Date
July 17, 2025, 10:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.184694] ================================================================== [ 32.184988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 32.185103] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.185203] [ 32.185260] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.185347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.185377] Hardware name: linux,dummy-virt (DT) [ 32.185410] Call trace: [ 32.185432] show_stack+0x20/0x38 (C) [ 32.185497] dump_stack_lvl+0x8c/0xd0 [ 32.185703] print_report+0x118/0x5d0 [ 32.185790] kasan_report+0xdc/0x128 [ 32.185839] __asan_report_load4_noabort+0x20/0x30 [ 32.186052] kasan_atomics_helper+0x3e04/0x4858 [ 32.186127] kasan_atomics+0x198/0x2e0 [ 32.186177] kunit_try_run_case+0x170/0x3f0 [ 32.186225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.186279] kthread+0x328/0x630 [ 32.186324] ret_from_fork+0x10/0x20 [ 32.186387] [ 32.186407] Allocated by task 296: [ 32.186455] kasan_save_stack+0x3c/0x68 [ 32.186502] kasan_save_track+0x20/0x40 [ 32.186541] kasan_save_alloc_info+0x40/0x58 [ 32.186581] __kasan_kmalloc+0xd4/0xd8 [ 32.186634] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.186677] kasan_atomics+0xb8/0x2e0 [ 32.186715] kunit_try_run_case+0x170/0x3f0 [ 32.186827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.186892] kthread+0x328/0x630 [ 32.186926] ret_from_fork+0x10/0x20 [ 32.186964] [ 32.187240] The buggy address belongs to the object at fff00000c9abb900 [ 32.187240] which belongs to the cache kmalloc-64 of size 64 [ 32.187308] The buggy address is located 0 bytes to the right of [ 32.187308] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.187374] [ 32.187414] The buggy address belongs to the physical page: [ 32.187533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.187627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.187751] page_type: f5(slab) [ 32.187798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.187850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.187892] page dumped because: kasan: bad access detected [ 32.187926] [ 32.187947] Memory state around the buggy address: [ 32.187979] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.188024] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.188079] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.188119] ^ [ 32.188154] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.188199] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.188239] ================================================================== [ 32.325877] ================================================================== [ 32.325927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 32.325997] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.326210] [ 32.326243] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.326408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.326609] Hardware name: linux,dummy-virt (DT) [ 32.326666] Call trace: [ 32.326799] show_stack+0x20/0x38 (C) [ 32.326873] dump_stack_lvl+0x8c/0xd0 [ 32.326925] print_report+0x118/0x5d0 [ 32.326988] kasan_report+0xdc/0x128 [ 32.327083] __asan_report_load8_noabort+0x20/0x30 [ 32.327139] kasan_atomics_helper+0x3e10/0x4858 [ 32.327192] kasan_atomics+0x198/0x2e0 [ 32.327250] kunit_try_run_case+0x170/0x3f0 [ 32.327300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.327354] kthread+0x328/0x630 [ 32.327408] ret_from_fork+0x10/0x20 [ 32.327458] [ 32.327478] Allocated by task 296: [ 32.327516] kasan_save_stack+0x3c/0x68 [ 32.327557] kasan_save_track+0x20/0x40 [ 32.327595] kasan_save_alloc_info+0x40/0x58 [ 32.327644] __kasan_kmalloc+0xd4/0xd8 [ 32.327681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.327724] kasan_atomics+0xb8/0x2e0 [ 32.327780] kunit_try_run_case+0x170/0x3f0 [ 32.327828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.327879] kthread+0x328/0x630 [ 32.327914] ret_from_fork+0x10/0x20 [ 32.327952] [ 32.327972] The buggy address belongs to the object at fff00000c9abb900 [ 32.327972] which belongs to the cache kmalloc-64 of size 64 [ 32.328030] The buggy address is located 0 bytes to the right of [ 32.328030] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.328344] [ 32.328396] The buggy address belongs to the physical page: [ 32.328446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.328515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.328562] page_type: f5(slab) [ 32.328603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.328653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.328826] page dumped because: kasan: bad access detected [ 32.329013] [ 32.329112] Memory state around the buggy address: [ 32.329247] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329311] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329355] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.329538] ^ [ 32.329586] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.329748] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.329931] ================================================================== [ 32.188375] ================================================================== [ 32.188638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 32.188692] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.188743] [ 32.188811] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.189203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.189233] Hardware name: linux,dummy-virt (DT) [ 32.189266] Call trace: [ 32.189291] show_stack+0x20/0x38 (C) [ 32.189343] dump_stack_lvl+0x8c/0xd0 [ 32.189391] print_report+0x118/0x5d0 [ 32.189437] kasan_report+0xdc/0x128 [ 32.189482] kasan_check_range+0x100/0x1a8 [ 32.189530] __kasan_check_read+0x20/0x30 [ 32.189578] kasan_atomics_helper+0xdd4/0x4858 [ 32.189630] kasan_atomics+0x198/0x2e0 [ 32.189676] kunit_try_run_case+0x170/0x3f0 [ 32.189725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.189778] kthread+0x328/0x630 [ 32.189823] ret_from_fork+0x10/0x20 [ 32.189872] [ 32.189893] Allocated by task 296: [ 32.189922] kasan_save_stack+0x3c/0x68 [ 32.189963] kasan_save_track+0x20/0x40 [ 32.190001] kasan_save_alloc_info+0x40/0x58 [ 32.190042] __kasan_kmalloc+0xd4/0xd8 [ 32.190146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.190212] kasan_atomics+0xb8/0x2e0 [ 32.190411] kunit_try_run_case+0x170/0x3f0 [ 32.190495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.190562] kthread+0x328/0x630 [ 32.190598] ret_from_fork+0x10/0x20 [ 32.190636] [ 32.190667] The buggy address belongs to the object at fff00000c9abb900 [ 32.190667] which belongs to the cache kmalloc-64 of size 64 [ 32.190724] The buggy address is located 0 bytes to the right of [ 32.190724] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.191089] [ 32.191211] The buggy address belongs to the physical page: [ 32.191270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.191368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.191694] page_type: f5(slab) [ 32.191765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.191843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.191997] page dumped because: kasan: bad access detected [ 32.192098] [ 32.192158] Memory state around the buggy address: [ 32.192286] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.192471] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.192544] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.192706] ^ [ 32.192791] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192847] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192887] ================================================================== [ 32.247860] ================================================================== [ 32.247929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 32.248010] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.248072] [ 32.248130] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.248243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.248301] Hardware name: linux,dummy-virt (DT) [ 32.248383] Call trace: [ 32.248593] show_stack+0x20/0x38 (C) [ 32.248721] dump_stack_lvl+0x8c/0xd0 [ 32.248830] print_report+0x118/0x5d0 [ 32.248976] kasan_report+0xdc/0x128 [ 32.249121] kasan_check_range+0x100/0x1a8 [ 32.249189] __kasan_check_write+0x20/0x30 [ 32.249250] kasan_atomics_helper+0x12d8/0x4858 [ 32.249302] kasan_atomics+0x198/0x2e0 [ 32.249350] kunit_try_run_case+0x170/0x3f0 [ 32.249399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.249452] kthread+0x328/0x630 [ 32.249496] ret_from_fork+0x10/0x20 [ 32.249554] [ 32.249574] Allocated by task 296: [ 32.249604] kasan_save_stack+0x3c/0x68 [ 32.249645] kasan_save_track+0x20/0x40 [ 32.249723] kasan_save_alloc_info+0x40/0x58 [ 32.249801] __kasan_kmalloc+0xd4/0xd8 [ 32.249890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.249968] kasan_atomics+0xb8/0x2e0 [ 32.250040] kunit_try_run_case+0x170/0x3f0 [ 32.250145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.250203] kthread+0x328/0x630 [ 32.250238] ret_from_fork+0x10/0x20 [ 32.250274] [ 32.250296] The buggy address belongs to the object at fff00000c9abb900 [ 32.250296] which belongs to the cache kmalloc-64 of size 64 [ 32.250355] The buggy address is located 0 bytes to the right of [ 32.250355] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.250420] [ 32.250478] The buggy address belongs to the physical page: [ 32.250556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.250615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.250719] page_type: f5(slab) [ 32.250784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.250864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.250907] page dumped because: kasan: bad access detected [ 32.250941] [ 32.250961] Memory state around the buggy address: [ 32.250995] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.251037] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.251091] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.251131] ^ [ 32.251166] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.251210] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.251250] ================================================================== [ 32.173498] ================================================================== [ 32.173551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 32.173603] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.173656] [ 32.173685] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.173769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.173798] Hardware name: linux,dummy-virt (DT) [ 32.173832] Call trace: [ 32.173855] show_stack+0x20/0x38 (C) [ 32.173904] dump_stack_lvl+0x8c/0xd0 [ 32.173954] print_report+0x118/0x5d0 [ 32.174001] kasan_report+0xdc/0x128 [ 32.174046] __asan_report_load4_noabort+0x20/0x30 [ 32.174113] kasan_atomics_helper+0x3dd8/0x4858 [ 32.174165] kasan_atomics+0x198/0x2e0 [ 32.174214] kunit_try_run_case+0x170/0x3f0 [ 32.174262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.174317] kthread+0x328/0x630 [ 32.174360] ret_from_fork+0x10/0x20 [ 32.174411] [ 32.174430] Allocated by task 296: [ 32.174459] kasan_save_stack+0x3c/0x68 [ 32.174498] kasan_save_track+0x20/0x40 [ 32.174536] kasan_save_alloc_info+0x40/0x58 [ 32.174574] __kasan_kmalloc+0xd4/0xd8 [ 32.174609] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.174652] kasan_atomics+0xb8/0x2e0 [ 32.174691] kunit_try_run_case+0x170/0x3f0 [ 32.174729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.174777] kthread+0x328/0x630 [ 32.174810] ret_from_fork+0x10/0x20 [ 32.174848] [ 32.174868] The buggy address belongs to the object at fff00000c9abb900 [ 32.174868] which belongs to the cache kmalloc-64 of size 64 [ 32.174925] The buggy address is located 0 bytes to the right of [ 32.174925] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.174992] [ 32.175014] The buggy address belongs to the physical page: [ 32.175046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.175174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.175252] page_type: f5(slab) [ 32.175292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.175344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.175386] page dumped because: kasan: bad access detected [ 32.175420] [ 32.175440] Memory state around the buggy address: [ 32.175473] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.176022] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.176436] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.176491] ^ [ 32.176530] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.176736] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.177217] ================================================================== [ 32.238239] ================================================================== [ 32.238277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 32.238323] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.238371] [ 32.238399] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.238491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.238521] Hardware name: linux,dummy-virt (DT) [ 32.238551] Call trace: [ 32.238574] show_stack+0x20/0x38 (C) [ 32.238622] dump_stack_lvl+0x8c/0xd0 [ 32.238669] print_report+0x118/0x5d0 [ 32.238716] kasan_report+0xdc/0x128 [ 32.238760] kasan_check_range+0x100/0x1a8 [ 32.238813] __kasan_check_write+0x20/0x30 [ 32.238861] kasan_atomics_helper+0x1190/0x4858 [ 32.238912] kasan_atomics+0x198/0x2e0 [ 32.238961] kunit_try_run_case+0x170/0x3f0 [ 32.239009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.239132] kthread+0x328/0x630 [ 32.239239] ret_from_fork+0x10/0x20 [ 32.239325] [ 32.239394] Allocated by task 296: [ 32.239435] kasan_save_stack+0x3c/0x68 [ 32.239475] kasan_save_track+0x20/0x40 [ 32.239513] kasan_save_alloc_info+0x40/0x58 [ 32.239553] __kasan_kmalloc+0xd4/0xd8 [ 32.239588] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.239631] kasan_atomics+0xb8/0x2e0 [ 32.239671] kunit_try_run_case+0x170/0x3f0 [ 32.239710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.239755] kthread+0x328/0x630 [ 32.239791] ret_from_fork+0x10/0x20 [ 32.239847] [ 32.239880] The buggy address belongs to the object at fff00000c9abb900 [ 32.239880] which belongs to the cache kmalloc-64 of size 64 [ 32.239939] The buggy address is located 0 bytes to the right of [ 32.239939] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.240004] [ 32.240084] The buggy address belongs to the physical page: [ 32.240162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.240261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.240405] page_type: f5(slab) [ 32.240480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.240866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.240935] page dumped because: kasan: bad access detected [ 32.240990] [ 32.241021] Memory state around the buggy address: [ 32.241064] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.241106] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.241149] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.241189] ^ [ 32.241223] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.241266] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.241305] ================================================================== [ 32.215953] ================================================================== [ 32.215992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 32.216038] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.216099] [ 32.216128] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.216211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.216238] Hardware name: linux,dummy-virt (DT) [ 32.216270] Call trace: [ 32.216292] show_stack+0x20/0x38 (C) [ 32.216339] dump_stack_lvl+0x8c/0xd0 [ 32.216403] print_report+0x118/0x5d0 [ 32.216449] kasan_report+0xdc/0x128 [ 32.216495] kasan_check_range+0x100/0x1a8 [ 32.216614] __kasan_check_write+0x20/0x30 [ 32.216731] kasan_atomics_helper+0xf88/0x4858 [ 32.216884] kasan_atomics+0x198/0x2e0 [ 32.216954] kunit_try_run_case+0x170/0x3f0 [ 32.217003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.217066] kthread+0x328/0x630 [ 32.217111] ret_from_fork+0x10/0x20 [ 32.217172] [ 32.217241] Allocated by task 296: [ 32.217347] kasan_save_stack+0x3c/0x68 [ 32.217446] kasan_save_track+0x20/0x40 [ 32.217545] kasan_save_alloc_info+0x40/0x58 [ 32.217875] __kasan_kmalloc+0xd4/0xd8 [ 32.217915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.217991] kasan_atomics+0xb8/0x2e0 [ 32.218037] kunit_try_run_case+0x170/0x3f0 [ 32.218086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.218193] kthread+0x328/0x630 [ 32.218280] ret_from_fork+0x10/0x20 [ 32.218402] [ 32.218462] The buggy address belongs to the object at fff00000c9abb900 [ 32.218462] which belongs to the cache kmalloc-64 of size 64 [ 32.218555] The buggy address is located 0 bytes to the right of [ 32.218555] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.218669] [ 32.218956] The buggy address belongs to the physical page: [ 32.219024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.219152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.219256] page_type: f5(slab) [ 32.219371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.219423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.219464] page dumped because: kasan: bad access detected [ 32.219724] [ 32.219768] Memory state around the buggy address: [ 32.219892] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.219973] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.220039] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.220135] ^ [ 32.220215] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.220415] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.220613] ================================================================== [ 32.244908] ================================================================== [ 32.244954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 32.245003] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.245067] [ 32.245096] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.245179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.245207] Hardware name: linux,dummy-virt (DT) [ 32.245261] Call trace: [ 32.245291] show_stack+0x20/0x38 (C) [ 32.245366] dump_stack_lvl+0x8c/0xd0 [ 32.245436] print_report+0x118/0x5d0 [ 32.245481] kasan_report+0xdc/0x128 [ 32.245525] kasan_check_range+0x100/0x1a8 [ 32.245573] __kasan_check_write+0x20/0x30 [ 32.245656] kasan_atomics_helper+0x126c/0x4858 [ 32.245710] kasan_atomics+0x198/0x2e0 [ 32.246074] kunit_try_run_case+0x170/0x3f0 [ 32.246124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.246178] kthread+0x328/0x630 [ 32.246238] ret_from_fork+0x10/0x20 [ 32.246295] [ 32.246344] Allocated by task 296: [ 32.246392] kasan_save_stack+0x3c/0x68 [ 32.246439] kasan_save_track+0x20/0x40 [ 32.246477] kasan_save_alloc_info+0x40/0x58 [ 32.246519] __kasan_kmalloc+0xd4/0xd8 [ 32.246554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.246598] kasan_atomics+0xb8/0x2e0 [ 32.246637] kunit_try_run_case+0x170/0x3f0 [ 32.246676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.246721] kthread+0x328/0x630 [ 32.246756] ret_from_fork+0x10/0x20 [ 32.246803] [ 32.246825] The buggy address belongs to the object at fff00000c9abb900 [ 32.246825] which belongs to the cache kmalloc-64 of size 64 [ 32.246883] The buggy address is located 0 bytes to the right of [ 32.246883] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.246982] [ 32.247032] The buggy address belongs to the physical page: [ 32.247075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.247154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.247220] page_type: f5(slab) [ 32.247297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.247366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.247408] page dumped because: kasan: bad access detected [ 32.247441] [ 32.247461] Memory state around the buggy address: [ 32.247495] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.247537] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.247581] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.247621] ^ [ 32.247655] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.247698] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.247737] ================================================================== [ 32.318384] ================================================================== [ 32.318436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 32.318664] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.318822] [ 32.318857] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.318945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.319210] Hardware name: linux,dummy-virt (DT) [ 32.319256] Call trace: [ 32.319383] show_stack+0x20/0x38 (C) [ 32.319458] dump_stack_lvl+0x8c/0xd0 [ 32.319526] print_report+0x118/0x5d0 [ 32.319827] kasan_report+0xdc/0x128 [ 32.319904] kasan_check_range+0x100/0x1a8 [ 32.320185] __kasan_check_write+0x20/0x30 [ 32.320251] kasan_atomics_helper+0x16d0/0x4858 [ 32.320304] kasan_atomics+0x198/0x2e0 [ 32.320385] kunit_try_run_case+0x170/0x3f0 [ 32.320557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.320677] kthread+0x328/0x630 [ 32.320836] ret_from_fork+0x10/0x20 [ 32.321041] [ 32.321155] Allocated by task 296: [ 32.321286] kasan_save_stack+0x3c/0x68 [ 32.321335] kasan_save_track+0x20/0x40 [ 32.321396] kasan_save_alloc_info+0x40/0x58 [ 32.321443] __kasan_kmalloc+0xd4/0xd8 [ 32.321757] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.321918] kasan_atomics+0xb8/0x2e0 [ 32.322171] kunit_try_run_case+0x170/0x3f0 [ 32.322268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.322415] kthread+0x328/0x630 [ 32.322593] ret_from_fork+0x10/0x20 [ 32.322672] [ 32.322700] The buggy address belongs to the object at fff00000c9abb900 [ 32.322700] which belongs to the cache kmalloc-64 of size 64 [ 32.323000] The buggy address is located 0 bytes to the right of [ 32.323000] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.323181] [ 32.323278] The buggy address belongs to the physical page: [ 32.323571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.323689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.323740] page_type: f5(slab) [ 32.323790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.324022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.324213] page dumped because: kasan: bad access detected [ 32.324405] [ 32.324439] Memory state around the buggy address: [ 32.324474] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.324520] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.324805] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.324939] ^ [ 32.324986] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.325187] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.325399] ================================================================== [ 32.101897] ================================================================== [ 32.101955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.102044] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.102110] [ 32.102142] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.102226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.102256] Hardware name: linux,dummy-virt (DT) [ 32.102288] Call trace: [ 32.102312] show_stack+0x20/0x38 (C) [ 32.102369] dump_stack_lvl+0x8c/0xd0 [ 32.102421] print_report+0x118/0x5d0 [ 32.102467] kasan_report+0xdc/0x128 [ 32.102513] __asan_report_load4_noabort+0x20/0x30 [ 32.102574] kasan_atomics_helper+0x42d8/0x4858 [ 32.102637] kasan_atomics+0x198/0x2e0 [ 32.102702] kunit_try_run_case+0x170/0x3f0 [ 32.102751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.103135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.103640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.103689] page_type: f5(slab) [ 32.103729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.106267] kasan_atomics_helper+0x934/0x4858 [ 32.107144] kasan_save_alloc_info+0x40/0x58 [ 32.107230] __kasan_kmalloc+0xd4/0xd8 [ 32.107561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.107700] kasan_atomics+0xb8/0x2e0 [ 32.107744] kunit_try_run_case+0x170/0x3f0 [ 32.107818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.107921] kthread+0x328/0x630 [ 32.107958] ret_from_fork+0x10/0x20 [ 32.107996] [ 32.108019] The buggy address belongs to the object at fff00000c9abb900 [ 32.108019] which belongs to the cache kmalloc-64 of size 64 [ 32.108093] The buggy address is located 0 bytes to the right of [ 32.108093] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.108264] [ 32.108326] The buggy address belongs to the physical page: [ 32.108485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.108569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.108756] page_type: f5(slab) [ 32.109095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.109207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.109281] page dumped because: kasan: bad access detected [ 32.109316] [ 32.109383] Memory state around the buggy address: [ 32.109442] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.109490] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.109535] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.109573] ^ [ 32.109608] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.112617] kasan_atomics_helper+0x99c/0x4858 [ 32.114952] The buggy address is located 0 bytes to the right of [ 32.114952] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.124347] ret_from_fork+0x10/0x20 [ 32.125255] The buggy address is located 0 bytes to the right of [ 32.125255] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.125341] [ 32.125364] The buggy address belongs to the physical page: [ 32.125397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.125450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.125536] page_type: f5(slab) [ 32.125959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.126025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.126127] page dumped because: kasan: bad access detected [ 32.126192] [ 32.126339] Memory state around the buggy address: [ 32.126483] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.126591] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.126637] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.126677] ^ [ 32.126712] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.127619] ================================================================== [ 32.274455] ================================================================== [ 32.274506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 32.274557] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.274608] [ 32.274648] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.274735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.274764] Hardware name: linux,dummy-virt (DT) [ 32.274809] Call trace: [ 32.274833] show_stack+0x20/0x38 (C) [ 32.274885] dump_stack_lvl+0x8c/0xd0 [ 32.274934] print_report+0x118/0x5d0 [ 32.274985] kasan_report+0xdc/0x128 [ 32.275033] kasan_check_range+0x100/0x1a8 [ 32.275102] __kasan_check_write+0x20/0x30 [ 32.275157] kasan_atomics_helper+0x14e4/0x4858 [ 32.275218] kasan_atomics+0x198/0x2e0 [ 32.275275] kunit_try_run_case+0x170/0x3f0 [ 32.275324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.275377] kthread+0x328/0x630 [ 32.275421] ret_from_fork+0x10/0x20 [ 32.275469] [ 32.275489] Allocated by task 296: [ 32.275519] kasan_save_stack+0x3c/0x68 [ 32.275559] kasan_save_track+0x20/0x40 [ 32.275597] kasan_save_alloc_info+0x40/0x58 [ 32.275644] __kasan_kmalloc+0xd4/0xd8 [ 32.275682] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.275733] kasan_atomics+0xb8/0x2e0 [ 32.275773] kunit_try_run_case+0x170/0x3f0 [ 32.275812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.275858] kthread+0x328/0x630 [ 32.275894] ret_from_fork+0x10/0x20 [ 32.275932] [ 32.275953] The buggy address belongs to the object at fff00000c9abb900 [ 32.275953] which belongs to the cache kmalloc-64 of size 64 [ 32.276012] The buggy address is located 0 bytes to the right of [ 32.276012] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.276538] [ 32.276634] The buggy address belongs to the physical page: [ 32.276672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.276727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.276775] page_type: f5(slab) [ 32.277196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.277290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.277488] page dumped because: kasan: bad access detected [ 32.277604] [ 32.277674] Memory state around the buggy address: [ 32.277882] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.277928] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.277972] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.278047] ^ [ 32.278130] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.278189] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.278301] ================================================================== [ 32.208766] ================================================================== [ 32.208817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 32.208869] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.208921] [ 32.208951] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.209035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.209078] Hardware name: linux,dummy-virt (DT) [ 32.209111] Call trace: [ 32.209136] show_stack+0x20/0x38 (C) [ 32.209187] dump_stack_lvl+0x8c/0xd0 [ 32.209252] print_report+0x118/0x5d0 [ 32.209299] kasan_report+0xdc/0x128 [ 32.209343] kasan_check_range+0x100/0x1a8 [ 32.209408] __kasan_check_write+0x20/0x30 [ 32.209473] kasan_atomics_helper+0xeb8/0x4858 [ 32.209526] kasan_atomics+0x198/0x2e0 [ 32.209585] kunit_try_run_case+0x170/0x3f0 [ 32.209633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.209687] kthread+0x328/0x630 [ 32.209731] ret_from_fork+0x10/0x20 [ 32.209779] [ 32.209801] Allocated by task 296: [ 32.209831] kasan_save_stack+0x3c/0x68 [ 32.212070] kasan_save_track+0x20/0x40 [ 32.212124] kasan_save_alloc_info+0x40/0x58 [ 32.212165] __kasan_kmalloc+0xd4/0xd8 [ 32.212202] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.212245] kasan_atomics+0xb8/0x2e0 [ 32.212283] kunit_try_run_case+0x170/0x3f0 [ 32.212323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.212369] kthread+0x328/0x630 [ 32.212416] ret_from_fork+0x10/0x20 [ 32.212455] [ 32.212476] The buggy address belongs to the object at fff00000c9abb900 [ 32.212476] which belongs to the cache kmalloc-64 of size 64 [ 32.212533] The buggy address is located 0 bytes to the right of [ 32.212533] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.212598] [ 32.212619] The buggy address belongs to the physical page: [ 32.212651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.212704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.212753] page_type: f5(slab) [ 32.212791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.212841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.212882] page dumped because: kasan: bad access detected [ 32.212916] [ 32.212936] Memory state around the buggy address: [ 32.212968] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.213014] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.213067] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.213184] ^ [ 32.213271] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.213329] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.213369] ================================================================== [ 32.330550] ================================================================== [ 32.330664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 32.330750] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.330810] [ 32.331123] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.331221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.331258] Hardware name: linux,dummy-virt (DT) [ 32.331323] Call trace: [ 32.331349] show_stack+0x20/0x38 (C) [ 32.331437] dump_stack_lvl+0x8c/0xd0 [ 32.331504] print_report+0x118/0x5d0 [ 32.331659] kasan_report+0xdc/0x128 [ 32.331721] kasan_check_range+0x100/0x1a8 [ 32.331863] __kasan_check_write+0x20/0x30 [ 32.331926] kasan_atomics_helper+0x175c/0x4858 [ 32.331985] kasan_atomics+0x198/0x2e0 [ 32.332119] kunit_try_run_case+0x170/0x3f0 [ 32.332193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.332452] kthread+0x328/0x630 [ 32.332763] ret_from_fork+0x10/0x20 [ 32.333221] [ 32.333288] Allocated by task 296: [ 32.333428] kasan_save_stack+0x3c/0x68 [ 32.333515] kasan_save_track+0x20/0x40 [ 32.333656] kasan_save_alloc_info+0x40/0x58 [ 32.333777] __kasan_kmalloc+0xd4/0xd8 [ 32.333930] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.334081] kasan_atomics+0xb8/0x2e0 [ 32.334185] kunit_try_run_case+0x170/0x3f0 [ 32.334397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.334559] kthread+0x328/0x630 [ 32.334639] ret_from_fork+0x10/0x20 [ 32.334696] [ 32.334719] The buggy address belongs to the object at fff00000c9abb900 [ 32.334719] which belongs to the cache kmalloc-64 of size 64 [ 32.334988] The buggy address is located 0 bytes to the right of [ 32.334988] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.335174] [ 32.335245] The buggy address belongs to the physical page: [ 32.335544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.335688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.335774] page_type: f5(slab) [ 32.335920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.336142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.336284] page dumped because: kasan: bad access detected [ 32.336351] [ 32.336559] Memory state around the buggy address: [ 32.336607] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.336653] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.336890] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.337027] ^ [ 32.337106] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.337382] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.337490] ================================================================== [ 32.231434] ================================================================== [ 32.231487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 32.231538] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.231589] [ 32.231618] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.231703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.231731] Hardware name: linux,dummy-virt (DT) [ 32.231764] Call trace: [ 32.231789] show_stack+0x20/0x38 (C) [ 32.231836] dump_stack_lvl+0x8c/0xd0 [ 32.231883] print_report+0x118/0x5d0 [ 32.231929] kasan_report+0xdc/0x128 [ 32.231973] kasan_check_range+0x100/0x1a8 [ 32.232022] __kasan_check_write+0x20/0x30 [ 32.232086] kasan_atomics_helper+0x10c0/0x4858 [ 32.232138] kasan_atomics+0x198/0x2e0 [ 32.232186] kunit_try_run_case+0x170/0x3f0 [ 32.232233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.232287] kthread+0x328/0x630 [ 32.232330] ret_from_fork+0x10/0x20 [ 32.232637] [ 32.232734] Allocated by task 296: [ 32.232914] kasan_save_stack+0x3c/0x68 [ 32.232982] kasan_save_track+0x20/0x40 [ 32.233030] kasan_save_alloc_info+0x40/0x58 [ 32.233079] __kasan_kmalloc+0xd4/0xd8 [ 32.233116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.233160] kasan_atomics+0xb8/0x2e0 [ 32.233298] kunit_try_run_case+0x170/0x3f0 [ 32.233418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.233498] kthread+0x328/0x630 [ 32.233556] ret_from_fork+0x10/0x20 [ 32.233684] [ 32.233754] The buggy address belongs to the object at fff00000c9abb900 [ 32.233754] which belongs to the cache kmalloc-64 of size 64 [ 32.233855] The buggy address is located 0 bytes to the right of [ 32.233855] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.233921] [ 32.233942] The buggy address belongs to the physical page: [ 32.233973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.234024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.234082] page_type: f5(slab) [ 32.234121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.234295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.234444] page dumped because: kasan: bad access detected [ 32.234534] [ 32.234594] Memory state around the buggy address: [ 32.234692] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.234791] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.235006] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.235077] ^ [ 32.235255] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235334] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235406] ================================================================== [ 32.251994] ================================================================== [ 32.252044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 32.252128] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.252186] [ 32.252233] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.252344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.252403] Hardware name: linux,dummy-virt (DT) [ 32.252507] Call trace: [ 32.252633] show_stack+0x20/0x38 (C) [ 32.252741] dump_stack_lvl+0x8c/0xd0 [ 32.252849] print_report+0x118/0x5d0 [ 32.252929] kasan_report+0xdc/0x128 [ 32.252999] kasan_check_range+0x100/0x1a8 [ 32.253048] __kasan_check_write+0x20/0x30 [ 32.253106] kasan_atomics_helper+0x1384/0x4858 [ 32.253157] kasan_atomics+0x198/0x2e0 [ 32.253205] kunit_try_run_case+0x170/0x3f0 [ 32.253254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.253307] kthread+0x328/0x630 [ 32.253352] ret_from_fork+0x10/0x20 [ 32.253408] [ 32.253428] Allocated by task 296: [ 32.253458] kasan_save_stack+0x3c/0x68 [ 32.253499] kasan_save_track+0x20/0x40 [ 32.253561] kasan_save_alloc_info+0x40/0x58 [ 32.253652] __kasan_kmalloc+0xd4/0xd8 [ 32.253710] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.253786] kasan_atomics+0xb8/0x2e0 [ 32.253914] kunit_try_run_case+0x170/0x3f0 [ 32.254001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.254069] kthread+0x328/0x630 [ 32.254103] ret_from_fork+0x10/0x20 [ 32.254141] [ 32.254164] The buggy address belongs to the object at fff00000c9abb900 [ 32.254164] which belongs to the cache kmalloc-64 of size 64 [ 32.254223] The buggy address is located 0 bytes to the right of [ 32.254223] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.254306] [ 32.254385] The buggy address belongs to the physical page: [ 32.254484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.254564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.254657] page_type: f5(slab) [ 32.254746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.254805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.254847] page dumped because: kasan: bad access detected [ 32.254879] [ 32.254899] Memory state around the buggy address: [ 32.254932] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.254975] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.255019] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.255068] ^ [ 32.255102] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255201] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255298] ================================================================== [ 32.203914] ================================================================== [ 32.203966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 32.204019] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.204088] [ 32.204121] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.204208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.204248] Hardware name: linux,dummy-virt (DT) [ 32.204292] Call trace: [ 32.204323] show_stack+0x20/0x38 (C) [ 32.204373] dump_stack_lvl+0x8c/0xd0 [ 32.204429] print_report+0x118/0x5d0 [ 32.204476] kasan_report+0xdc/0x128 [ 32.204521] __asan_report_store8_noabort+0x20/0x30 [ 32.204574] kasan_atomics_helper+0x3e5c/0x4858 [ 32.204625] kasan_atomics+0x198/0x2e0 [ 32.204673] kunit_try_run_case+0x170/0x3f0 [ 32.204730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.204799] kthread+0x328/0x630 [ 32.204849] ret_from_fork+0x10/0x20 [ 32.204898] [ 32.204928] Allocated by task 296: [ 32.204974] kasan_save_stack+0x3c/0x68 [ 32.205024] kasan_save_track+0x20/0x40 [ 32.205075] kasan_save_alloc_info+0x40/0x58 [ 32.205115] __kasan_kmalloc+0xd4/0xd8 [ 32.205151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.205193] kasan_atomics+0xb8/0x2e0 [ 32.205234] kunit_try_run_case+0x170/0x3f0 [ 32.205274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.205319] kthread+0x328/0x630 [ 32.205355] ret_from_fork+0x10/0x20 [ 32.205405] [ 32.205450] The buggy address belongs to the object at fff00000c9abb900 [ 32.205450] which belongs to the cache kmalloc-64 of size 64 [ 32.205509] The buggy address is located 0 bytes to the right of [ 32.205509] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.205575] [ 32.205595] The buggy address belongs to the physical page: [ 32.205625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.205679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.206035] page_type: f5(slab) [ 32.206094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.206183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.206272] page dumped because: kasan: bad access detected [ 32.206366] [ 32.206613] Memory state around the buggy address: [ 32.206671] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.206759] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.206841] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.206977] ^ [ 32.207042] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207127] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207291] ================================================================== [ 32.268373] ================================================================== [ 32.268441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 32.268493] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.268544] [ 32.268573] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.268659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.268687] Hardware name: linux,dummy-virt (DT) [ 32.268719] Call trace: [ 32.268741] show_stack+0x20/0x38 (C) [ 32.268790] dump_stack_lvl+0x8c/0xd0 [ 32.268838] print_report+0x118/0x5d0 [ 32.268882] kasan_report+0xdc/0x128 [ 32.268927] kasan_check_range+0x100/0x1a8 [ 32.268975] __kasan_check_write+0x20/0x30 [ 32.269076] kasan_atomics_helper+0x147c/0x4858 [ 32.269184] kasan_atomics+0x198/0x2e0 [ 32.269280] kunit_try_run_case+0x170/0x3f0 [ 32.269329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.269382] kthread+0x328/0x630 [ 32.269427] ret_from_fork+0x10/0x20 [ 32.269638] [ 32.270047] Allocated by task 296: [ 32.270391] kasan_save_stack+0x3c/0x68 [ 32.270454] kasan_save_track+0x20/0x40 [ 32.270541] kasan_save_alloc_info+0x40/0x58 [ 32.270645] __kasan_kmalloc+0xd4/0xd8 [ 32.270754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.271018] kasan_atomics+0xb8/0x2e0 [ 32.271133] kunit_try_run_case+0x170/0x3f0 [ 32.271222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.271271] kthread+0x328/0x630 [ 32.271313] ret_from_fork+0x10/0x20 [ 32.271559] [ 32.271654] The buggy address belongs to the object at fff00000c9abb900 [ 32.271654] which belongs to the cache kmalloc-64 of size 64 [ 32.271762] The buggy address is located 0 bytes to the right of [ 32.271762] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.271964] [ 32.272135] The buggy address belongs to the physical page: [ 32.272201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.272289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.272385] page_type: f5(slab) [ 32.272449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.272503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.272552] page dumped because: kasan: bad access detected [ 32.272585] [ 32.272605] Memory state around the buggy address: [ 32.272639] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.272933] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273073] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.273170] ^ [ 32.273480] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273557] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273644] ================================================================== [ 32.255729] ================================================================== [ 32.255774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 32.255823] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.255874] [ 32.255903] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.256005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.256035] Hardware name: linux,dummy-virt (DT) [ 32.256096] Call trace: [ 32.256121] show_stack+0x20/0x38 (C) [ 32.256177] dump_stack_lvl+0x8c/0xd0 [ 32.256249] print_report+0x118/0x5d0 [ 32.256335] kasan_report+0xdc/0x128 [ 32.256415] __asan_report_load8_noabort+0x20/0x30 [ 32.256518] kasan_atomics_helper+0x3f04/0x4858 [ 32.256627] kasan_atomics+0x198/0x2e0 [ 32.256750] kunit_try_run_case+0x170/0x3f0 [ 32.256813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.256888] kthread+0x328/0x630 [ 32.256933] ret_from_fork+0x10/0x20 [ 32.256983] [ 32.257003] Allocated by task 296: [ 32.257032] kasan_save_stack+0x3c/0x68 [ 32.257081] kasan_save_track+0x20/0x40 [ 32.257119] kasan_save_alloc_info+0x40/0x58 [ 32.257159] __kasan_kmalloc+0xd4/0xd8 [ 32.257194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.257238] kasan_atomics+0xb8/0x2e0 [ 32.257277] kunit_try_run_case+0x170/0x3f0 [ 32.257351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.257421] kthread+0x328/0x630 [ 32.257477] ret_from_fork+0x10/0x20 [ 32.257572] [ 32.257650] The buggy address belongs to the object at fff00000c9abb900 [ 32.257650] which belongs to the cache kmalloc-64 of size 64 [ 32.257750] The buggy address is located 0 bytes to the right of [ 32.257750] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.258099] [ 32.258168] The buggy address belongs to the physical page: [ 32.258263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.258400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.258468] page_type: f5(slab) [ 32.258507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.258559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.258755] page dumped because: kasan: bad access detected [ 32.258900] [ 32.258976] Memory state around the buggy address: [ 32.259078] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.259177] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.259276] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.259518] ^ [ 32.259661] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.259730] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.259813] ================================================================== [ 32.289650] ================================================================== [ 32.289702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 32.290003] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.291213] [ 32.291300] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.291411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.291508] Hardware name: linux,dummy-virt (DT) [ 32.291543] Call trace: [ 32.291567] show_stack+0x20/0x38 (C) [ 32.291624] dump_stack_lvl+0x8c/0xd0 [ 32.291680] print_report+0x118/0x5d0 [ 32.291726] kasan_report+0xdc/0x128 [ 32.291772] kasan_check_range+0x100/0x1a8 [ 32.292086] __kasan_check_write+0x20/0x30 [ 32.292289] kasan_atomics_helper+0x15b4/0x4858 [ 32.292390] kasan_atomics+0x198/0x2e0 [ 32.292521] kunit_try_run_case+0x170/0x3f0 [ 32.292702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.292763] kthread+0x328/0x630 [ 32.292940] ret_from_fork+0x10/0x20 [ 32.293000] [ 32.293021] Allocated by task 296: [ 32.293052] kasan_save_stack+0x3c/0x68 [ 32.293200] kasan_save_track+0x20/0x40 [ 32.293395] kasan_save_alloc_info+0x40/0x58 [ 32.293480] __kasan_kmalloc+0xd4/0xd8 [ 32.293872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.293989] kasan_atomics+0xb8/0x2e0 [ 32.294291] kunit_try_run_case+0x170/0x3f0 [ 32.294404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.294504] kthread+0x328/0x630 [ 32.294590] ret_from_fork+0x10/0x20 [ 32.294881] [ 32.294927] The buggy address belongs to the object at fff00000c9abb900 [ 32.294927] which belongs to the cache kmalloc-64 of size 64 [ 32.295081] The buggy address is located 0 bytes to the right of [ 32.295081] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.295152] [ 32.295176] The buggy address belongs to the physical page: [ 32.295370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.295448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.295610] page_type: f5(slab) [ 32.295672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.295739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.295910] page dumped because: kasan: bad access detected [ 32.296085] [ 32.296146] Memory state around the buggy address: [ 32.296253] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.296402] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.296474] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.296809] ^ [ 32.296924] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.297040] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.297241] ================================================================== [ 32.235827] ================================================================== [ 32.235876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 32.235924] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.235974] [ 32.236005] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.236104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.236132] Hardware name: linux,dummy-virt (DT) [ 32.236164] Call trace: [ 32.236186] show_stack+0x20/0x38 (C) [ 32.236250] dump_stack_lvl+0x8c/0xd0 [ 32.236301] print_report+0x118/0x5d0 [ 32.236345] kasan_report+0xdc/0x128 [ 32.236399] kasan_check_range+0x100/0x1a8 [ 32.236446] __kasan_check_write+0x20/0x30 [ 32.236493] kasan_atomics_helper+0x1128/0x4858 [ 32.236553] kasan_atomics+0x198/0x2e0 [ 32.236603] kunit_try_run_case+0x170/0x3f0 [ 32.236652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.236705] kthread+0x328/0x630 [ 32.236757] ret_from_fork+0x10/0x20 [ 32.236814] [ 32.236834] Allocated by task 296: [ 32.236863] kasan_save_stack+0x3c/0x68 [ 32.236904] kasan_save_track+0x20/0x40 [ 32.236941] kasan_save_alloc_info+0x40/0x58 [ 32.236981] __kasan_kmalloc+0xd4/0xd8 [ 32.237018] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.237069] kasan_atomics+0xb8/0x2e0 [ 32.237110] kunit_try_run_case+0x170/0x3f0 [ 32.237150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.237211] kthread+0x328/0x630 [ 32.237247] ret_from_fork+0x10/0x20 [ 32.237285] [ 32.237305] The buggy address belongs to the object at fff00000c9abb900 [ 32.237305] which belongs to the cache kmalloc-64 of size 64 [ 32.237371] The buggy address is located 0 bytes to the right of [ 32.237371] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.237436] [ 32.237459] The buggy address belongs to the physical page: [ 32.237491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.237541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.237588] page_type: f5(slab) [ 32.237655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.237706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.237759] page dumped because: kasan: bad access detected [ 32.237791] [ 32.237811] Memory state around the buggy address: [ 32.237842] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.237886] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.237952] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.238013] ^ [ 32.238048] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.238100] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.238139] ================================================================== [ 32.342665] ================================================================== [ 32.342876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 32.342950] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.343077] [ 32.343136] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.343300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.343544] Hardware name: linux,dummy-virt (DT) [ 32.343620] Call trace: [ 32.343645] show_stack+0x20/0x38 (C) [ 32.343783] dump_stack_lvl+0x8c/0xd0 [ 32.343837] print_report+0x118/0x5d0 [ 32.343884] kasan_report+0xdc/0x128 [ 32.343927] kasan_check_range+0x100/0x1a8 [ 32.344101] __kasan_check_write+0x20/0x30 [ 32.344320] kasan_atomics_helper+0x17ec/0x4858 [ 32.344543] kasan_atomics+0x198/0x2e0 [ 32.344621] kunit_try_run_case+0x170/0x3f0 [ 32.344801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.344880] kthread+0x328/0x630 [ 32.345032] ret_from_fork+0x10/0x20 [ 32.345151] [ 32.345267] Allocated by task 296: [ 32.345365] kasan_save_stack+0x3c/0x68 [ 32.345567] kasan_save_track+0x20/0x40 [ 32.345628] kasan_save_alloc_info+0x40/0x58 [ 32.345715] __kasan_kmalloc+0xd4/0xd8 [ 32.345835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.345906] kasan_atomics+0xb8/0x2e0 [ 32.346205] kunit_try_run_case+0x170/0x3f0 [ 32.346320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.346416] kthread+0x328/0x630 [ 32.346671] ret_from_fork+0x10/0x20 [ 32.346802] [ 32.346873] The buggy address belongs to the object at fff00000c9abb900 [ 32.346873] which belongs to the cache kmalloc-64 of size 64 [ 32.347008] The buggy address is located 0 bytes to the right of [ 32.347008] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.347088] [ 32.347110] The buggy address belongs to the physical page: [ 32.347143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.347317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.347406] page_type: f5(slab) [ 32.347454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.347523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.347762] page dumped because: kasan: bad access detected [ 32.347929] [ 32.347998] Memory state around the buggy address: [ 32.348081] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.348219] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.348273] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.348312] ^ [ 32.348459] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.348666] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.348787] ================================================================== [ 32.193695] ================================================================== [ 32.193880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 32.193944] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.194000] [ 32.194120] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.194251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.194318] Hardware name: linux,dummy-virt (DT) [ 32.194352] Call trace: [ 32.194447] show_stack+0x20/0x38 (C) [ 32.194515] dump_stack_lvl+0x8c/0xd0 [ 32.194567] print_report+0x118/0x5d0 [ 32.194614] kasan_report+0xdc/0x128 [ 32.194659] __asan_report_load8_noabort+0x20/0x30 [ 32.194818] kasan_atomics_helper+0x3f58/0x4858 [ 32.194894] kasan_atomics+0x198/0x2e0 [ 32.194945] kunit_try_run_case+0x170/0x3f0 [ 32.194994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.195047] kthread+0x328/0x630 [ 32.195104] ret_from_fork+0x10/0x20 [ 32.195338] [ 32.195440] Allocated by task 296: [ 32.195482] kasan_save_stack+0x3c/0x68 [ 32.195525] kasan_save_track+0x20/0x40 [ 32.195563] kasan_save_alloc_info+0x40/0x58 [ 32.195603] __kasan_kmalloc+0xd4/0xd8 [ 32.195639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.195682] kasan_atomics+0xb8/0x2e0 [ 32.195856] kunit_try_run_case+0x170/0x3f0 [ 32.196004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.196099] kthread+0x328/0x630 [ 32.196219] ret_from_fork+0x10/0x20 [ 32.196256] [ 32.196294] The buggy address belongs to the object at fff00000c9abb900 [ 32.196294] which belongs to the cache kmalloc-64 of size 64 [ 32.196355] The buggy address is located 0 bytes to the right of [ 32.196355] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.196456] [ 32.196738] The buggy address belongs to the physical page: [ 32.196822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.196878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.196927] page_type: f5(slab) [ 32.196979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.197073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.197116] page dumped because: kasan: bad access detected [ 32.197148] [ 32.197177] Memory state around the buggy address: [ 32.197216] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.197261] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.197314] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.197355] ^ [ 32.197388] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.197431] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.197808] ================================================================== [ 32.213576] ================================================================== [ 32.213622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 32.213695] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.213752] [ 32.213785] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.213869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.213897] Hardware name: linux,dummy-virt (DT) [ 32.213929] Call trace: [ 32.213954] show_stack+0x20/0x38 (C) [ 32.214011] dump_stack_lvl+0x8c/0xd0 [ 32.214075] print_report+0x118/0x5d0 [ 32.214121] kasan_report+0xdc/0x128 [ 32.214175] kasan_check_range+0x100/0x1a8 [ 32.214223] __kasan_check_write+0x20/0x30 [ 32.214271] kasan_atomics_helper+0xf20/0x4858 [ 32.214326] kasan_atomics+0x198/0x2e0 [ 32.214375] kunit_try_run_case+0x170/0x3f0 [ 32.214423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.214476] kthread+0x328/0x630 [ 32.214530] ret_from_fork+0x10/0x20 [ 32.214588] [ 32.214617] Allocated by task 296: [ 32.214656] kasan_save_stack+0x3c/0x68 [ 32.214706] kasan_save_track+0x20/0x40 [ 32.214744] kasan_save_alloc_info+0x40/0x58 [ 32.214791] __kasan_kmalloc+0xd4/0xd8 [ 32.214829] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.214871] kasan_atomics+0xb8/0x2e0 [ 32.214911] kunit_try_run_case+0x170/0x3f0 [ 32.214951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.214996] kthread+0x328/0x630 [ 32.215062] ret_from_fork+0x10/0x20 [ 32.215102] [ 32.215122] The buggy address belongs to the object at fff00000c9abb900 [ 32.215122] which belongs to the cache kmalloc-64 of size 64 [ 32.215179] The buggy address is located 0 bytes to the right of [ 32.215179] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.215242] [ 32.215263] The buggy address belongs to the physical page: [ 32.215296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.215347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.215394] page_type: f5(slab) [ 32.215431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.215485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.215526] page dumped because: kasan: bad access detected [ 32.215559] [ 32.215578] Memory state around the buggy address: [ 32.215612] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.215655] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.215698] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.215737] ^ [ 32.215771] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.215813] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.215853] ================================================================== [ 32.337953] ================================================================== [ 32.338028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 32.338095] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.338146] [ 32.338177] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.338526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.338570] Hardware name: linux,dummy-virt (DT) [ 32.338605] Call trace: [ 32.338654] show_stack+0x20/0x38 (C) [ 32.338834] dump_stack_lvl+0x8c/0xd0 [ 32.338885] print_report+0x118/0x5d0 [ 32.338930] kasan_report+0xdc/0x128 [ 32.338977] __asan_report_load8_noabort+0x20/0x30 [ 32.339027] kasan_atomics_helper+0x3e20/0x4858 [ 32.339091] kasan_atomics+0x198/0x2e0 [ 32.339140] kunit_try_run_case+0x170/0x3f0 [ 32.339189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.339243] kthread+0x328/0x630 [ 32.339288] ret_from_fork+0x10/0x20 [ 32.339367] [ 32.339390] Allocated by task 296: [ 32.339434] kasan_save_stack+0x3c/0x68 [ 32.339476] kasan_save_track+0x20/0x40 [ 32.339513] kasan_save_alloc_info+0x40/0x58 [ 32.339553] __kasan_kmalloc+0xd4/0xd8 [ 32.339589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.339632] kasan_atomics+0xb8/0x2e0 [ 32.339671] kunit_try_run_case+0x170/0x3f0 [ 32.339710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.339754] kthread+0x328/0x630 [ 32.339790] ret_from_fork+0x10/0x20 [ 32.339828] [ 32.339847] The buggy address belongs to the object at fff00000c9abb900 [ 32.339847] which belongs to the cache kmalloc-64 of size 64 [ 32.339906] The buggy address is located 0 bytes to the right of [ 32.339906] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.339972] [ 32.340009] The buggy address belongs to the physical page: [ 32.340046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.340589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.340714] page_type: f5(slab) [ 32.340954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.341140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.341318] page dumped because: kasan: bad access detected [ 32.341357] [ 32.341377] Memory state around the buggy address: [ 32.341442] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.341502] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.341557] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.341676] ^ [ 32.341818] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.342096] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.342195] ================================================================== [ 32.198169] ================================================================== [ 32.198245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 32.198294] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.198346] [ 32.198401] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.198489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.198534] Hardware name: linux,dummy-virt (DT) [ 32.198686] Call trace: [ 32.198729] show_stack+0x20/0x38 (C) [ 32.198801] dump_stack_lvl+0x8c/0xd0 [ 32.198850] print_report+0x118/0x5d0 [ 32.198896] kasan_report+0xdc/0x128 [ 32.199139] kasan_check_range+0x100/0x1a8 [ 32.199243] __kasan_check_write+0x20/0x30 [ 32.199354] kasan_atomics_helper+0xe44/0x4858 [ 32.199407] kasan_atomics+0x198/0x2e0 [ 32.199473] kunit_try_run_case+0x170/0x3f0 [ 32.199557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.199821] kthread+0x328/0x630 [ 32.199889] ret_from_fork+0x10/0x20 [ 32.199986] [ 32.200015] Allocated by task 296: [ 32.200083] kasan_save_stack+0x3c/0x68 [ 32.200127] kasan_save_track+0x20/0x40 [ 32.200182] kasan_save_alloc_info+0x40/0x58 [ 32.200384] __kasan_kmalloc+0xd4/0xd8 [ 32.200438] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.200482] kasan_atomics+0xb8/0x2e0 [ 32.200600] kunit_try_run_case+0x170/0x3f0 [ 32.200642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.200687] kthread+0x328/0x630 [ 32.200723] ret_from_fork+0x10/0x20 [ 32.200817] [ 32.200920] The buggy address belongs to the object at fff00000c9abb900 [ 32.200920] which belongs to the cache kmalloc-64 of size 64 [ 32.201100] The buggy address is located 0 bytes to the right of [ 32.201100] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.201239] [ 32.201433] The buggy address belongs to the physical page: [ 32.201486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.201537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.201586] page_type: f5(slab) [ 32.201771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.202038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.202151] page dumped because: kasan: bad access detected [ 32.202255] [ 32.202438] Memory state around the buggy address: [ 32.202617] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.202734] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.202863] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.202941] ^ [ 32.203016] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.203166] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.203254] ================================================================== [ 32.241750] ================================================================== [ 32.241828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 32.241914] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.241968] [ 32.242015] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.242351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.242398] Hardware name: linux,dummy-virt (DT) [ 32.242435] Call trace: [ 32.242464] show_stack+0x20/0x38 (C) [ 32.242513] dump_stack_lvl+0x8c/0xd0 [ 32.242603] print_report+0x118/0x5d0 [ 32.242669] kasan_report+0xdc/0x128 [ 32.242760] kasan_check_range+0x100/0x1a8 [ 32.242820] __kasan_check_write+0x20/0x30 [ 32.242870] kasan_atomics_helper+0x11f8/0x4858 [ 32.242922] kasan_atomics+0x198/0x2e0 [ 32.242970] kunit_try_run_case+0x170/0x3f0 [ 32.243019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.243082] kthread+0x328/0x630 [ 32.243126] ret_from_fork+0x10/0x20 [ 32.243174] [ 32.243195] Allocated by task 296: [ 32.243224] kasan_save_stack+0x3c/0x68 [ 32.243283] kasan_save_track+0x20/0x40 [ 32.243340] kasan_save_alloc_info+0x40/0x58 [ 32.243386] __kasan_kmalloc+0xd4/0xd8 [ 32.243422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.243483] kasan_atomics+0xb8/0x2e0 [ 32.243550] kunit_try_run_case+0x170/0x3f0 [ 32.243629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.243702] kthread+0x328/0x630 [ 32.243771] ret_from_fork+0x10/0x20 [ 32.243809] [ 32.243831] The buggy address belongs to the object at fff00000c9abb900 [ 32.243831] which belongs to the cache kmalloc-64 of size 64 [ 32.243889] The buggy address is located 0 bytes to the right of [ 32.243889] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.243954] [ 32.243974] The buggy address belongs to the physical page: [ 32.244007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.244065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.244130] page_type: f5(slab) [ 32.244187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.244240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.244293] page dumped because: kasan: bad access detected [ 32.244327] [ 32.244346] Memory state around the buggy address: [ 32.244396] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.244483] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.244563] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.244603] ^ [ 32.244637] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.244681] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.244721] ================================================================== [ 32.178869] ================================================================== [ 32.178922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 32.178977] Write of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.179932] [ 32.179987] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.180294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.180324] Hardware name: linux,dummy-virt (DT) [ 32.180355] Call trace: [ 32.180713] show_stack+0x20/0x38 (C) [ 32.180791] dump_stack_lvl+0x8c/0xd0 [ 32.180921] print_report+0x118/0x5d0 [ 32.181286] kasan_report+0xdc/0x128 [ 32.181509] kasan_check_range+0x100/0x1a8 [ 32.181561] __kasan_check_write+0x20/0x30 [ 32.181614] kasan_atomics_helper+0xd3c/0x4858 [ 32.181665] kasan_atomics+0x198/0x2e0 [ 32.181715] kunit_try_run_case+0x170/0x3f0 [ 32.181763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.181816] kthread+0x328/0x630 [ 32.181860] ret_from_fork+0x10/0x20 [ 32.181909] [ 32.181929] Allocated by task 296: [ 32.181961] kasan_save_stack+0x3c/0x68 [ 32.182000] kasan_save_track+0x20/0x40 [ 32.182038] kasan_save_alloc_info+0x40/0x58 [ 32.182143] __kasan_kmalloc+0xd4/0xd8 [ 32.182232] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.182378] kasan_atomics+0xb8/0x2e0 [ 32.182475] kunit_try_run_case+0x170/0x3f0 [ 32.182565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.182785] kthread+0x328/0x630 [ 32.182970] ret_from_fork+0x10/0x20 [ 32.183031] [ 32.183074] The buggy address belongs to the object at fff00000c9abb900 [ 32.183074] which belongs to the cache kmalloc-64 of size 64 [ 32.183134] The buggy address is located 0 bytes to the right of [ 32.183134] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.183199] [ 32.183241] The buggy address belongs to the physical page: [ 32.183280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.183348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.183406] page_type: f5(slab) [ 32.183455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.183506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.183548] page dumped because: kasan: bad access detected [ 32.183581] [ 32.183607] Memory state around the buggy address: [ 32.183638] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.183683] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.183727] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.183767] ^ [ 32.183809] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183855] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183894] ================================================================== [ 32.221423] ================================================================== [ 32.221472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 32.221522] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.221573] [ 32.221601] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.221688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.221715] Hardware name: linux,dummy-virt (DT) [ 32.221746] Call trace: [ 32.221770] show_stack+0x20/0x38 (C) [ 32.221817] dump_stack_lvl+0x8c/0xd0 [ 32.221866] print_report+0x118/0x5d0 [ 32.221913] kasan_report+0xdc/0x128 [ 32.221958] kasan_check_range+0x100/0x1a8 [ 32.222005] __kasan_check_write+0x20/0x30 [ 32.222068] kasan_atomics_helper+0xff0/0x4858 [ 32.222120] kasan_atomics+0x198/0x2e0 [ 32.222169] kunit_try_run_case+0x170/0x3f0 [ 32.222250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.222304] kthread+0x328/0x630 [ 32.222348] ret_from_fork+0x10/0x20 [ 32.222431] [ 32.222469] Allocated by task 296: [ 32.222528] kasan_save_stack+0x3c/0x68 [ 32.222569] kasan_save_track+0x20/0x40 [ 32.222905] kasan_save_alloc_info+0x40/0x58 [ 32.222957] __kasan_kmalloc+0xd4/0xd8 [ 32.223014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.223100] kasan_atomics+0xb8/0x2e0 [ 32.223188] kunit_try_run_case+0x170/0x3f0 [ 32.223276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.223372] kthread+0x328/0x630 [ 32.223419] ret_from_fork+0x10/0x20 [ 32.223478] [ 32.223517] The buggy address belongs to the object at fff00000c9abb900 [ 32.223517] which belongs to the cache kmalloc-64 of size 64 [ 32.223610] The buggy address is located 0 bytes to the right of [ 32.223610] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.223691] [ 32.223713] The buggy address belongs to the physical page: [ 32.223745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.223798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.224070] page_type: f5(slab) [ 32.224146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.224256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.224300] page dumped because: kasan: bad access detected [ 32.224359] [ 32.224419] Memory state around the buggy address: [ 32.224483] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.224818] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.224933] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.225047] ^ [ 32.225132] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.225195] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.225273] ================================================================== [ 32.260336] ================================================================== [ 32.263086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 32.263144] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.263195] [ 32.263225] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.263310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.263339] Hardware name: linux,dummy-virt (DT) [ 32.263371] Call trace: [ 32.263394] show_stack+0x20/0x38 (C) [ 32.263441] dump_stack_lvl+0x8c/0xd0 [ 32.263491] print_report+0x118/0x5d0 [ 32.263536] kasan_report+0xdc/0x128 [ 32.263580] kasan_check_range+0x100/0x1a8 [ 32.263627] __kasan_check_write+0x20/0x30 [ 32.263675] kasan_atomics_helper+0x1414/0x4858 [ 32.263727] kasan_atomics+0x198/0x2e0 [ 32.263775] kunit_try_run_case+0x170/0x3f0 [ 32.263824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.263877] kthread+0x328/0x630 [ 32.263921] ret_from_fork+0x10/0x20 [ 32.263970] [ 32.263990] Allocated by task 296: [ 32.264019] kasan_save_stack+0x3c/0x68 [ 32.264070] kasan_save_track+0x20/0x40 [ 32.264166] kasan_save_alloc_info+0x40/0x58 [ 32.264206] __kasan_kmalloc+0xd4/0xd8 [ 32.264243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.264288] kasan_atomics+0xb8/0x2e0 [ 32.264328] kunit_try_run_case+0x170/0x3f0 [ 32.264368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.264429] kthread+0x328/0x630 [ 32.264480] ret_from_fork+0x10/0x20 [ 32.264526] [ 32.264558] The buggy address belongs to the object at fff00000c9abb900 [ 32.264558] which belongs to the cache kmalloc-64 of size 64 [ 32.264616] The buggy address is located 0 bytes to the right of [ 32.264616] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.264692] [ 32.264733] The buggy address belongs to the physical page: [ 32.264764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.264822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.264868] page_type: f5(slab) [ 32.264918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.264970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.265013] page dumped because: kasan: bad access detected [ 32.265064] [ 32.265100] Memory state around the buggy address: [ 32.265134] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.265178] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.265222] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.265273] ^ [ 32.265316] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.265361] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.265401] ================================================================== [ 32.306021] ================================================================== [ 32.306099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 32.306212] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.306265] [ 32.306306] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.306401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.306439] Hardware name: linux,dummy-virt (DT) [ 32.306472] Call trace: [ 32.306495] show_stack+0x20/0x38 (C) [ 32.306544] dump_stack_lvl+0x8c/0xd0 [ 32.306595] print_report+0x118/0x5d0 [ 32.306640] kasan_report+0xdc/0x128 [ 32.306693] kasan_check_range+0x100/0x1a8 [ 32.306749] __kasan_check_write+0x20/0x30 [ 32.306805] kasan_atomics_helper+0x1644/0x4858 [ 32.306857] kasan_atomics+0x198/0x2e0 [ 32.306906] kunit_try_run_case+0x170/0x3f0 [ 32.306955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.307017] kthread+0x328/0x630 [ 32.307074] ret_from_fork+0x10/0x20 [ 32.307123] [ 32.307143] Allocated by task 296: [ 32.307173] kasan_save_stack+0x3c/0x68 [ 32.307222] kasan_save_track+0x20/0x40 [ 32.307270] kasan_save_alloc_info+0x40/0x58 [ 32.307311] __kasan_kmalloc+0xd4/0xd8 [ 32.307355] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.307401] kasan_atomics+0xb8/0x2e0 [ 32.307442] kunit_try_run_case+0x170/0x3f0 [ 32.307482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.307528] kthread+0x328/0x630 [ 32.307564] ret_from_fork+0x10/0x20 [ 32.307601] [ 32.307623] The buggy address belongs to the object at fff00000c9abb900 [ 32.307623] which belongs to the cache kmalloc-64 of size 64 [ 32.307682] The buggy address is located 0 bytes to the right of [ 32.307682] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.307747] [ 32.307776] The buggy address belongs to the physical page: [ 32.307810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.307860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.307916] page_type: f5(slab) [ 32.307954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.308006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.308047] page dumped because: kasan: bad access detected [ 32.308100] [ 32.308553] Memory state around the buggy address: [ 32.309079] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309135] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309298] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.309396] ^ [ 32.309526] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309633] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309789] ================================================================== [ 32.278979] ================================================================== [ 32.279052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 32.279117] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.279168] [ 32.279398] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.279587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.279622] Hardware name: linux,dummy-virt (DT) [ 32.279672] Call trace: [ 32.279768] show_stack+0x20/0x38 (C) [ 32.279841] dump_stack_lvl+0x8c/0xd0 [ 32.279909] print_report+0x118/0x5d0 [ 32.279955] kasan_report+0xdc/0x128 [ 32.280036] kasan_check_range+0x100/0x1a8 [ 32.280097] __kasan_check_write+0x20/0x30 [ 32.280145] kasan_atomics_helper+0x154c/0x4858 [ 32.280286] kasan_atomics+0x198/0x2e0 [ 32.280499] kunit_try_run_case+0x170/0x3f0 [ 32.280639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.280747] kthread+0x328/0x630 [ 32.281646] ret_from_fork+0x10/0x20 [ 32.281716] [ 32.281738] Allocated by task 296: [ 32.281770] kasan_save_stack+0x3c/0x68 [ 32.281812] kasan_save_track+0x20/0x40 [ 32.281851] kasan_save_alloc_info+0x40/0x58 [ 32.284190] __kasan_kmalloc+0xd4/0xd8 [ 32.284902] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.285043] kasan_atomics+0xb8/0x2e0 [ 32.286182] kunit_try_run_case+0x170/0x3f0 [ 32.286325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.286377] kthread+0x328/0x630 [ 32.286412] ret_from_fork+0x10/0x20 [ 32.286451] [ 32.286482] The buggy address belongs to the object at fff00000c9abb900 [ 32.286482] which belongs to the cache kmalloc-64 of size 64 [ 32.286543] The buggy address is located 0 bytes to the right of [ 32.286543] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.286608] [ 32.286631] The buggy address belongs to the physical page: [ 32.286663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.286715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.286762] page_type: f5(slab) [ 32.286812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.286866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.286909] page dumped because: kasan: bad access detected [ 32.286942] [ 32.286962] Memory state around the buggy address: [ 32.286995] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.287039] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.287173] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.287214] ^ [ 32.287249] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.287292] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.287331] ================================================================== [ 32.309982] ================================================================== [ 32.310028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 32.310093] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.310329] [ 32.310414] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.310660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.311025] Hardware name: linux,dummy-virt (DT) [ 32.311078] Call trace: [ 32.311138] show_stack+0x20/0x38 (C) [ 32.311199] dump_stack_lvl+0x8c/0xd0 [ 32.311320] print_report+0x118/0x5d0 [ 32.311396] kasan_report+0xdc/0x128 [ 32.311442] __asan_report_load8_noabort+0x20/0x30 [ 32.311702] kasan_atomics_helper+0x3df4/0x4858 [ 32.311797] kasan_atomics+0x198/0x2e0 [ 32.312051] kunit_try_run_case+0x170/0x3f0 [ 32.312261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.312354] kthread+0x328/0x630 [ 32.312419] ret_from_fork+0x10/0x20 [ 32.312472] [ 32.312492] Allocated by task 296: [ 32.312523] kasan_save_stack+0x3c/0x68 [ 32.312563] kasan_save_track+0x20/0x40 [ 32.312601] kasan_save_alloc_info+0x40/0x58 [ 32.313010] __kasan_kmalloc+0xd4/0xd8 [ 32.313360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.313529] kasan_atomics+0xb8/0x2e0 [ 32.313785] kunit_try_run_case+0x170/0x3f0 [ 32.314020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.314131] kthread+0x328/0x630 [ 32.314415] ret_from_fork+0x10/0x20 [ 32.314641] [ 32.314691] The buggy address belongs to the object at fff00000c9abb900 [ 32.314691] which belongs to the cache kmalloc-64 of size 64 [ 32.314816] The buggy address is located 0 bytes to the right of [ 32.314816] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.315167] [ 32.315318] The buggy address belongs to the physical page: [ 32.315407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.315716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.315819] page_type: f5(slab) [ 32.315983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.316338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.316391] page dumped because: kasan: bad access detected [ 32.316531] [ 32.316611] Memory state around the buggy address: [ 32.316743] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316848] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316933] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.317131] ^ [ 32.317383] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.317581] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.317648] ================================================================== [ 32.225684] ================================================================== [ 32.225753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 32.225810] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.225897] [ 32.225976] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.226094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.226122] Hardware name: linux,dummy-virt (DT) [ 32.226169] Call trace: [ 32.226192] show_stack+0x20/0x38 (C) [ 32.226240] dump_stack_lvl+0x8c/0xd0 [ 32.226289] print_report+0x118/0x5d0 [ 32.226333] kasan_report+0xdc/0x128 [ 32.226378] kasan_check_range+0x100/0x1a8 [ 32.226428] __kasan_check_write+0x20/0x30 [ 32.226476] kasan_atomics_helper+0x1058/0x4858 [ 32.226527] kasan_atomics+0x198/0x2e0 [ 32.226575] kunit_try_run_case+0x170/0x3f0 [ 32.226622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.226675] kthread+0x328/0x630 [ 32.226735] ret_from_fork+0x10/0x20 [ 32.226818] [ 32.226857] Allocated by task 296: [ 32.226913] kasan_save_stack+0x3c/0x68 [ 32.226992] kasan_save_track+0x20/0x40 [ 32.227095] kasan_save_alloc_info+0x40/0x58 [ 32.227139] __kasan_kmalloc+0xd4/0xd8 [ 32.227205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.227535] kasan_atomics+0xb8/0x2e0 [ 32.227575] kunit_try_run_case+0x170/0x3f0 [ 32.227635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.227701] kthread+0x328/0x630 [ 32.227755] ret_from_fork+0x10/0x20 [ 32.227832] [ 32.227870] The buggy address belongs to the object at fff00000c9abb900 [ 32.227870] which belongs to the cache kmalloc-64 of size 64 [ 32.227949] The buggy address is located 0 bytes to the right of [ 32.227949] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.228041] [ 32.228072] The buggy address belongs to the physical page: [ 32.228103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.228153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.228201] page_type: f5(slab) [ 32.228240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.228289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.228331] page dumped because: kasan: bad access detected [ 32.228364] [ 32.228392] Memory state around the buggy address: [ 32.228425] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.228468] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.228541] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.228641] ^ [ 32.228748] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.228836] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.228948] ================================================================== [ 32.298584] ================================================================== [ 32.298636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 32.298690] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.298893] [ 32.298928] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.299152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.299234] Hardware name: linux,dummy-virt (DT) [ 32.299270] Call trace: [ 32.299311] show_stack+0x20/0x38 (C) [ 32.299374] dump_stack_lvl+0x8c/0xd0 [ 32.299472] print_report+0x118/0x5d0 [ 32.299520] kasan_report+0xdc/0x128 [ 32.299566] __asan_report_load8_noabort+0x20/0x30 [ 32.299617] kasan_atomics_helper+0x3db0/0x4858 [ 32.299668] kasan_atomics+0x198/0x2e0 [ 32.299717] kunit_try_run_case+0x170/0x3f0 [ 32.299767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.299836] kthread+0x328/0x630 [ 32.299882] ret_from_fork+0x10/0x20 [ 32.299931] [ 32.299964] Allocated by task 296: [ 32.299996] kasan_save_stack+0x3c/0x68 [ 32.300044] kasan_save_track+0x20/0x40 [ 32.300346] kasan_save_alloc_info+0x40/0x58 [ 32.300407] __kasan_kmalloc+0xd4/0xd8 [ 32.300850] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.300973] kasan_atomics+0xb8/0x2e0 [ 32.301036] kunit_try_run_case+0x170/0x3f0 [ 32.301195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.301525] kthread+0x328/0x630 [ 32.301849] ret_from_fork+0x10/0x20 [ 32.301920] [ 32.302048] The buggy address belongs to the object at fff00000c9abb900 [ 32.302048] which belongs to the cache kmalloc-64 of size 64 [ 32.302296] The buggy address is located 0 bytes to the right of [ 32.302296] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.302452] [ 32.302584] The buggy address belongs to the physical page: [ 32.302682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.302744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.303031] page_type: f5(slab) [ 32.303257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.303616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.303827] page dumped because: kasan: bad access detected [ 32.303965] [ 32.304044] Memory state around the buggy address: [ 32.304125] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.304385] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.304561] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.304733] ^ [ 32.304801] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.304882] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.304924] ================================================================== [ 32.035785] ================================================================== [ 32.035871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 32.038380] kasan_save_track+0x20/0x40 [ 32.038981] [ 32.040012] page dumped because: kasan: bad access detected [ 32.041252] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.041318] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.041462] ==================================================================
