c/0x1c0 [ 26.792275] __kasan_check_write+0x18/0x20 [ 26.792306] kasan_atomics_helper+0x72f/0x5450 [ 26.792338] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.792369] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.792401] ? kasan_atomics+0x152/0x310 [ 26.792437] kasan_atomics+0x1dc/0x310 [ 26.792467] ? __pfx_kasan_atomics+0x10/0x10 [ 26.792507] ? __pfx_read_tsc+0x10/0x10 [ 26.792552] ? ktime_get_ts64+0x86/0x230 [ 26.792638] kunit_try_run_case+0x1a5/0x480 [ 26.792671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.792701] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.792733] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.792764] ? __kthread_parkme+0x82/0x180 [ 26.792792] ? preempt_count_sub+0x50/0x80 [ 26.792825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.792857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.792891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.792927] kthread+0x337/0x6f0 [ 26.792953] ? trace_preempt_on+0x20/0xc0 [ 26.792984] ? __pfx_kthread+0x10/0x10 [ 26.793013] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.793045] ? calculate_sigpending+0x7b/0xa0 [ 26.793075] ? __pfx_kthread+0x10/0x10 [ 26.793106] ret_from_fork+0x116/0x1d0 [ 26.793133] ? __pfx_kthread+0x10/0x10 [ 26.793171] ret_from_fork_asm+0x1a/0x30 [ 26.793214] </TASK> [ 26.793228] [ 26.801468] Allocated by task 313: [ 26.801771] kasan_save_stack+0x45/0x70 [ 26.801982] kasan_save_track+0x18/0x40 [ 26.802127] kasan_save_alloc_info+0x3b/0x50 [ 26.802280] __kasan_kmalloc+0xb7/0xc0 [ 26.802488] __kmalloc_cache_noprof+0x189/0x420 [ 26.802733] kasan_atomics+0x95/0x310 [ 26.802930] kunit_try_run_case+0x1a5/0x480 [ 26.803291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.803482] kthread+0x337/0x6f0 [ 26.803788] ret_from_fork+0x116/0x1d0 [ 26.803980] ret_from_fork_asm+0x1a/0x30 [ 26.804241] [ 26.804346] The buggy address belongs to the object at ffff888105926b00 [ 26.804346] which belongs to the cache kmalloc-64 of size 64 [ 26.804942] The buggy address is located 0 bytes to the right of [ 26.804942] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.805491] [ 26.805597] The buggy address belongs to the physical page: [ 26.806163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.806461] flags: 0x200000000000000(node=0|zone=2) [ 26.806782] page_type: f5(slab) [ 26.807014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.807338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.807790] page dumped because: kasan: bad access detected [ 26.808077] [ 26.808199] Memory state around the buggy address: [ 26.808381] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.808777] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.809073] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.809293] ^ [ 26.809452] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.809786] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.810128] ================================================================== [ 27.134578] ================================================================== [ 27.135103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 27.135492] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.135739] [ 27.135825] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.135890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.135907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.135933] Call Trace: [ 27.135949] <TASK> [ 27.135967] dump_stack_lvl+0x73/0xb0 [ 27.136070] print_report+0xd1/0x610 [ 27.136129] ? __virt_addr_valid+0x1db/0x2d0 [ 27.136185] ? kasan_atomics_helper+0x1079/0x5450 [ 27.136241] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.136274] ? kasan_atomics_helper+0x1079/0x5450 [ 27.136304] kasan_report+0x141/0x180 [ 27.136334] ? kasan_atomics_helper+0x1079/0x5450 [ 27.136369] kasan_check_range+0x10c/0x1c0 [ 27.136400] __kasan_check_write+0x18/0x20 [ 27.136431] kasan_atomics_helper+0x1079/0x5450 [ 27.136461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.136491] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.136558] ? kasan_atomics+0x152/0x310 [ 27.136595] kasan_atomics+0x1dc/0x310 [ 27.136635] ? __pfx_kasan_atomics+0x10/0x10 [ 27.136668] ? __pfx_read_tsc+0x10/0x10 [ 27.136696] ? ktime_get_ts64+0x86/0x230 [ 27.136730] kunit_try_run_case+0x1a5/0x480 [ 27.136761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.136822] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.136854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.136884] ? __kthread_parkme+0x82/0x180 [ 27.136911] ? preempt_count_sub+0x50/0x80 [ 27.136974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.137005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.137039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.137104] kthread+0x337/0x6f0 [ 27.137134] ? trace_preempt_on+0x20/0xc0 [ 27.137165] ? __pfx_kthread+0x10/0x10 [ 27.137192] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.137255] ? calculate_sigpending+0x7b/0xa0 [ 27.137287] ? __pfx_kthread+0x10/0x10 [ 27.137318] ret_from_fork+0x116/0x1d0 [ 27.137373] ? __pfx_kthread+0x10/0x10 [ 27.137403] ret_from_fork_asm+0x1a/0x30 [ 27.137444] </TASK> [ 27.137458] [ 27.145080] Allocated by task 313: [ 27.145242] kasan_save_stack+0x45/0x70 [ 27.145390] kasan_save_track+0x18/0x40 [ 27.145540] kasan_save_alloc_info+0x3b/0x50 [ 27.145893] __kasan_kmalloc+0xb7/0xc0 [ 27.146131] __kmalloc_cache_noprof+0x189/0x420 [ 27.146385] kasan_atomics+0x95/0x310 [ 27.146596] kunit_try_run_case+0x1a5/0x480 [ 27.146826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.147067] kthread+0x337/0x6f0 [ 27.147191] ret_from_fork+0x116/0x1d0 [ 27.147325] ret_from_fork_asm+0x1a/0x30 [ 27.147471] [ 27.147578] The buggy address belongs to the object at ffff888105926b00 [ 27.147578] which belongs to the cache kmalloc-64 of size 64 [ 27.148146] The buggy address is located 0 bytes to the right of [ 27.148146] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.148738] [ 27.148835] The buggy address belongs to the physical page: [ 27.149092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.149473] flags: 0x200000000000000(node=0|zone=2) [ 27.149768] page_type: f5(slab) [ 27.149935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.150288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.150615] page dumped because: kasan: bad access detected [ 27.150889] [ 27.150995] Memory state around the buggy address: [ 27.151199] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.151552] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.151901] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.152198] ^ [ 27.152413] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.152634] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.152839] ================================================================== [ 26.987746] ================================================================== [ 26.988111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 26.988393] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.988621] [ 26.988714] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.988787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.988804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.988828] Call Trace: [ 26.988844] <TASK> [ 26.988878] dump_stack_lvl+0x73/0xb0 [ 26.988914] print_report+0xd1/0x610 [ 26.988944] ? __virt_addr_valid+0x1db/0x2d0 [ 26.988975] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.989003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.989035] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.989065] kasan_report+0x141/0x180 [ 26.989094] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.989147] __asan_report_load4_noabort+0x18/0x20 [ 26.989178] kasan_atomics_helper+0x4a84/0x5450 [ 26.989208] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.989236] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.989268] ? kasan_atomics+0x152/0x310 [ 26.989304] kasan_atomics+0x1dc/0x310 [ 26.989333] ? __pfx_kasan_atomics+0x10/0x10 [ 26.989364] ? __pfx_read_tsc+0x10/0x10 [ 26.989392] ? ktime_get_ts64+0x86/0x230 [ 26.989424] kunit_try_run_case+0x1a5/0x480 [ 26.989454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.989483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.989514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.989553] ? __kthread_parkme+0x82/0x180 [ 26.989581] ? preempt_count_sub+0x50/0x80 [ 26.989613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.989662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.989696] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.989728] kthread+0x337/0x6f0 [ 26.989754] ? trace_preempt_on+0x20/0xc0 [ 26.989785] ? __pfx_kthread+0x10/0x10 [ 26.989813] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.989843] ? calculate_sigpending+0x7b/0xa0 [ 26.989876] ? __pfx_kthread+0x10/0x10 [ 26.989905] ret_from_fork+0x116/0x1d0 [ 26.989931] ? __pfx_kthread+0x10/0x10 [ 26.989959] ret_from_fork_asm+0x1a/0x30 [ 26.990002] </TASK> [ 26.990016] [ 26.997458] Allocated by task 313: [ 26.997621] kasan_save_stack+0x45/0x70 [ 26.997844] kasan_save_track+0x18/0x40 [ 26.997997] kasan_save_alloc_info+0x3b/0x50 [ 26.998216] __kasan_kmalloc+0xb7/0xc0 [ 26.998424] __kmalloc_cache_noprof+0x189/0x420 [ 26.998628] kasan_atomics+0x95/0x310 [ 26.998834] kunit_try_run_case+0x1a5/0x480 [ 26.999035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.999245] kthread+0x337/0x6f0 [ 26.999430] ret_from_fork+0x116/0x1d0 [ 26.999652] ret_from_fork_asm+0x1a/0x30 [ 26.999803] [ 26.999897] The buggy address belongs to the object at ffff888105926b00 [ 26.999897] which belongs to the cache kmalloc-64 of size 64 [ 27.000412] The buggy address is located 0 bytes to the right of [ 27.000412] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.001010] [ 27.001106] The buggy address belongs to the physical page: [ 27.001315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.001594] flags: 0x200000000000000(node=0|zone=2) [ 27.001858] page_type: f5(slab) [ 27.002043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.002382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.002722] page dumped because: kasan: bad access detected [ 27.002970] [ 27.003061] Memory state around the buggy address: [ 27.003246] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.003514] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.003979] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.004350] ^ [ 27.004585] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.004899] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.005226] ================================================================== [ 27.504977] ================================================================== [ 27.505600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 27.505963] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.506440] [ 27.506806] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.506885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.506902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.506929] Call Trace: [ 27.506946] <TASK> [ 27.506966] dump_stack_lvl+0x73/0xb0 [ 27.507002] print_report+0xd1/0x610 [ 27.507033] ? __virt_addr_valid+0x1db/0x2d0 [ 27.507063] ? kasan_atomics_helper+0x1818/0x5450 [ 27.507092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.507125] ? kasan_atomics_helper+0x1818/0x5450 [ 27.507154] kasan_report+0x141/0x180 [ 27.507183] ? kasan_atomics_helper+0x1818/0x5450 [ 27.507219] kasan_check_range+0x10c/0x1c0 [ 27.507250] __kasan_check_write+0x18/0x20 [ 27.507280] kasan_atomics_helper+0x1818/0x5450 [ 27.507311] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.507342] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.507373] ? kasan_atomics+0x152/0x310 [ 27.507409] kasan_atomics+0x1dc/0x310 [ 27.507438] ? __pfx_kasan_atomics+0x10/0x10 [ 27.507469] ? __pfx_read_tsc+0x10/0x10 [ 27.507497] ? ktime_get_ts64+0x86/0x230 [ 27.507540] kunit_try_run_case+0x1a5/0x480 [ 27.507571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.507598] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.507638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.507668] ? __kthread_parkme+0x82/0x180 [ 27.507696] ? preempt_count_sub+0x50/0x80 [ 27.507728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.507759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.507792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.507825] kthread+0x337/0x6f0 [ 27.507852] ? trace_preempt_on+0x20/0xc0 [ 27.507882] ? __pfx_kthread+0x10/0x10 [ 27.507910] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.507942] ? calculate_sigpending+0x7b/0xa0 [ 27.507974] ? __pfx_kthread+0x10/0x10 [ 27.508003] ret_from_fork+0x116/0x1d0 [ 27.508028] ? __pfx_kthread+0x10/0x10 [ 27.508057] ret_from_fork_asm+0x1a/0x30 [ 27.508099] </TASK> [ 27.508112] [ 27.517120] Allocated by task 313: [ 27.517287] kasan_save_stack+0x45/0x70 [ 27.517485] kasan_save_track+0x18/0x40 [ 27.517690] kasan_save_alloc_info+0x3b/0x50 [ 27.517896] __kasan_kmalloc+0xb7/0xc0 [ 27.518086] __kmalloc_cache_noprof+0x189/0x420 [ 27.518292] kasan_atomics+0x95/0x310 [ 27.518512] kunit_try_run_case+0x1a5/0x480 [ 27.518747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.519016] kthread+0x337/0x6f0 [ 27.519184] ret_from_fork+0x116/0x1d0 [ 27.519388] ret_from_fork_asm+0x1a/0x30 [ 27.519538] [ 27.519640] The buggy address belongs to the object at ffff888105926b00 [ 27.519640] which belongs to the cache kmalloc-64 of size 64 [ 27.520188] The buggy address is located 0 bytes to the right of [ 27.520188] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.520749] [ 27.520827] The buggy address belongs to the physical page: [ 27.521072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.521390] flags: 0x200000000000000(node=0|zone=2) [ 27.521642] page_type: f5(slab) [ 27.521814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.522142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.522457] page dumped because: kasan: bad access detected [ 27.522718] [ 27.522890] Memory state around the buggy address: [ 27.523110] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.523409] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.523755] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.524018] ^ [ 27.524212] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.524526] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.524883] ================================================================== [ 26.645217] ================================================================== [ 26.645577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 26.646024] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.646358] [ 26.646465] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.646522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.646549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.646574] Call Trace: [ 26.646604] <TASK> [ 26.646622] dump_stack_lvl+0x73/0xb0 [ 26.646656] print_report+0xd1/0x610 [ 26.646686] ? __virt_addr_valid+0x1db/0x2d0 [ 26.646716] ? kasan_atomics_helper+0x3df/0x5450 [ 26.646743] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.646777] ? kasan_atomics_helper+0x3df/0x5450 [ 26.646806] kasan_report+0x141/0x180 [ 26.646836] ? kasan_atomics_helper+0x3df/0x5450 [ 26.646872] kasan_check_range+0x10c/0x1c0 [ 26.646903] __kasan_check_read+0x15/0x20 [ 26.646932] kasan_atomics_helper+0x3df/0x5450 [ 26.646962] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.646992] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.647025] ? kasan_atomics+0x152/0x310 [ 26.647060] kasan_atomics+0x1dc/0x310 [ 26.647090] ? __pfx_kasan_atomics+0x10/0x10 [ 26.647122] ? __pfx_read_tsc+0x10/0x10 [ 26.647148] ? ktime_get_ts64+0x86/0x230 [ 26.647181] kunit_try_run_case+0x1a5/0x480 [ 26.647211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.647240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.647270] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.647300] ? __kthread_parkme+0x82/0x180 [ 26.647326] ? preempt_count_sub+0x50/0x80 [ 26.647358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.647389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.647422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.647455] kthread+0x337/0x6f0 [ 26.647482] ? trace_preempt_on+0x20/0xc0 [ 26.647511] ? __pfx_kthread+0x10/0x10 [ 26.647551] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.647582] ? calculate_sigpending+0x7b/0xa0 [ 26.647614] ? __pfx_kthread+0x10/0x10 [ 26.647642] ret_from_fork+0x116/0x1d0 [ 26.647668] ? __pfx_kthread+0x10/0x10 [ 26.647696] ret_from_fork_asm+0x1a/0x30 [ 26.647738] </TASK> [ 26.647752] [ 26.655829] Allocated by task 313: [ 26.656066] kasan_save_stack+0x45/0x70 [ 26.656272] kasan_save_track+0x18/0x40 [ 26.656467] kasan_save_alloc_info+0x3b/0x50 [ 26.656692] __kasan_kmalloc+0xb7/0xc0 [ 26.657001] __kmalloc_cache_noprof+0x189/0x420 [ 26.657177] kasan_atomics+0x95/0x310 [ 26.657369] kunit_try_run_case+0x1a5/0x480 [ 26.657628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.658046] kthread+0x337/0x6f0 [ 26.658224] ret_from_fork+0x116/0x1d0 [ 26.658426] ret_from_fork_asm+0x1a/0x30 [ 26.658734] [ 26.658842] The buggy address belongs to the object at ffff888105926b00 [ 26.658842] which belongs to the cache kmalloc-64 of size 64 [ 26.659266] The buggy address is located 0 bytes to the right of [ 26.659266] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.659730] [ 26.659824] The buggy address belongs to the physical page: [ 26.660075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.660424] flags: 0x200000000000000(node=0|zone=2) [ 26.660750] page_type: f5(slab) [ 26.660875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.661160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.661614] page dumped because: kasan: bad access detected [ 26.661893] [ 26.661991] Memory state around the buggy address: [ 26.662180] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.662486] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.662886] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.663210] ^ [ 26.663425] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.663901] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.664242] ================================================================== [ 27.350264] ================================================================== [ 27.350641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 27.350964] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.351250] [ 27.351383] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.351436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.351451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.351476] Call Trace: [ 27.351504] <TASK> [ 27.351521] dump_stack_lvl+0x73/0xb0 [ 27.351573] print_report+0xd1/0x610 [ 27.351605] ? __virt_addr_valid+0x1db/0x2d0 [ 27.351645] ? kasan_atomics_helper+0x1467/0x5450 [ 27.351674] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.351709] ? kasan_atomics_helper+0x1467/0x5450 [ 27.351739] kasan_report+0x141/0x180 [ 27.351769] ? kasan_atomics_helper+0x1467/0x5450 [ 27.351805] kasan_check_range+0x10c/0x1c0 [ 27.351836] __kasan_check_write+0x18/0x20 [ 27.351867] kasan_atomics_helper+0x1467/0x5450 [ 27.351897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.351927] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.351959] ? kasan_atomics+0x152/0x310 [ 27.351994] kasan_atomics+0x1dc/0x310 [ 27.352033] ? __pfx_kasan_atomics+0x10/0x10 [ 27.352066] ? __pfx_read_tsc+0x10/0x10 [ 27.352104] ? ktime_get_ts64+0x86/0x230 [ 27.352137] kunit_try_run_case+0x1a5/0x480 [ 27.352168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.352196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.352225] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.352255] ? __kthread_parkme+0x82/0x180 [ 27.352283] ? preempt_count_sub+0x50/0x80 [ 27.352314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.352345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.352379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.352412] kthread+0x337/0x6f0 [ 27.352439] ? trace_preempt_on+0x20/0xc0 [ 27.352469] ? __pfx_kthread+0x10/0x10 [ 27.352497] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.352545] ? calculate_sigpending+0x7b/0xa0 [ 27.352576] ? __pfx_kthread+0x10/0x10 [ 27.352617] ret_from_fork+0x116/0x1d0 [ 27.352651] ? __pfx_kthread+0x10/0x10 [ 27.352680] ret_from_fork_asm+0x1a/0x30 [ 27.352731] </TASK> [ 27.352745] [ 27.360467] Allocated by task 313: [ 27.360643] kasan_save_stack+0x45/0x70 [ 27.360863] kasan_save_track+0x18/0x40 [ 27.361057] kasan_save_alloc_info+0x3b/0x50 [ 27.361286] __kasan_kmalloc+0xb7/0xc0 [ 27.361424] __kmalloc_cache_noprof+0x189/0x420 [ 27.361595] kasan_atomics+0x95/0x310 [ 27.361783] kunit_try_run_case+0x1a5/0x480 [ 27.362097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.362332] kthread+0x337/0x6f0 [ 27.362455] ret_from_fork+0x116/0x1d0 [ 27.362609] ret_from_fork_asm+0x1a/0x30 [ 27.362999] [ 27.363102] The buggy address belongs to the object at ffff888105926b00 [ 27.363102] which belongs to the cache kmalloc-64 of size 64 [ 27.363584] The buggy address is located 0 bytes to the right of [ 27.363584] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.364081] [ 27.364165] The