[ 28.775636] ================================================================== [ 28.776042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 28.776838] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.777446] [ 28.777560] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.777770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.777785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.777807] Call Trace: [ 28.777822] <TASK> [ 28.777839] dump_stack_lvl+0x73/0xb0 [ 28.777870] print_report+0xd1/0x610 [ 28.777892] ? __virt_addr_valid+0x1db/0x2d0 [ 28.777915] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.777943] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.777969] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.777990] kasan_report+0x141/0x180 [ 28.778013] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.778040] kasan_check_range+0x10c/0x1c0 [ 28.778063] __kasan_check_write+0x18/0x20 [ 28.778097] kasan_atomics_helper+0x12e6/0x5450 [ 28.778120] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.778142] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.778168] ? kasan_atomics+0x152/0x310 [ 28.778194] kasan_atomics+0x1dc/0x310 [ 28.778217] ? __pfx_kasan_atomics+0x10/0x10 [ 28.778242] ? __pfx_read_tsc+0x10/0x10 [ 28.778264] ? ktime_get_ts64+0x86/0x230 [ 28.778299] kunit_try_run_case+0x1a5/0x480 [ 28.778323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.778346] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.778369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.778393] ? __kthread_parkme+0x82/0x180 [ 28.778417] ? preempt_count_sub+0x50/0x80 [ 28.778441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.778465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.778489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.778512] kthread+0x337/0x6f0 [ 28.778532] ? trace_preempt_on+0x20/0xc0 [ 28.778554] ? __pfx_kthread+0x10/0x10 [ 28.778575] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.778597] ? calculate_sigpending+0x7b/0xa0 [ 28.778620] ? __pfx_kthread+0x10/0x10 [ 28.778641] ret_from_fork+0x116/0x1d0 [ 28.778660] ? __pfx_kthread+0x10/0x10 [ 28.778681] ret_from_fork_asm+0x1a/0x30 [ 28.778713] </TASK> [ 28.778724] [ 28.788155] Allocated by task 314: [ 28.788438] kasan_save_stack+0x45/0x70 [ 28.788783] kasan_save_track+0x18/0x40 [ 28.789019] kasan_save_alloc_info+0x3b/0x50 [ 28.789317] __kasan_kmalloc+0xb7/0xc0 [ 28.789498] __kmalloc_cache_noprof+0x189/0x420 [ 28.789818] kasan_atomics+0x95/0x310 [ 28.790015] kunit_try_run_case+0x1a5/0x480 [ 28.790318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.790650] kthread+0x337/0x6f0 [ 28.790779] ret_from_fork+0x116/0x1d0 [ 28.791087] ret_from_fork_asm+0x1a/0x30 [ 28.791260] [ 28.791364] The buggy address belongs to the object at ffff88810458d180 [ 28.791364] which belongs to the cache kmalloc-64 of size 64 [ 28.791844] The buggy address is located 0 bytes to the right of [ 28.791844] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.792671] [ 28.792771] The buggy address belongs to the physical page: [ 28.792967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.793474] flags: 0x200000000000000(node=0|zone=2) [ 28.793742] page_type: f5(slab) [ 28.793893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.794206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.794710] page dumped because: kasan: bad access detected [ 28.794997] [ 28.795086] Memory state around the buggy address: [ 28.795277] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.795772] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.796062] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.796549] ^ [ 28.796765] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.797173] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.797578] ================================================================== [ 28.819823] ================================================================== [ 28.820215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 28.820769] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.821361] [ 28.821455] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.821502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.821514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.821534] Call Trace: [ 28.821548] <TASK> [ 28.821562] dump_stack_lvl+0x73/0xb0 [ 28.821786] print_report+0xd1/0x610 [ 28.821812] ? __virt_addr_valid+0x1db/0x2d0 [ 28.821835] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.821856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.821882] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.821905] kasan_report+0x141/0x180 [ 28.821936] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.821963] kasan_check_range+0x10c/0x1c0 [ 28.821986] __kasan_check_read+0x15/0x20 [ 28.822009] kasan_atomics_helper+0x13b5/0x5450 [ 28.822032] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.822055] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.822090] ? kasan_atomics+0x152/0x310 [ 28.822117] kasan_atomics+0x1dc/0x310 [ 28.822139] ? __pfx_kasan_atomics+0x10/0x10 [ 28.822163] ? __pfx_read_tsc+0x10/0x10 [ 28.822184] ? ktime_get_ts64+0x86/0x230 [ 28.822208] kunit_try_run_case+0x1a5/0x480 [ 28.822232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.822254] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.822279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.822302] ? __kthread_parkme+0x82/0x180 [ 28.822326] ? preempt_count_sub+0x50/0x80 [ 28.822350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.822373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.822398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.822421] kthread+0x337/0x6f0 [ 28.822441] ? trace_preempt_on+0x20/0xc0 [ 28.822463] ? __pfx_kthread+0x10/0x10 [ 28.822485] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.822507] ? calculate_sigpending+0x7b/0xa0 [ 28.822530] ? __pfx_kthread+0x10/0x10 [ 28.822552] ret_from_fork+0x116/0x1d0 [ 28.822571] ? __pfx_kthread+0x10/0x10 [ 28.822591] ret_from_fork_asm+0x1a/0x30 [ 28.822623] </TASK> [ 28.822633] [ 28.831885] Allocated by task 314: [ 28.832230] kasan_save_stack+0x45/0x70 [ 28.832473] kasan_save_track+0x18/0x40 [ 28.832770] kasan_save_alloc_info+0x3b/0x50 [ 28.832943] __kasan_kmalloc+0xb7/0xc0 [ 28.833140] __kmalloc_cache_noprof+0x189/0x420 [ 28.833563] kasan_atomics+0x95/0x310 [ 28.833737] kunit_try_run_case+0x1a5/0x480 [ 28.833916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.834165] kthread+0x337/0x6f0 [ 28.834542] ret_from_fork+0x116/0x1d0 [ 28.834732] ret_from_fork_asm+0x1a/0x30 [ 28.834974] [ 28.835053] The buggy address belongs to the object at ffff88810458d180 [ 28.835053] which belongs to the cache kmalloc-64 of size 64 [ 28.835743] The buggy address is located 0 bytes to the right of [ 28.835743] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.836246] [ 28.836554] The buggy address belongs to the physical page: [ 28.836775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.837115] flags: 0x200000000000000(node=0|zone=2) [ 28.837322] page_type: f5(slab) [ 28.837460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.837768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.838074] page dumped because: kasan: bad access detected [ 28.838620] [ 28.838706] Memory state around the buggy address: [ 28.838887] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.839354] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.839723] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.840021] ^ [ 28.840332] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.840695] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.840946] ================================================================== [ 29.106341] ================================================================== [ 29.107250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 29.107683] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.107906] [ 29.107985] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.108033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.108045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.108067] Call Trace: [ 29.108093] <TASK> [ 29.108109] dump_stack_lvl+0x73/0xb0 [ 29.108139] print_report+0xd1/0x610 [ 29.108161] ? __virt_addr_valid+0x1db/0x2d0 [ 29.108184] ? kasan_atomics_helper+0x1b22/0x5450 [ 29.108206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.108232] ? kasan_atomics_helper+0x1b22/0x5450 [ 29.108254] kasan_report+0x141/0x180 [ 29.108297] ? kasan_atomics_helper+0x1b22/0x5450 [ 29.108325] kasan_check_range+0x10c/0x1c0 [ 29.108348] __kasan_check_write+0x18/0x20 [ 29.108371] kasan_atomics_helper+0x1b22/0x5450 [ 29.108394] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.108416] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.108441] ? kasan_atomics+0x152/0x310 [ 29.108468] kasan_atomics+0x1dc/0x310 [ 29.108491] ? __pfx_kasan_atomics+0x10/0x10 [ 29.108515] ? __pfx_read_tsc+0x10/0x10 [ 29.108537] ? ktime_get_ts64+0x86/0x230 [ 29.108561] kunit_try_run_case+0x1a5/0x480 [ 29.108586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.108607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.108631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.108656] ? __kthread_parkme+0x82/0x180 [ 29.108680] ? preempt_count_sub+0x50/0x80 [ 29.108704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.108727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.108751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.108774] kthread+0x337/0x6f0 [ 29.108794] ? trace_preempt_on+0x20/0xc0 [ 29.108817] ? __pfx_kthread+0x10/0x10 [ 29.108837] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.108859] ? calculate_sigpending+0x7b/0xa0 [ 29.108883] ? __pfx_kthread+0x10/0x10 [ 29.108905] ret_from_fork+0x116/0x1d0 [ 29.108925] ? __pfx_kthread+0x10/0x10 [ 29.108946] ret_from_fork_asm+0x1a/0x30 [ 29.108978] </TASK> [ 29.108989] [ 29.115813] Allocated by task 314: [ 29.115982] kasan_save_stack+0x45/0x70 [ 29.116182] kasan_save_track+0x18/0x40 [ 29.116387] kasan_save_alloc_info+0x3b/0x50 [ 29.116578] __kasan_kmalloc+0xb7/0xc0 [ 29.116703] __kmalloc_cache_noprof+0x189/0x420 [ 29.116851] kasan_atomics+0x95/0x310 [ 29.116978] kunit_try_run_case+0x1a5/0x480 [ 29.117175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.117453] kthread+0x337/0x6f0 [ 29.117617] ret_from_fork+0x116/0x1d0 [ 29.117806] ret_from_fork_asm+0x1a/0x30 [ 29.117999] [ 29.118099] The buggy address belongs to the object at ffff88810458d180 [ 29.118099] which belongs to the cache kmalloc-64 of size 64 [ 29.118640] The buggy address is located 0 bytes to the right of [ 29.118640] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.119125] [ 29.119201] The buggy address belongs to the physical page: [ 29.119445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.119777] flags: 0x200000000000000(node=0|zone=2) [ 29.119973] page_type: f5(slab) [ 29.120142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.120458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.120736] page dumped because: kasan: bad access detected [ 29.120901] [ 29.120964] Memory state around the buggy address: [ 29.121120] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.121356] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.121615] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.121927] ^ [ 29.122149] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.122482] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.122698] ================================================================== [ 28.053131] ================================================================== [ 28.054991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 28.055872] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.056107] [ 28.056192] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.056251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.056264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.056286] Call Trace: [ 28.056298] <TASK> [ 28.056315] dump_stack_lvl+0x73/0xb0 [ 28.056345] print_report+0xd1/0x610 [ 28.056366] ? __virt_addr_valid+0x1db/0x2d0 [ 28.056390] ? kasan_atomics_helper+0x4bbc/0x5450 [ 28.056410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.056435] ? kasan_atomics_helper+0x4bbc/0x5450 [ 28.056456] kasan_report+0x141/0x180 [ 28.056477] ? kasan_atomics_helper+0x4bbc/0x5450 [ 28.056503] __asan_report_load4_noabort+0x18/0x20 [ 28.056527] kasan_atomics_helper+0x4bbc/0x5450 [ 28.056549] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.056570] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.056593] ? kasan_atomics+0x152/0x310 [ 28.056618] kasan_atomics+0x1dc/0x310 [ 28.056639] ? __pfx_kasan_atomics+0x10/0x10 [ 28.056662] ? __pfx_read_tsc+0x10/0x10 [ 28.056683] ? ktime_get_ts64+0x86/0x230 [ 28.056707] kunit_try_run_case+0x1a5/0x480 [ 28.056730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.056751] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.056773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.056796] ? __kthread_parkme+0x82/0x180 [ 28.056818] ? preempt_count_sub+0x50/0x80 [ 28.056841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.056864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.056886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.056909] kthread+0x337/0x6f0 [ 28.056927] ? trace_preempt_on+0x20/0xc0 [ 28.056949] ? __pfx_kthread+0x10/0x10 [ 28.056968] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.056989] ? calculate_sigpending+0x7b/0xa0 [ 28.057012] ? __pfx_kthread+0x10/0x10 [ 28.057032] ret_from_fork+0x116/0x1d0 [ 28.057050] ? __pfx_kthread+0x10/0x10 [ 28.057070] ret_from_fork_asm+0x1a/0x30 [ 28.057672] </TASK> [ 28.057685] [ 28.065564] Allocated by task 314: [ 28.065688] kasan_save_stack+0x45/0x70 [ 28.065826] kasan_save_track+0x18/0x40 [ 28.065967] kasan_save_alloc_info+0x3b/0x50 [ 28.066272] __kasan_kmalloc+0xb7/0xc0 [ 28.066562] __kmalloc_cache_noprof+0x189/0x420 [ 28.066841] kasan_atomics+0x95/0x310 [ 28.067042] kunit_try_run_case+0x1a5/0x480 [ 28.067324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.067611] kthread+0x337/0x6f0 [ 28.067771] ret_from_fork+0x116/0x1d0 [ 28.067961] ret_from_fork_asm+0x1a/0x30 [ 28.068153] [ 28.068219] The buggy address belongs to the object at ffff88810458d180 [ 28.068219] which belongs to the cache kmalloc-64 of size 64 [ 28.068800] The buggy address is located 0 bytes to the right of [ 28.068800] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.069219] [ 28.069306] The buggy address belongs to the physical page: [ 28.069580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.069930] flags: 0x200000000000000(node=0|zone=2) [ 28.070160] page_type: f5(slab) [ 28.070538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.070780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.071092] page dumped because: kasan: bad access detected [ 28.071427] [ 28.071524] Memory state around the buggy address: [ 28.071723] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.072016] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.072356] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.072726] ^ [ 28.072970] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.073334] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.073681] ================================================================== [ 28.396770] ================================================================== [ 28.397105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 28.397421] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.397707] [ 28.397788] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.397835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.397848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.397869] Call Trace: [ 28.397883] <TASK> [ 28.397901] dump_stack_lvl+0x73/0xb0 [ 28.397966] print_report+0xd1/0x610 [ 28.397989] ? __virt_addr_valid+0x1db/0x2d0 [ 28.398012] ? kasan_atomics_helper+0xa2b/0x5450 [ 28.398046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.398072] ? kasan_atomics_helper+0xa2b/0x5450 [ 28.398135] kasan_report+0x141/0x180 [ 28.398159] ? kasan_atomics_helper+0xa2b/0x5450 [ 28.398185] kasan_check_range+0x10c/0x1c0 [ 28.398220] __kasan_check_write+0x18/0x20 [ 28.398244] kasan_atomics_helper+0xa2b/0x5450 [ 28.398267] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.398301] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.398326] ? kasan_atomics+0x152/0x310 [ 28.398353] kasan_atomics+0x1dc/0x310 [ 28.398393] ? __pfx_kasan_atomics+0x10/0x10 [ 28.398418] ? __pfx_read_tsc+0x10/0x10 [ 28.398453] ? ktime_get_ts64+0x86/0x230 [ 28.398487] kunit_try_run_case+0x1a5/0x480 [ 28.398510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.398532] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.398568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.398592] ? __kthread_parkme+0x82/0x180 [ 28.398620] ? preempt_count_sub+0x50/0x80 [ 28.398644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.398668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.398691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.398714] kthread+0x337/0x6f0 [ 28.398734] ? trace_preempt_on+0x20/0xc0 [ 28.398757] ? __pfx_kthread+0x10/0x10 [ 28.398778] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.398800] ? calculate_sigpending+0x7b/0xa0 [ 28.398824] ? __pfx_kthread+0x10/0x10 [ 28.398845] ret_from_fork+0x116/0x1d0 [ 28.398865] ? __pfx_kthread+0x10/0x10 [ 28.398885] ret_from_fork_asm+0x1a/0x30 [ 28.398917] </TASK> [ 28.398927] [ 28.409211] Allocated by task 314: [ 28.409451] kasan_save_stack+0x45/0x70 [ 28.409919] kasan_save_track+0x18/0x40 [ 28.410117] kasan_save_alloc_info+0x3b/0x50 [ 28.410276] __kasan_kmalloc+0xb7/0xc0 [ 28.410581] __kmalloc_cache_noprof+0x189/0x420 [ 28.410806] kasan_atomics+0x95/0x310 [ 28.411216] kunit_try_run_case+0x1a5/0x480 [ 28.411407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.411722] kthread+0x337/0x6f0 [ 28.411890] ret_from_fork+0x116/0x1d0 [ 28.412334] ret_from_fork_asm+0x1a/0x30 [ 28.412548] [ 28.412755] The buggy address belongs to the object at ffff88810458d180 [ 28.412755] which belongs to the cache kmalloc-64 of size 64 [ 28.413392] The buggy address is located 0 bytes to the right of [ 28.413392] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.414126] [ 28.414221] The buggy address belongs to the physical page: [ 28.414666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.415044] flags: 0x200000000000000(node=0|zone=2) [ 28.415303] page_type: f5(slab) [ 28.415568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.415881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.416200] page dumped because: kasan: bad access detected [ 28.416656] [ 28.416774] Memory state around the buggy address: [ 28.417112] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.417642] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.418013] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.418458] ^ [ 28.418751] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.419137] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.419592] ================================================================== [ 28.527743] ================================================================== [ 28.528042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 28.528390] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.529040] [ 28.529171] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.529221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.529234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.529257] Call Trace: [ 28.529274] <TASK> [ 28.529291] dump_stack_lvl+0x73/0xb0 [ 28.529322] print_report+0xd1/0x610 [ 28.529344] ? __virt_addr_valid+0x1db/0x2d0 [ 28.529367] ? kasan_atomics_helper+0xde0/0x5450 [ 28.529401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.529428] ? kasan_atomics_helper+0xde0/0x5450 [ 28.529450] kasan_report+0x141/0x180 [ 28.529485] ? kasan_atomics_helper+0xde0/0x5450 [ 28.529511] kasan_check_range+0x10c/0x1c0 [ 28.529535] __kasan_check_write+0x18/0x20 [ 28.529559] kasan_atomics_helper+0xde0/0x5450 [ 28.529582] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.529605] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.529630] ? kasan_atomics+0x152/0x310 [ 28.529657] kasan_atomics+0x1dc/0x310 [ 28.529680] ? __pfx_kasan_atomics+0x10/0x10 [ 28.529705] ? __pfx_read_tsc+0x10/0x10 [ 28.529728] ? ktime_get_ts64+0x86/0x230 [ 28.529762] kunit_try_run_case+0x1a5/0x480 [ 28.529786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.529808] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.529843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.529867] ? __kthread_parkme+0x82/0x180 [ 28.529891] ? preempt_count_sub+0x50/0x80 [ 28.529916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.529953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.529977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.530001] kthread+0x337/0x6f0 [ 28.530032] ? trace_preempt_on+0x20/0xc0 [ 28.530056] ? __pfx_kthread+0x10/0x10 [ 28.530085] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.530107] ? calculate_sigpending+0x7b/0xa0 [ 28.530131] ? __pfx_kthread+0x10/0x10 [ 28.530153] ret_from_fork+0x116/0x1d0 [ 28.530173] ? __pfx_kthread+0x10/0x10 [ 28.530195] ret_from_fork_asm+0x1a/0x30 [ 28.530228] </TASK> [ 28.530239] [ 28.537763] Allocated by task 314: [ 28.537930] kasan_save_stack+0x45/0x70 [ 28.538152] kasan_save_track+0x18/0x40 [ 28.538284] kasan_save_alloc_info+0x3b/0x50 [ 28.538426] __kasan_kmalloc+0xb7/0xc0 [ 28.538607] __kmalloc_cache_noprof+0x189/0x420 [ 28.538825] kasan_atomics+0x95/0x310 [ 28.539030] kunit_try_run_case+0x1a5/0x480 [ 28.539243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.539460] kthread+0x337/0x6f0 [ 28.539575] ret_from_fork+0x116/0x1d0 [ 28.539799] ret_from_fork_asm+0x1a/0x30 [ 28.539990] [ 28.540087] The buggy address belongs to the object at ffff88810458d180 [ 28.540087] which belongs to the cache kmalloc-64 of size 64 [ 28.540639] The buggy address is located 0 bytes to the right of [ 28.540639] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.541156] [ 28.541246] The buggy address belongs to the physical page: [ 28.541515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.541909] flags: 0x200000000000000(node=0|zone=2) [ 28.542129] page_type: f5(slab) [ 28.542312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.542641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.542894] page dumped because: kasan: bad access detected [ 28.543059] [ 28.543132] Memory state around the buggy address: [ 28.543282] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.543492] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.544156] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.544617] ^ [ 28.544928] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.545210] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.545599] ================================================================== [ 29.341242] ================================================================== [ 29.341598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 29.341905] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.342212] [ 29.342319] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.342365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.342378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.342400] Call Trace: [ 29.342413] <TASK> [ 29.342428] dump_stack_lvl+0x73/0xb0 [ 29.342455] print_report+0xd1/0x610 [ 29.342477] ? __virt_addr_valid+0x1db/0x2d0 [ 29.342499] ? kasan_atomics_helper+0x20c8/0x5450 [ 29.342521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.342547] ? kasan_atomics_helper+0x20c8/0x5450 [ 29.342569] kasan_report+0x141/0x180 [ 29.342591] ? kasan_atomics_helper+0x20c8/0x5450 [ 29.342617] kasan_check_range+0x10c/0x1c0 [ 29.342641] __kasan_check_write+0x18/0x20 [ 29.342664] kasan_atomics_helper+0x20c8/0x5450 [ 29.342687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.342709] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.342734] ? kasan_atomics+0x152/0x310 [ 29.342760] kasan_atomics+0x1dc/0x310 [ 29.342783] ? __pfx_kasan_atomics+0x10/0x10 [ 29.342808] ? __pfx_read_tsc+0x10/0x10 [ 29.342829] ? ktime_get_ts64+0x86/0x230 [ 29.342853] kunit_try_run_case+0x1a5/0x480 [ 29.342877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.342900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.342923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.342947] ? __kthread_parkme+0x82/0x180 [ 29.342971] ? preempt_count_sub+0x50/0x80 [ 29.342994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.343018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.343041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.343065] kthread+0x337/0x6f0 [ 29.343096] ? trace_preempt_on+0x20/0xc0 [ 29.343119] ? __pfx_kthread+0x10/0x10 [ 29.343139] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.343161] ? calculate_sigpending+0x7b/0xa0 [ 29.343184] ? __pfx_kthread+0x10/0x10 [ 29.343208] ret_from_fork+0x116/0x1d0 [ 29.343226] ? __pfx_kthread+0x10/0x10 [ 29.343248] ret_from_fork_asm+0x1a/0x30 [ 29.343279] </TASK> [ 29.343290] [ 29.351189] Allocated by task 314: [ 29.352200] kasan_save_stack+0x45/0x70 [ 29.353032] kasan_save_track+0x18/0x40 [ 29.353238] kasan_save_alloc_info+0x3b/0x50 [ 29.353441] __kasan_kmalloc+0xb7/0xc0 [ 29.353566] __kmalloc_cache_noprof+0x189/0x420 [ 29.353710] kasan_atomics+0x95/0x310 [ 29.353832] kunit_try_run_case+0x1a5/0x480 [ 29.353970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.354165] kthread+0x337/0x6f0 [ 29.354781] ret_from_fork+0x116/0x1d0 [ 29.355036] ret_from_fork_asm+0x1a/0x30 [ 29.355538] [ 29.355779] The buggy address belongs to the object at ffff88810458d180 [ 29.355779] which belongs to the cache kmalloc-64 of size 64 [ 29.356564] The buggy address is located 0 bytes to the right of [ 29.356564] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.357095] [ 29.357181] The buggy address belongs to the physical page: [ 29.357824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.358259] flags: 0x200000000000000(node=0|zone=2) [ 29.358766] page_type: f5(slab) [ 29.359010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.359570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.359882] page dumped because: kasan: bad access detected [ 29.360125] [ 29.360209] Memory state around the buggy address: [ 29.360763] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.361201] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.361520] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.361805] ^ [ 29.362012] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.362565] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.363015] ================================================================== [ 29.409569] ================================================================== [ 29.409873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 29.410311] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.410635] [ 29.410752] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.410799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.410812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.410832] Call Trace: [ 29.410864] <TASK> [ 29.410879] dump_stack_lvl+0x73/0xb0 [ 29.410906] print_report+0xd1/0x610 [ 29.410946] ? __virt_addr_valid+0x1db/0x2d0 [ 29.410969] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.411007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.411034] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.411056] kasan_report+0x141/0x180 [ 29.411091] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.411118] __asan_report_load8_noabort+0x18/0x20 [ 29.411159] kasan_atomics_helper+0x4fa5/0x5450 [ 29.411184] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.411220] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.411269] ? kasan_atomics+0x152/0x310 [ 29.411296] kasan_atomics+0x1dc/0x310 [ 29.411332] ? __pfx_kasan_atomics+0x10/0x10 [ 29.411369] ? __pfx_read_tsc+0x10/0x10 [ 29.411391] ? ktime_get_ts64+0x86/0x230 [ 29.411415] kunit_try_run_case+0x1a5/0x480 [ 29.411439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.411461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.411485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.411509] ? __kthread_parkme+0x82/0x180 [ 29.411533] ? preempt_count_sub+0x50/0x80 [ 29.411556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.411580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.411604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.411628] kthread+0x337/0x6f0 [ 29.411647] ? trace_preempt_on+0x20/0xc0 [ 29.411669] ? __pfx_kthread+0x10/0x10 [ 29.411690] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.411716] ? calculate_sigpending+0x7b/0xa0 [ 29.411741] ? __pfx_kthread+0x10/0x10 [ 29.411763] ret_from_fork+0x116/0x1d0 [ 29.411783] ? __pfx_kthread+0x10/0x10 [ 29.411805] ret_from_fork_asm+0x1a/0x30 [ 29.411836] </TASK> [ 29.411847] [ 29.419437] Allocated by task 314: [ 29.419616] kasan_save_stack+0x45/0x70 [ 29.419811] kasan_save_track+0x18/0x40 [ 29.420006] kasan_save_alloc_info+0x3b/0x50 [ 29.420197] __kasan_kmalloc+0xb7/0xc0 [ 29.420423] __kmalloc_cache_noprof+0x189/0x420 [ 29.420580] kasan_atomics+0x95/0x310 [ 29.420774] kunit_try_run_case+0x1a5/0x480 [ 29.420914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.421086] kthread+0x337/0x6f0 [ 29.421441] ret_from_fork+0x116/0x1d0 [ 29.423105] ret_from_fork_asm+0x1a/0x30 [ 29.423339] [ 29.423539] The buggy address belongs to the object at ffff88810458d180 [ 29.423539] which belongs to the cache kmalloc-64 of size 64 [ 29.424136] The buggy address is located 0 bytes to the right of [ 29.424136] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.424495] [ 29.424560] The buggy address belongs to the physical page: [ 29.424719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.424993] flags: 0x200000000000000(node=0|zone=2) [ 29.425178] page_type: f5(slab) [ 29.425294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.425518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.425736] page dumped because: kasan: bad access detected [ 29.425899] [ 29.425968] Memory state around the buggy address: [ 29.426126] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.426336] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.426549] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.427675] ^ [ 29.427912] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.430289] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.431565] ================================================================== [ 29.037946] ================================================================== [ 29.038591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 29.038819] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.039088] [ 29.039187] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.039233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.039245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.039310] Call Trace: [ 29.039323] <TASK> [ 29.039338] dump_stack_lvl+0x73/0xb0 [ 29.039366] print_report+0xd1/0x610 [ 29.039388] ? __virt_addr_valid+0x1db/0x2d0 [ 29.039411] ? kasan_atomics_helper+0x194a/0x5450 [ 29.039432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.039494] ? kasan_atomics_helper+0x194a/0x5450 [ 29.039517] kasan_report+0x141/0x180 [ 29.039540] ? kasan_atomics_helper+0x194a/0x5450 [ 29.039568] kasan_check_range+0x10c/0x1c0 [ 29.039591] __kasan_check_write+0x18/0x20 [ 29.039646] kasan_atomics_helper+0x194a/0x5450 [ 29.039671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.039693] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.039718] ? kasan_atomics+0x152/0x310 [ 29.039744] kasan_atomics+0x1dc/0x310 [ 29.039798] ? __pfx_kasan_atomics+0x10/0x10 [ 29.039822] ? __pfx_read_tsc+0x10/0x10 [ 29.039844] ? ktime_get_ts64+0x86/0x230 [ 29.039868] kunit_try_run_case+0x1a5/0x480 [ 29.039894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.039916] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.039939] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.039963] ? __kthread_parkme+0x82/0x180 [ 29.039987] ? preempt_count_sub+0x50/0x80 [ 29.040010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.040034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.040058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.040091] kthread+0x337/0x6f0 [ 29.040111] ? trace_preempt_on+0x20/0xc0 [ 29.040134] ? __pfx_kthread+0x10/0x10 [ 29.040154] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.040176] ? calculate_sigpending+0x7b/0xa0 [ 29.040200] ? __pfx_kthread+0x10/0x10 [ 29.040221] ret_from_fork+0x116/0x1d0 [ 29.040241] ? __pfx_kthread+0x10/0x10 [ 29.040261] ret_from_fork_asm+0x1a/0x30 [ 29.040327] </TASK> [ 29.040338] [ 29.048177] Allocated by task 314: [ 29.048414] kasan_save_stack+0x45/0x70 [ 29.048775] kasan_save_track+0x18/0x40 [ 29.048998] kasan_save_alloc_info+0x3b/0x50 [ 29.049272] __kasan_kmalloc+0xb7/0xc0 [ 29.049521] __kmalloc_cache_noprof+0x189/0x420 [ 29.049768] kasan_atomics+0x95/0x310 [ 29.049939] kunit_try_run_case+0x1a5/0x480 [ 29.050090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.050258] kthread+0x337/0x6f0 [ 29.050387] ret_from_fork+0x116/0x1d0 [ 29.050604] ret_from_fork_asm+0x1a/0x30 [ 29.050796] [ 29.050884] The buggy address belongs to the object at ffff88810458d180 [ 29.050884] which belongs to the cache kmalloc-64 of size 64 [ 29.051453] The buggy address is located 0 bytes to the right of [ 29.051453] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.051950] [ 29.052018] The buggy address belongs to the physical page: [ 29.052285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.052633] flags: 0x200000000000000(node=0|zone=2) [ 29.052807] page_type: f5(slab) [ 29.053000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.053371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.053698] page dumped because: kasan: bad access detected [ 29.053939] [ 29.054029] Memory state around the buggy address: [ 29.054282] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.054598] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.054934] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.055259] ^ [ 29.055487] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.055790] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.056047] ================================================================== [ 28.752444] ================================================================== [ 28.752780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 28.753246] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.753476] [ 28.753577] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.753624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.753636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.753658] Call Trace: [ 28.753673] <TASK> [ 28.753688] dump_stack_lvl+0x73/0xb0 [ 28.753716] print_report+0xd1/0x610 [ 28.753748] ? __virt_addr_valid+0x1db/0x2d0 [ 28.753950] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.753978] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.754005] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.754111] kasan_report+0x141/0x180 [ 28.754193] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.754221] __asan_report_load4_noabort+0x18/0x20 [ 28.754297] kasan_atomics_helper+0x49e8/0x5450 [ 28.754321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.754344] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.754369] ? kasan_atomics+0x152/0x310 [ 28.754395] kasan_atomics+0x1dc/0x310 [ 28.754417] ? __pfx_kasan_atomics+0x10/0x10 [ 28.754442] ? __pfx_read_tsc+0x10/0x10 [ 28.754463] ? ktime_get_ts64+0x86/0x230 [ 28.754487] kunit_try_run_case+0x1a5/0x480 [ 28.754635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.754660] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.754683] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.754707] ? __kthread_parkme+0x82/0x180 [ 28.754731] ? preempt_count_sub+0x50/0x80 [ 28.754755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.754779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.754802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.754826] kthread+0x337/0x6f0 [ 28.754845] ? trace_preempt_on+0x20/0xc0 [ 28.754868] ? __pfx_kthread+0x10/0x10 [ 28.754889] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.754911] ? calculate_sigpending+0x7b/0xa0 [ 28.754934] ? __pfx_kthread+0x10/0x10 [ 28.754956] ret_from_fork+0x116/0x1d0 [ 28.754975] ? __pfx_kthread+0x10/0x10 [ 28.754995] ret_from_fork_asm+0x1a/0x30 [ 28.755027] </TASK> [ 28.755039] [ 28.764521] Allocated by task 314: [ 28.764813] kasan_save_stack+0x45/0x70 [ 28.764982] kasan_save_track+0x18/0x40 [ 28.765183] kasan_save_alloc_info+0x3b/0x50 [ 28.765819] __kasan_kmalloc+0xb7/0xc0 [ 28.765993] __kmalloc_cache_noprof+0x189/0x420 [ 28.766491] kasan_atomics+0x95/0x310 [ 28.766672] kunit_try_run_case+0x1a5/0x480 [ 28.766987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.767240] kthread+0x337/0x6f0 [ 28.767598] ret_from_fork+0x116/0x1d0 [ 28.767863] ret_from_fork_asm+0x1a/0x30 [ 28.768029] [ 28.768212] The buggy address belongs to the object at ffff88810458d180 [ 28.768212] which belongs to the cache kmalloc-64 of size 64 [ 28.768904] The buggy address is located 0 bytes to the right of [ 28.768904] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.769482] [ 28.769811] The buggy address belongs to the physical page: [ 28.770070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.770605] flags: 0x200000000000000(node=0|zone=2) [ 28.770923] page_type: f5(slab) [ 28.771225] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.771677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.772003] page dumped because: kasan: bad access detected [ 28.772357] [ 28.772457] Memory state around the buggy address: [ 28.772679] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.772992] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.773568] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.773854] ^ [ 28.774074] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.774611] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.774977] ================================================================== [ 28.638303] ================================================================== [ 28.638676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 28.638991] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.639285] [ 28.639420] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.639482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.639495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.639517] Call Trace: [ 28.639531] <TASK> [ 28.639549] dump_stack_lvl+0x73/0xb0 [ 28.639577] print_report+0xd1/0x610 [ 28.639600] ? __virt_addr_valid+0x1db/0x2d0 [ 28.639623] ? kasan_atomics_helper+0x1079/0x5450 [ 28.639645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.639671] ? kasan_atomics_helper+0x1079/0x5450 [ 28.639703] kasan_report+0x141/0x180 [ 28.639726] ? kasan_atomics_helper+0x1079/0x5450 [ 28.639752] kasan_check_range+0x10c/0x1c0 [ 28.639787] __kasan_check_write+0x18/0x20 [ 28.639811] kasan_atomics_helper+0x1079/0x5450 [ 28.639835] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.639857] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.639882] ? kasan_atomics+0x152/0x310 [ 28.639909] kasan_atomics+0x1dc/0x310 [ 28.639932] ? __pfx_kasan_atomics+0x10/0x10 [ 28.639957] ? __pfx_read_tsc+0x10/0x10 [ 28.639979] ? ktime_get_ts64+0x86/0x230 [ 28.640003] kunit_try_run_case+0x1a5/0x480 [ 28.640028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.640051] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.640075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.640109] ? __kthread_parkme+0x82/0x180 [ 28.640133] ? preempt_count_sub+0x50/0x80 [ 28.640157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.640192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.640216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.640239] kthread+0x337/0x6f0 [ 28.640270] ? trace_preempt_on+0x20/0xc0 [ 28.640294] ? __pfx_kthread+0x10/0x10 [ 28.640332] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.640355] ? calculate_sigpending+0x7b/0xa0 [ 28.640389] ? __pfx_kthread+0x10/0x10 [ 28.640411] ret_from_fork+0x116/0x1d0 [ 28.640430] ? __pfx_kthread+0x10/0x10 [ 28.640451] ret_from_fork_asm+0x1a/0x30 [ 28.640483] </TASK> [ 28.640494] [ 28.653783] Allocated by task 314: [ 28.653941] kasan_save_stack+0x45/0x70 [ 28.654374] kasan_save_track+0x18/0x40 [ 28.654547] kasan_save_alloc_info+0x3b/0x50 [ 28.654897] __kasan_kmalloc+0xb7/0xc0 [ 28.655074] __kmalloc_cache_noprof+0x189/0x420 [ 28.655433] kasan_atomics+0x95/0x310 [ 28.655624] kunit_try_run_case+0x1a5/0x480 [ 28.655821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.656107] kthread+0x337/0x6f0 [ 28.656464] ret_from_fork+0x116/0x1d0 [ 28.656655] ret_from_fork_asm+0x1a/0x30 [ 28.656975] [ 28.657074] The buggy address belongs to the object at ffff88810458d180 [ 28.657074] which belongs to the cache kmalloc-64 of size 64 [ 28.657734] The buggy address is located 0 bytes to the right of [ 28.657734] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.658467] [ 28.658665] The buggy address belongs to the physical page: [ 28.658986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.659431] flags: 0x200000000000000(node=0|zone=2) [ 28.659612] page_type: f5(slab) [ 28.659951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.660392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.660743] page dumped because: kasan: bad access detected [ 28.661075] [ 28.661183] Memory state around the buggy address: [ 28.661621] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.661994] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.662522] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.662900] ^ [ 28.663154] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.663659] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.663984] ================================================================== [ 29.196252] ================================================================== [ 29.197074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 29.197819] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.198546] [ 29.198755] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.198804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.198817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.198839] Call Trace: [ 29.198855] <TASK> [ 29.198902] dump_stack_lvl+0x73/0xb0 [ 29.198932] print_report+0xd1/0x610 [ 29.198955] ? __virt_addr_valid+0x1db/0x2d0 [ 29.198985] ? kasan_atomics_helper+0x1d7a/0x5450 [ 29.199007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.199032] ? kasan_atomics_helper+0x1d7a/0x5450 [ 29.199054] kasan_report+0x141/0x180 [ 29.199084] ? kasan_atomics_helper+0x1d7a/0x5450 [ 29.199111] kasan_check_range+0x10c/0x1c0 [ 29.199135] __kasan_check_write+0x18/0x20 [ 29.199158] kasan_atomics_helper+0x1d7a/0x5450 [ 29.199181] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.199203] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.199228] ? kasan_atomics+0x152/0x310 [ 29.199255] kasan_atomics+0x1dc/0x310 [ 29.199283] ? __pfx_kasan_atomics+0x10/0x10 [ 29.199307] ? __pfx_read_tsc+0x10/0x10 [ 29.199328] ? ktime_get_ts64+0x86/0x230 [ 29.199352] kunit_try_run_case+0x1a5/0x480 [ 29.199376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.199399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.199423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.199446] ? __kthread_parkme+0x82/0x180 [ 29.199470] ? preempt_count_sub+0x50/0x80 [ 29.199494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.199517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.199542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.199565] kthread+0x337/0x6f0 [ 29.199584] ? trace_preempt_on+0x20/0xc0 [ 29.199607] ? __pfx_kthread+0x10/0x10 [ 29.199627] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.199650] ? calculate_sigpending+0x7b/0xa0 [ 29.199673] ? __pfx_kthread+0x10/0x10 [ 29.199695] ret_from_fork+0x116/0x1d0 [ 29.199714] ? __pfx_kthread+0x10/0x10 [ 29.199734] ret_from_fork_asm+0x1a/0x30 [ 29.199766] </TASK> [ 29.199777] [ 29.211019] Allocated by task 314: [ 29.211412] kasan_save_stack+0x45/0x70 [ 29.211804] kasan_save_track+0x18/0x40 [ 29.212190] kasan_save_alloc_info+0x3b/0x50 [ 29.212619] __kasan_kmalloc+0xb7/0xc0 [ 29.212988] __kmalloc_cache_noprof+0x189/0x420 [ 29.213451] kasan_atomics+0x95/0x310 [ 29.213863] kunit_try_run_case+0x1a5/0x480 [ 29.214299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.214793] kthread+0x337/0x6f0 [ 29.215044] ret_from_fork+0x116/0x1d0 [ 29.215180] ret_from_fork_asm+0x1a/0x30 [ 29.215440] [ 29.215603] The buggy address belongs to the object at ffff88810458d180 [ 29.215603] which belongs to the cache kmalloc-64 of size 64 [ 29.216687] The buggy address is located 0 bytes to the right of [ 29.216687] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.217036] [ 29.217109] The buggy address belongs to the physical page: [ 29.217269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.218031] flags: 0x200000000000000(node=0|zone=2) [ 29.218518] page_type: f5(slab) [ 29.218834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.219582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.220266] page dumped because: kasan: bad access detected [ 29.220491] [ 29.220666] Memory state around the buggy address: [ 29.221105] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.221489] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.221695] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.221894] ^ [ 29.222043] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.222518] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.222897] ================================================================== [ 28.457689] ================================================================== [ 28.457988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 28.458232] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.458863] [ 28.458965] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.459014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.459045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.459067] Call Trace: [ 28.459107] <TASK> [ 28.459124] dump_stack_lvl+0x73/0xb0 [ 28.459153] print_report+0xd1/0x610 [ 28.459194] ? __virt_addr_valid+0x1db/0x2d0 [ 28.459220] ? kasan_atomics_helper+0xc70/0x5450 [ 28.459258] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.459295] ? kasan_atomics_helper+0xc70/0x5450 [ 28.459318] kasan_report+0x141/0x180 [ 28.459342] ? kasan_atomics_helper+0xc70/0x5450 [ 28.459369] kasan_check_range+0x10c/0x1c0 [ 28.459393] __kasan_check_write+0x18/0x20 [ 28.459416] kasan_atomics_helper+0xc70/0x5450 [ 28.459439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.459461] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.459486] ? kasan_atomics+0x152/0x310 [ 28.459513] kasan_atomics+0x1dc/0x310 [ 28.459552] ? __pfx_kasan_atomics+0x10/0x10 [ 28.459590] ? __pfx_read_tsc+0x10/0x10 [ 28.459625] ? ktime_get_ts64+0x86/0x230 [ 28.459650] kunit_try_run_case+0x1a5/0x480 [ 28.459674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.459696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.459720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.459745] ? __kthread_parkme+0x82/0x180 [ 28.459768] ? preempt_count_sub+0x50/0x80 [ 28.459791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.459815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.459839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.459862] kthread+0x337/0x6f0 [ 28.459882] ? trace_preempt_on+0x20/0xc0 [ 28.459905] ? __pfx_kthread+0x10/0x10 [ 28.459926] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.459948] ? calculate_sigpending+0x7b/0xa0 [ 28.459971] ? __pfx_kthread+0x10/0x10 [ 28.459994] ret_from_fork+0x116/0x1d0 [ 28.460013] ? __pfx_kthread+0x10/0x10 [ 28.460034] ret_from_fork_asm+0x1a/0x30 [ 28.460066] </TASK> [ 28.460087] [ 28.467467] Allocated by task 314: [ 28.467639] kasan_save_stack+0x45/0x70 [ 28.467826] kasan_save_track+0x18/0x40 [ 28.468005] kasan_save_alloc_info+0x3b/0x50 [ 28.468216] __kasan_kmalloc+0xb7/0xc0 [ 28.468404] __kmalloc_cache_noprof+0x189/0x420 [ 28.468600] kasan_atomics+0x95/0x310 [ 28.468721] kunit_try_run_case+0x1a5/0x480 [ 28.468922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.469195] kthread+0x337/0x6f0 [ 28.469405] ret_from_fork+0x116/0x1d0 [ 28.469541] ret_from_fork_asm+0x1a/0x30 [ 28.469752] [ 28.469837] The buggy address belongs to the object at ffff88810458d180 [ 28.469837] which belongs to the cache kmalloc-64 of size 64 [ 28.470294] The buggy address is located 0 bytes to the right of [ 28.470294] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.470847] [ 28.470945] The buggy address belongs to the physical page: [ 28.471194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.471501] flags: 0x200000000000000(node=0|zone=2) [ 28.471723] page_type: f5(slab) [ 28.471890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.472179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.472632] page dumped because: kasan: bad access detected [ 28.472824] [ 28.472905] Memory state around the buggy address: [ 28.473153] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.473493] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.473750] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.474063] ^ [ 28.474282] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.474673] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.475001] ================================================================== [ 28.882360] ================================================================== [ 28.882743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 28.883496] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.884061] [ 28.884319] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.884468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.884487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.884511] Call Trace: [ 28.884527] <TASK> [ 28.884543] dump_stack_lvl+0x73/0xb0 [ 28.884573] print_report+0xd1/0x610 [ 28.884596] ? __virt_addr_valid+0x1db/0x2d0 [ 28.884620] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.884641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.884668] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.884689] kasan_report+0x141/0x180 [ 28.884712] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.884739] __asan_report_store8_noabort+0x1b/0x30 [ 28.884763] kasan_atomics_helper+0x50d4/0x5450 [ 28.884786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.884808] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.884833] ? kasan_atomics+0x152/0x310 [ 28.884860] kasan_atomics+0x1dc/0x310 [ 28.884882] ? __pfx_kasan_atomics+0x10/0x10 [ 28.884906] ? __pfx_read_tsc+0x10/0x10 [ 28.884928] ? ktime_get_ts64+0x86/0x230 [ 28.884952] kunit_try_run_case+0x1a5/0x480 [ 28.884976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.884999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.885022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.885046] ? __kthread_parkme+0x82/0x180 [ 28.885070] ? preempt_count_sub+0x50/0x80 [ 28.885106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.885130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.885154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.885178] kthread+0x337/0x6f0 [ 28.885197] ? trace_preempt_on+0x20/0xc0 [ 28.885221] ? __pfx_kthread+0x10/0x10 [ 28.885241] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.885263] ? calculate_sigpending+0x7b/0xa0 [ 28.885286] ? __pfx_kthread+0x10/0x10 [ 28.885308] ret_from_fork+0x116/0x1d0 [ 28.885327] ? __pfx_kthread+0x10/0x10 [ 28.885348] ret_from_fork_asm+0x1a/0x30 [ 28.885379] </TASK> [ 28.885390] [ 28.894893] Allocated by task 314: [ 28.895068] kasan_save_stack+0x45/0x70 [ 28.895278] kasan_save_track+0x18/0x40 [ 28.895851] kasan_save_alloc_info+0x3b/0x50 [ 28.896010] __kasan_kmalloc+0xb7/0xc0 [ 28.896348] __kmalloc_cache_noprof+0x189/0x420 [ 28.896658] kasan_atomics+0x95/0x310 [ 28.896831] kunit_try_run_case+0x1a5/0x480 [ 28.897176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.897535] kthread+0x337/0x6f0 [ 28.897824] ret_from_fork+0x116/0x1d0 [ 28.898003] ret_from_fork_asm+0x1a/0x30 [ 28.898303] [ 28.898379] The buggy address belongs to the object at ffff88810458d180 [ 28.898379] which belongs to the cache kmalloc-64 of size 64 [ 28.898937] The buggy address is located 0 bytes to the right of [ 28.898937] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.899353] [ 28.899842] The buggy address belongs to the physical page: [ 28.900122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.900512] flags: 0x200000000000000(node=0|zone=2) [ 28.900679] page_type: f5(slab) [ 28.900800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.901034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.901271] page dumped because: kasan: bad access detected [ 28.901438] [ 28.901502] Memory state around the buggy address: [ 28.901651] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.901878] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.902117] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.902325] ^ [ 28.902474] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.902683] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.902890] ================================================================== [ 28.841567] ================================================================== [ 28.841962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 28.842615] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.843015] [ 28.843116] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.843164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.843176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.843197] Call Trace: [ 28.843211] <TASK> [ 28.843226] dump_stack_lvl+0x73/0xb0 [ 28.843256] print_report+0xd1/0x610 [ 28.843278] ? __virt_addr_valid+0x1db/0x2d0 [ 28.843303] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.843324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.843351] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.843373] kasan_report+0x141/0x180 [ 28.843395] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.843422] __asan_report_load8_noabort+0x18/0x20 [ 28.843446] kasan_atomics_helper+0x4eae/0x5450 [ 28.843469] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.843491] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.843516] ? kasan_atomics+0x152/0x310 [ 28.843542] kasan_atomics+0x1dc/0x310 [ 28.843567] ? __pfx_kasan_atomics+0x10/0x10 [ 28.843592] ? __pfx_read_tsc+0x10/0x10 [ 28.843615] ? ktime_get_ts64+0x86/0x230 [ 28.843639] kunit_try_run_case+0x1a5/0x480 [ 28.843663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.843685] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.843708] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.843732] ? __kthread_parkme+0x82/0x180 [ 28.843756] ? preempt_count_sub+0x50/0x80 [ 28.843779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.843803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.843826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.843850] kthread+0x337/0x6f0 [ 28.843869] ? trace_preempt_on+0x20/0xc0 [ 28.843892] ? __pfx_kthread+0x10/0x10 [ 28.843913] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.843935] ? calculate_sigpending+0x7b/0xa0 [ 28.843959] ? __pfx_kthread+0x10/0x10 [ 28.843980] ret_from_fork+0x116/0x1d0 [ 28.843999] ? __pfx_kthread+0x10/0x10 [ 28.844020] ret_from_fork_asm+0x1a/0x30 [ 28.844052] </TASK> [ 28.844062] [ 28.850984] Allocated by task 314: [ 28.851114] kasan_save_stack+0x45/0x70 [ 28.851321] kasan_save_track+0x18/0x40 [ 28.851510] kasan_save_alloc_info+0x3b/0x50 [ 28.851710] __kasan_kmalloc+0xb7/0xc0 [ 28.851889] __kmalloc_cache_noprof+0x189/0x420 [ 28.852112] kasan_atomics+0x95/0x310 [ 28.852239] kunit_try_run_case+0x1a5/0x480 [ 28.852376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.852544] kthread+0x337/0x6f0 [ 28.852684] ret_from_fork+0x116/0x1d0 [ 28.852996] ret_from_fork_asm+0x1a/0x30 [ 28.853200] [ 28.853288] The buggy address belongs to the object at ffff88810458d180 [ 28.853288] which belongs to the cache kmalloc-64 of size 64 [ 28.853678] The buggy address is located 0 bytes to the right of [ 28.853678] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.854087] [ 28.854178] The buggy address belongs to the physical page: [ 28.854419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.854769] flags: 0x200000000000000(node=0|zone=2) [ 28.855125] page_type: f5(slab) [ 28.855293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.855599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.855818] page dumped because: kasan: bad access detected [ 28.855980] [ 28.856041] Memory state around the buggy address: [ 28.856273] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.856589] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.856902] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.857182] ^ [ 28.857427] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.857692] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.857932] ================================================================== [ 29.322911] ================================================================== [ 29.323335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 29.323682] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.324012] [ 29.324123] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.324168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.324180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.324201] Call Trace: [ 29.324214] <TASK> [ 29.324227] dump_stack_lvl+0x73/0xb0 [ 29.324254] print_report+0xd1/0x610 [ 29.324276] ? __virt_addr_valid+0x1db/0x2d0 [ 29.324311] ? kasan_atomics_helper+0x4f98/0x5450 [ 29.324333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.324359] ? kasan_atomics_helper+0x4f98/0x5450 [ 29.324381] kasan_report+0x141/0x180 [ 29.324403] ? kasan_atomics_helper+0x4f98/0x5450 [ 29.324430] __asan_report_load8_noabort+0x18/0x20 [ 29.324455] kasan_atomics_helper+0x4f98/0x5450 [ 29.324477] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.324499] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.324524] ? kasan_atomics+0x152/0x310 [ 29.324551] kasan_atomics+0x1dc/0x310 [ 29.324574] ? __pfx_kasan_atomics+0x10/0x10 [ 29.324598] ? __pfx_read_tsc+0x10/0x10 [ 29.324620] ? ktime_get_ts64+0x86/0x230 [ 29.324644] kunit_try_run_case+0x1a5/0x480 [ 29.324669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.324691] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.324715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.324739] ? __kthread_parkme+0x82/0x180 [ 29.324763] ? preempt_count_sub+0x50/0x80 [ 29.324786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.324810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.324834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.324857] kthread+0x337/0x6f0 [ 29.324876] ? trace_preempt_on+0x20/0xc0 [ 29.324899] ? __pfx_kthread+0x10/0x10 [ 29.324919] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.324941] ? calculate_sigpending+0x7b/0xa0 [ 29.324964] ? __pfx_kthread+0x10/0x10 [ 29.324986] ret_from_fork+0x116/0x1d0 [ 29.325005] ? __pfx_kthread+0x10/0x10 [ 29.325026] ret_from_fork_asm+0x1a/0x30 [ 29.325057] </TASK> [ 29.325068] [ 29.333472] Allocated by task 314: [ 29.333635] kasan_save_stack+0x45/0x70 [ 29.333810] kasan_save_track+0x18/0x40 [ 29.333976] kasan_save_alloc_info+0x3b/0x50 [ 29.334153] __kasan_kmalloc+0xb7/0xc0 [ 29.334374] __kmalloc_cache_noprof+0x189/0x420 [ 29.334576] kasan_atomics+0x95/0x310 [ 29.334727] kunit_try_run_case+0x1a5/0x480 [ 29.334886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.335124] kthread+0x337/0x6f0 [ 29.335265] ret_from_fork+0x116/0x1d0 [ 29.335447] ret_from_fork_asm+0x1a/0x30 [ 29.335578] [ 29.335668] The buggy address belongs to the object at ffff88810458d180 [ 29.335668] which belongs to the cache kmalloc-64 of size 64 [ 29.336145] The buggy address is located 0 bytes to the right of [ 29.336145] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.336605] [ 29.336694] The buggy address belongs to the physical page: [ 29.336918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.337222] flags: 0x200000000000000(node=0|zone=2) [ 29.337552] page_type: f5(slab) [ 29.337710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.338011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.338331] page dumped because: kasan: bad access detected [ 29.338553] [ 29.338624] Memory state around the buggy address: [ 29.338823] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.339091] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.339405] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.339675] ^ [ 29.339861] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.340067] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.340293] ================================================================== [ 28.944523] ================================================================== [ 28.944858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 28.945207] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.945654] [ 28.945733] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.945779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.945792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.945813] Call Trace: [ 28.945827] <TASK> [ 28.945841] dump_stack_lvl+0x73/0xb0 [ 28.945869] print_report+0xd1/0x610 [ 28.945890] ? __virt_addr_valid+0x1db/0x2d0 [ 28.945913] ? kasan_atomics_helper+0x164f/0x5450 [ 28.945939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.945965] ? kasan_atomics_helper+0x164f/0x5450 [ 28.945987] kasan_report+0x141/0x180 [ 28.946009] ? kasan_atomics_helper+0x164f/0x5450 [ 28.946037] kasan_check_range+0x10c/0x1c0 [ 28.946060] __kasan_check_write+0x18/0x20 [ 28.946095] kasan_atomics_helper+0x164f/0x5450 [ 28.946118] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.946141] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.946166] ? kasan_atomics+0x152/0x310 [ 28.946221] kasan_atomics+0x1dc/0x310 [ 28.946245] ? __pfx_kasan_atomics+0x10/0x10 [ 28.946269] ? __pfx_read_tsc+0x10/0x10 [ 28.946301] ? ktime_get_ts64+0x86/0x230 [ 28.946324] kunit_try_run_case+0x1a5/0x480 [ 28.946348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.946371] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.946413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.946437] ? __kthread_parkme+0x82/0x180 [ 28.946461] ? preempt_count_sub+0x50/0x80 [ 28.946484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.946509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.946532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.946557] kthread+0x337/0x6f0 [ 28.946577] ? trace_preempt_on+0x20/0xc0 [ 28.946600] ? __pfx_kthread+0x10/0x10 [ 28.946620] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.946643] ? calculate_sigpending+0x7b/0xa0 [ 28.946667] ? __pfx_kthread+0x10/0x10 [ 28.946689] ret_from_fork+0x116/0x1d0 [ 28.946708] ? __pfx_kthread+0x10/0x10 [ 28.946729] ret_from_fork_asm+0x1a/0x30 [ 28.946760] </TASK> [ 28.946771] [ 28.954251] Allocated by task 314: [ 28.954374] kasan_save_stack+0x45/0x70 [ 28.954508] kasan_save_track+0x18/0x40 [ 28.954817] kasan_save_alloc_info+0x3b/0x50 [ 28.955026] __kasan_kmalloc+0xb7/0xc0 [ 28.955239] __kmalloc_cache_noprof+0x189/0x420 [ 28.955445] kasan_atomics+0x95/0x310 [ 28.955571] kunit_try_run_case+0x1a5/0x480 [ 28.955786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.956047] kthread+0x337/0x6f0 [ 28.956239] ret_from_fork+0x116/0x1d0 [ 28.956420] ret_from_fork_asm+0x1a/0x30 [ 28.956555] [ 28.956618] The buggy address belongs to the object at ffff88810458d180 [ 28.956618] which belongs to the cache kmalloc-64 of size 64 [ 28.957041] The buggy address is located 0 bytes to the right of [ 28.957041] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.957650] [ 28.957738] The buggy address belongs to the physical page: [ 28.958015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.958368] flags: 0x200000000000000(node=0|zone=2) [ 28.958525] page_type: f5(slab) [ 28.958639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.958862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.959090] page dumped because: kasan: bad access detected [ 28.959334] [ 28.959421] Memory state around the buggy address: [ 28.959638] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.959958] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.960333] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.960540] ^ [ 28.960687] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.961016] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.961411] ================================================================== [ 29.306756] ================================================================== [ 29.307111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 29.307494] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.307792] [ 29.307887] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.307933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.307945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.307966] Call Trace: [ 29.307981] <TASK> [ 29.307996] dump_stack_lvl+0x73/0xb0 [ 29.308023] print_report+0xd1/0x610 [ 29.308046] ? __virt_addr_valid+0x1db/0x2d0 [ 29.308069] ? kasan_atomics_helper+0x2006/0x5450 [ 29.308104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.308131] ? kasan_atomics_helper+0x2006/0x5450 [ 29.308153] kasan_report+0x141/0x180 [ 29.308176] ? kasan_atomics_helper+0x2006/0x5450 [ 29.308202] kasan_check_range+0x10c/0x1c0 [ 29.308227] __kasan_check_write+0x18/0x20 [ 29.308250] kasan_atomics_helper+0x2006/0x5450 [ 29.308273] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.308306] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.308331] ? kasan_atomics+0x152/0x310 [ 29.308358] kasan_atomics+0x1dc/0x310 [ 29.308381] ? __pfx_kasan_atomics+0x10/0x10 [ 29.308405] ? __pfx_read_tsc+0x10/0x10 [ 29.308426] ? ktime_get_ts64+0x86/0x230 [ 29.308450] kunit_try_run_case+0x1a5/0x480 [ 29.308474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.308497] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.308520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.308544] ? __kthread_parkme+0x82/0x180 [ 29.308568] ? preempt_count_sub+0x50/0x80 [ 29.308590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.308614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.308637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.308661] kthread+0x337/0x6f0 [ 29.308680] ? trace_preempt_on+0x20/0xc0 [ 29.308703] ? __pfx_kthread+0x10/0x10 [ 29.308724] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.308745] ? calculate_sigpending+0x7b/0xa0 [ 29.308769] ? __pfx_kthread+0x10/0x10 [ 29.308790] ret_from_fork+0x116/0x1d0 [ 29.308809] ? __pfx_kthread+0x10/0x10 [ 29.308829] ret_from_fork_asm+0x1a/0x30 [ 29.308860] </TASK> [ 29.308871] [ 29.316054] Allocated by task 314: [ 29.316203] kasan_save_stack+0x45/0x70 [ 29.316376] kasan_save_track+0x18/0x40 [ 29.316547] kasan_save_alloc_info+0x3b/0x50 [ 29.316744] __kasan_kmalloc+0xb7/0xc0 [ 29.316895] __kmalloc_cache_noprof+0x189/0x420 [ 29.317098] kasan_atomics+0x95/0x310 [ 29.317245] kunit_try_run_case+0x1a5/0x480 [ 29.317428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.317649] kthread+0x337/0x6f0 [ 29.317773] ret_from_fork+0x116/0x1d0 [ 29.317956] ret_from_fork_asm+0x1a/0x30 [ 29.318099] [ 29.318164] The buggy address belongs to the object at ffff88810458d180 [ 29.318164] which belongs to the cache kmalloc-64 of size 64 [ 29.318703] The buggy address is located 0 bytes to the right of [ 29.318703] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.319059] [ 29.319131] The buggy address belongs to the physical page: [ 29.319296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.319526] flags: 0x200000000000000(node=0|zone=2) [ 29.319682] page_type: f5(slab) [ 29.319795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.320092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.320423] page dumped because: kasan: bad access detected [ 29.320672] [ 29.320758] Memory state around the buggy address: [ 29.320973] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.321590] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.321814] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.322023] ^ [ 29.322180] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.322387] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.322592] ================================================================== [ 28.798201] ================================================================== [ 28.798585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 28.799153] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.799709] [ 28.799805] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.799854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.799867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.799887] Call Trace: [ 28.799902] <TASK> [ 28.799918] dump_stack_lvl+0x73/0xb0 [ 28.799949] print_report+0xd1/0x610 [ 28.799971] ? __virt_addr_valid+0x1db/0x2d0 [ 28.799995] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.800016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.800042] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.800064] kasan_report+0x141/0x180 [ 28.800099] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.800126] __asan_report_load4_noabort+0x18/0x20 [ 28.800150] kasan_atomics_helper+0x49ce/0x5450 [ 28.800173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.800195] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.800220] ? kasan_atomics+0x152/0x310 [ 28.800246] kasan_atomics+0x1dc/0x310 [ 28.800269] ? __pfx_kasan_atomics+0x10/0x10 [ 28.800458] ? __pfx_read_tsc+0x10/0x10 [ 28.800481] ? ktime_get_ts64+0x86/0x230 [ 28.800505] kunit_try_run_case+0x1a5/0x480 [ 28.800531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.800554] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.800577] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.800601] ? __kthread_parkme+0x82/0x180 [ 28.800625] ? preempt_count_sub+0x50/0x80 [ 28.800648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.800672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.800696] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.800720] kthread+0x337/0x6f0 [ 28.800739] ? trace_preempt_on+0x20/0xc0 [ 28.800763] ? __pfx_kthread+0x10/0x10 [ 28.800784] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.800806] ? calculate_sigpending+0x7b/0xa0 [ 28.800829] ? __pfx_kthread+0x10/0x10 [ 28.800850] ret_from_fork+0x116/0x1d0 [ 28.800872] ? __pfx_kthread+0x10/0x10 [ 28.800893] ret_from_fork_asm+0x1a/0x30 [ 28.800925] </TASK> [ 28.800936] [ 28.810018] Allocated by task 314: [ 28.810178] kasan_save_stack+0x45/0x70 [ 28.810680] kasan_save_track+0x18/0x40 [ 28.810849] kasan_save_alloc_info+0x3b/0x50 [ 28.811127] __kasan_kmalloc+0xb7/0xc0 [ 28.811276] __kmalloc_cache_noprof+0x189/0x420 [ 28.811542] kasan_atomics+0x95/0x310 [ 28.811870] kunit_try_run_case+0x1a5/0x480 [ 28.812058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.812289] kthread+0x337/0x6f0 [ 28.812625] ret_from_fork+0x116/0x1d0 [ 28.812808] ret_from_fork_asm+0x1a/0x30 [ 28.812971] [ 28.813042] The buggy address belongs to the object at ffff88810458d180 [ 28.813042] which belongs to the cache kmalloc-64 of size 64 [ 28.813776] The buggy address is located 0 bytes to the right of [ 28.813776] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.814344] [ 28.814531] The buggy address belongs to the physical page: [ 28.814785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.815243] flags: 0x200000000000000(node=0|zone=2) [ 28.815555] page_type: f5(slab) [ 28.815686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.816001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.816321] page dumped because: kasan: bad access detected [ 28.816745] [ 28.816837] Memory state around the buggy address: [ 28.817144] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.817508] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.817864] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.818176] ^ [ 28.818567] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.818863] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.819160] ================================================================== [ 28.335309] ================================================================== [ 28.335657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 28.335971] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.336507] [ 28.336631] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.336709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.336722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.336754] Call Trace: [ 28.336768] <TASK> [ 28.336785] dump_stack_lvl+0x73/0xb0 [ 28.336814] print_report+0xd1/0x610 [ 28.336836] ? __virt_addr_valid+0x1db/0x2d0 [ 28.336859] ? kasan_atomics_helper+0x860/0x5450 [ 28.336880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.336907] ? kasan_atomics_helper+0x860/0x5450 [ 28.336928] kasan_report+0x141/0x180 [ 28.336950] ? kasan_atomics_helper+0x860/0x5450 [ 28.336977] kasan_check_range+0x10c/0x1c0 [ 28.337001] __kasan_check_write+0x18/0x20 [ 28.337024] kasan_atomics_helper+0x860/0x5450 [ 28.337046] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.337071] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.337105] ? kasan_atomics+0x152/0x310 [ 28.337131] kasan_atomics+0x1dc/0x310 [ 28.337187] ? __pfx_kasan_atomics+0x10/0x10 [ 28.337212] ? __pfx_read_tsc+0x10/0x10 [ 28.337243] ? ktime_get_ts64+0x86/0x230 [ 28.337268] kunit_try_run_case+0x1a5/0x480 [ 28.337293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.337316] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.337339] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.337363] ? __kthread_parkme+0x82/0x180 [ 28.337388] ? preempt_count_sub+0x50/0x80 [ 28.337413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.337562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.337594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.337618] kthread+0x337/0x6f0 [ 28.337638] ? trace_preempt_on+0x20/0xc0 [ 28.337662] ? __pfx_kthread+0x10/0x10 [ 28.337683] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.337706] ? calculate_sigpending+0x7b/0xa0 [ 28.337730] ? __pfx_kthread+0x10/0x10 [ 28.337751] ret_from_fork+0x116/0x1d0 [ 28.337771] ? __pfx_kthread+0x10/0x10 [ 28.337791] ret_from_fork_asm+0x1a/0x30 [ 28.337824] </TASK> [ 28.337835] [ 28.345426] Allocated by task 314: [ 28.345607] kasan_save_stack+0x45/0x70 [ 28.345785] kasan_save_track+0x18/0x40 [ 28.345955] kasan_save_alloc_info+0x3b/0x50 [ 28.346129] __kasan_kmalloc+0xb7/0xc0 [ 28.346258] __kmalloc_cache_noprof+0x189/0x420 [ 28.346605] kasan_atomics+0x95/0x310 [ 28.346805] kunit_try_run_case+0x1a5/0x480 [ 28.346994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.347260] kthread+0x337/0x6f0 [ 28.347418] ret_from_fork+0x116/0x1d0 [ 28.347626] ret_from_fork_asm+0x1a/0x30 [ 28.347914] [ 28.347998] The buggy address belongs to the object at ffff88810458d180 [ 28.347998] which belongs to the cache kmalloc-64 of size 64 [ 28.348588] The buggy address is located 0 bytes to the right of [ 28.348588] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.348953] [ 28.349017] The buggy address belongs to the physical page: [ 28.349196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.349437] flags: 0x200000000000000(node=0|zone=2) [ 28.349645] page_type: f5(slab) [ 28.349810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.350206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.350542] page dumped because: kasan: bad access detected [ 28.350789] [ 28.350875] Memory state around the buggy address: [ 28.351105] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.351595] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.351915] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.352174] ^ [ 28.352489] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.352771] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.353066] ================================================================== [ 29.289757] ================================================================== [ 29.290206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 29.290435] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.290650] [ 29.290724] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.290770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.290782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.290803] Call Trace: [ 29.290816] <TASK> [ 29.290830] dump_stack_lvl+0x73/0xb0 [ 29.290856] print_report+0xd1/0x610 [ 29.290878] ? __virt_addr_valid+0x1db/0x2d0 [ 29.290900] ? kasan_atomics_helper+0x4f71/0x5450 [ 29.290921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.290947] ? kasan_atomics_helper+0x4f71/0x5450 [ 29.290969] kasan_report+0x141/0x180 [ 29.290991] ? kasan_atomics_helper+0x4f71/0x5450 [ 29.291017] __asan_report_load8_noabort+0x18/0x20 [ 29.291041] kasan_atomics_helper+0x4f71/0x5450 [ 29.291075] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.291111] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.291136] ? kasan_atomics+0x152/0x310 [ 29.291163] kasan_atomics+0x1dc/0x310 [ 29.291185] ? __pfx_kasan_atomics+0x10/0x10 [ 29.291210] ? __pfx_read_tsc+0x10/0x10 [ 29.291231] ? ktime_get_ts64+0x86/0x230 [ 29.291256] kunit_try_run_case+0x1a5/0x480 [ 29.291280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.291302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.291325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.291349] ? __kthread_parkme+0x82/0x180 [ 29.291372] ? preempt_count_sub+0x50/0x80 [ 29.291396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.291420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.291451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.291475] kthread+0x337/0x6f0 [ 29.291494] ? trace_preempt_on+0x20/0xc0 [ 29.291518] ? __pfx_kthread+0x10/0x10 [ 29.291538] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.291560] ? calculate_sigpending+0x7b/0xa0 [ 29.291584] ? __pfx_kthread+0x10/0x10 [ 29.291605] ret_from_fork+0x116/0x1d0 [ 29.291625] ? __pfx_kthread+0x10/0x10 [ 29.291645] ret_from_fork_asm+0x1a/0x30 [ 29.291678] </TASK> [ 29.291688] [ 29.298854] Allocated by task 314: [ 29.299009] kasan_save_stack+0x45/0x70 [ 29.299204] kasan_save_track+0x18/0x40 [ 29.299458] kasan_save_alloc_info+0x3b/0x50 [ 29.299646] __kasan_kmalloc+0xb7/0xc0 [ 29.299773] __kmalloc_cache_noprof+0x189/0x420 [ 29.299921] kasan_atomics+0x95/0x310 [ 29.300046] kunit_try_run_case+0x1a5/0x480 [ 29.300255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.300507] kthread+0x337/0x6f0 [ 29.300804] ret_from_fork+0x116/0x1d0 [ 29.300989] ret_from_fork_asm+0x1a/0x30 [ 29.301167] [ 29.301251] The buggy address belongs to the object at ffff88810458d180 [ 29.301251] which belongs to the cache kmalloc-64 of size 64 [ 29.301705] The buggy address is located 0 bytes to the right of [ 29.301705] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.302152] [ 29.302240] The buggy address belongs to the physical page: [ 29.302528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.302806] flags: 0x200000000000000(node=0|zone=2) [ 29.302964] page_type: f5(slab) [ 29.303088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.303313] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.303566] page dumped because: kasan: bad access detected [ 29.303818] [ 29.303903] Memory state around the buggy address: [ 29.304124] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.304730] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.305035] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.305450] ^ [ 29.305666] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.305904] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.306124] ================================================================== [ 29.223770] ================================================================== [ 29.224620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 29.224861] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.225091] [ 29.225200] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.225289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.225302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.225324] Call Trace: [ 29.225340] <TASK> [ 29.225358] dump_stack_lvl+0x73/0xb0 [ 29.225388] print_report+0xd1/0x610 [ 29.225411] ? __virt_addr_valid+0x1db/0x2d0 [ 29.225435] ? kasan_atomics_helper+0x1e12/0x5450 [ 29.225456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.225482] ? kasan_atomics_helper+0x1e12/0x5450 [ 29.225504] kasan_report+0x141/0x180 [ 29.225554] ? kasan_atomics_helper+0x1e12/0x5450 [ 29.225581] kasan_check_range+0x10c/0x1c0 [ 29.225631] __kasan_check_write+0x18/0x20 [ 29.225664] kasan_atomics_helper+0x1e12/0x5450 [ 29.225686] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.225719] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.225743] ? kasan_atomics+0x152/0x310 [ 29.225770] kasan_atomics+0x1dc/0x310 [ 29.225792] ? __pfx_kasan_atomics+0x10/0x10 [ 29.225817] ? __pfx_read_tsc+0x10/0x10 [ 29.225839] ? ktime_get_ts64+0x86/0x230 [ 29.225890] kunit_try_run_case+0x1a5/0x480 [ 29.225915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.225941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.225975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.225999] ? __kthread_parkme+0x82/0x180 [ 29.226024] ? preempt_count_sub+0x50/0x80 [ 29.226048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.226071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.226104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.226127] kthread+0x337/0x6f0 [ 29.226147] ? trace_preempt_on+0x20/0xc0 [ 29.226170] ? __pfx_kthread+0x10/0x10 [ 29.226192] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.226214] ? calculate_sigpending+0x7b/0xa0 [ 29.226237] ? __pfx_kthread+0x10/0x10 [ 29.226259] ret_from_fork+0x116/0x1d0 [ 29.226296] ? __pfx_kthread+0x10/0x10 [ 29.226327] ret_from_fork_asm+0x1a/0x30 [ 29.226358] </TASK> [ 29.226370] [ 29.237933] Allocated by task 314: [ 29.238108] kasan_save_stack+0x45/0x70 [ 29.238510] kasan_save_track+0x18/0x40 [ 29.238687] kasan_save_alloc_info+0x3b/0x50 [ 29.238882] __kasan_kmalloc+0xb7/0xc0 [ 29.239054] __kmalloc_cache_noprof+0x189/0x420 [ 29.239234] kasan_atomics+0x95/0x310 [ 29.239430] kunit_try_run_case+0x1a5/0x480 [ 29.239634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.239883] kthread+0x337/0x6f0 [ 29.240009] ret_from_fork+0x116/0x1d0 [ 29.240188] ret_from_fork_asm+0x1a/0x30 [ 29.240466] [ 29.240580] The buggy address belongs to the object at ffff88810458d180 [ 29.240580] which belongs to the cache kmalloc-64 of size 64 [ 29.241061] The buggy address is located 0 bytes to the right of [ 29.241061] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.242209] [ 29.242318] The buggy address belongs to the physical page: [ 29.242529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.242881] flags: 0x200000000000000(node=0|zone=2) [ 29.243113] page_type: f5(slab) [ 29.243253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.243867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.244279] page dumped because: kasan: bad access detected [ 29.244546] [ 29.244780] Memory state around the buggy address: [ 29.245072] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.245552] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.245909] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.246233] ^ [ 29.246641] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.247058] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.247533] ================================================================== [ 28.979887] ================================================================== [ 28.980243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 28.980612] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.980848] [ 28.980946] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.980991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.981003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.981023] Call Trace: [ 28.981037] <TASK> [ 28.981051] dump_stack_lvl+0x73/0xb0 [ 28.981090] print_report+0xd1/0x610 [ 28.981111] ? __virt_addr_valid+0x1db/0x2d0 [ 28.981134] ? kasan_atomics_helper+0x177f/0x5450 [ 28.981156] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.981182] ? kasan_atomics_helper+0x177f/0x5450 [ 28.981204] kasan_report+0x141/0x180 [ 28.981226] ? kasan_atomics_helper+0x177f/0x5450 [ 28.981253] kasan_check_range+0x10c/0x1c0 [ 28.981277] __kasan_check_write+0x18/0x20 [ 28.981336] kasan_atomics_helper+0x177f/0x5450 [ 28.981360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.981382] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.981407] ? kasan_atomics+0x152/0x310 [ 28.981433] kasan_atomics+0x1dc/0x310 [ 28.981456] ? __pfx_kasan_atomics+0x10/0x10 [ 28.981481] ? __pfx_read_tsc+0x10/0x10 [ 28.981502] ? ktime_get_ts64+0x86/0x230 [ 28.981527] kunit_try_run_case+0x1a5/0x480 [ 28.981551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.981573] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.981598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.981642] ? __kthread_parkme+0x82/0x180 [ 28.981666] ? preempt_count_sub+0x50/0x80 [ 28.981690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.981714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.981738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.981762] kthread+0x337/0x6f0 [ 28.981782] ? trace_preempt_on+0x20/0xc0 [ 28.981804] ? __pfx_kthread+0x10/0x10 [ 28.981825] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.981866] ? calculate_sigpending+0x7b/0xa0 [ 28.981890] ? __pfx_kthread+0x10/0x10 [ 28.981912] ret_from_fork+0x116/0x1d0 [ 28.981940] ? __pfx_kthread+0x10/0x10 [ 28.981960] ret_from_fork_asm+0x1a/0x30 [ 28.981992] </TASK> [ 28.982003] [ 28.989605] Allocated by task 314: [ 28.989797] kasan_save_stack+0x45/0x70 [ 28.990001] kasan_save_track+0x18/0x40 [ 28.990233] kasan_save_alloc_info+0x3b/0x50 [ 28.990465] __kasan_kmalloc+0xb7/0xc0 [ 28.990643] __kmalloc_cache_noprof+0x189/0x420 [ 28.990876] kasan_atomics+0x95/0x310 [ 28.991064] kunit_try_run_case+0x1a5/0x480 [ 28.991320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.991564] kthread+0x337/0x6f0 [ 28.991726] ret_from_fork+0x116/0x1d0 [ 28.991926] ret_from_fork_asm+0x1a/0x30 [ 28.992131] [ 28.992223] The buggy address belongs to the object at ffff88810458d180 [ 28.992223] which belongs to the cache kmalloc-64 of size 64 [ 28.992754] The buggy address is located 0 bytes to the right of [ 28.992754] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.993289] [ 28.993435] The buggy address belongs to the physical page: [ 28.993654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.993889] flags: 0x200000000000000(node=0|zone=2) [ 28.994051] page_type: f5(slab) [ 28.994177] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.994491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.994817] page dumped because: kasan: bad access detected [ 28.995366] [ 28.995458] Memory state around the buggy address: [ 28.995672] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.995958] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.996177] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.996695] ^ [ 28.996913] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.997297] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.997599] ================================================================== [ 28.113137] ================================================================== [ 28.113468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 28.113746] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.113970] [ 28.114045] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.114175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.114188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.114211] Call Trace: [ 28.114226] <TASK> [ 28.114270] dump_stack_lvl+0x73/0xb0 [ 28.114313] print_report+0xd1/0x610 [ 28.114336] ? __virt_addr_valid+0x1db/0x2d0 [ 28.114371] ? kasan_atomics_helper+0x4b6e/0x5450 [ 28.114393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.114419] ? kasan_atomics_helper+0x4b6e/0x5450 [ 28.114442] kasan_report+0x141/0x180 [ 28.114466] ? kasan_atomics_helper+0x4b6e/0x5450 [ 28.114492] __asan_report_store4_noabort+0x1b/0x30 [ 28.114517] kasan_atomics_helper+0x4b6e/0x5450 [ 28.114540] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.114562] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.114587] ? kasan_atomics+0x152/0x310 [ 28.114614] kasan_atomics+0x1dc/0x310 [ 28.114637] ? __pfx_kasan_atomics+0x10/0x10 [ 28.114661] ? __pfx_read_tsc+0x10/0x10 [ 28.114682] ? ktime_get_ts64+0x86/0x230 [ 28.114707] kunit_try_run_case+0x1a5/0x480 [ 28.114731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.114753] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.114777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.114800] ? __kthread_parkme+0x82/0x180 [ 28.114824] ? preempt_count_sub+0x50/0x80 [ 28.114848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.114882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.114904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.114928] kthread+0x337/0x6f0 [ 28.114959] ? trace_preempt_on+0x20/0xc0 [ 28.114982] ? __pfx_kthread+0x10/0x10 [ 28.115004] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.115028] ? calculate_sigpending+0x7b/0xa0 [ 28.115052] ? __pfx_kthread+0x10/0x10 [ 28.115075] ret_from_fork+0x116/0x1d0 [ 28.115103] ? __pfx_kthread+0x10/0x10 [ 28.115126] ret_from_fork_asm+0x1a/0x30 [ 28.115158] </TASK> [ 28.115170] [ 28.122618] Allocated by task 314: [ 28.122744] kasan_save_stack+0x45/0x70 [ 28.122880] kasan_save_track+0x18/0x40 [ 28.123004] kasan_save_alloc_info+0x3b/0x50 [ 28.123152] __kasan_kmalloc+0xb7/0xc0 [ 28.123274] __kmalloc_cache_noprof+0x189/0x420 [ 28.124341] kasan_atomics+0x95/0x310 [ 28.125073] kunit_try_run_case+0x1a5/0x480 [ 28.125287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.125534] kthread+0x337/0x6f0 [ 28.125787] ret_from_fork+0x116/0x1d0 [ 28.126099] ret_from_fork_asm+0x1a/0x30 [ 28.129097] [ 28.129452] The buggy address belongs to the object at ffff88810458d180 [ 28.129452] which belongs to the cache kmalloc-64 of size 64 [ 28.130994] The buggy address is located 0 bytes to the right of [ 28.130994] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.132089] [ 28.132462] The buggy address belongs to the physical page: [ 28.133137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.133973] flags: 0x200000000000000(node=0|zone=2) [ 28.134686] page_type: f5(slab) [ 28.135094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.135785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.136023] page dumped because: kasan: bad access detected [ 28.136204] [ 28.136569] Memory state around the buggy address: [ 28.137311] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.138146] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.139118] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.139999] ^ [ 28.140178] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.141002] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.141863] ================================================================== [ 29.432859] ================================================================== [ 29.433639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 29.434055] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.434730] [ 29.434917] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.434972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.434988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.435013] Call Trace: [ 29.435028] <TASK> [ 29.435044] dump_stack_lvl+0x73/0xb0 [ 29.435074] print_report+0xd1/0x610 [ 29.435210] ? __virt_addr_valid+0x1db/0x2d0 [ 29.435235] ? kasan_atomics_helper+0x224c/0x5450 [ 29.435257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.435298] ? kasan_atomics_helper+0x224c/0x5450 [ 29.435320] kasan_report+0x141/0x180 [ 29.435343] ? kasan_atomics_helper+0x224c/0x5450 [ 29.435369] kasan_check_range+0x10c/0x1c0 [ 29.435393] __kasan_check_write+0x18/0x20 [ 29.435417] kasan_atomics_helper+0x224c/0x5450 [ 29.435440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.435462] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.435486] ? kasan_atomics+0x152/0x310 [ 29.435513] kasan_atomics+0x1dc/0x310 [ 29.435538] ? __pfx_kasan_atomics+0x10/0x10 [ 29.435563] ? __pfx_read_tsc+0x10/0x10 [ 29.435585] ? ktime_get_ts64+0x86/0x230 [ 29.435611] kunit_try_run_case+0x1a5/0x480 [ 29.435635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.435658] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.435681] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.435706] ? __kthread_parkme+0x82/0x180 [ 29.435731] ? preempt_count_sub+0x50/0x80 [ 29.435754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.435778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.435802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.435825] kthread+0x337/0x6f0 [ 29.435845] ? trace_preempt_on+0x20/0xc0 [ 29.435868] ? __pfx_kthread+0x10/0x10 [ 29.435889] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.435911] ? calculate_sigpending+0x7b/0xa0 [ 29.435935] ? __pfx_kthread+0x10/0x10 [ 29.435956] ret_from_fork+0x116/0x1d0 [ 29.435976] ? __pfx_kthread+0x10/0x10 [ 29.435996] ret_from_fork_asm+0x1a/0x30 [ 29.436028] </TASK> [ 29.436040] [ 29.445185] Allocated by task 314: [ 29.445316] kasan_save_stack+0x45/0x70 [ 29.445500] kasan_save_track+0x18/0x40 [ 29.445719] kasan_save_alloc_info+0x3b/0x50 [ 29.445872] __kasan_kmalloc+0xb7/0xc0 [ 29.446004] __kmalloc_cache_noprof+0x189/0x420 [ 29.446162] kasan_atomics+0x95/0x310 [ 29.446338] kunit_try_run_case+0x1a5/0x480 [ 29.446547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.446822] kthread+0x337/0x6f0 [ 29.446990] ret_from_fork+0x116/0x1d0 [ 29.447203] ret_from_fork_asm+0x1a/0x30 [ 29.447462] [ 29.447528] The buggy address belongs to the object at ffff88810458d180 [ 29.447528] which belongs to the cache kmalloc-64 of size 64 [ 29.448043] The buggy address is located 0 bytes to the right of [ 29.448043] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.448632] [ 29.448745] The buggy address belongs to the physical page: [ 29.448978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.449267] flags: 0x200000000000000(node=0|zone=2) [ 29.449424] page_type: f5(slab) [ 29.449542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.449908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.450254] page dumped because: kasan: bad access detected [ 29.450508] [ 29.450596] Memory state around the buggy address: [ 29.450800] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.451011] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.451300] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.451625] ^ [ 29.451908] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.452130] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.452496] ================================================================== [ 28.372799] ================================================================== [ 28.373181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 28.373555] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.373819] [ 28.373934] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.373981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.373994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.374015] Call Trace: [ 28.374029] <TASK> [ 28.374045] dump_stack_lvl+0x73/0xb0 [ 28.374072] print_report+0xd1/0x610 [ 28.374104] ? __virt_addr_valid+0x1db/0x2d0 [ 28.374127] ? kasan_atomics_helper+0x992/0x5450 [ 28.374148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.374174] ? kasan_atomics_helper+0x992/0x5450 [ 28.374196] kasan_report+0x141/0x180 [ 28.374218] ? kasan_atomics_helper+0x992/0x5450 [ 28.374244] kasan_check_range+0x10c/0x1c0 [ 28.374268] __kasan_check_write+0x18/0x20 [ 28.374336] kasan_atomics_helper+0x992/0x5450 [ 28.374360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.374392] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.374444] ? kasan_atomics+0x152/0x310 [ 28.374471] kasan_atomics+0x1dc/0x310 [ 28.374494] ? __pfx_kasan_atomics+0x10/0x10 [ 28.374529] ? __pfx_read_tsc+0x10/0x10 [ 28.374551] ? ktime_get_ts64+0x86/0x230 [ 28.374575] kunit_try_run_case+0x1a5/0x480 [ 28.374601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.374624] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.374674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.374699] ? __kthread_parkme+0x82/0x180 [ 28.374744] ? preempt_count_sub+0x50/0x80 [ 28.374768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.374792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.374816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.374840] kthread+0x337/0x6f0 [ 28.374860] ? trace_preempt_on+0x20/0xc0 [ 28.374884] ? __pfx_kthread+0x10/0x10 [ 28.374905] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.374927] ? calculate_sigpending+0x7b/0xa0 [ 28.374952] ? __pfx_kthread+0x10/0x10 [ 28.374974] ret_from_fork+0x116/0x1d0 [ 28.374994] ? __pfx_kthread+0x10/0x10 [ 28.375015] ret_from_fork_asm+0x1a/0x30 [ 28.375047] </TASK> [ 28.375059] [ 28.384011] Allocated by task 314: [ 28.385237] kasan_save_stack+0x45/0x70 [ 28.385614] kasan_save_track+0x18/0x40 [ 28.385977] kasan_save_alloc_info+0x3b/0x50 [ 28.386206] __kasan_kmalloc+0xb7/0xc0 [ 28.386388] __kmalloc_cache_noprof+0x189/0x420 [ 28.386604] kasan_atomics+0x95/0x310 [ 28.386788] kunit_try_run_case+0x1a5/0x480 [ 28.388255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.388558] kthread+0x337/0x6f0 [ 28.388684] ret_from_fork+0x116/0x1d0 [ 28.388811] ret_from_fork_asm+0x1a/0x30 [ 28.388944] [ 28.389011] The buggy address belongs to the object at ffff88810458d180 [ 28.389011] which belongs to the cache kmalloc-64 of size 64 [ 28.390424] The buggy address is located 0 bytes to the right of [ 28.390424] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.391172] [ 28.391361] The buggy address belongs to the physical page: [ 28.391618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.391942] flags: 0x200000000000000(node=0|zone=2) [ 28.392178] page_type: f5(slab) [ 28.392382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.392722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.393052] page dumped because: kasan: bad access detected [ 28.393371] [ 28.393484] Memory state around the buggy address: [ 28.393690] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.394004] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.394399] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.394716] ^ [ 28.394932] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.395216] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.395567] ================================================================== [ 28.290422] ================================================================== [ 28.290787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 28.291242] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.291579] [ 28.291747] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.292056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.292092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.292113] Call Trace: [ 28.292125] <TASK> [ 28.292141] dump_stack_lvl+0x73/0xb0 [ 28.292170] print_report+0xd1/0x610 [ 28.292193] ? __virt_addr_valid+0x1db/0x2d0 [ 28.292217] ? kasan_atomics_helper+0x72f/0x5450 [ 28.292238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.292265] ? kasan_atomics_helper+0x72f/0x5450 [ 28.292287] kasan_report+0x141/0x180 [ 28.292310] ? kasan_atomics_helper+0x72f/0x5450 [ 28.292413] kasan_check_range+0x10c/0x1c0 [ 28.292455] __kasan_check_write+0x18/0x20 [ 28.292480] kasan_atomics_helper+0x72f/0x5450 [ 28.292503] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.292525] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.292551] ? kasan_atomics+0x152/0x310 [ 28.292577] kasan_atomics+0x1dc/0x310 [ 28.292600] ? __pfx_kasan_atomics+0x10/0x10 [ 28.292625] ? __pfx_read_tsc+0x10/0x10 [ 28.292647] ? ktime_get_ts64+0x86/0x230 [ 28.292672] kunit_try_run_case+0x1a5/0x480 [ 28.292696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.292719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.292743] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.292767] ? __kthread_parkme+0x82/0x180 [ 28.292791] ? preempt_count_sub+0x50/0x80 [ 28.292815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.292839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.292863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.292886] kthread+0x337/0x6f0 [ 28.292906] ? trace_preempt_on+0x20/0xc0 [ 28.292932] ? __pfx_kthread+0x10/0x10 [ 28.292953] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.292975] ? calculate_sigpending+0x7b/0xa0 [ 28.292999] ? __pfx_kthread+0x10/0x10 [ 28.293021] ret_from_fork+0x116/0x1d0 [ 28.293041] ? __pfx_kthread+0x10/0x10 [ 28.293062] ret_from_fork_asm+0x1a/0x30 [ 28.293103] </TASK> [ 28.293115] [ 28.303291] Allocated by task 314: [ 28.303684] kasan_save_stack+0x45/0x70 [ 28.303834] kasan_save_track+0x18/0x40 [ 28.303964] kasan_save_alloc_info+0x3b/0x50 [ 28.304118] __kasan_kmalloc+0xb7/0xc0 [ 28.304299] __kmalloc_cache_noprof+0x189/0x420 [ 28.304814] kasan_atomics+0x95/0x310 [ 28.305182] kunit_try_run_case+0x1a5/0x480 [ 28.305737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.306276] kthread+0x337/0x6f0 [ 28.306795] ret_from_fork+0x116/0x1d0 [ 28.307181] ret_from_fork_asm+0x1a/0x30 [ 28.307685] [ 28.307842] The buggy address belongs to the object at ffff88810458d180 [ 28.307842] which belongs to the cache kmalloc-64 of size 64 [ 28.308926] The buggy address is located 0 bytes to the right of [ 28.308926] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.309693] [ 28.309878] The buggy address belongs to the physical page: [ 28.310545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.311252] flags: 0x200000000000000(node=0|zone=2) [ 28.311667] page_type: f5(slab) [ 28.311890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.312510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.312739] page dumped because: kasan: bad access detected [ 28.312906] [ 28.312970] Memory state around the buggy address: [ 28.313136] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.313434] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.313939] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.314434] ^ [ 28.314631] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.314959] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.315352] ================================================================== [ 28.204091] ================================================================== [ 28.204518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 28.204853] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.205190] [ 28.205366] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.205416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.205429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.205450] Call Trace: [ 28.205464] <TASK> [ 28.205480] dump_stack_lvl+0x73/0xb0 [ 28.205509] print_report+0xd1/0x610 [ 28.205532] ? __virt_addr_valid+0x1db/0x2d0 [ 28.205557] ? kasan_atomics_helper+0x4b3a/0x5450 [ 28.205578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.205604] ? kasan_atomics_helper+0x4b3a/0x5450 [ 28.205627] kasan_report+0x141/0x180 [ 28.205649] ? kasan_atomics_helper+0x4b3a/0x5450 [ 28.205676] __asan_report_store4_noabort+0x1b/0x30 [ 28.205701] kasan_atomics_helper+0x4b3a/0x5450 [ 28.205724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.205746] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.205771] ? kasan_atomics+0x152/0x310 [ 28.205798] kasan_atomics+0x1dc/0x310 [ 28.205821] ? __pfx_kasan_atomics+0x10/0x10 [ 28.205846] ? __pfx_read_tsc+0x10/0x10 [ 28.205868] ? ktime_get_ts64+0x86/0x230 [ 28.205893] kunit_try_run_case+0x1a5/0x480 [ 28.205917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.205947] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.205971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.205996] ? __kthread_parkme+0x82/0x180 [ 28.206020] ? preempt_count_sub+0x50/0x80 [ 28.206044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.206068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.206103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.206127] kthread+0x337/0x6f0 [ 28.206146] ? trace_preempt_on+0x20/0xc0 [ 28.206170] ? __pfx_kthread+0x10/0x10 [ 28.206191] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.206213] ? calculate_sigpending+0x7b/0xa0 [ 28.206256] ? __pfx_kthread+0x10/0x10 [ 28.206312] ret_from_fork+0x116/0x1d0 [ 28.206332] ? __pfx_kthread+0x10/0x10 [ 28.206353] ret_from_fork_asm+0x1a/0x30 [ 28.206385] </TASK> [ 28.206397] [ 28.213849] Allocated by task 314: [ 28.214022] kasan_save_stack+0x45/0x70 [ 28.214213] kasan_save_track+0x18/0x40 [ 28.214555] kasan_save_alloc_info+0x3b/0x50 [ 28.214770] __kasan_kmalloc+0xb7/0xc0 [ 28.214921] __kmalloc_cache_noprof+0x189/0x420 [ 28.215129] kasan_atomics+0x95/0x310 [ 28.215396] kunit_try_run_case+0x1a5/0x480 [ 28.215561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.215818] kthread+0x337/0x6f0 [ 28.215958] ret_from_fork+0x116/0x1d0 [ 28.216125] ret_from_fork_asm+0x1a/0x30 [ 28.216392] [ 28.216487] The buggy address belongs to the object at ffff88810458d180 [ 28.216487] which belongs to the cache kmalloc-64 of size 64 [ 28.216891] The buggy address is located 0 bytes to the right of [ 28.216891] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.217354] [ 28.217451] The buggy address belongs to the physical page: [ 28.217696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.218053] flags: 0x200000000000000(node=0|zone=2) [ 28.218457] page_type: f5(slab) [ 28.218631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.218931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.219194] page dumped because: kasan: bad access detected [ 28.219467] [ 28.219545] Memory state around the buggy address: [ 28.219765] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.220094] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.220482] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.220786] ^ [ 28.220980] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.221345] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.221637] ================================================================== [ 29.018098] ================================================================== [ 29.018327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 29.018934] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.019318] [ 29.019478] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.019558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.019594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.019615] Call Trace: [ 29.019629] <TASK> [ 29.019644] dump_stack_lvl+0x73/0xb0 [ 29.019672] print_report+0xd1/0x610 [ 29.019694] ? __virt_addr_valid+0x1db/0x2d0 [ 29.019717] ? kasan_atomics_helper+0x18b1/0x5450 [ 29.019738] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.019765] ? kasan_atomics_helper+0x18b1/0x5450 [ 29.019787] kasan_report+0x141/0x180 [ 29.019809] ? kasan_atomics_helper+0x18b1/0x5450 [ 29.019835] kasan_check_range+0x10c/0x1c0 [ 29.019859] __kasan_check_write+0x18/0x20 [ 29.019882] kasan_atomics_helper+0x18b1/0x5450 [ 29.019938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.019960] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.019985] ? kasan_atomics+0x152/0x310 [ 29.020013] kasan_atomics+0x1dc/0x310 [ 29.020036] ? __pfx_kasan_atomics+0x10/0x10 [ 29.020101] ? __pfx_read_tsc+0x10/0x10 [ 29.020123] ? ktime_get_ts64+0x86/0x230 [ 29.020147] kunit_try_run_case+0x1a5/0x480 [ 29.020171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.020194] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.020250] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.020274] ? __kthread_parkme+0x82/0x180 [ 29.020302] ? preempt_count_sub+0x50/0x80 [ 29.020334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.020359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.020413] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.020440] kthread+0x337/0x6f0 [ 29.020460] ? trace_preempt_on+0x20/0xc0 [ 29.020483] ? __pfx_kthread+0x10/0x10 [ 29.020505] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.020527] ? calculate_sigpending+0x7b/0xa0 [ 29.020584] ? __pfx_kthread+0x10/0x10 [ 29.020606] ret_from_fork+0x116/0x1d0 [ 29.020625] ? __pfx_kthread+0x10/0x10 [ 29.020645] ret_from_fork_asm+0x1a/0x30 [ 29.020678] </TASK> [ 29.020688] [ 29.028570] Allocated by task 314: [ 29.028805] kasan_save_stack+0x45/0x70 [ 29.029264] kasan_save_track+0x18/0x40 [ 29.029524] kasan_save_alloc_info+0x3b/0x50 [ 29.029751] __kasan_kmalloc+0xb7/0xc0 [ 29.029896] __kmalloc_cache_noprof+0x189/0x420 [ 29.030051] kasan_atomics+0x95/0x310 [ 29.030189] kunit_try_run_case+0x1a5/0x480 [ 29.030528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.030842] kthread+0x337/0x6f0 [ 29.031008] ret_from_fork+0x116/0x1d0 [ 29.031204] ret_from_fork_asm+0x1a/0x30 [ 29.031422] [ 29.031488] The buggy address belongs to the object at ffff88810458d180 [ 29.031488] which belongs to the cache kmalloc-64 of size 64 [ 29.032016] The buggy address is located 0 bytes to the right of [ 29.032016] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.032673] [ 29.032758] The buggy address belongs to the physical page: [ 29.033015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.033414] flags: 0x200000000000000(node=0|zone=2) [ 29.033639] page_type: f5(slab) [ 29.033836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.034194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.034547] page dumped because: kasan: bad access detected [ 29.034801] [ 29.034885] Memory state around the buggy address: [ 29.035118] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.035465] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.035823] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.036384] ^ [ 29.036764] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.037075] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.037389] ================================================================== [ 29.453170] ================================================================== [ 29.453864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 29.454211] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.454496] [ 29.454575] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.454622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.454634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.454656] Call Trace: [ 29.454671] <TASK> [ 29.454686] dump_stack_lvl+0x73/0xb0 [ 29.454715] print_report+0xd1/0x610 [ 29.454737] ? __virt_addr_valid+0x1db/0x2d0 [ 29.454784] ? kasan_atomics_helper+0x5115/0x5450 [ 29.454805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.454832] ? kasan_atomics_helper+0x5115/0x5450 [ 29.454854] kasan_report+0x141/0x180 [ 29.454876] ? kasan_atomics_helper+0x5115/0x5450 [ 29.454903] __asan_report_load8_noabort+0x18/0x20 [ 29.454928] kasan_atomics_helper+0x5115/0x5450 [ 29.454951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.454991] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.455015] ? kasan_atomics+0x152/0x310 [ 29.455044] kasan_atomics+0x1dc/0x310 [ 29.455067] ? __pfx_kasan_atomics+0x10/0x10 [ 29.455102] ? __pfx_read_tsc+0x10/0x10 [ 29.455125] ? ktime_get_ts64+0x86/0x230 [ 29.455151] kunit_try_run_case+0x1a5/0x480 [ 29.455177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.455202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.455227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.455274] ? __kthread_parkme+0x82/0x180 [ 29.455300] ? preempt_count_sub+0x50/0x80 [ 29.455325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.455351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.455378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.455403] kthread+0x337/0x6f0 [ 29.455424] ? trace_preempt_on+0x20/0xc0 [ 29.455448] ? __pfx_kthread+0x10/0x10 [ 29.455469] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.455492] ? calculate_sigpending+0x7b/0xa0 [ 29.455516] ? __pfx_kthread+0x10/0x10 [ 29.455546] ret_from_fork+0x116/0x1d0 [ 29.455567] ? __pfx_kthread+0x10/0x10 [ 29.455588] ret_from_fork_asm+0x1a/0x30 [ 29.455620] </TASK> [ 29.455631] [ 29.464138] Allocated by task 314: [ 29.464715] kasan_save_stack+0x45/0x70 [ 29.464980] kasan_save_track+0x18/0x40 [ 29.465279] kasan_save_alloc_info+0x3b/0x50 [ 29.465676] __kasan_kmalloc+0xb7/0xc0 [ 29.465980] __kmalloc_cache_noprof+0x189/0x420 [ 29.466380] kasan_atomics+0x95/0x310 [ 29.466675] kunit_try_run_case+0x1a5/0x480 [ 29.466883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.467124] kthread+0x337/0x6f0 [ 29.467271] ret_from_fork+0x116/0x1d0 [ 29.467728] ret_from_fork_asm+0x1a/0x30 [ 29.468019] [ 29.468240] The buggy address belongs to the object at ffff88810458d180 [ 29.468240] which belongs to the cache kmalloc-64 of size 64 [ 29.468857] The buggy address is located 0 bytes to the right of [ 29.468857] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.469561] [ 29.469774] The buggy address belongs to the physical page: [ 29.470241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.470727] flags: 0x200000000000000(node=0|zone=2) [ 29.471061] page_type: f5(slab) [ 29.471234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.471857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.472369] page dumped because: kasan: bad access detected [ 29.472607] [ 29.472690] Memory state around the buggy address: [ 29.472893] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.473189] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.473799] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.474299] ^ [ 29.474633] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.475202] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.475508] ================================================================== [ 28.353759] ================================================================== [ 28.354170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 28.354678] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.354937] [ 28.355017] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.355063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.355075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.355107] Call Trace: [ 28.355124] <TASK> [ 28.355140] dump_stack_lvl+0x73/0xb0 [ 28.355168] print_report+0xd1/0x610 [ 28.355191] ? __virt_addr_valid+0x1db/0x2d0 [ 28.355214] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.355235] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.355261] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.355294] kasan_report+0x141/0x180 [ 28.355316] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.355343] kasan_check_range+0x10c/0x1c0 [ 28.355401] __kasan_check_write+0x18/0x20 [ 28.355425] kasan_atomics_helper+0x8f9/0x5450 [ 28.355459] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.355481] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.355506] ? kasan_atomics+0x152/0x310 [ 28.355533] kasan_atomics+0x1dc/0x310 [ 28.355555] ? __pfx_kasan_atomics+0x10/0x10 [ 28.355607] ? __pfx_read_tsc+0x10/0x10 [ 28.355630] ? ktime_get_ts64+0x86/0x230 [ 28.355654] kunit_try_run_case+0x1a5/0x480 [ 28.355689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.355712] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.355735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.355760] ? __kthread_parkme+0x82/0x180 [ 28.355784] ? preempt_count_sub+0x50/0x80 [ 28.355809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.355833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.355856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.355880] kthread+0x337/0x6f0 [ 28.355900] ? trace_preempt_on+0x20/0xc0 [ 28.355952] ? __pfx_kthread+0x10/0x10 [ 28.355974] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.356008] ? calculate_sigpending+0x7b/0xa0 [ 28.356042] ? __pfx_kthread+0x10/0x10 [ 28.356063] ret_from_fork+0x116/0x1d0 [ 28.356092] ? __pfx_kthread+0x10/0x10 [ 28.356113] ret_from_fork_asm+0x1a/0x30 [ 28.356145] </TASK> [ 28.356156] [ 28.364116] Allocated by task 314: [ 28.364390] kasan_save_stack+0x45/0x70 [ 28.364598] kasan_save_track+0x18/0x40 [ 28.364783] kasan_save_alloc_info+0x3b/0x50 [ 28.364955] __kasan_kmalloc+0xb7/0xc0 [ 28.365090] __kmalloc_cache_noprof+0x189/0x420 [ 28.365239] kasan_atomics+0x95/0x310 [ 28.365625] kunit_try_run_case+0x1a5/0x480 [ 28.365829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.366164] kthread+0x337/0x6f0 [ 28.366435] ret_from_fork+0x116/0x1d0 [ 28.366662] ret_from_fork_asm+0x1a/0x30 [ 28.366799] [ 28.366863] The buggy address belongs to the object at ffff88810458d180 [ 28.366863] which belongs to the cache kmalloc-64 of size 64 [ 28.367530] The buggy address is located 0 bytes to the right of [ 28.367530] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.368099] [ 28.368166] The buggy address belongs to the physical page: [ 28.368488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.368898] flags: 0x200000000000000(node=0|zone=2) [ 28.369115] page_type: f5(slab) [ 28.369251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.369571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.369799] page dumped because: kasan: bad access detected [ 28.369971] [ 28.370034] Memory state around the buggy address: [ 28.370261] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.370622] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.370951] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.371336] ^ [ 28.371489] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.371910] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.372156] ================================================================== [ 28.315975] ================================================================== [ 28.316354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 28.316756] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.317075] [ 28.317163] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.317241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.317255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.317287] Call Trace: [ 28.317301] <TASK> [ 28.317316] dump_stack_lvl+0x73/0xb0 [ 28.317344] print_report+0xd1/0x610 [ 28.317366] ? __virt_addr_valid+0x1db/0x2d0 [ 28.317389] ? kasan_atomics_helper+0x7c7/0x5450 [ 28.317410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.317491] ? kasan_atomics_helper+0x7c7/0x5450 [ 28.317518] kasan_report+0x141/0x180 [ 28.317542] ? kasan_atomics_helper+0x7c7/0x5450 [ 28.317604] kasan_check_range+0x10c/0x1c0 [ 28.317652] __kasan_check_write+0x18/0x20 [ 28.317676] kasan_atomics_helper+0x7c7/0x5450 [ 28.317698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.317721] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.317746] ? kasan_atomics+0x152/0x310 [ 28.317773] kasan_atomics+0x1dc/0x310 [ 28.317796] ? __pfx_kasan_atomics+0x10/0x10 [ 28.317820] ? __pfx_read_tsc+0x10/0x10 [ 28.317842] ? ktime_get_ts64+0x86/0x230 [ 28.317895] kunit_try_run_case+0x1a5/0x480 [ 28.317925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.317970] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.317994] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.318018] ? __kthread_parkme+0x82/0x180 [ 28.318043] ? preempt_count_sub+0x50/0x80 [ 28.318067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.318099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.318123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.318148] kthread+0x337/0x6f0 [ 28.318168] ? trace_preempt_on+0x20/0xc0 [ 28.318191] ? __pfx_kthread+0x10/0x10 [ 28.318211] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.318234] ? calculate_sigpending+0x7b/0xa0 [ 28.318398] ? __pfx_kthread+0x10/0x10 [ 28.318422] ret_from_fork+0x116/0x1d0 [ 28.318442] ? __pfx_kthread+0x10/0x10 [ 28.318463] ret_from_fork_asm+0x1a/0x30 [ 28.318496] </TASK> [ 28.318509] [ 28.326963] Allocated by task 314: [ 28.327173] kasan_save_stack+0x45/0x70 [ 28.327433] kasan_save_track+0x18/0x40 [ 28.327619] kasan_save_alloc_info+0x3b/0x50 [ 28.327771] __kasan_kmalloc+0xb7/0xc0 [ 28.327900] __kmalloc_cache_noprof+0x189/0x420 [ 28.328075] kasan_atomics+0x95/0x310 [ 28.328267] kunit_try_run_case+0x1a5/0x480 [ 28.328531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.328783] kthread+0x337/0x6f0 [ 28.328984] ret_from_fork+0x116/0x1d0 [ 28.329176] ret_from_fork_asm+0x1a/0x30 [ 28.329313] [ 28.329378] The buggy address belongs to the object at ffff88810458d180 [ 28.329378] which belongs to the cache kmalloc-64 of size 64 [ 28.330190] The buggy address is located 0 bytes to the right of [ 28.330190] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.330879] [ 28.330980] The buggy address belongs to the physical page: [ 28.331284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.331523] flags: 0x200000000000000(node=0|zone=2) [ 28.331679] page_type: f5(slab) [ 28.331796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.332219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.332611] page dumped because: kasan: bad access detected [ 28.332868] [ 28.332960] Memory state around the buggy address: [ 28.333191] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.333486] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.333836] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.334151] ^ [ 28.334376] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.334599] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.334807] ================================================================== [ 28.687357] ================================================================== [ 28.687655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 28.687943] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.688179] [ 28.688303] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.688350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.688363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.688385] Call Trace: [ 28.688402] <TASK> [ 28.688417] dump_stack_lvl+0x73/0xb0 [ 28.688445] print_report+0xd1/0x610 [ 28.688467] ? __virt_addr_valid+0x1db/0x2d0 [ 28.688490] ? kasan_atomics_helper+0x1148/0x5450 [ 28.688511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.688537] ? kasan_atomics_helper+0x1148/0x5450 [ 28.688559] kasan_report+0x141/0x180 [ 28.688583] ? kasan_atomics_helper+0x1148/0x5450 [ 28.688610] kasan_check_range+0x10c/0x1c0 [ 28.688634] __kasan_check_write+0x18/0x20 [ 28.688658] kasan_atomics_helper+0x1148/0x5450 [ 28.688681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.688703] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.688727] ? kasan_atomics+0x152/0x310 [ 28.688754] kasan_atomics+0x1dc/0x310 [ 28.688777] ? __pfx_kasan_atomics+0x10/0x10 [ 28.688801] ? __pfx_read_tsc+0x10/0x10 [ 28.688822] ? ktime_get_ts64+0x86/0x230 [ 28.688846] kunit_try_run_case+0x1a5/0x480 [ 28.688870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.688892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.688916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.688940] ? __kthread_parkme+0x82/0x180 [ 28.688964] ? preempt_count_sub+0x50/0x80 [ 28.688988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.689012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.689035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.689060] kthread+0x337/0x6f0 [ 28.689090] ? trace_preempt_on+0x20/0xc0 [ 28.689114] ? __pfx_kthread+0x10/0x10 [ 28.689136] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.689158] ? calculate_sigpending+0x7b/0xa0 [ 28.689182] ? __pfx_kthread+0x10/0x10 [ 28.689203] ret_from_fork+0x116/0x1d0 [ 28.689223] ? __pfx_kthread+0x10/0x10 [ 28.689243] ret_from_fork_asm+0x1a/0x30 [ 28.689276] </TASK> [ 28.689288] [ 28.698543] Allocated by task 314: [ 28.698867] kasan_save_stack+0x45/0x70 [ 28.699045] kasan_save_track+0x18/0x40 [ 28.699236] kasan_save_alloc_info+0x3b/0x50 [ 28.699490] __kasan_kmalloc+0xb7/0xc0 [ 28.699930] __kmalloc_cache_noprof+0x189/0x420 [ 28.700148] kasan_atomics+0x95/0x310 [ 28.700491] kunit_try_run_case+0x1a5/0x480 [ 28.700649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.701009] kthread+0x337/0x6f0 [ 28.701193] ret_from_fork+0x116/0x1d0 [ 28.701348] ret_from_fork_asm+0x1a/0x30 [ 28.701689] [ 28.701761] The buggy address belongs to the object at ffff88810458d180 [ 28.701761] which belongs to the cache kmalloc-64 of size 64 [ 28.702398] The buggy address is located 0 bytes to the right of [ 28.702398] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.703003] [ 28.703119] The buggy address belongs to the physical page: [ 28.703478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.703920] flags: 0x200000000000000(node=0|zone=2) [ 28.704149] page_type: f5(slab) [ 28.704285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.704755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.705137] page dumped because: kasan: bad access detected [ 28.705417] [ 28.705492] Memory state around the buggy address: [ 28.705809] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.706117] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.706438] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.706724] ^ [ 28.706925] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.707534] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.707787] ================================================================== [ 28.858482] ================================================================== [ 28.859224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 28.860331] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.860628] [ 28.860717] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.860764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.860777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.860799] Call Trace: [ 28.860814] <TASK> [ 28.860830] dump_stack_lvl+0x73/0xb0 [ 28.860859] print_report+0xd1/0x610 [ 28.860882] ? __virt_addr_valid+0x1db/0x2d0 [ 28.860905] ? kasan_atomics_helper+0x1467/0x5450 [ 28.860926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.860953] ? kasan_atomics_helper+0x1467/0x5450 [ 28.860975] kasan_report+0x141/0x180 [ 28.860997] ? kasan_atomics_helper+0x1467/0x5450 [ 28.861024] kasan_check_range+0x10c/0x1c0 [ 28.861048] __kasan_check_write+0x18/0x20 [ 28.861071] kasan_atomics_helper+0x1467/0x5450 [ 28.861105] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.861129] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.861154] ? kasan_atomics+0x152/0x310 [ 28.861180] kasan_atomics+0x1dc/0x310 [ 28.861204] ? __pfx_kasan_atomics+0x10/0x10 [ 28.861228] ? __pfx_read_tsc+0x10/0x10 [ 28.861250] ? ktime_get_ts64+0x86/0x230 [ 28.861274] kunit_try_run_case+0x1a5/0x480 [ 28.861771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.861796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.861820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.861845] ? __kthread_parkme+0x82/0x180 [ 28.861869] ? preempt_count_sub+0x50/0x80 [ 28.861892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.861916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.861948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.861972] kthread+0x337/0x6f0 [ 28.861992] ? trace_preempt_on+0x20/0xc0 [ 28.862014] ? __pfx_kthread+0x10/0x10 [ 28.862035] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.862058] ? calculate_sigpending+0x7b/0xa0 [ 28.862092] ? __pfx_kthread+0x10/0x10 [ 28.862113] ret_from_fork+0x116/0x1d0 [ 28.862133] ? __pfx_kthread+0x10/0x10 [ 28.862153] ret_from_fork_asm+0x1a/0x30 [ 28.862185] </TASK> [ 28.862197] [ 28.871684] Allocated by task 314: [ 28.871853] kasan_save_stack+0x45/0x70 [ 28.872029] kasan_save_track+0x18/0x40 [ 28.872203] kasan_save_alloc_info+0x3b/0x50 [ 28.872736] __kasan_kmalloc+0xb7/0xc0 [ 28.872921] __kmalloc_cache_noprof+0x189/0x420 [ 28.873135] kasan_atomics+0x95/0x310 [ 28.873406] kunit_try_run_case+0x1a5/0x480 [ 28.873840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.874073] kthread+0x337/0x6f0 [ 28.874406] ret_from_fork+0x116/0x1d0 [ 28.874583] ret_from_fork_asm+0x1a/0x30 [ 28.874751] [ 28.874848] The buggy address belongs to the object at ffff88810458d180 [ 28.874848] which belongs to the cache kmalloc-64 of size 64 [ 28.875350] The buggy address is located 0 bytes to the right of [ 28.875350] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.876182] [ 28.876459] The buggy address belongs to the physical page: [ 28.876675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.877150] flags: 0x200000000000000(node=0|zone=2) [ 28.877337] page_type: f5(slab) [ 28.877608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.878026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.878554] page dumped because: kasan: bad access detected [ 28.878880] [ 28.878970] Memory state around the buggy address: [ 28.879299] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.879615] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.880017] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.880582] ^ [ 28.880867] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.881288] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.881628] ================================================================== [ 28.998021] ================================================================== [ 28.998510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 28.999227] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.999636] [ 28.999718] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.999763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.999775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.999829] Call Trace: [ 28.999844] <TASK> [ 28.999858] dump_stack_lvl+0x73/0xb0 [ 28.999887] print_report+0xd1/0x610 [ 28.999909] ? __virt_addr_valid+0x1db/0x2d0 [ 28.999931] ? kasan_atomics_helper+0x1818/0x5450 [ 28.999953] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.999979] ? kasan_atomics_helper+0x1818/0x5450 [ 29.000001] kasan_report+0x141/0x180 [ 29.000023] ? kasan_atomics_helper+0x1818/0x5450 [ 29.000049] kasan_check_range+0x10c/0x1c0 [ 29.000073] __kasan_check_write+0x18/0x20 [ 29.000107] kasan_atomics_helper+0x1818/0x5450 [ 29.000129] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.000152] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.000176] ? kasan_atomics+0x152/0x310 [ 29.000237] kasan_atomics+0x1dc/0x310 [ 29.000260] ? __pfx_kasan_atomics+0x10/0x10 [ 29.000284] ? __pfx_read_tsc+0x10/0x10 [ 29.000315] ? ktime_get_ts64+0x86/0x230 [ 29.000340] kunit_try_run_case+0x1a5/0x480 [ 29.000396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.000418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.000442] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.000467] ? __kthread_parkme+0x82/0x180 [ 29.000490] ? preempt_count_sub+0x50/0x80 [ 29.000544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.000569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.000592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.000616] kthread+0x337/0x6f0 [ 29.000636] ? trace_preempt_on+0x20/0xc0 [ 29.000689] ? __pfx_kthread+0x10/0x10 [ 29.000713] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.000735] ? calculate_sigpending+0x7b/0xa0 [ 29.000759] ? __pfx_kthread+0x10/0x10 [ 29.000781] ret_from_fork+0x116/0x1d0 [ 29.000831] ? __pfx_kthread+0x10/0x10 [ 29.000853] ret_from_fork_asm+0x1a/0x30 [ 29.000885] </TASK> [ 29.000897] [ 29.008716] Allocated by task 314: [ 29.008851] kasan_save_stack+0x45/0x70 [ 29.009074] kasan_save_track+0x18/0x40 [ 29.009254] kasan_save_alloc_info+0x3b/0x50 [ 29.009475] __kasan_kmalloc+0xb7/0xc0 [ 29.009680] __kmalloc_cache_noprof+0x189/0x420 [ 29.009864] kasan_atomics+0x95/0x310 [ 29.010089] kunit_try_run_case+0x1a5/0x480 [ 29.010331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.010653] kthread+0x337/0x6f0 [ 29.010975] ret_from_fork+0x116/0x1d0 [ 29.011140] ret_from_fork_asm+0x1a/0x30 [ 29.011329] [ 29.011420] The buggy address belongs to the object at ffff88810458d180 [ 29.011420] which belongs to the cache kmalloc-64 of size 64 [ 29.011936] The buggy address is located 0 bytes to the right of [ 29.011936] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.012383] [ 29.012449] The buggy address belongs to the physical page: [ 29.012813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.013170] flags: 0x200000000000000(node=0|zone=2) [ 29.013500] page_type: f5(slab) [ 29.013651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.014032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.014776] page dumped because: kasan: bad access detected [ 29.014978] [ 29.015044] Memory state around the buggy address: [ 29.015208] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.015795] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.016047] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.016267] ^ [ 29.016643] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.016973] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.017296] ================================================================== [ 28.546119] ================================================================== [ 28.546349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 28.546570] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.547047] [ 28.547147] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.547210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.547224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.547246] Call Trace: [ 28.547261] <TASK> [ 28.547289] dump_stack_lvl+0x73/0xb0 [ 28.547320] print_report+0xd1/0x610 [ 28.547343] ? __virt_addr_valid+0x1db/0x2d0 [ 28.547367] ? kasan_atomics_helper+0xe78/0x5450 [ 28.547409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.547436] ? kasan_atomics_helper+0xe78/0x5450 [ 28.547469] kasan_report+0x141/0x180 [ 28.547493] ? kasan_atomics_helper+0xe78/0x5450 [ 28.547521] kasan_check_range+0x10c/0x1c0 [ 28.547547] __kasan_check_write+0x18/0x20 [ 28.547572] kasan_atomics_helper+0xe78/0x5450 [ 28.547596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.547619] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.547645] ? kasan_atomics+0x152/0x310 [ 28.547673] kasan_atomics+0x1dc/0x310 [ 28.547696] ? __pfx_kasan_atomics+0x10/0x10 [ 28.547721] ? __pfx_read_tsc+0x10/0x10 [ 28.547743] ? ktime_get_ts64+0x86/0x230 [ 28.547769] kunit_try_run_case+0x1a5/0x480 [ 28.547794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.547818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.547843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.547868] ? __kthread_parkme+0x82/0x180 [ 28.547892] ? preempt_count_sub+0x50/0x80 [ 28.547916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.547941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.547974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.547998] kthread+0x337/0x6f0 [ 28.548018] ? trace_preempt_on+0x20/0xc0 [ 28.548053] ? __pfx_kthread+0x10/0x10 [ 28.548074] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.548105] ? calculate_sigpending+0x7b/0xa0 [ 28.548129] ? __pfx_kthread+0x10/0x10 [ 28.548151] ret_from_fork+0x116/0x1d0 [ 28.548171] ? __pfx_kthread+0x10/0x10 [ 28.548192] ret_from_fork_asm+0x1a/0x30 [ 28.548224] </TASK> [ 28.548235] [ 28.556223] Allocated by task 314: [ 28.556441] kasan_save_stack+0x45/0x70 [ 28.556633] kasan_save_track+0x18/0x40 [ 28.556763] kasan_save_alloc_info+0x3b/0x50 [ 28.556904] __kasan_kmalloc+0xb7/0xc0 [ 28.557030] __kmalloc_cache_noprof+0x189/0x420 [ 28.557270] kasan_atomics+0x95/0x310 [ 28.557615] kunit_try_run_case+0x1a5/0x480 [ 28.557818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.558067] kthread+0x337/0x6f0 [ 28.558276] ret_from_fork+0x116/0x1d0 [ 28.558406] ret_from_fork_asm+0x1a/0x30 [ 28.558539] [ 28.558602] The buggy address belongs to the object at ffff88810458d180 [ 28.558602] which belongs to the cache kmalloc-64 of size 64 [ 28.559121] The buggy address is located 0 bytes to the right of [ 28.559121] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.559695] [ 28.559809] The buggy address belongs to the physical page: [ 28.560074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.560474] flags: 0x200000000000000(node=0|zone=2) [ 28.560670] page_type: f5(slab) [ 28.560829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.561143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.561511] page dumped because: kasan: bad access detected [ 28.561677] [ 28.561741] Memory state around the buggy address: [ 28.561890] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.562116] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.562326] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.562600] ^ [ 28.562815] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.563354] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.563655] ================================================================== [ 29.144456] ================================================================== [ 29.144780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 29.145068] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.145299] [ 29.145374] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.145424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.145437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.145457] Call Trace: [ 29.145472] <TASK> [ 29.145512] dump_stack_lvl+0x73/0xb0 [ 29.145539] print_report+0xd1/0x610 [ 29.145560] ? __virt_addr_valid+0x1db/0x2d0 [ 29.145583] ? kasan_atomics_helper+0x4f30/0x5450 [ 29.145603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.145665] ? kasan_atomics_helper+0x4f30/0x5450 [ 29.145689] kasan_report+0x141/0x180 [ 29.145711] ? kasan_atomics_helper+0x4f30/0x5450 [ 29.145738] __asan_report_load8_noabort+0x18/0x20 [ 29.145762] kasan_atomics_helper+0x4f30/0x5450 [ 29.145785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.145808] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.145833] ? kasan_atomics+0x152/0x310 [ 29.145859] kasan_atomics+0x1dc/0x310 [ 29.145896] ? __pfx_kasan_atomics+0x10/0x10 [ 29.145927] ? __pfx_read_tsc+0x10/0x10 [ 29.145949] ? ktime_get_ts64+0x86/0x230 [ 29.145973] kunit_try_run_case+0x1a5/0x480 [ 29.145997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.146020] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.146043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.146091] ? __kthread_parkme+0x82/0x180 [ 29.146115] ? preempt_count_sub+0x50/0x80 [ 29.146139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.146162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.146186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.146210] kthread+0x337/0x6f0 [ 29.146229] ? trace_preempt_on+0x20/0xc0 [ 29.146252] ? __pfx_kthread+0x10/0x10 [ 29.146272] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.146306] ? calculate_sigpending+0x7b/0xa0 [ 29.146328] ? __pfx_kthread+0x10/0x10 [ 29.146349] ret_from_fork+0x116/0x1d0 [ 29.146369] ? __pfx_kthread+0x10/0x10 [ 29.146390] ret_from_fork_asm+0x1a/0x30 [ 29.146421] </TASK> [ 29.146431] [ 29.155009] Allocated by task 314: [ 29.155185] kasan_save_stack+0x45/0x70 [ 29.155642] kasan_save_track+0x18/0x40 [ 29.155953] kasan_save_alloc_info+0x3b/0x50 [ 29.156367] __kasan_kmalloc+0xb7/0xc0 [ 29.156657] __kmalloc_cache_noprof+0x189/0x420 [ 29.156986] kasan_atomics+0x95/0x310 [ 29.157184] kunit_try_run_case+0x1a5/0x480 [ 29.157575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.158022] kthread+0x337/0x6f0 [ 29.158262] ret_from_fork+0x116/0x1d0 [ 29.158455] ret_from_fork_asm+0x1a/0x30 [ 29.158631] [ 29.158711] The buggy address belongs to the object at ffff88810458d180 [ 29.158711] which belongs to the cache kmalloc-64 of size 64 [ 29.159183] The buggy address is located 0 bytes to the right of [ 29.159183] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.160112] [ 29.160332] The buggy address belongs to the physical page: [ 29.160808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.161323] flags: 0x200000000000000(node=0|zone=2) [ 29.161549] page_type: f5(slab) [ 29.162344] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.162590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.162819] page dumped because: kasan: bad access detected [ 29.162988] [ 29.163053] Memory state around the buggy address: [ 29.163215] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.163435] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.163644] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.163850] ^ [ 29.163998] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.165172] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.165824] ================================================================== [ 29.273192] ================================================================== [ 29.273653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 29.273966] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.274308] [ 29.274423] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.274471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.274484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.274506] Call Trace: [ 29.274522] <TASK> [ 29.274538] dump_stack_lvl+0x73/0xb0 [ 29.274567] print_report+0xd1/0x610 [ 29.274590] ? __virt_addr_valid+0x1db/0x2d0 [ 29.274613] ? kasan_atomics_helper+0x1f43/0x5450 [ 29.274634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.274661] ? kasan_atomics_helper+0x1f43/0x5450 [ 29.274683] kasan_report+0x141/0x180 [ 29.274705] ? kasan_atomics_helper+0x1f43/0x5450 [ 29.274732] kasan_check_range+0x10c/0x1c0 [ 29.274755] __kasan_check_write+0x18/0x20 [ 29.274779] kasan_atomics_helper+0x1f43/0x5450 [ 29.274802] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.274825] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.274850] ? kasan_atomics+0x152/0x310 [ 29.274877] kasan_atomics+0x1dc/0x310 [ 29.274899] ? __pfx_kasan_atomics+0x10/0x10 [ 29.274923] ? __pfx_read_tsc+0x10/0x10 [ 29.274944] ? ktime_get_ts64+0x86/0x230 [ 29.274968] kunit_try_run_case+0x1a5/0x480 [ 29.274992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.275015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.275040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.275063] ? __kthread_parkme+0x82/0x180 [ 29.275099] ? preempt_count_sub+0x50/0x80 [ 29.275123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.275147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.275170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.275193] kthread+0x337/0x6f0 [ 29.275213] ? trace_preempt_on+0x20/0xc0 [ 29.275236] ? __pfx_kthread+0x10/0x10 [ 29.275257] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.275290] ? calculate_sigpending+0x7b/0xa0 [ 29.275314] ? __pfx_kthread+0x10/0x10 [ 29.275335] ret_from_fork+0x116/0x1d0 [ 29.275354] ? __pfx_kthread+0x10/0x10 [ 29.275375] ret_from_fork_asm+0x1a/0x30 [ 29.275407] </TASK> [ 29.275418] [ 29.282358] Allocated by task 314: [ 29.282478] kasan_save_stack+0x45/0x70 [ 29.282640] kasan_save_track+0x18/0x40 [ 29.282827] kasan_save_alloc_info+0x3b/0x50 [ 29.283035] __kasan_kmalloc+0xb7/0xc0 [ 29.283227] __kmalloc_cache_noprof+0x189/0x420 [ 29.283446] kasan_atomics+0x95/0x310 [ 29.283635] kunit_try_run_case+0x1a5/0x480 [ 29.283838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.284094] kthread+0x337/0x6f0 [ 29.284255] ret_from_fork+0x116/0x1d0 [ 29.284435] ret_from_fork_asm+0x1a/0x30 [ 29.284583] [ 29.284646] The buggy address belongs to the object at ffff88810458d180 [ 29.284646] which belongs to the cache kmalloc-64 of size 64 [ 29.284989] The buggy address is located 0 bytes to the right of [ 29.284989] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.285656] [ 29.285759] The buggy address belongs to the physical page: [ 29.285927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.286168] flags: 0x200000000000000(node=0|zone=2) [ 29.286321] page_type: f5(slab) [ 29.286434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.286665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.286995] page dumped because: kasan: bad access detected [ 29.287252] [ 29.287339] Memory state around the buggy address: [ 29.287557] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.287874] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.288199] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.288562] ^ [ 29.288761] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.288972] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.289304] ================================================================== [ 28.165369] ================================================================== [ 28.165716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 28.166054] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.166622] [ 28.166732] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.166781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.166794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.166817] Call Trace: [ 28.166831] <TASK> [ 28.166847] dump_stack_lvl+0x73/0xb0 [ 28.166878] print_report+0xd1/0x610 [ 28.166900] ? __virt_addr_valid+0x1db/0x2d0 [ 28.166923] ? kasan_atomics_helper+0x4b54/0x5450 [ 28.166945] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.166971] ? kasan_atomics_helper+0x4b54/0x5450 [ 28.166993] kasan_report+0x141/0x180 [ 28.167016] ? kasan_atomics_helper+0x4b54/0x5450 [ 28.167043] __asan_report_load4_noabort+0x18/0x20 [ 28.167067] kasan_atomics_helper+0x4b54/0x5450 [ 28.167105] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.167127] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.167152] ? kasan_atomics+0x152/0x310 [ 28.167178] kasan_atomics+0x1dc/0x310 [ 28.167202] ? __pfx_kasan_atomics+0x10/0x10 [ 28.167308] ? __pfx_read_tsc+0x10/0x10 [ 28.167336] ? ktime_get_ts64+0x86/0x230 [ 28.167361] kunit_try_run_case+0x1a5/0x480 [ 28.167386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.167409] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.167433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.167457] ? __kthread_parkme+0x82/0x180 [ 28.167481] ? preempt_count_sub+0x50/0x80 [ 28.167505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.167529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.167552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.167576] kthread+0x337/0x6f0 [ 28.167596] ? trace_preempt_on+0x20/0xc0 [ 28.167619] ? __pfx_kthread+0x10/0x10 [ 28.167640] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.167661] ? calculate_sigpending+0x7b/0xa0 [ 28.167685] ? __pfx_kthread+0x10/0x10 [ 28.167707] ret_from_fork+0x116/0x1d0 [ 28.167727] ? __pfx_kthread+0x10/0x10 [ 28.167747] ret_from_fork_asm+0x1a/0x30 [ 28.167780] </TASK> [ 28.167792] [ 28.175440] Allocated by task 314: [ 28.175567] kasan_save_stack+0x45/0x70 [ 28.175759] kasan_save_track+0x18/0x40 [ 28.175945] kasan_save_alloc_info+0x3b/0x50 [ 28.176183] __kasan_kmalloc+0xb7/0xc0 [ 28.176475] __kmalloc_cache_noprof+0x189/0x420 [ 28.176726] kasan_atomics+0x95/0x310 [ 28.176921] kunit_try_run_case+0x1a5/0x480 [ 28.177120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.177469] kthread+0x337/0x6f0 [ 28.177629] ret_from_fork+0x116/0x1d0 [ 28.177811] ret_from_fork_asm+0x1a/0x30 [ 28.177999] [ 28.178096] The buggy address belongs to the object at ffff88810458d180 [ 28.178096] which belongs to the cache kmalloc-64 of size 64 [ 28.178793] The buggy address is located 0 bytes to the right of [ 28.178793] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.179385] [ 28.179459] The buggy address belongs to the physical page: [ 28.179626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.179959] flags: 0x200000000000000(node=0|zone=2) [ 28.180195] page_type: f5(slab) [ 28.180444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.180806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.181149] page dumped because: kasan: bad access detected [ 28.181455] [ 28.181571] Memory state around the buggy address: [ 28.181736] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.181971] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.182508] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.182821] ^ [ 28.183019] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.183418] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.183629] ================================================================== [ 28.184001] ================================================================== [ 28.184445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 28.184795] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.185124] [ 28.185319] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.185370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.185383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.185405] Call Trace: [ 28.185421] <TASK> [ 28.185437] dump_stack_lvl+0x73/0xb0 [ 28.185467] print_report+0xd1/0x610 [ 28.185491] ? __virt_addr_valid+0x1db/0x2d0 [ 28.185514] ? kasan_atomics_helper+0x4a0/0x5450 [ 28.185558] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.185586] ? kasan_atomics_helper+0x4a0/0x5450 [ 28.185608] kasan_report+0x141/0x180 [ 28.185631] ? kasan_atomics_helper+0x4a0/0x5450 [ 28.185658] kasan_check_range+0x10c/0x1c0 [ 28.185683] __kasan_check_write+0x18/0x20 [ 28.185707] kasan_atomics_helper+0x4a0/0x5450 [ 28.185730] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.185752] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.185778] ? kasan_atomics+0x152/0x310 [ 28.185805] kasan_atomics+0x1dc/0x310 [ 28.185828] ? __pfx_kasan_atomics+0x10/0x10 [ 28.185853] ? __pfx_read_tsc+0x10/0x10 [ 28.185874] ? ktime_get_ts64+0x86/0x230 [ 28.185899] kunit_try_run_case+0x1a5/0x480 [ 28.185928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.185952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.185976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.186000] ? __kthread_parkme+0x82/0x180 [ 28.186025] ? preempt_count_sub+0x50/0x80 [ 28.186048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.186073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.186108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.186132] kthread+0x337/0x6f0 [ 28.186152] ? trace_preempt_on+0x20/0xc0 [ 28.186175] ? __pfx_kthread+0x10/0x10 [ 28.186196] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.186219] ? calculate_sigpending+0x7b/0xa0 [ 28.186451] ? __pfx_kthread+0x10/0x10 [ 28.186474] ret_from_fork+0x116/0x1d0 [ 28.186495] ? __pfx_kthread+0x10/0x10 [ 28.186516] ret_from_fork_asm+0x1a/0x30 [ 28.186548] </TASK> [ 28.186559] [ 28.195488] Allocated by task 314: [ 28.195667] kasan_save_stack+0x45/0x70 [ 28.195820] kasan_save_track+0x18/0x40 [ 28.195949] kasan_save_alloc_info+0x3b/0x50 [ 28.196103] __kasan_kmalloc+0xb7/0xc0 [ 28.196375] __kmalloc_cache_noprof+0x189/0x420 [ 28.196625] kasan_atomics+0x95/0x310 [ 28.196827] kunit_try_run_case+0x1a5/0x480 [ 28.197045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.197391] kthread+0x337/0x6f0 [ 28.197562] ret_from_fork+0x116/0x1d0 [ 28.197738] ret_from_fork_asm+0x1a/0x30 [ 28.197949] [ 28.198032] The buggy address belongs to the object at ffff88810458d180 [ 28.198032] which belongs to the cache kmalloc-64 of size 64 [ 28.198654] The buggy address is located 0 bytes to the right of [ 28.198654] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.199200] [ 28.199320] The buggy address belongs to the physical page: [ 28.199528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.199964] flags: 0x200000000000000(node=0|zone=2) [ 28.200294] page_type: f5(slab) [ 28.200468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.200730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.201065] page dumped because: kasan: bad access detected [ 28.201344] [ 28.201414] Memory state around the buggy address: [ 28.201616] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.201967] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.202480] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.202791] ^ [ 28.203004] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.203409] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.203677] ================================================================== [ 28.269689] ================================================================== [ 28.270123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 28.270685] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.271041] [ 28.271134] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.271193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.271205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.271237] Call Trace: [ 28.271255] <TASK> [ 28.271271] dump_stack_lvl+0x73/0xb0 [ 28.271300] print_report+0xd1/0x610 [ 28.271322] ? __virt_addr_valid+0x1db/0x2d0 [ 28.271345] ? kasan_atomics_helper+0x697/0x5450 [ 28.271367] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.271393] ? kasan_atomics_helper+0x697/0x5450 [ 28.271415] kasan_report+0x141/0x180 [ 28.271438] ? kasan_atomics_helper+0x697/0x5450 [ 28.271535] kasan_check_range+0x10c/0x1c0 [ 28.271560] __kasan_check_write+0x18/0x20 [ 28.271595] kasan_atomics_helper+0x697/0x5450 [ 28.271618] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.271641] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.271685] ? kasan_atomics+0x152/0x310 [ 28.271712] kasan_atomics+0x1dc/0x310 [ 28.271735] ? __pfx_kasan_atomics+0x10/0x10 [ 28.271770] ? __pfx_read_tsc+0x10/0x10 [ 28.271792] ? ktime_get_ts64+0x86/0x230 [ 28.271816] kunit_try_run_case+0x1a5/0x480 [ 28.271840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.271863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.271887] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.271911] ? __kthread_parkme+0x82/0x180 [ 28.271945] ? preempt_count_sub+0x50/0x80 [ 28.271968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.271993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.272026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.272050] kthread+0x337/0x6f0 [ 28.272070] ? trace_preempt_on+0x20/0xc0 [ 28.272102] ? __pfx_kthread+0x10/0x10 [ 28.272132] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.272153] ? calculate_sigpending+0x7b/0xa0 [ 28.272178] ? __pfx_kthread+0x10/0x10 [ 28.272210] ret_from_fork+0x116/0x1d0 [ 28.272230] ? __pfx_kthread+0x10/0x10 [ 28.272261] ret_from_fork_asm+0x1a/0x30 [ 28.272303] </TASK> [ 28.272314] [ 28.280585] Allocated by task 314: [ 28.280750] kasan_save_stack+0x45/0x70 [ 28.281071] kasan_save_track+0x18/0x40 [ 28.281393] kasan_save_alloc_info+0x3b/0x50 [ 28.281624] __kasan_kmalloc+0xb7/0xc0 [ 28.281823] __kmalloc_cache_noprof+0x189/0x420 [ 28.281983] kasan_atomics+0x95/0x310 [ 28.282120] kunit_try_run_case+0x1a5/0x480 [ 28.282332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.282584] kthread+0x337/0x6f0 [ 28.282746] ret_from_fork+0x116/0x1d0 [ 28.282928] ret_from_fork_asm+0x1a/0x30 [ 28.283132] [ 28.283223] The buggy address belongs to the object at ffff88810458d180 [ 28.283223] which belongs to the cache kmalloc-64 of size 64 [ 28.283953] The buggy address is located 0 bytes to the right of [ 28.283953] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.284779] [ 28.284854] The buggy address belongs to the physical page: [ 28.285020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.285455] flags: 0x200000000000000(node=0|zone=2) [ 28.285876] page_type: f5(slab) [ 28.286068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.286421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.286756] page dumped because: kasan: bad access detected [ 28.287102] [ 28.287180] Memory state around the buggy address: [ 28.287385] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.287913] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.288146] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.288541] ^ [ 28.288765] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.289396] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.289717] ================================================================== [ 28.093998] ================================================================== [ 28.094389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 28.094617] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.094887] [ 28.094983] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.095031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.095042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.095062] Call Trace: [ 28.095084] <TASK> [ 28.095099] dump_stack_lvl+0x73/0xb0 [ 28.095125] print_report+0xd1/0x610 [ 28.095145] ? __virt_addr_valid+0x1db/0x2d0 [ 28.095168] ? kasan_atomics_helper+0x4b88/0x5450 [ 28.095188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.095213] ? kasan_atomics_helper+0x4b88/0x5450 [ 28.095234] kasan_report+0x141/0x180 [ 28.095257] ? kasan_atomics_helper+0x4b88/0x5450 [ 28.095283] __asan_report_load4_noabort+0x18/0x20 [ 28.095306] kasan_atomics_helper+0x4b88/0x5450 [ 28.095328] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.095349] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.095372] ? kasan_atomics+0x152/0x310 [ 28.095397] kasan_atomics+0x1dc/0x310 [ 28.095418] ? __pfx_kasan_atomics+0x10/0x10 [ 28.095442] ? __pfx_read_tsc+0x10/0x10 [ 28.095463] ? ktime_get_ts64+0x86/0x230 [ 28.095486] kunit_try_run_case+0x1a5/0x480 [ 28.095525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.095560] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.095593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.095616] ? __kthread_parkme+0x82/0x180 [ 28.095639] ? preempt_count_sub+0x50/0x80 [ 28.095661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.095684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.095707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.095730] kthread+0x337/0x6f0 [ 28.095752] ? trace_preempt_on+0x20/0xc0 [ 28.095775] ? __pfx_kthread+0x10/0x10 [ 28.095797] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.095819] ? calculate_sigpending+0x7b/0xa0 [ 28.095853] ? __pfx_kthread+0x10/0x10 [ 28.095875] ret_from_fork+0x116/0x1d0 [ 28.095894] ? __pfx_kthread+0x10/0x10 [ 28.095926] ret_from_fork_asm+0x1a/0x30 [ 28.095957] </TASK> [ 28.095969] [ 28.104137] Allocated by task 314: [ 28.104414] kasan_save_stack+0x45/0x70 [ 28.104629] kasan_save_track+0x18/0x40 [ 28.104760] kasan_save_alloc_info+0x3b/0x50 [ 28.104902] __kasan_kmalloc+0xb7/0xc0 [ 28.105028] __kmalloc_cache_noprof+0x189/0x420 [ 28.105236] kasan_atomics+0x95/0x310 [ 28.105416] kunit_try_run_case+0x1a5/0x480 [ 28.105614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.105884] kthread+0x337/0x6f0 [ 28.106180] ret_from_fork+0x116/0x1d0 [ 28.106434] ret_from_fork_asm+0x1a/0x30 [ 28.106573] [ 28.106637] The buggy address belongs to the object at ffff88810458d180 [ 28.106637] which belongs to the cache kmalloc-64 of size 64 [ 28.107117] The buggy address is located 0 bytes to the right of [ 28.107117] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.108033] [ 28.108146] The buggy address belongs to the physical page: [ 28.108502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.108839] flags: 0x200000000000000(node=0|zone=2) [ 28.109071] page_type: f5(slab) [ 28.109227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.109660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.109987] page dumped because: kasan: bad access detected [ 28.110203] [ 28.110377] Memory state around the buggy address: [ 28.110676] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.110987] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.111476] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.111783] ^ [ 28.112023] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.112402] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.112752] ================================================================== [ 28.585410] ================================================================== [ 28.585725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 28.586029] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.586585] [ 28.586933] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.586988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.587001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.587022] Call Trace: [ 28.587038] <TASK> [ 28.587052] dump_stack_lvl+0x73/0xb0 [ 28.587094] print_report+0xd1/0x610 [ 28.587117] ? __virt_addr_valid+0x1db/0x2d0 [ 28.587140] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.587161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.587188] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.587210] kasan_report+0x141/0x180 [ 28.587233] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.587259] kasan_check_range+0x10c/0x1c0 [ 28.587657] __kasan_check_write+0x18/0x20 [ 28.587702] kasan_atomics_helper+0xfa9/0x5450 [ 28.587727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.587750] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.587775] ? kasan_atomics+0x152/0x310 [ 28.587842] kasan_atomics+0x1dc/0x310 [ 28.587865] ? __pfx_kasan_atomics+0x10/0x10 [ 28.587889] ? __pfx_read_tsc+0x10/0x10 [ 28.587911] ? ktime_get_ts64+0x86/0x230 [ 28.587935] kunit_try_run_case+0x1a5/0x480 [ 28.587961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.587983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.588007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.588031] ? __kthread_parkme+0x82/0x180 [ 28.588056] ? preempt_count_sub+0x50/0x80 [ 28.588090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.588114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.588139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.588162] kthread+0x337/0x6f0 [ 28.588183] ? trace_preempt_on+0x20/0xc0 [ 28.588206] ? __pfx_kthread+0x10/0x10 [ 28.588227] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.588249] ? calculate_sigpending+0x7b/0xa0 [ 28.588273] ? __pfx_kthread+0x10/0x10 [ 28.588296] ret_from_fork+0x116/0x1d0 [ 28.588316] ? __pfx_kthread+0x10/0x10 [ 28.588337] ret_from_fork_asm+0x1a/0x30 [ 28.588369] </TASK> [ 28.588380] [ 28.599214] Allocated by task 314: [ 28.599712] kasan_save_stack+0x45/0x70 [ 28.600166] kasan_save_track+0x18/0x40 [ 28.600404] kasan_save_alloc_info+0x3b/0x50 [ 28.600605] __kasan_kmalloc+0xb7/0xc0 [ 28.600772] __kmalloc_cache_noprof+0x189/0x420 [ 28.600965] kasan_atomics+0x95/0x310 [ 28.601148] kunit_try_run_case+0x1a5/0x480 [ 28.601685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.602011] kthread+0x337/0x6f0 [ 28.602322] ret_from_fork+0x116/0x1d0 [ 28.602709] ret_from_fork_asm+0x1a/0x30 [ 28.602902] [ 28.602991] The buggy address belongs to the object at ffff88810458d180 [ 28.602991] which belongs to the cache kmalloc-64 of size 64 [ 28.603755] The buggy address is located 0 bytes to the right of [ 28.603755] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.604682] [ 28.604776] The buggy address belongs to the physical page: [ 28.604996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.605525] flags: 0x200000000000000(node=0|zone=2) [ 28.605950] page_type: f5(slab) [ 28.606270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.606896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.607242] page dumped because: kasan: bad access detected [ 28.607845] [ 28.607949] Memory state around the buggy address: [ 28.608167] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.608928] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.609339] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.609631] ^ [ 28.609830] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.610123] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.610553] ================================================================== [ 28.222039] ================================================================== [ 28.222539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 28.222822] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.223134] [ 28.223248] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.223311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.223324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.223346] Call Trace: [ 28.223360] <TASK> [ 28.223374] dump_stack_lvl+0x73/0xb0 [ 28.223401] print_report+0xd1/0x610 [ 28.223424] ? __virt_addr_valid+0x1db/0x2d0 [ 28.223447] ? kasan_atomics_helper+0x565/0x5450 [ 28.223468] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.223494] ? kasan_atomics_helper+0x565/0x5450 [ 28.223516] kasan_report+0x141/0x180 [ 28.223539] ? kasan_atomics_helper+0x565/0x5450 [ 28.223566] kasan_check_range+0x10c/0x1c0 [ 28.223590] __kasan_check_write+0x18/0x20 [ 28.223613] kasan_atomics_helper+0x565/0x5450 [ 28.223636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.223659] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.223683] ? kasan_atomics+0x152/0x310 [ 28.223710] kasan_atomics+0x1dc/0x310 [ 28.223733] ? __pfx_kasan_atomics+0x10/0x10 [ 28.223757] ? __pfx_read_tsc+0x10/0x10 [ 28.223778] ? ktime_get_ts64+0x86/0x230 [ 28.223802] kunit_try_run_case+0x1a5/0x480 [ 28.223826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.223849] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.223872] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.223896] ? __kthread_parkme+0x82/0x180 [ 28.223920] ? preempt_count_sub+0x50/0x80 [ 28.223943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.223967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.223991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.224015] kthread+0x337/0x6f0 [ 28.224035] ? trace_preempt_on+0x20/0xc0 [ 28.224058] ? __pfx_kthread+0x10/0x10 [ 28.224153] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.224183] ? calculate_sigpending+0x7b/0xa0 [ 28.224207] ? __pfx_kthread+0x10/0x10 [ 28.224289] ret_from_fork+0x116/0x1d0 [ 28.224315] ? __pfx_kthread+0x10/0x10 [ 28.224337] ret_from_fork_asm+0x1a/0x30 [ 28.224369] </TASK> [ 28.224380] [ 28.231842] Allocated by task 314: [ 28.232016] kasan_save_stack+0x45/0x70 [ 28.232296] kasan_save_track+0x18/0x40 [ 28.232498] kasan_save_alloc_info+0x3b/0x50 [ 28.232649] __kasan_kmalloc+0xb7/0xc0 [ 28.232776] __kmalloc_cache_noprof+0x189/0x420 [ 28.232924] kasan_atomics+0x95/0x310 [ 28.233051] kunit_try_run_case+0x1a5/0x480 [ 28.233338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.233552] kthread+0x337/0x6f0 [ 28.233698] ret_from_fork+0x116/0x1d0 [ 28.233878] ret_from_fork_asm+0x1a/0x30 [ 28.234046] [ 28.234146] The buggy address belongs to the object at ffff88810458d180 [ 28.234146] which belongs to the cache kmalloc-64 of size 64 [ 28.234783] The buggy address is located 0 bytes to the right of [ 28.234783] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.235397] [ 28.235485] The buggy address belongs to the physical page: [ 28.235690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.235924] flags: 0x200000000000000(node=0|zone=2) [ 28.236099] page_type: f5(slab) [ 28.236267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.236572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.236880] page dumped because: kasan: bad access detected [ 28.237115] [ 28.237197] Memory state around the buggy address: [ 28.237392] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.237677] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.237960] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.239013] ^ [ 28.239205] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.240041] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.241011] ================================================================== [ 28.420532] ================================================================== [ 28.420832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 28.421401] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.421785] [ 28.422178] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.422230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.422244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.422266] Call Trace: [ 28.422283] <TASK> [ 28.422298] dump_stack_lvl+0x73/0xb0 [ 28.422327] print_report+0xd1/0x610 [ 28.422350] ? __virt_addr_valid+0x1db/0x2d0 [ 28.422373] ? kasan_atomics_helper+0xac7/0x5450 [ 28.422395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.422421] ? kasan_atomics_helper+0xac7/0x5450 [ 28.422442] kasan_report+0x141/0x180 [ 28.422465] ? kasan_atomics_helper+0xac7/0x5450 [ 28.422491] kasan_check_range+0x10c/0x1c0 [ 28.422515] __kasan_check_write+0x18/0x20 [ 28.422539] kasan_atomics_helper+0xac7/0x5450 [ 28.422562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.422585] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.422611] ? kasan_atomics+0x152/0x310 [ 28.422637] kasan_atomics+0x1dc/0x310 [ 28.422660] ? __pfx_kasan_atomics+0x10/0x10 [ 28.422684] ? __pfx_read_tsc+0x10/0x10 [ 28.422706] ? ktime_get_ts64+0x86/0x230 [ 28.422730] kunit_try_run_case+0x1a5/0x480 [ 28.422755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.422777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.422802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.422826] ? __kthread_parkme+0x82/0x180 [ 28.422850] ? preempt_count_sub+0x50/0x80 [ 28.422874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.422899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.422922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.422946] kthread+0x337/0x6f0 [ 28.422966] ? trace_preempt_on+0x20/0xc0 [ 28.422989] ? __pfx_kthread+0x10/0x10 [ 28.423010] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.423032] ? calculate_sigpending+0x7b/0xa0 [ 28.423055] ? __pfx_kthread+0x10/0x10 [ 28.423089] ret_from_fork+0x116/0x1d0 [ 28.423109] ? __pfx_kthread+0x10/0x10 [ 28.423130] ret_from_fork_asm+0x1a/0x30 [ 28.423162] </TASK> [ 28.423174] [ 28.430747] Allocated by task 314: [ 28.430920] kasan_save_stack+0x45/0x70 [ 28.431143] kasan_save_track+0x18/0x40 [ 28.431270] kasan_save_alloc_info+0x3b/0x50 [ 28.431489] __kasan_kmalloc+0xb7/0xc0 [ 28.431685] __kmalloc_cache_noprof+0x189/0x420 [ 28.431901] kasan_atomics+0x95/0x310 [ 28.432095] kunit_try_run_case+0x1a5/0x480 [ 28.432268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.432556] kthread+0x337/0x6f0 [ 28.432714] ret_from_fork+0x116/0x1d0 [ 28.432933] ret_from_fork_asm+0x1a/0x30 [ 28.433218] [ 28.433333] The buggy address belongs to the object at ffff88810458d180 [ 28.433333] which belongs to the cache kmalloc-64 of size 64 [ 28.433708] The buggy address is located 0 bytes to the right of [ 28.433708] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.434251] [ 28.434361] The buggy address belongs to the physical page: [ 28.434663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.434978] flags: 0x200000000000000(node=0|zone=2) [ 28.435256] page_type: f5(slab) [ 28.435439] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.435800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.436130] page dumped because: kasan: bad access detected [ 28.436368] [ 28.436455] Memory state around the buggy address: [ 28.436703] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.437008] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.437255] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.437553] ^ [ 28.437695] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.437898] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.438138] ================================================================== [ 28.438999] ================================================================== [ 28.439469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 28.439750] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.440018] [ 28.440150] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.440198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.440211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.440249] Call Trace: [ 28.440266] <TASK> [ 28.440292] dump_stack_lvl+0x73/0xb0 [ 28.440321] print_report+0xd1/0x610 [ 28.440364] ? __virt_addr_valid+0x1db/0x2d0 [ 28.440387] ? kasan_atomics_helper+0xb6a/0x5450 [ 28.440408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.440434] ? kasan_atomics_helper+0xb6a/0x5450 [ 28.440456] kasan_report+0x141/0x180 [ 28.440478] ? kasan_atomics_helper+0xb6a/0x5450 [ 28.440521] kasan_check_range+0x10c/0x1c0 [ 28.440546] __kasan_check_write+0x18/0x20 [ 28.440571] kasan_atomics_helper+0xb6a/0x5450 [ 28.440595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.440617] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.440642] ? kasan_atomics+0x152/0x310 [ 28.440686] kasan_atomics+0x1dc/0x310 [ 28.440709] ? __pfx_kasan_atomics+0x10/0x10 [ 28.440734] ? __pfx_read_tsc+0x10/0x10 [ 28.440756] ? ktime_get_ts64+0x86/0x230 [ 28.440780] kunit_try_run_case+0x1a5/0x480 [ 28.440804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.440843] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.440868] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.440892] ? __kthread_parkme+0x82/0x180 [ 28.440916] ? preempt_count_sub+0x50/0x80 [ 28.440939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.440963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.440987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.441011] kthread+0x337/0x6f0 [ 28.441031] ? trace_preempt_on+0x20/0xc0 [ 28.441053] ? __pfx_kthread+0x10/0x10 [ 28.441073] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.441106] ? calculate_sigpending+0x7b/0xa0 [ 28.441129] ? __pfx_kthread+0x10/0x10 [ 28.441150] ret_from_fork+0x116/0x1d0 [ 28.441170] ? __pfx_kthread+0x10/0x10 [ 28.441191] ret_from_fork_asm+0x1a/0x30 [ 28.441241] </TASK> [ 28.441252] [ 28.449151] Allocated by task 314: [ 28.449269] kasan_save_stack+0x45/0x70 [ 28.449470] kasan_save_track+0x18/0x40 [ 28.449656] kasan_save_alloc_info+0x3b/0x50 [ 28.449881] __kasan_kmalloc+0xb7/0xc0 [ 28.450102] __kmalloc_cache_noprof+0x189/0x420 [ 28.450322] kasan_atomics+0x95/0x310 [ 28.450501] kunit_try_run_case+0x1a5/0x480 [ 28.450658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.450818] kthread+0x337/0x6f0 [ 28.450929] ret_from_fork+0x116/0x1d0 [ 28.451101] ret_from_fork_asm+0x1a/0x30 [ 28.451364] [ 28.451452] The buggy address belongs to the object at ffff88810458d180 [ 28.451452] which belongs to the cache kmalloc-64 of size 64 [ 28.451993] The buggy address is located 0 bytes to the right of [ 28.451993] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.452511] [ 28.452601] The buggy address belongs to the physical page: [ 28.452846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.453175] flags: 0x200000000000000(node=0|zone=2) [ 28.453415] page_type: f5(slab) [ 28.453626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.454012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.454381] page dumped because: kasan: bad access detected [ 28.454624] [ 28.454712] Memory state around the buggy address: [ 28.454934] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.455585] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.455846] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.456043] ^ [ 28.456196] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.456731] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.457035] ================================================================== [ 29.075967] ================================================================== [ 29.076761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 29.077101] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.077815] [ 29.078459] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.078513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.078525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.078547] Call Trace: [ 29.078708] <TASK> [ 29.078733] dump_stack_lvl+0x73/0xb0 [ 29.078817] print_report+0xd1/0x610 [ 29.078842] ? __virt_addr_valid+0x1db/0x2d0 [ 29.078880] ? kasan_atomics_helper+0x1a7f/0x5450 [ 29.078901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.078929] ? kasan_atomics_helper+0x1a7f/0x5450 [ 29.078963] kasan_report+0x141/0x180 [ 29.078986] ? kasan_atomics_helper+0x1a7f/0x5450 [ 29.079013] kasan_check_range+0x10c/0x1c0 [ 29.079047] __kasan_check_write+0x18/0x20 [ 29.079070] kasan_atomics_helper+0x1a7f/0x5450 [ 29.079109] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.079131] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.079157] ? kasan_atomics+0x152/0x310 [ 29.079194] kasan_atomics+0x1dc/0x310 [ 29.079217] ? __pfx_kasan_atomics+0x10/0x10 [ 29.079254] ? __pfx_read_tsc+0x10/0x10 [ 29.079276] ? ktime_get_ts64+0x86/0x230 [ 29.079302] kunit_try_run_case+0x1a5/0x480 [ 29.079336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.079359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.079383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.079418] ? __kthread_parkme+0x82/0x180 [ 29.079442] ? preempt_count_sub+0x50/0x80 [ 29.079466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.079501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.079524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.079548] kthread+0x337/0x6f0 [ 29.079579] ? trace_preempt_on+0x20/0xc0 [ 29.079602] ? __pfx_kthread+0x10/0x10 [ 29.079623] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.079658] ? calculate_sigpending+0x7b/0xa0 [ 29.079681] ? __pfx_kthread+0x10/0x10 [ 29.079703] ret_from_fork+0x116/0x1d0 [ 29.079755] ? __pfx_kthread+0x10/0x10 [ 29.079776] ret_from_fork_asm+0x1a/0x30 [ 29.079819] </TASK> [ 29.079831] [ 29.092820] Allocated by task 314: [ 29.093164] kasan_save_stack+0x45/0x70 [ 29.093692] kasan_save_track+0x18/0x40 [ 29.093953] kasan_save_alloc_info+0x3b/0x50 [ 29.094534] __kasan_kmalloc+0xb7/0xc0 [ 29.094933] __kmalloc_cache_noprof+0x189/0x420 [ 29.095602] kasan_atomics+0x95/0x310 [ 29.095874] kunit_try_run_case+0x1a5/0x480 [ 29.096328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.096577] kthread+0x337/0x6f0 [ 29.096727] ret_from_fork+0x116/0x1d0 [ 29.096896] ret_from_fork_asm+0x1a/0x30 [ 29.097071] [ 29.097165] The buggy address belongs to the object at ffff88810458d180 [ 29.097165] which belongs to the cache kmalloc-64 of size 64 [ 29.098474] The buggy address is located 0 bytes to the right of [ 29.098474] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.099488] [ 29.099582] The buggy address belongs to the physical page: [ 29.099756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.099996] flags: 0x200000000000000(node=0|zone=2) [ 29.100468] page_type: f5(slab) [ 29.100882] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.101128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.101584] page dumped because: kasan: bad access detected [ 29.102053] [ 29.102214] Memory state around the buggy address: [ 29.102637] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.103173] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.103667] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.104050] ^ [ 29.104216] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.104823] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.105440] ================================================================== [ 29.391220] ================================================================== [ 29.392017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 29.392628] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.392937] [ 29.393036] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.393098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.393111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.393133] Call Trace: [ 29.393148] <TASK> [ 29.393165] dump_stack_lvl+0x73/0xb0 [ 29.393194] print_report+0xd1/0x610 [ 29.393217] ? __virt_addr_valid+0x1db/0x2d0 [ 29.393241] ? kasan_atomics_helper+0x218a/0x5450 [ 29.393262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.393290] ? kasan_atomics_helper+0x218a/0x5450 [ 29.393312] kasan_report+0x141/0x180 [ 29.393335] ? kasan_atomics_helper+0x218a/0x5450 [ 29.393361] kasan_check_range+0x10c/0x1c0 [ 29.393386] __kasan_check_write+0x18/0x20 [ 29.393432] kasan_atomics_helper+0x218a/0x5450 [ 29.393455] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.393491] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.393515] ? kasan_atomics+0x152/0x310 [ 29.393555] kasan_atomics+0x1dc/0x310 [ 29.393578] ? __pfx_kasan_atomics+0x10/0x10 [ 29.393604] ? __pfx_read_tsc+0x10/0x10 [ 29.393625] ? ktime_get_ts64+0x86/0x230 [ 29.393650] kunit_try_run_case+0x1a5/0x480 [ 29.393674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.393696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.393720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.393744] ? __kthread_parkme+0x82/0x180 [ 29.393768] ? preempt_count_sub+0x50/0x80 [ 29.393792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.393815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.393839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.393863] kthread+0x337/0x6f0 [ 29.393882] ? trace_preempt_on+0x20/0xc0 [ 29.393906] ? __pfx_kthread+0x10/0x10 [ 29.393934] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.393956] ? calculate_sigpending+0x7b/0xa0 [ 29.393980] ? __pfx_kthread+0x10/0x10 [ 29.394002] ret_from_fork+0x116/0x1d0 [ 29.394021] ? __pfx_kthread+0x10/0x10 [ 29.394042] ret_from_fork_asm+0x1a/0x30 [ 29.394074] </TASK> [ 29.394095] [ 29.401622] Allocated by task 314: [ 29.401764] kasan_save_stack+0x45/0x70 [ 29.401894] kasan_save_track+0x18/0x40 [ 29.402021] kasan_save_alloc_info+0x3b/0x50 [ 29.402169] __kasan_kmalloc+0xb7/0xc0 [ 29.402425] __kmalloc_cache_noprof+0x189/0x420 [ 29.402641] kasan_atomics+0x95/0x310 [ 29.402835] kunit_try_run_case+0x1a5/0x480 [ 29.403037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.403355] kthread+0x337/0x6f0 [ 29.403541] ret_from_fork+0x116/0x1d0 [ 29.403732] ret_from_fork_asm+0x1a/0x30 [ 29.403911] [ 29.404014] The buggy address belongs to the object at ffff88810458d180 [ 29.404014] which belongs to the cache kmalloc-64 of size 64 [ 29.404523] The buggy address is located 0 bytes to the right of [ 29.404523] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.405088] [ 29.405183] The buggy address belongs to the physical page: [ 29.405445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.405729] flags: 0x200000000000000(node=0|zone=2) [ 29.405978] page_type: f5(slab) [ 29.406149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.406511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.406749] page dumped because: kasan: bad access detected [ 29.406994] [ 29.407115] Memory state around the buggy address: [ 29.407346] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.407587] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.407893] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.408169] ^ [ 29.408495] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.408807] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.409149] ================================================================== [ 28.500821] ================================================================== [ 28.501662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 28.502313] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.503035] [ 28.503237] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.503294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.503306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.503328] Call Trace: [ 28.503344] <TASK> [ 28.503359] dump_stack_lvl+0x73/0xb0 [ 28.503401] print_report+0xd1/0x610 [ 28.503423] ? __virt_addr_valid+0x1db/0x2d0 [ 28.503447] ? kasan_atomics_helper+0xd47/0x5450 [ 28.503479] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.503506] ? kasan_atomics_helper+0xd47/0x5450 [ 28.503527] kasan_report+0x141/0x180 [ 28.503550] ? kasan_atomics_helper+0xd47/0x5450 [ 28.503577] kasan_check_range+0x10c/0x1c0 [ 28.503601] __kasan_check_write+0x18/0x20 [ 28.503624] kasan_atomics_helper+0xd47/0x5450 [ 28.503647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.503669] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.503695] ? kasan_atomics+0x152/0x310 [ 28.503721] kasan_atomics+0x1dc/0x310 [ 28.503744] ? __pfx_kasan_atomics+0x10/0x10 [ 28.503769] ? __pfx_read_tsc+0x10/0x10 [ 28.503790] ? ktime_get_ts64+0x86/0x230 [ 28.503814] kunit_try_run_case+0x1a5/0x480 [ 28.503839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.503861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.503885] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.503909] ? __kthread_parkme+0x82/0x180 [ 28.503932] ? preempt_count_sub+0x50/0x80 [ 28.503955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.503979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.504003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.504026] kthread+0x337/0x6f0 [ 28.504046] ? trace_preempt_on+0x20/0xc0 [ 28.504069] ? __pfx_kthread+0x10/0x10 [ 28.504100] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.504122] ? calculate_sigpending+0x7b/0xa0 [ 28.504147] ? __pfx_kthread+0x10/0x10 [ 28.504169] ret_from_fork+0x116/0x1d0 [ 28.504189] ? __pfx_kthread+0x10/0x10 [ 28.504210] ret_from_fork_asm+0x1a/0x30 [ 28.504242] </TASK> [ 28.504253] [ 28.516398] Allocated by task 314: [ 28.516826] kasan_save_stack+0x45/0x70 [ 28.517193] kasan_save_track+0x18/0x40 [ 28.517571] kasan_save_alloc_info+0x3b/0x50 [ 28.517969] __kasan_kmalloc+0xb7/0xc0 [ 28.518323] __kmalloc_cache_noprof+0x189/0x420 [ 28.518813] kasan_atomics+0x95/0x310 [ 28.519168] kunit_try_run_case+0x1a5/0x480 [ 28.519589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.519988] kthread+0x337/0x6f0 [ 28.520114] ret_from_fork+0x116/0x1d0 [ 28.520241] ret_from_fork_asm+0x1a/0x30 [ 28.520435] [ 28.520602] The buggy address belongs to the object at ffff88810458d180 [ 28.520602] which belongs to the cache kmalloc-64 of size 64 [ 28.521662] The buggy address is located 0 bytes to the right of [ 28.521662] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.522757] [ 28.522930] The buggy address belongs to the physical page: [ 28.523427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.523758] flags: 0x200000000000000(node=0|zone=2) [ 28.523917] page_type: f5(slab) [ 28.524033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.524364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.524660] page dumped because: kasan: bad access detected [ 28.524870] [ 28.524958] Memory state around the buggy address: [ 28.525176] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.525510] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.525798] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.526073] ^ [ 28.526278] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.526584] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.526817] ================================================================== [ 29.056630] ================================================================== [ 29.057049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 29.057516] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.057739] [ 29.057814] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.057860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.057873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.057894] Call Trace: [ 29.057907] <TASK> [ 29.057929] dump_stack_lvl+0x73/0xb0 [ 29.057957] print_report+0xd1/0x610 [ 29.057979] ? __virt_addr_valid+0x1db/0x2d0 [ 29.058002] ? kasan_atomics_helper+0x19e3/0x5450 [ 29.058063] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.058104] ? kasan_atomics_helper+0x19e3/0x5450 [ 29.058125] kasan_report+0x141/0x180 [ 29.058148] ? kasan_atomics_helper+0x19e3/0x5450 [ 29.058175] kasan_check_range+0x10c/0x1c0 [ 29.058199] __kasan_check_write+0x18/0x20 [ 29.058222] kasan_atomics_helper+0x19e3/0x5450 [ 29.058245] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.058267] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.058305] ? kasan_atomics+0x152/0x310 [ 29.058332] kasan_atomics+0x1dc/0x310 [ 29.058354] ? __pfx_kasan_atomics+0x10/0x10 [ 29.058378] ? __pfx_read_tsc+0x10/0x10 [ 29.058399] ? ktime_get_ts64+0x86/0x230 [ 29.058424] kunit_try_run_case+0x1a5/0x480 [ 29.058447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.058469] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.058493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.058516] ? __kthread_parkme+0x82/0x180 [ 29.058539] ? preempt_count_sub+0x50/0x80 [ 29.058562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.058586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.058609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.058633] kthread+0x337/0x6f0 [ 29.058652] ? trace_preempt_on+0x20/0xc0 [ 29.058676] ? __pfx_kthread+0x10/0x10 [ 29.058696] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.058718] ? calculate_sigpending+0x7b/0xa0 [ 29.058741] ? __pfx_kthread+0x10/0x10 [ 29.058764] ret_from_fork+0x116/0x1d0 [ 29.058783] ? __pfx_kthread+0x10/0x10 [ 29.058803] ret_from_fork_asm+0x1a/0x30 [ 29.058836] </TASK> [ 29.058846] [ 29.066958] Allocated by task 314: [ 29.067205] kasan_save_stack+0x45/0x70 [ 29.067631] kasan_save_track+0x18/0x40 [ 29.067851] kasan_save_alloc_info+0x3b/0x50 [ 29.068020] __kasan_kmalloc+0xb7/0xc0 [ 29.068192] __kmalloc_cache_noprof+0x189/0x420 [ 29.068522] kasan_atomics+0x95/0x310 [ 29.068703] kunit_try_run_case+0x1a5/0x480 [ 29.068893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.069162] kthread+0x337/0x6f0 [ 29.069278] ret_from_fork+0x116/0x1d0 [ 29.069415] ret_from_fork_asm+0x1a/0x30 [ 29.069712] [ 29.069832] The buggy address belongs to the object at ffff88810458d180 [ 29.069832] which belongs to the cache kmalloc-64 of size 64 [ 29.070349] The buggy address is located 0 bytes to the right of [ 29.070349] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.070927] [ 29.071012] The buggy address belongs to the physical page: [ 29.071260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.071614] flags: 0x200000000000000(node=0|zone=2) [ 29.071836] page_type: f5(slab) [ 29.071971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.072342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.072698] page dumped because: kasan: bad access detected [ 29.072946] [ 29.073034] Memory state around the buggy address: [ 29.073279] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.073690] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.074025] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.074312] ^ [ 29.074592] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.074799] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.075002] ================================================================== [ 29.166915] ================================================================== [ 29.167576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 29.168469] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.169478] [ 29.169836] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.169888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.169901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.169929] Call Trace: [ 29.169944] <TASK> [ 29.169961] dump_stack_lvl+0x73/0xb0 [ 29.169991] print_report+0xd1/0x610 [ 29.170013] ? __virt_addr_valid+0x1db/0x2d0 [ 29.170035] ? kasan_atomics_helper+0x1ce1/0x5450 [ 29.170056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.170148] ? kasan_atomics_helper+0x1ce1/0x5450 [ 29.170172] kasan_report+0x141/0x180 [ 29.170195] ? kasan_atomics_helper+0x1ce1/0x5450 [ 29.170221] kasan_check_range+0x10c/0x1c0 [ 29.170245] __kasan_check_write+0x18/0x20 [ 29.170298] kasan_atomics_helper+0x1ce1/0x5450 [ 29.170321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.170344] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.170369] ? kasan_atomics+0x152/0x310 [ 29.170396] kasan_atomics+0x1dc/0x310 [ 29.170418] ? __pfx_kasan_atomics+0x10/0x10 [ 29.170443] ? __pfx_read_tsc+0x10/0x10 [ 29.170463] ? ktime_get_ts64+0x86/0x230 [ 29.170488] kunit_try_run_case+0x1a5/0x480 [ 29.170512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.170534] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.170557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.170581] ? __kthread_parkme+0x82/0x180 [ 29.170605] ? preempt_count_sub+0x50/0x80 [ 29.170628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.170652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.170675] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.170699] kthread+0x337/0x6f0 [ 29.170718] ? trace_preempt_on+0x20/0xc0 [ 29.170741] ? __pfx_kthread+0x10/0x10 [ 29.170761] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.170783] ? calculate_sigpending+0x7b/0xa0 [ 29.170807] ? __pfx_kthread+0x10/0x10 [ 29.170829] ret_from_fork+0x116/0x1d0 [ 29.170848] ? __pfx_kthread+0x10/0x10 [ 29.170944] ret_from_fork_asm+0x1a/0x30 [ 29.170989] </TASK> [ 29.171001] [ 29.184028] Allocated by task 314: [ 29.184339] kasan_save_stack+0x45/0x70 [ 29.184482] kasan_save_track+0x18/0x40 [ 29.184612] kasan_save_alloc_info+0x3b/0x50 [ 29.184755] __kasan_kmalloc+0xb7/0xc0 [ 29.184880] __kmalloc_cache_noprof+0x189/0x420 [ 29.185028] kasan_atomics+0x95/0x310 [ 29.185428] kunit_try_run_case+0x1a5/0x480 [ 29.185818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.186348] kthread+0x337/0x6f0 [ 29.186660] ret_from_fork+0x116/0x1d0 [ 29.187041] ret_from_fork_asm+0x1a/0x30 [ 29.187447] [ 29.187624] The buggy address belongs to the object at ffff88810458d180 [ 29.187624] which belongs to the cache kmalloc-64 of size 64 [ 29.188714] The buggy address is located 0 bytes to the right of [ 29.188714] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.189580] [ 29.189650] The buggy address belongs to the physical page: [ 29.189815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.190065] flags: 0x200000000000000(node=0|zone=2) [ 29.190587] page_type: f5(slab) [ 29.190917] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.191592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.192252] page dumped because: kasan: bad access detected [ 29.192758] [ 29.192907] Memory state around the buggy address: [ 29.193193] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.193757] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.194185] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.194725] ^ [ 29.195171] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.195539] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.195750] ================================================================== [ 28.475506] ================================================================== [ 28.475763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 28.476212] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.476530] [ 28.476604] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.476648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.476660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.476681] Call Trace: [ 28.476712] <TASK> [ 28.476725] dump_stack_lvl+0x73/0xb0 [ 28.476767] print_report+0xd1/0x610 [ 28.476789] ? __virt_addr_valid+0x1db/0x2d0 [ 28.476825] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.476846] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.476873] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.476895] kasan_report+0x141/0x180 [ 28.476917] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.476959] __asan_report_load4_noabort+0x18/0x20 [ 28.476984] kasan_atomics_helper+0x4a84/0x5450 [ 28.477034] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.477071] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.477120] ? kasan_atomics+0x152/0x310 [ 28.477159] kasan_atomics+0x1dc/0x310 [ 28.477195] ? __pfx_kasan_atomics+0x10/0x10 [ 28.477245] ? __pfx_read_tsc+0x10/0x10 [ 28.477280] ? ktime_get_ts64+0x86/0x230 [ 28.477318] kunit_try_run_case+0x1a5/0x480 [ 28.477354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.477402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.477439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.477476] ? __kthread_parkme+0x82/0x180 [ 28.477526] ? preempt_count_sub+0x50/0x80 [ 28.477562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.477599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.477635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.477685] kthread+0x337/0x6f0 [ 28.477718] ? trace_preempt_on+0x20/0xc0 [ 28.477754] ? __pfx_kthread+0x10/0x10 [ 28.477787] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.477822] ? calculate_sigpending+0x7b/0xa0 [ 28.477871] ? __pfx_kthread+0x10/0x10 [ 28.477906] ret_from_fork+0x116/0x1d0 [ 28.477929] ? __pfx_kthread+0x10/0x10 [ 28.477950] ret_from_fork_asm+0x1a/0x30 [ 28.477982] </TASK> [ 28.477993] [ 28.485817] Allocated by task 314: [ 28.485996] kasan_save_stack+0x45/0x70 [ 28.486186] kasan_save_track+0x18/0x40 [ 28.486389] kasan_save_alloc_info+0x3b/0x50 [ 28.486609] __kasan_kmalloc+0xb7/0xc0 [ 28.486785] __kmalloc_cache_noprof+0x189/0x420 [ 28.486978] kasan_atomics+0x95/0x310 [ 28.487169] kunit_try_run_case+0x1a5/0x480 [ 28.487521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.488200] kthread+0x337/0x6f0 [ 28.489099] ret_from_fork+0x116/0x1d0 [ 28.489452] ret_from_fork_asm+0x1a/0x30 [ 28.489895] [ 28.490259] The buggy address belongs to the object at ffff88810458d180 [ 28.490259] which belongs to the cache kmalloc-64 of size 64 [ 28.491453] The buggy address is located 0 bytes to the right of [ 28.491453] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.492030] [ 28.492367] The buggy address belongs to the physical page: [ 28.493156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.494414] flags: 0x200000000000000(node=0|zone=2) [ 28.494712] page_type: f5(slab) [ 28.495150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.495908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.496151] page dumped because: kasan: bad access detected [ 28.496675] [ 28.496983] Memory state around the buggy address: [ 28.497670] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.498567] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.499457] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.499685] ^ [ 28.499838] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.500052] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.500272] ================================================================== [ 28.611817] ================================================================== [ 28.612199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 28.612775] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.613240] [ 28.613558] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.613635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.613649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.613671] Call Trace: [ 28.613722] <TASK> [ 28.613739] dump_stack_lvl+0x73/0xb0 [ 28.613769] print_report+0xd1/0x610 [ 28.613792] ? __virt_addr_valid+0x1db/0x2d0 [ 