buggy address belongs to the physical page: [ 27.364398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.365608] flags: 0x200000000000000(node=0|zone=2) [ 27.365786] page_type: f5(slab) [ 27.366201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.366754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.367064] page dumped because: kasan: bad access detected [ 27.367298] [ 27.367388] Memory state around the buggy address: [ 27.367856] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.368476] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.368803] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.369095] ^ [ 27.369302] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.369597] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.369881] ================================================================== [ 27.005767] ================================================================== [ 27.006106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 27.006487] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.006731] [ 27.006817] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.006867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.006883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.006908] Call Trace: [ 27.006927] <TASK> [ 27.006945] dump_stack_lvl+0x73/0xb0 [ 27.006979] print_report+0xd1/0x610 [ 27.007008] ? __virt_addr_valid+0x1db/0x2d0 [ 27.007037] ? kasan_atomics_helper+0xd47/0x5450 [ 27.007065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.007098] ? kasan_atomics_helper+0xd47/0x5450 [ 27.007126] kasan_report+0x141/0x180 [ 27.007155] ? kasan_atomics_helper+0xd47/0x5450 [ 27.007189] kasan_check_range+0x10c/0x1c0 [ 27.007220] __kasan_check_write+0x18/0x20 [ 27.007276] kasan_atomics_helper+0xd47/0x5450 [ 27.007309] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.007338] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.007369] ? kasan_atomics+0x152/0x310 [ 27.007404] kasan_atomics+0x1dc/0x310 [ 27.007433] ? __pfx_kasan_atomics+0x10/0x10 [ 27.007464] ? __pfx_read_tsc+0x10/0x10 [ 27.007493] ? ktime_get_ts64+0x86/0x230 [ 27.007524] kunit_try_run_case+0x1a5/0x480 [ 27.007566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.007594] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.007638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.007668] ? __kthread_parkme+0x82/0x180 [ 27.007694] ? preempt_count_sub+0x50/0x80 [ 27.007726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.007757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.007790] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.007824] kthread+0x337/0x6f0 [ 27.007849] ? trace_preempt_on+0x20/0xc0 [ 27.007880] ? __pfx_kthread+0x10/0x10 [ 27.007907] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.007939] ? calculate_sigpending+0x7b/0xa0 [ 27.007970] ? __pfx_kthread+0x10/0x10 [ 27.007999] ret_from_fork+0x116/0x1d0 [ 27.008025] ? __pfx_kthread+0x10/0x10 [ 27.008052] ret_from_fork_asm+0x1a/0x30 [ 27.008094] </TASK> [ 27.008107] [ 27.015693] Allocated by task 313: [ 27.015833] kasan_save_stack+0x45/0x70 [ 27.016058] kasan_save_track+0x18/0x40 [ 27.016233] kasan_save_alloc_info+0x3b/0x50 [ 27.016445] __kasan_kmalloc+0xb7/0xc0 [ 27.016659] __kmalloc_cache_noprof+0x189/0x420 [ 27.016880] kasan_atomics+0x95/0x310 [ 27.017060] kunit_try_run_case+0x1a5/0x480 [ 27.017294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.017563] kthread+0x337/0x6f0 [ 27.017744] ret_from_fork+0x116/0x1d0 [ 27.017929] ret_from_fork_asm+0x1a/0x30 [ 27.018148] [ 27.018217] The buggy address belongs to the object at ffff888105926b00 [ 27.018217] which belongs to the cache kmalloc-64 of size 64 [ 27.018763] The buggy address is located 0 bytes to the right of [ 27.018763] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.019276] [ 27.019379] The buggy address belongs to the physical page: [ 27.019611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.019951] flags: 0x200000000000000(node=0|zone=2) [ 27.020161] page_type: f5(slab) [ 27.020322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.020685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.020971] page dumped because: kasan: bad access detected [ 27.021214] [ 27.021297] Memory state around the buggy address: [ 27.021448] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.021737] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.022065] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.022371] ^ [ 27.022619] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.022987] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.023416] ================================================================== [ 27.525337] ================================================================== [ 27.525867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 27.526189] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.526544] [ 27.526656] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.526748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.526776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.526802] Call Trace: [ 27.526823] <TASK> [ 27.526840] dump_stack_lvl+0x73/0xb0 [ 27.526876] print_report+0xd1/0x610 [ 27.526905] ? __virt_addr_valid+0x1db/0x2d0 [ 27.526938] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.526966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.526999] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.527029] kasan_report+0x141/0x180 [ 27.527058] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.527093] kasan_check_range+0x10c/0x1c0 [ 27.527125] __kasan_check_write+0x18/0x20 [ 27.527154] kasan_atomics_helper+0x18b1/0x5450 [ 27.527184] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.527212] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.527244] ? kasan_atomics+0x152/0x310 [ 27.527286] kasan_atomics+0x1dc/0x310 [ 27.527316] ? __pfx_kasan_atomics+0x10/0x10 [ 27.527348] ? __pfx_read_tsc+0x10/0x10 [ 27.527378] ? ktime_get_ts64+0x86/0x230 [ 27.527412] kunit_try_run_case+0x1a5/0x480 [ 27.527442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.527470] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.527499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.527540] ? __kthread_parkme+0x82/0x180 [ 27.527569] ? preempt_count_sub+0x50/0x80 [ 27.527600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.527638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.527672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.527725] kthread+0x337/0x6f0 [ 27.527753] ? trace_preempt_on+0x20/0xc0 [ 27.527797] ? __pfx_kthread+0x10/0x10 [ 27.527826] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.527858] ? calculate_sigpending+0x7b/0xa0 [ 27.527889] ? __pfx_kthread+0x10/0x10 [ 27.527920] ret_from_fork+0x116/0x1d0 [ 27.527946] ? __pfx_kthread+0x10/0x10 [ 27.527973] ret_from_fork_asm+0x1a/0x30 [ 27.528016] </TASK> [ 27.528029] [ 27.535602] Allocated by task 313: [ 27.535781] kasan_save_stack+0x45/0x70 [ 27.536003] kasan_save_track+0x18/0x40 [ 27.536182] kasan_save_alloc_info+0x3b/0x50 [ 27.536429] __kasan_kmalloc+0xb7/0xc0 [ 27.536701] __kmalloc_cache_noprof+0x189/0x420 [ 27.536935] kasan_atomics+0x95/0x310 [ 27.537130] kunit_try_run_case+0x1a5/0x480 [ 27.537329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.537504] kthread+0x337/0x6f0 [ 27.537683] ret_from_fork+0x116/0x1d0 [ 27.537879] ret_from_fork_asm+0x1a/0x30 [ 27.538103] [ 27.538214] The buggy address belongs to the object at ffff888105926b00 [ 27.538214] which belongs to the cache kmalloc-64 of size 64 [ 27.538918] The buggy address is located 0 bytes to the right of [ 27.538918] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.539305] [ 27.539372] The buggy address belongs to the physical page: [ 27.539639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.540151] flags: 0x200000000000000(node=0|zone=2) [ 27.540392] page_type: f5(slab) [ 27.540563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.541010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.541289] page dumped because: kasan: bad access detected [ 27.541575] [ 27.541698] Memory state around the buggy address: [ 27.541912] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.542160] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.542455] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.542795] ^ [ 27.543015] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.543386] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.543777] ================================================================== [ 27.747982] ================================================================== [ 27.748688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 27.749173] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.749655] [ 27.749828] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.749892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.749908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.749933] Call Trace: [ 27.749950] <TASK> [ 27.749981] dump_stack_lvl+0x73/0xb0 [ 27.750016] print_report+0xd1/0x610 [ 27.750047] ? __virt_addr_valid+0x1db/0x2d0 [ 27.750087] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.750116] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.750160] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.750189] kasan_report+0x141/0x180 [ 27.750219] ? kasan_atomics_helper+0x1f43/0x5450 [ 27.750255] kasan_check_range+0x10c/0x1c0 [ 27.750286] __kasan_check_write+0x18/0x20 [ 27.750317] kasan_atomics_helper+0x1f43/0x5450 [ 27.750347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.750376] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.750409] ? kasan_atomics+0x152/0x310 [ 27.750445] kasan_atomics+0x1dc/0x310 [ 27.750479] ? __pfx_kasan_atomics+0x10/0x10 [ 27.750510] ? __pfx_read_tsc+0x10/0x10 [ 27.750547] ? ktime_get_ts64+0x86/0x230 [ 27.750579] kunit_try_run_case+0x1a5/0x480 [ 27.750629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.750659] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.750689] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.750717] ? __kthread_parkme+0x82/0x180 [ 27.750745] ? preempt_count_sub+0x50/0x80 [ 27.750777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.750807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.750840] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.750874] kthread+0x337/0x6f0 [ 27.750901] ? trace_preempt_on+0x20/0xc0 [ 27.750932] ? __pfx_kthread+0x10/0x10 [ 27.750960] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.750991] ? calculate_sigpending+0x7b/0xa0 [ 27.751022] ? __pfx_kthread+0x10/0x10 [ 27.751051] ret_from_fork+0x116/0x1d0 [ 27.751076] ? __pfx_kthread+0x10/0x10 [ 27.751104] ret_from_fork_asm+0x1a/0x30 [ 27.751146] </TASK> [ 27.751159] [ 27.758367] Allocated by task 313: [ 27.758580] kasan_save_stack+0x45/0x70 [ 27.758799] kasan_save_track+0x18/0x40 [ 27.759023] kasan_save_alloc_info+0x3b/0x50 [ 27.759181] __kasan_kmalloc+0xb7/0xc0 [ 27.759317] __kmalloc_cache_noprof+0x189/0x420 [ 27.759475] kasan_atomics+0x95/0x310 [ 27.759675] kunit_try_run_case+0x1a5/0x480 [ 27.759915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.760204] kthread+0x337/0x6f0 [ 27.760396] ret_from_fork+0x116/0x1d0 [ 27.760643] ret_from_fork_asm+0x1a/0x30 [ 27.760877] [ 27.760974] The buggy address belongs to the object at ffff888105926b00 [ 27.760974] which belongs to the cache kmalloc-64 of size 64 [ 27.761536] The buggy address is located 0 bytes to the right of [ 27.761536] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.762087] [ 27.762184] The buggy address belongs to the physical page: [ 27.762458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.762839] flags: 0x200000000000000(node=0|zone=2) [ 27.763070] page_type: f5(slab) [ 27.763241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.763551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.763787] page dumped because: kasan: bad access detected [ 27.763959] [ 27.764027] Memory state around the buggy address: [ 27.764208] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.764553] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.764898] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.765212] ^ [ 27.765434] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.765789] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.766052] ================================================================== [ 27.818991] ================================================================== [ 27.819458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 27.819831] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.820132] [ 27.820237] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.820289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.820304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.820330] Call Trace: [ 27.820345] <TASK> [ 27.820363] dump_stack_lvl+0x73/0xb0 [ 27.820396] print_report+0xd1/0x610 [ 27.820425] ? __virt_addr_valid+0x1db/0x2d0 [ 27.820455] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.820485] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.820519] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.820559] kasan_report+0x141/0x180 [ 27.820589] ? kasan_atomics_helper+0x20c8/0x5450 [ 27.820644] kasan_check_range+0x10c/0x1c0 [ 27.820676] __kasan_check_write+0x18/0x20 [ 27.820707] kasan_atomics_helper+0x20c8/0x5450 [ 27.820737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.820767] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.820801] ? kasan_atomics+0x152/0x310 [ 27.820835] kasan_atomics+0x1dc/0x310 [ 27.820865] ? __pfx_kasan_atomics+0x10/0x10 [ 27.820899] ? __pfx_read_tsc+0x10/0x10 [ 27.820928] ? ktime_get_ts64+0x86/0x230 [ 27.820960] kunit_try_run_case+0x1a5/0x480 [ 27.820991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.821020] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.821050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.821080] ? __kthread_parkme+0x82/0x180 [ 27.821108] ? preempt_count_sub+0x50/0x80 [ 27.821140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.821170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.821204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.821238] kthread+0x337/0x6f0 [ 27.821265] ? trace_preempt_on+0x20/0xc0 [ 27.821296] ? __pfx_kthread+0x10/0x10 [ 27.821323] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.821354] ? calculate_sigpending+0x7b/0xa0 [ 27.821385] ? __pfx_kthread+0x10/0x10 [ 27.821414] ret_from_fork+0x116/0x1d0 [ 27.821439] ? __pfx_kthread+0x10/0x10 [ 27.821467] ret_from_fork_asm+0x1a/0x30 [ 27.821510] </TASK> [ 27.821523] [ 27.828347] Allocated by task 313: [ 27.828472] kasan_save_stack+0x45/0x70 [ 27.828703] kasan_save_track+0x18/0x40 [ 27.828900] kasan_save_alloc_info+0x3b/0x50 [ 27.829114] __kasan_kmalloc+0xb7/0xc0 [ 27.829302] __kmalloc_cache_noprof+0x189/0x420 [ 27.829524] kasan_atomics+0x95/0x310 [ 27.829749] kunit_try_run_case+0x1a5/0x480 [ 27.829965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.830219] kthread+0x337/0x6f0 [ 27.830391] ret_from_fork+0x116/0x1d0 [ 27.830621] ret_from_fork_asm+0x1a/0x30 [ 27.830825] [ 27.830918] The buggy address belongs to the object at ffff888105926b00 [ 27.830918] which belongs to the cache kmalloc-64 of size 64 [ 27.831334] The buggy address is located 0 bytes to the right of [ 27.831334] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.831730] [ 27.831801] The buggy address belongs to the physical page: [ 27.832018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.832377] flags: 0x200000000000000(node=0|zone=2) [ 27.832654] page_type: f5(slab) [ 27.832828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.833170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.833511] page dumped because: kasan: bad access detected [ 27.833795] [ 27.833889] Memory state around the buggy address: [ 27.834109] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.834331] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.834691] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.834986] ^ [ 27.835175] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.835458] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.835780] ================================================================== [ 27.153331] ================================================================== [ 27.153679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 27.154012] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.154614] [ 27.154720] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.154772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.154787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.154811] Call Trace: [ 27.154828] <TASK> [ 27.154846] dump_stack_lvl+0x73/0xb0 [ 27.154880] print_report+0xd1/0x610 [ 27.154910] ? __virt_addr_valid+0x1db/0x2d0 [ 27.154942] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.154972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.155005] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.155034] kasan_report+0x141/0x180 [ 27.155064] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.155099] __asan_report_load4_noabort+0x18/0x20 [ 27.155131] kasan_atomics_helper+0x4a1c/0x5450 [ 27.155162] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.155235] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.155270] ? kasan_atomics+0x152/0x310 [ 27.155305] kasan_atomics+0x1dc/0x310 [ 27.155336] ? __pfx_kasan_atomics+0x10/0x10 [ 27.155401] ? __pfx_read_tsc+0x10/0x10 [ 27.155430] ? ktime_get_ts64+0x86/0x230 [ 27.155463] kunit_try_run_case+0x1a5/0x480 [ 27.155524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.155566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.155597] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.155637] ? __kthread_parkme+0x82/0x180 [ 27.155664] ? preempt_count_sub+0x50/0x80 [ 27.155730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.155761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.155795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.155860] kthread+0x337/0x6f0 [ 27.155887] ? trace_preempt_on+0x20/0xc0 [ 27.155919] ? __pfx_kthread+0x10/0x10 [ 27.155948] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.156010] ? calculate_sigpending+0x7b/0xa0 [ 27.156043] ? __pfx_kthread+0x10/0x10 [ 27.156072] ret_from_fork+0x116/0x1d0 [ 27.156099] ? __pfx_kthread+0x10/0x10 [ 27.156159] ret_from_fork_asm+0x1a/0x30 [ 27.156203] </TASK> [ 27.156217] [ 27.166550] Allocated by task 313: [ 27.166849] kasan_save_stack+0x45/0x70 [ 27.167057] kasan_save_track+0x18/0x40 [ 27.167268] kasan_save_alloc_info+0x3b/0x50 [ 27.167482] __kasan_kmalloc+0xb7/0xc0 [ 27.167657] __kmalloc_cache_noprof+0x189/0x420 [ 27.167813] kasan_atomics+0x95/0x310 [ 27.167989] kunit_try_run_case+0x1a5/0x480 [ 27.168195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.168456] kthread+0x337/0x6f0 [ 27.168673] ret_from_fork+0x116/0x1d0 [ 27.168865] ret_from_fork_asm+0x1a/0x30 [ 27.169063] [ 27.169142] The buggy address belongs to the object at ffff888105926b00 [ 27.169142] which belongs to the cache kmalloc-64 of size 64 [ 27.169629] The buggy address is located 0 bytes to the right of [ 27.169629] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.170145] [ 27.170233] The buggy address belongs to the physical page: [ 27.170494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.171074] flags: 0x200000000000000(node=0|zone=2) [ 27.171316] page_type: f5(slab) [ 27.171489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.171862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.172143] page dumped because: kasan: bad access detected [ 27.172310] [ 27.172385] Memory state around the buggy address: [ 27.172636] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.172990] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.173338] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.173676] ^ [ 27.173854] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.174153] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.174456] ================================================================== [ 27.582290] ================================================================== [ 27.582635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 27.582975] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.583342] [ 27.583457] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.583509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.583524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.583558] Call Trace: [ 27.583573] <TASK> [ 27.583590] dump_stack_lvl+0x73/0xb0 [ 27.583625] print_report+0xd1/0x610 [ 27.583654] ? __virt_addr_valid+0x1db/0x2d0 [ 27.583685] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.583721] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.583754] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.583783] kasan_report+0x141/0x180 [ 27.583836] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.583885] kasan_check_range+0x10c/0x1c0 [ 27.583930] __kasan_check_write+0x18/0x20 [ 27.583972] kasan_atomics_helper+0x1a7f/0x5450 [ 27.584029] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.584072] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.584130] ? kasan_atomics+0x152/0x310 [ 27.584190] kasan_atomics+0x1dc/0x310 [ 27.584246] ? __pfx_kasan_atomics+0x10/0x10 [ 27.584291] ? __pfx_read_tsc+0x10/0x10 [ 27.584345] ? ktime_get_ts64+0x86/0x230 [ 27.584405] kunit_try_run_case+0x1a5/0x480 [ 27.584461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.584504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.584542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.584573] ? __kthread_parkme+0x82/0x180 [ 27.584600] ? preempt_count_sub+0x50/0x80 [ 27.584632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.584662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.584695] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.584728] kthread+0x337/0x6f0 [ 27.584754] ? trace_preempt_on+0x20/0xc0 [ 27.584785] ? __pfx_kthread+0x10/0x10 [ 27.584814] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.584845] ? calculate_sigpending+0x7b/0xa0 [ 27.584878] ? __pfx_kthread+0x10/0x10 [ 27.584907] ret_from_fork+0x116/0x1d0 [ 27.584932] ? __pfx_kthread+0x10/0x10 [ 27.584960] ret_from_fork_asm+0x1a/0x30 [ 27.585003] </TASK> [ 27.585016] [ 27.592820] Allocated by task 313: [ 27.592979] kasan_save_stack+0x45/0x70 [ 27.593197] kasan_save_track+0x18/0x40 [ 27.593416] kasan_save_alloc_info+0x3b/0x50 [ 27.593733] __kasan_kmalloc+0xb7/0xc0 [ 27.593928] __kmalloc_cache_noprof+0x189/0x420 [ 27.594114] kasan_atomics+0x95/0x310 [ 27.594282] kunit_try_run_case+0x1a5/0x480 [ 27.594455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.594721] kthread+0x337/0x6f0 [ 27.594925] ret_from_fork+0x116/0x1d0 [ 27.595136] ret_from_fork_asm+0x1a/0x30 [ 27.595339] [ 27.595425] The buggy address belongs to the object at ffff888105926b00 [ 27.595425] which belongs to the cache kmalloc-64 of size 64 [ 27.596059] The buggy address is located 0 bytes to the right of [ 27.596059] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.596505] [ 27.596596] The buggy address belongs to the physical page: [ 27.596822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.597074] flags: 0x200000000000000(node=0|zone=2) [ 27.597232] page_type: f5(slab) [ 27.597351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.597586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.598086] page dumped because: kasan: bad access detected [ 27.598333] [ 27.598424] Memory state around the buggy address: [ 27.598745] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.599104] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.599350] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.599580] ^ [ 27.600063] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.600335] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.600609] ================================================================== [ 27.699279] ================================================================== [ 27.699685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 27.699995] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.700277] [ 27.700359] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.700411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.700427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.700452] Call Trace: [ 27.700469] <TASK> [ 27.700487] dump_stack_lvl+0x73/0xb0 [ 27.700521] print_report+0xd1/0x610 [ 27.700562] ? __virt_addr_valid+0x1db/0x2d0 [ 27.700592] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.700620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.700654] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.700684] kasan_report+0x141/0x180 [ 27.700715] ? kasan_atomics_helper+0x1e12/0x5450 [ 27.700750] kasan_check_range+0x10c/0x1c0 [ 27.700781] __kasan_check_write+0x18/0x20 [ 27.700811] kasan_atomics_helper+0x1e12/0x5450 [ 27.700841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.700870] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.700901] ? kasan_atomics+0x152/0x310 [ 27.700936] kasan_atomics+0x1dc/0x310 [ 27.700965] ? __pfx_kasan_atomics+0x10/0x10 [ 27.700997] ? __pfx_read_tsc+0x10/0x10 [ 27.701025] ? ktime_get_ts64+0x86/0x230 [ 27.701057] kunit_try_run_case+0x1a5/0x480 [ 27.701086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.701115] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.701143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.701172] ? __kthread_parkme+0x82/0x180 [ 27.701200] ? preempt_count_sub+0x50/0x80 [ 27.701232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.701261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.701294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.701327] kthread+0x337/0x6f0 [ 27.701353] ? trace_preempt_on+0x20/0xc0 [ 27.701383] ? __pfx_kthread+0x10/0x10 [ 27.701411] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.701443] ? calculate_sigpending+0x7b/0xa0 [ 27.701473] ? __pfx_kthread+0x10/0x10 [ 27.701502] ret_from_fork+0x116/0x1d0 [ 27.701536] ? __pfx_kthread+0x10/0x10 [ 27.701565] ret_from_fork_asm+0x1a/0x30 [ 27.701606] </TASK> [ 27.701619] [ 27.708544] Allocated by task 313: [ 27.708670] kasan_save_stack+0x45/0x70 [ 27.708814] kasan_save_track+0x18/0x40 [ 27.708975] kasan_save_alloc_info+0x3b/0x50 [ 27.709190] __kasan_kmalloc+0xb7/0xc0 [ 27.709384] __kmalloc_cache_noprof+0x189/0x420 [ 27.709613] kasan_atomics+0x95/0x310 [ 27.709802] kunit_try_run_case+0x1a5/0x480 [ 27.710017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.710272] kthread+0x337/0x6f0 [ 27.710566] ret_from_fork+0x116/0x1d0 [ 27.710779] ret_from_fork_asm+0x1a/0x30 [ 27.710925] [ 27.710996] The buggy address belongs to the object at ffff888105926b00 [ 27.710996] which belongs to the cache kmalloc-64 of size 64 [ 27.711347] The buggy address is located 0 bytes to the right of [ 27.711347] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.712254] [ 27.712348] The buggy address belongs to the physical page: [ 27.712612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.712976] flags: 0x200000000000000(node=0|zone=2) [ 27.713176] page_type: f5(slab) [ 27.713316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.713648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.713948] page dumped because: kasan: bad access detected [ 27.714159] [ 27.714249] Memory state around the buggy address: [ 27.714441] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.714775] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.715057] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.715297] ^ [ 27.715452] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.715921] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.716205] ================================================================== [ 27.240449] ================================================================== [ 27.241093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 27.241699] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 27.242134] [ 27.242347] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 27.242406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.242422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.242456] Call Trace: [ 27.242480] <TASK> [ 27.242498] dump_stack_lvl+0x73/0xb0 [ 27.242548] print_report+0xd1/0x610 [ 27.242579] ? __virt_addr_valid+0x1db/0x2d0 [ 27.242613] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.242644] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.242676] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.242707] kasan_report+0x141/0x180 [ 27.242736] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.242771] __asan_report_load4_noabort+0x18/0x20 [ 27.242803] kasan_atomics_helper+0x49e8/0x5450 [ 27.242832] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.242862] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.242895] ? kasan_atomics+0x152/0x310 [ 27.242929] kasan_atomics+0x1dc/0x310 [ 27.242959] ? __pfx_kasan_atomics+0x10/0x10 [ 27.242990] ? __pfx_read_tsc+0x10/0x10 [ 27.243018] ? ktime_get_ts64+0x86/0x230 [ 27.243051] kunit_try_run_case+0x1a5/0x480 [ 27.243083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.243112] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.243143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.243174] ? __kthread_parkme+0x82/0x180 [ 27.243202] ? preempt_count_sub+0x50/0x80 [ 27.243235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.243266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.243299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.243333] kthread+0x337/0x6f0 [ 27.243360] ? trace_preempt_on+0x20/0xc0 [ 27.243390] ? __pfx_kthread+0x10/0x10 [ 27.243419] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.243451] ? calculate_sigpending+0x7b/0xa0 [ 27.243482] ? __pfx_kthread+0x10/0x10 [ 27.243512] ret_from_fork+0x116/0x1d0 [ 27.243651] ? __pfx_kthread+0x10/0x10 [ 27.243686] ret_from_fork_asm+0x1a/0x30 [ 27.243731] </TASK> [ 27.243746] [ 27.255233] Allocated by task 313: [ 27.255517] kasan_save_stack+0x45/0x70 [ 27.255918] kasan_save_track+0x18/0x40 [ 27.256216] kasan_save_alloc_info+0x3b/0x50 [ 27.256438] __kasan_kmalloc+0xb7/0xc0 [ 27.256661] __kmalloc_cache_noprof+0x189/0x420 [ 27.256885] kasan_atomics+0x95/0x310 [ 27.257062] kunit_try_run_case+0x1a5/0x480 [ 27.257259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.257485] kthread+0x337/0x6f0 [ 27.257981] ret_from_fork+0x116/0x1d0 [ 27.258292] ret_from_fork_asm+0x1a/0x30 [ 27.258614] [ 27.258838] The buggy address belongs to the object at ffff888105926b00 [ 27.258838] which belongs to the cache kmalloc-64 of size 64 [ 27.259702] The buggy address is located 0 bytes to the right of [ 27.259702] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 27.260520] [ 27.260635] The buggy address belongs to the physical page: [ 27.260879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 27.261210] flags: 0x200000000000000(node=0|zone=2) [ 27.261425] page_type: f5(slab) [ 27.261584] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.261896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.262201] page dumped because: kasan: bad access detected [ 27.262430] [ 27.262517] Memory state around the buggy address: [ 27.263212] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.263665] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.264158] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.264660] ^ [ 27.265081] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.265574] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.266066] ================================================================== [ 26.664713] ================================================================== [ 26.665054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 26.665393] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313 [ 26.665838] [ 26.665932] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.665997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.666014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.666039] Call Trace: [ 26.666067] <TASK> [ 26.666085] dump_stack_lvl+0x73/0xb0 [ 26.666120] print_report+0xd1/0x610 [ 26.666150] ? __virt_addr_valid+0x1db/0x2d0 [ 26.666181] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.666209] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.666242] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.666271] kasan_report+0x141/0x180 [ 26.666301] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.666344] __asan_report_load4_noabort+0x18/0x20 [ 26.666376] kasan_atomics_helper+0x4b54/0x5450 [ 26.666417] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.666447] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.666486] ? kasan_atomics+0x152/0x310 [ 26.666521] kasan_atomics+0x1dc/0x310 [ 26.666560] ? __pfx_kasan_atomics+0x10/0x10 [ 26.666591] ? __pfx_read_tsc+0x10/0x10 [ 26.666619] ? ktime_get_ts64+0x86/0x230 [ 26.666651] kunit_try_run_case+0x1a5/0x480 [ 26.666681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.666711] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.666740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.666770] ? __kthread_parkme+0x82/0x180 [ 26.666798] ? preempt_count_sub+0x50/0x80 [ 26.666829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.666919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.666953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.666988] kthread+0x337/0x6f0 [ 26.667014] ? trace_preempt_on+0x20/0xc0 [ 26.667045] ? __pfx_kthread+0x10/0x10 [ 26.667073] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.667104] ? calculate_sigpending+0x7b/0xa0 [ 26.667137] ? __pfx_kthread+0x10/0x10 [ 26.667166] ret_from_fork+0x116/0x1d0 [ 26.667191] ? __pfx_kthread+0x10/0x10 [ 26.667219] ret_from_fork_asm+0x1a/0x30 [ 26.667261] </TASK> [ 26.667275] [ 26.677995] Allocated by task 313: [ 26.678145] kasan_save_stack+0x45/0x70 [ 26.678303] kasan_save_track+0x18/0x40 [ 26.678444] kasan_save_alloc_info+0x3b/0x50 [ 26.678620] __kasan_kmalloc+0xb7/0xc0 [ 26.678758] __kmalloc_cache_noprof+0x189/0x420 [ 26.678920] kasan_atomics+0x95/0x310 [ 26.679056] kunit_try_run_case+0x1a5/0x480 [ 26.679205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.679389] kthread+0x337/0x6f0 [ 26.679513] ret_from_fork+0x116/0x1d0 [ 26.681437] ret_from_fork_asm+0x1a/0x30 [ 26.682047] [ 26.682557] The buggy address belongs to the object at ffff888105926b00 [ 26.682557] which belongs to the cache kmalloc-64 of size 64 [ 26.684047] The buggy address is located 0 bytes to the right of [ 26.684047] allocated 48-byte region [ffff888105926b00, ffff888105926b30) [ 26.684649] [ 26.684756] The buggy address belongs to the physical page: [ 26.685016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 26.685375] flags: 0x200000000000000(node=0|zone=2) [ 26.685715] page_type: f5(slab) [ 26.685875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.686215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.686572] page dumped because: kasan: bad access detected [ 26.686843] [ 26.687135] Memory state around the buggy address: [ 26.687378] ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.687821] ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.688104] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.688418] ^ [ 26.688745] ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.689013] ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.689363] ==================================================================