28.613816] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.613838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.613864] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.613887] kasan_report+0x141/0x180 [ 28.613909] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.613941] __asan_report_load4_noabort+0x18/0x20 [ 28.613966] kasan_atomics_helper+0x4a36/0x5450 [ 28.613991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.614013] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.614038] ? kasan_atomics+0x152/0x310 [ 28.614065] kasan_atomics+0x1dc/0x310 [ 28.614099] ? __pfx_kasan_atomics+0x10/0x10 [ 28.614124] ? __pfx_read_tsc+0x10/0x10 [ 28.614145] ? ktime_get_ts64+0x86/0x230 [ 28.614171] kunit_try_run_case+0x1a5/0x480 [ 28.614197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.614222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.614246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.614270] ? __kthread_parkme+0x82/0x180 [ 28.614305] ? preempt_count_sub+0x50/0x80 [ 28.614329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.614353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.614377] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.614401] kthread+0x337/0x6f0 [ 28.614421] ? trace_preempt_on+0x20/0xc0 [ 28.614446] ? __pfx_kthread+0x10/0x10 [ 28.614467] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.614490] ? calculate_sigpending+0x7b/0xa0 [ 28.614514] ? __pfx_kthread+0x10/0x10 [ 28.614536] ret_from_fork+0x116/0x1d0 [ 28.614556] ? __pfx_kthread+0x10/0x10 [ 28.614577] ret_from_fork_asm+0x1a/0x30 [ 28.614609] </TASK> [ 28.614621] [ 28.626569] Allocated by task 314: [ 28.626738] kasan_save_stack+0x45/0x70 [ 28.626923] kasan_save_track+0x18/0x40 [ 28.627106] kasan_save_alloc_info+0x3b/0x50 [ 28.627587] __kasan_kmalloc+0xb7/0xc0 [ 28.627756] __kmalloc_cache_noprof+0x189/0x420 [ 28.627950] kasan_atomics+0x95/0x310 [ 28.628128] kunit_try_run_case+0x1a5/0x480 [ 28.628604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.628905] kthread+0x337/0x6f0 [ 28.629060] ret_from_fork+0x116/0x1d0 [ 28.629232] ret_from_fork_asm+0x1a/0x30 [ 28.629777] [ 28.629887] The buggy address belongs to the object at ffff88810458d180 [ 28.629887] which belongs to the cache kmalloc-64 of size 64 [ 28.630617] The buggy address is located 0 bytes to the right of [ 28.630617] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.631641] [ 28.631773] The buggy address belongs to the physical page: [ 28.632216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.632667] flags: 0x200000000000000(node=0|zone=2) [ 28.632888] page_type: f5(slab) [ 28.633040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.633670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.633985] page dumped because: kasan: bad access detected [ 28.634219] [ 28.634518] Memory state around the buggy address: [ 28.634851] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.635424] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.635715] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.635996] ^ [ 28.636200] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.636763] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.637259] ================================================================== [ 28.564174] ================================================================== [ 28.564765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 28.564990] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.565224] [ 28.565434] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.565498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.565511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.565532] Call Trace: [ 28.565558] <TASK> [ 28.565574] dump_stack_lvl+0x73/0xb0 [ 28.565603] print_report+0xd1/0x610 [ 28.565625] ? __virt_addr_valid+0x1db/0x2d0 [ 28.565649] ? kasan_atomics_helper+0xf10/0x5450 [ 28.565682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.565709] ? kasan_atomics_helper+0xf10/0x5450 [ 28.565732] kasan_report+0x141/0x180 [ 28.565764] ? kasan_atomics_helper+0xf10/0x5450 [ 28.565791] kasan_check_range+0x10c/0x1c0 [ 28.565815] __kasan_check_write+0x18/0x20 [ 28.565839] kasan_atomics_helper+0xf10/0x5450 [ 28.565862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.565885] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.565909] ? kasan_atomics+0x152/0x310 [ 28.565940] kasan_atomics+0x1dc/0x310 [ 28.565963] ? __pfx_kasan_atomics+0x10/0x10 [ 28.565988] ? __pfx_read_tsc+0x10/0x10 [ 28.566010] ? ktime_get_ts64+0x86/0x230 [ 28.566034] kunit_try_run_case+0x1a5/0x480 [ 28.566058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.566090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.566114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.566138] ? __kthread_parkme+0x82/0x180 [ 28.566163] ? preempt_count_sub+0x50/0x80 [ 28.566187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.566211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.566235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.566259] kthread+0x337/0x6f0 [ 28.566290] ? trace_preempt_on+0x20/0xc0 [ 28.566314] ? __pfx_kthread+0x10/0x10 [ 28.566335] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.566357] ? calculate_sigpending+0x7b/0xa0 [ 28.566391] ? __pfx_kthread+0x10/0x10 [ 28.566412] ret_from_fork+0x116/0x1d0 [ 28.566432] ? __pfx_kthread+0x10/0x10 [ 28.566464] ret_from_fork_asm+0x1a/0x30 [ 28.566496] </TASK> [ 28.566507] [ 28.574351] Allocated by task 314: [ 28.574473] kasan_save_stack+0x45/0x70 [ 28.574666] kasan_save_track+0x18/0x40 [ 28.574847] kasan_save_alloc_info+0x3b/0x50 [ 28.575048] __kasan_kmalloc+0xb7/0xc0 [ 28.575230] __kmalloc_cache_noprof+0x189/0x420 [ 28.575493] kasan_atomics+0x95/0x310 [ 28.575660] kunit_try_run_case+0x1a5/0x480 [ 28.575862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.576072] kthread+0x337/0x6f0 [ 28.576196] ret_from_fork+0x116/0x1d0 [ 28.576321] ret_from_fork_asm+0x1a/0x30 [ 28.576454] [ 28.576517] The buggy address belongs to the object at ffff88810458d180 [ 28.576517] which belongs to the cache kmalloc-64 of size 64 [ 28.576860] The buggy address is located 0 bytes to the right of [ 28.576860] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.577496] [ 28.577608] The buggy address belongs to the physical page: [ 28.577848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.578210] flags: 0x200000000000000(node=0|zone=2) [ 28.579153] page_type: f5(slab) [ 28.579702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.580045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.580756] page dumped because: kasan: bad access detected [ 28.581163] [ 28.581257] Memory state around the buggy address: [ 28.581749] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.582016] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.582576] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.583016] ^ [ 28.583466] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.583969] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.584685] ================================================================== [ 28.927326] ================================================================== [ 28.927796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 28.928137] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.928528] [ 28.928633] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.928703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.928716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.928737] Call Trace: [ 28.928752] <TASK> [ 28.928767] dump_stack_lvl+0x73/0xb0 [ 28.928795] print_report+0xd1/0x610 [ 28.928817] ? __virt_addr_valid+0x1db/0x2d0 [ 28.928840] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.928862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.928888] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.928932] kasan_report+0x141/0x180 [ 28.928955] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.928983] kasan_check_range+0x10c/0x1c0 [ 28.929006] __kasan_check_write+0x18/0x20 [ 28.929029] kasan_atomics_helper+0x15b6/0x5450 [ 28.929053] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.929075] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.929110] ? kasan_atomics+0x152/0x310 [ 28.929136] kasan_atomics+0x1dc/0x310 [ 28.929159] ? __pfx_kasan_atomics+0x10/0x10 [ 28.929184] ? __pfx_read_tsc+0x10/0x10 [ 28.929205] ? ktime_get_ts64+0x86/0x230 [ 28.929230] kunit_try_run_case+0x1a5/0x480 [ 28.929253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.929284] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.929327] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.929352] ? __kthread_parkme+0x82/0x180 [ 28.929378] ? preempt_count_sub+0x50/0x80 [ 28.929402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.929426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.929450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.929474] kthread+0x337/0x6f0 [ 28.929495] ? trace_preempt_on+0x20/0xc0 [ 28.929517] ? __pfx_kthread+0x10/0x10 [ 28.929539] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.929562] ? calculate_sigpending+0x7b/0xa0 [ 28.929587] ? __pfx_kthread+0x10/0x10 [ 28.929609] ret_from_fork+0x116/0x1d0 [ 28.929628] ? __pfx_kthread+0x10/0x10 [ 28.929650] ret_from_fork_asm+0x1a/0x30 [ 28.929681] </TASK> [ 28.929693] [ 28.936934] Allocated by task 314: [ 28.937186] kasan_save_stack+0x45/0x70 [ 28.937390] kasan_save_track+0x18/0x40 [ 28.937521] kasan_save_alloc_info+0x3b/0x50 [ 28.937664] __kasan_kmalloc+0xb7/0xc0 [ 28.937804] __kmalloc_cache_noprof+0x189/0x420 [ 28.938029] kasan_atomics+0x95/0x310 [ 28.938243] kunit_try_run_case+0x1a5/0x480 [ 28.938463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.938733] kthread+0x337/0x6f0 [ 28.938899] ret_from_fork+0x116/0x1d0 [ 28.939059] ret_from_fork_asm+0x1a/0x30 [ 28.939260] [ 28.939338] The buggy address belongs to the object at ffff88810458d180 [ 28.939338] which belongs to the cache kmalloc-64 of size 64 [ 28.939756] The buggy address is located 0 bytes to the right of [ 28.939756] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.940126] [ 28.940196] The buggy address belongs to the physical page: [ 28.940471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.940834] flags: 0x200000000000000(node=0|zone=2) [ 28.941058] page_type: f5(slab) [ 28.941228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.941540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.941761] page dumped because: kasan: bad access detected [ 28.941934] [ 28.942021] Memory state around the buggy address: [ 28.942250] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.942596] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.942928] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.943248] ^ [ 28.943554] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.943787] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.943992] ================================================================== [ 28.708523] ================================================================== [ 28.709070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 28.709507] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.710166] [ 28.710274] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.710338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.710350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.710372] Call Trace: [ 28.710386] <TASK> [ 28.710402] dump_stack_lvl+0x73/0xb0 [ 28.710432] print_report+0xd1/0x610 [ 28.710454] ? __virt_addr_valid+0x1db/0x2d0 [ 28.710478] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.710500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.710527] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.710548] kasan_report+0x141/0x180 [ 28.710571] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.710598] __asan_report_load4_noabort+0x18/0x20 [ 28.710915] kasan_atomics_helper+0x4a02/0x5450 [ 28.710940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.710962] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.710988] ? kasan_atomics+0x152/0x310 [ 28.711014] kasan_atomics+0x1dc/0x310 [ 28.711037] ? __pfx_kasan_atomics+0x10/0x10 [ 28.711062] ? __pfx_read_tsc+0x10/0x10 [ 28.711096] ? ktime_get_ts64+0x86/0x230 [ 28.711120] kunit_try_run_case+0x1a5/0x480 [ 28.711144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.711167] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.711190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.711216] ? __kthread_parkme+0x82/0x180 [ 28.711240] ? preempt_count_sub+0x50/0x80 [ 28.711263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.711296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.711319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.711343] kthread+0x337/0x6f0 [ 28.711362] ? trace_preempt_on+0x20/0xc0 [ 28.711386] ? __pfx_kthread+0x10/0x10 [ 28.711407] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.711429] ? calculate_sigpending+0x7b/0xa0 [ 28.711452] ? __pfx_kthread+0x10/0x10 [ 28.711474] ret_from_fork+0x116/0x1d0 [ 28.711493] ? __pfx_kthread+0x10/0x10 [ 28.711514] ret_from_fork_asm+0x1a/0x30 [ 28.711545] </TASK> [ 28.711556] [ 28.720779] Allocated by task 314: [ 28.720954] kasan_save_stack+0x45/0x70 [ 28.721128] kasan_save_track+0x18/0x40 [ 28.721614] kasan_save_alloc_info+0x3b/0x50 [ 28.721822] __kasan_kmalloc+0xb7/0xc0 [ 28.722066] __kmalloc_cache_noprof+0x189/0x420 [ 28.722357] kasan_atomics+0x95/0x310 [ 28.722603] kunit_try_run_case+0x1a5/0x480 [ 28.722772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.723021] kthread+0x337/0x6f0 [ 28.723260] ret_from_fork+0x116/0x1d0 [ 28.723394] ret_from_fork_asm+0x1a/0x30 [ 28.723589] [ 28.723676] The buggy address belongs to the object at ffff88810458d180 [ 28.723676] which belongs to the cache kmalloc-64 of size 64 [ 28.724480] The buggy address is located 0 bytes to the right of [ 28.724480] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.725096] [ 28.725253] The buggy address belongs to the physical page: [ 28.725597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.725991] flags: 0x200000000000000(node=0|zone=2) [ 28.726226] page_type: f5(slab) [ 28.726384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.726865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.727299] page dumped because: kasan: bad access detected [ 28.727603] [ 28.727692] Memory state around the buggy address: [ 28.727876] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.728194] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.728773] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.729141] ^ [ 28.729313] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.729811] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.730209] ================================================================== [ 28.242131] ================================================================== [ 28.242883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 28.243123] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.243364] [ 28.243670] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.243720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.243733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.243754] Call Trace: [ 28.243770] <TASK> [ 28.243786] dump_stack_lvl+0x73/0xb0 [ 28.243816] print_report+0xd1/0x610 [ 28.243839] ? __virt_addr_valid+0x1db/0x2d0 [ 28.243861] ? kasan_atomics_helper+0x5fe/0x5450 [ 28.243882] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.243908] ? kasan_atomics_helper+0x5fe/0x5450 [ 28.243930] kasan_report+0x141/0x180 [ 28.243953] ? kasan_atomics_helper+0x5fe/0x5450 [ 28.243980] kasan_check_range+0x10c/0x1c0 [ 28.244005] __kasan_check_write+0x18/0x20 [ 28.244028] kasan_atomics_helper+0x5fe/0x5450 [ 28.244051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.244073] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.244109] ? kasan_atomics+0x152/0x310 [ 28.244136] kasan_atomics+0x1dc/0x310 [ 28.244158] ? __pfx_kasan_atomics+0x10/0x10 [ 28.244183] ? __pfx_read_tsc+0x10/0x10 [ 28.244246] ? ktime_get_ts64+0x86/0x230 [ 28.244270] kunit_try_run_case+0x1a5/0x480 [ 28.244466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.244489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.244513] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.244538] ? __kthread_parkme+0x82/0x180 [ 28.244562] ? preempt_count_sub+0x50/0x80 [ 28.244585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.244609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.244633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.244657] kthread+0x337/0x6f0 [ 28.244676] ? trace_preempt_on+0x20/0xc0 [ 28.244699] ? __pfx_kthread+0x10/0x10 [ 28.244720] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.244742] ? calculate_sigpending+0x7b/0xa0 [ 28.244766] ? __pfx_kthread+0x10/0x10 [ 28.244788] ret_from_fork+0x116/0x1d0 [ 28.244807] ? __pfx_kthread+0x10/0x10 [ 28.244828] ret_from_fork_asm+0x1a/0x30 [ 28.244861] </TASK> [ 28.244872] [ 28.255148] Allocated by task 314: [ 28.255711] kasan_save_stack+0x45/0x70 [ 28.255927] kasan_save_track+0x18/0x40 [ 28.256117] kasan_save_alloc_info+0x3b/0x50 [ 28.256724] __kasan_kmalloc+0xb7/0xc0 [ 28.256923] __kmalloc_cache_noprof+0x189/0x420 [ 28.257134] kasan_atomics+0x95/0x310 [ 28.257475] kunit_try_run_case+0x1a5/0x480 [ 28.257918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.258599] kthread+0x337/0x6f0 [ 28.258845] ret_from_fork+0x116/0x1d0 [ 28.259158] ret_from_fork_asm+0x1a/0x30 [ 28.259604] [ 28.259698] The buggy address belongs to the object at ffff88810458d180 [ 28.259698] which belongs to the cache kmalloc-64 of size 64 [ 28.260898] The buggy address is located 0 bytes to the right of [ 28.260898] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.261895] [ 28.262151] The buggy address belongs to the physical page: [ 28.262808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.263513] flags: 0x200000000000000(node=0|zone=2) [ 28.263818] page_type: f5(slab) [ 28.264186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.264840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.265165] page dumped because: kasan: bad access detected [ 28.265915] [ 28.266184] Memory state around the buggy address: [ 28.266799] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.267306] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.267766] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.268058] ^ [ 28.268224] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.268619] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.269136] ================================================================== [ 28.961929] ================================================================== [ 28.962395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 28.962629] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.962848] [ 28.962924] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.962971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.962983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.963004] Call Trace: [ 28.963018] <TASK> [ 28.963035] dump_stack_lvl+0x73/0xb0 [ 28.963063] print_report+0xd1/0x610 [ 28.963099] ? __virt_addr_valid+0x1db/0x2d0 [ 28.963122] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.963144] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.963171] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.963193] kasan_report+0x141/0x180 [ 28.963216] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.963243] kasan_check_range+0x10c/0x1c0 [ 28.963267] __kasan_check_write+0x18/0x20 [ 28.963291] kasan_atomics_helper+0x16e7/0x5450 [ 28.963314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.963336] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.963361] ? kasan_atomics+0x152/0x310 [ 28.963387] kasan_atomics+0x1dc/0x310 [ 28.963434] ? __pfx_kasan_atomics+0x10/0x10 [ 28.963459] ? __pfx_read_tsc+0x10/0x10 [ 28.963481] ? ktime_get_ts64+0x86/0x230 [ 28.963506] kunit_try_run_case+0x1a5/0x480 [ 28.963530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.963552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.963576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.963600] ? __kthread_parkme+0x82/0x180 [ 28.963624] ? preempt_count_sub+0x50/0x80 [ 28.963648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.963672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.963696] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.963719] kthread+0x337/0x6f0 [ 28.963739] ? trace_preempt_on+0x20/0xc0 [ 28.963763] ? __pfx_kthread+0x10/0x10 [ 28.963783] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.963805] ? calculate_sigpending+0x7b/0xa0 [ 28.963829] ? __pfx_kthread+0x10/0x10 [ 28.963851] ret_from_fork+0x116/0x1d0 [ 28.963870] ? __pfx_kthread+0x10/0x10 [ 28.963891] ret_from_fork_asm+0x1a/0x30 [ 28.963942] </TASK> [ 28.963953] [ 28.971654] Allocated by task 314: [ 28.971849] kasan_save_stack+0x45/0x70 [ 28.971992] kasan_save_track+0x18/0x40 [ 28.972132] kasan_save_alloc_info+0x3b/0x50 [ 28.972275] __kasan_kmalloc+0xb7/0xc0 [ 28.972487] __kmalloc_cache_noprof+0x189/0x420 [ 28.972702] kasan_atomics+0x95/0x310 [ 28.972879] kunit_try_run_case+0x1a5/0x480 [ 28.973088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.973355] kthread+0x337/0x6f0 [ 28.973518] ret_from_fork+0x116/0x1d0 [ 28.973684] ret_from_fork_asm+0x1a/0x30 [ 28.973830] [ 28.973894] The buggy address belongs to the object at ffff88810458d180 [ 28.973894] which belongs to the cache kmalloc-64 of size 64 [ 28.974352] The buggy address is located 0 bytes to the right of [ 28.974352] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.974924] [ 28.975015] The buggy address belongs to the physical page: [ 28.975195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.975658] flags: 0x200000000000000(node=0|zone=2) [ 28.975829] page_type: f5(slab) [ 28.975942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.976179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.976464] page dumped because: kasan: bad access detected [ 28.976829] [ 28.976939] Memory state around the buggy address: [ 28.977151] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.977362] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.977568] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.977955] ^ [ 28.978182] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.978484] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.978952] ================================================================== [ 29.123124] ================================================================== [ 29.123563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 29.123911] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.124252] [ 29.124375] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.124424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.124437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.124459] Call Trace: [ 29.124471] <TASK> [ 29.124486] dump_stack_lvl+0x73/0xb0 [ 29.124513] print_report+0xd1/0x610 [ 29.124535] ? __virt_addr_valid+0x1db/0x2d0 [ 29.124557] ? kasan_atomics_helper+0x1c18/0x5450 [ 29.124579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.124605] ? kasan_atomics_helper+0x1c18/0x5450 [ 29.124627] kasan_report+0x141/0x180 [ 29.124651] ? kasan_atomics_helper+0x1c18/0x5450 [ 29.124678] kasan_check_range+0x10c/0x1c0 [ 29.124702] __kasan_check_write+0x18/0x20 [ 29.124727] kasan_atomics_helper+0x1c18/0x5450 [ 29.124749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.124772] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.124797] ? kasan_atomics+0x152/0x310 [ 29.124823] kasan_atomics+0x1dc/0x310 [ 29.124846] ? __pfx_kasan_atomics+0x10/0x10 [ 29.124869] ? __pfx_read_tsc+0x10/0x10 [ 29.124891] ? ktime_get_ts64+0x86/0x230 [ 29.124915] kunit_try_run_case+0x1a5/0x480 [ 29.124939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.124961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.124985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.125009] ? __kthread_parkme+0x82/0x180 [ 29.125033] ? preempt_count_sub+0x50/0x80 [ 29.125056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.125090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.125114] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.125138] kthread+0x337/0x6f0 [ 29.125158] ? trace_preempt_on+0x20/0xc0 [ 29.125181] ? __pfx_kthread+0x10/0x10 [ 29.125202] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.125224] ? calculate_sigpending+0x7b/0xa0 [ 29.125247] ? __pfx_kthread+0x10/0x10 [ 29.125288] ret_from_fork+0x116/0x1d0 [ 29.125308] ? __pfx_kthread+0x10/0x10 [ 29.125330] ret_from_fork_asm+0x1a/0x30 [ 29.125362] </TASK> [ 29.125372] [ 29.134641] Allocated by task 314: [ 29.134816] kasan_save_stack+0x45/0x70 [ 29.134966] kasan_save_track+0x18/0x40 [ 29.135110] kasan_save_alloc_info+0x3b/0x50 [ 29.135253] __kasan_kmalloc+0xb7/0xc0 [ 29.136000] __kmalloc_cache_noprof+0x189/0x420 [ 29.136430] kasan_atomics+0x95/0x310 [ 29.136617] kunit_try_run_case+0x1a5/0x480 [ 29.136808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.137037] kthread+0x337/0x6f0 [ 29.137203] ret_from_fork+0x116/0x1d0 [ 29.137370] ret_from_fork_asm+0x1a/0x30 [ 29.137839] [ 29.137926] The buggy address belongs to the object at ffff88810458d180 [ 29.137926] which belongs to the cache kmalloc-64 of size 64 [ 29.138404] The buggy address is located 0 bytes to the right of [ 29.138404] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.139023] [ 29.139103] The buggy address belongs to the physical page: [ 29.139272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.140141] flags: 0x200000000000000(node=0|zone=2) [ 29.140703] page_type: f5(slab) [ 29.141052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.141783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.142087] page dumped because: kasan: bad access detected [ 29.142254] [ 29.142330] Memory state around the buggy address: [ 29.142481] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.142690] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.142898] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.143121] ^ [ 29.143346] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.143606] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.143820] ================================================================== [ 28.903419] ================================================================== [ 28.903697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 28.903940] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.904929] [ 28.905049] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.905880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.905899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.905929] Call Trace: [ 28.905943] <TASK> [ 28.905959] dump_stack_lvl+0x73/0xb0 [ 28.905990] print_report+0xd1/0x610 [ 28.906012] ? __virt_addr_valid+0x1db/0x2d0 [ 28.906035] ? kasan_atomics_helper+0x151d/0x5450 [ 28.906057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.907115] ? kasan_atomics_helper+0x151d/0x5450 [ 28.907151] kasan_report+0x141/0x180 [ 28.907177] ? kasan_atomics_helper+0x151d/0x5450 [ 28.907206] kasan_check_range+0x10c/0x1c0 [ 28.907231] __kasan_check_write+0x18/0x20 [ 28.907255] kasan_atomics_helper+0x151d/0x5450 [ 28.907278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.907300] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.907326] ? kasan_atomics+0x152/0x310 [ 28.907354] kasan_atomics+0x1dc/0x310 [ 28.907377] ? __pfx_kasan_atomics+0x10/0x10 [ 28.907402] ? __pfx_read_tsc+0x10/0x10 [ 28.907424] ? ktime_get_ts64+0x86/0x230 [ 28.907448] kunit_try_run_case+0x1a5/0x480 [ 28.907472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.907494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.907517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.907541] ? __kthread_parkme+0x82/0x180 [ 28.907565] ? preempt_count_sub+0x50/0x80 [ 28.907589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.907614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.907636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.907660] kthread+0x337/0x6f0 [ 28.907679] ? trace_preempt_on+0x20/0xc0 [ 28.907702] ? __pfx_kthread+0x10/0x10 [ 28.907723] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.907745] ? calculate_sigpending+0x7b/0xa0 [ 28.907786] ? __pfx_kthread+0x10/0x10 [ 28.907808] ret_from_fork+0x116/0x1d0 [ 28.907829] ? __pfx_kthread+0x10/0x10 [ 28.907851] ret_from_fork_asm+0x1a/0x30 [ 28.907883] </TASK> [ 28.907895] [ 28.917615] Allocated by task 314: [ 28.917766] kasan_save_stack+0x45/0x70 [ 28.917945] kasan_save_track+0x18/0x40 [ 28.918122] kasan_save_alloc_info+0x3b/0x50 [ 28.918675] __kasan_kmalloc+0xb7/0xc0 [ 28.918875] __kmalloc_cache_noprof+0x189/0x420 [ 28.919251] kasan_atomics+0x95/0x310 [ 28.919596] kunit_try_run_case+0x1a5/0x480 [ 28.919791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.920014] kthread+0x337/0x6f0 [ 28.920189] ret_from_fork+0x116/0x1d0 [ 28.920754] ret_from_fork_asm+0x1a/0x30 [ 28.921032] [ 28.921299] The buggy address belongs to the object at ffff88810458d180 [ 28.921299] which belongs to the cache kmalloc-64 of size 64 [ 28.921952] The buggy address is located 0 bytes to the right of [ 28.921952] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.922485] [ 28.922554] The buggy address belongs to the physical page: [ 28.922926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.923223] flags: 0x200000000000000(node=0|zone=2) [ 28.923667] page_type: f5(slab) [ 28.923840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.924128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.924468] page dumped because: kasan: bad access detected [ 28.924687] [ 28.924783] Memory state around the buggy address: [ 28.925049] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.925367] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.925679] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.925986] ^ [ 28.926148] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.926434] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.926776] ================================================================== [ 29.364046] ================================================================== [ 29.364555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 29.364850] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.365155] [ 29.365248] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.365294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.365307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.365328] Call Trace: [ 29.365344] <TASK> [ 29.365359] dump_stack_lvl+0x73/0xb0 [ 29.365388] print_report+0xd1/0x610 [ 29.365410] ? __virt_addr_valid+0x1db/0x2d0 [ 29.365433] ? kasan_atomics_helper+0x4fb2/0x5450 [ 29.365454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.365480] ? kasan_atomics_helper+0x4fb2/0x5450 [ 29.365502] kasan_report+0x141/0x180 [ 29.365525] ? kasan_atomics_helper+0x4fb2/0x5450 [ 29.365551] __asan_report_load8_noabort+0x18/0x20 [ 29.365575] kasan_atomics_helper+0x4fb2/0x5450 [ 29.365599] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.365621] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.365646] ? kasan_atomics+0x152/0x310 [ 29.365672] kasan_atomics+0x1dc/0x310 [ 29.365695] ? __pfx_kasan_atomics+0x10/0x10 [ 29.365719] ? __pfx_read_tsc+0x10/0x10 [ 29.365740] ? ktime_get_ts64+0x86/0x230 [ 29.365764] kunit_try_run_case+0x1a5/0x480 [ 29.365788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.365810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.365834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.365859] ? __kthread_parkme+0x82/0x180 [ 29.365883] ? preempt_count_sub+0x50/0x80 [ 29.365906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.365936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.365960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.365983] kthread+0x337/0x6f0 [ 29.366003] ? trace_preempt_on+0x20/0xc0 [ 29.366026] ? __pfx_kthread+0x10/0x10 [ 29.366046] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.366068] ? calculate_sigpending+0x7b/0xa0 [ 29.366322] ? __pfx_kthread+0x10/0x10 [ 29.366348] ret_from_fork+0x116/0x1d0 [ 29.366368] ? __pfx_kthread+0x10/0x10 [ 29.366389] ret_from_fork_asm+0x1a/0x30 [ 29.366615] </TASK> [ 29.366634] [ 29.380071] Allocated by task 314: [ 29.380243] kasan_save_stack+0x45/0x70 [ 29.380424] kasan_save_track+0x18/0x40 [ 29.380590] kasan_save_alloc_info+0x3b/0x50 [ 29.380770] __kasan_kmalloc+0xb7/0xc0 [ 29.380936] __kmalloc_cache_noprof+0x189/0x420 [ 29.381633] kasan_atomics+0x95/0x310 [ 29.381926] kunit_try_run_case+0x1a5/0x480 [ 29.382303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.382625] kthread+0x337/0x6f0 [ 29.382937] ret_from_fork+0x116/0x1d0 [ 29.383122] ret_from_fork_asm+0x1a/0x30 [ 29.383577] [ 29.383666] The buggy address belongs to the object at ffff88810458d180 [ 29.383666] which belongs to the cache kmalloc-64 of size 64 [ 29.384416] The buggy address is located 0 bytes to the right of [ 29.384416] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.384914] [ 29.384995] The buggy address belongs to the physical page: [ 29.385218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.385778] flags: 0x200000000000000(node=0|zone=2) [ 29.385985] page_type: f5(slab) [ 29.386144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.386956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.387409] page dumped because: kasan: bad access detected [ 29.387650] [ 29.387731] Memory state around the buggy address: [ 29.387928] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.388217] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.388757] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.389034] ^ [ 29.389673] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.390027] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.390546] ================================================================== [ 29.248270] ================================================================== [ 29.248754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 29.249386] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 29.249799] [ 29.250148] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 29.250203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.250217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.250240] Call Trace: [ 29.250256] <TASK> [ 29.250273] dump_stack_lvl+0x73/0xb0 [ 29.250304] print_report+0xd1/0x610 [ 29.250327] ? __virt_addr_valid+0x1db/0x2d0 [ 29.250350] ? kasan_atomics_helper+0x1eaa/0x5450 [ 29.250372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.250399] ? kasan_atomics_helper+0x1eaa/0x5450 [ 29.250421] kasan_report+0x141/0x180 [ 29.250445] ? kasan_atomics_helper+0x1eaa/0x5450 [ 29.250472] kasan_check_range+0x10c/0x1c0 [ 29.250496] __kasan_check_write+0x18/0x20 [ 29.250520] kasan_atomics_helper+0x1eaa/0x5450 [ 29.250543] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.250565] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.250590] ? kasan_atomics+0x152/0x310 [ 29.250616] kasan_atomics+0x1dc/0x310 [ 29.250639] ? __pfx_kasan_atomics+0x10/0x10 [ 29.250664] ? __pfx_read_tsc+0x10/0x10 [ 29.250685] ? ktime_get_ts64+0x86/0x230 [ 29.250709] kunit_try_run_case+0x1a5/0x480 [ 29.250733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.250755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.250779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.250803] ? __kthread_parkme+0x82/0x180 [ 29.250827] ? preempt_count_sub+0x50/0x80 [ 29.250851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.250875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.250899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.250922] kthread+0x337/0x6f0 [ 29.250941] ? trace_preempt_on+0x20/0xc0 [ 29.250965] ? __pfx_kthread+0x10/0x10 [ 29.250985] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.251007] ? calculate_sigpending+0x7b/0xa0 [ 29.251031] ? __pfx_kthread+0x10/0x10 [ 29.251053] ret_from_fork+0x116/0x1d0 [ 29.251072] ? __pfx_kthread+0x10/0x10 [ 29.251103] ret_from_fork_asm+0x1a/0x30 [ 29.251134] </TASK> [ 29.251145] [ 29.261511] Allocated by task 314: [ 29.261714] kasan_save_stack+0x45/0x70 [ 29.262068] kasan_save_track+0x18/0x40 [ 29.262287] kasan_save_alloc_info+0x3b/0x50 [ 29.262611] __kasan_kmalloc+0xb7/0xc0 [ 29.262799] __kmalloc_cache_noprof+0x189/0x420 [ 29.263008] kasan_atomics+0x95/0x310 [ 29.263195] kunit_try_run_case+0x1a5/0x480 [ 29.263674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.263967] kthread+0x337/0x6f0 [ 29.264171] ret_from_fork+0x116/0x1d0 [ 29.264518] ret_from_fork_asm+0x1a/0x30 [ 29.264739] [ 29.264990] The buggy address belongs to the object at ffff88810458d180 [ 29.264990] which belongs to the cache kmalloc-64 of size 64 [ 29.265588] The buggy address is located 0 bytes to the right of [ 29.265588] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 29.266269] [ 29.266519] The buggy address belongs to the physical page: [ 29.266768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 29.267146] flags: 0x200000000000000(node=0|zone=2) [ 29.267590] page_type: f5(slab) [ 29.267888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.268380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.268708] page dumped because: kasan: bad access detected [ 29.269062] [ 29.269169] Memory state around the buggy address: [ 29.269564] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.269894] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.270408] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.270784] ^ [ 29.271105] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.271535] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.271906] ================================================================== [ 28.664619] ================================================================== [ 28.664946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 28.665593] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.665902] [ 28.666011] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.666342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.666358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.666380] Call Trace: [ 28.666394] <TASK> [ 28.666410] dump_stack_lvl+0x73/0xb0 [ 28.666440] print_report+0xd1/0x610 [ 28.666462] ? __virt_addr_valid+0x1db/0x2d0 [ 28.666485] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.666506] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.666533] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.666555] kasan_report+0x141/0x180 [ 28.666578] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.666605] __asan_report_load4_noabort+0x18/0x20 [ 28.666629] kasan_atomics_helper+0x4a1c/0x5450 [ 28.666652] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.666674] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.666699] ? kasan_atomics+0x152/0x310 [ 28.666726] kasan_atomics+0x1dc/0x310 [ 28.666748] ? __pfx_kasan_atomics+0x10/0x10 [ 28.666772] ? __pfx_read_tsc+0x10/0x10 [ 28.666793] ? ktime_get_ts64+0x86/0x230 [ 28.666817] kunit_try_run_case+0x1a5/0x480 [ 28.666841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.666863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.666887] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.666911] ? __kthread_parkme+0x82/0x180 [ 28.666935] ? preempt_count_sub+0x50/0x80 [ 28.666959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.666983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.667006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.667030] kthread+0x337/0x6f0 [ 28.667049] ? trace_preempt_on+0x20/0xc0 [ 28.667072] ? __pfx_kthread+0x10/0x10 [ 28.667104] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.667126] ? calculate_sigpending+0x7b/0xa0 [ 28.667150] ? __pfx_kthread+0x10/0x10 [ 28.667171] ret_from_fork+0x116/0x1d0 [ 28.667191] ? __pfx_kthread+0x10/0x10 [ 28.667211] ret_from_fork_asm+0x1a/0x30 [ 28.667243] </TASK> [ 28.667254] [ 28.676573] Allocated by task 314: [ 28.676994] kasan_save_stack+0x45/0x70 [ 28.677202] kasan_save_track+0x18/0x40 [ 28.677414] kasan_save_alloc_info+0x3b/0x50 [ 28.677671] __kasan_kmalloc+0xb7/0xc0 [ 28.677984] __kmalloc_cache_noprof+0x189/0x420 [ 28.678339] kasan_atomics+0x95/0x310 [ 28.678548] kunit_try_run_case+0x1a5/0x480 [ 28.678853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.679192] kthread+0x337/0x6f0 [ 28.679436] ret_from_fork+0x116/0x1d0 [ 28.679734] ret_from_fork_asm+0x1a/0x30 [ 28.679948] [ 28.680041] The buggy address belongs to the object at ffff88810458d180 [ 28.680041] which belongs to the cache kmalloc-64 of size 64 [ 28.680748] The buggy address is located 0 bytes to the right of [ 28.680748] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.681624] [ 28.681786] The buggy address belongs to the physical page: [ 28.682456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.683139] flags: 0x200000000000000(node=0|zone=2) [ 28.683583] page_type: f5(slab) [ 28.683886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.684338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.684639] page dumped because: kasan: bad access detected [ 28.684809] [ 28.684878] Memory state around the buggy address: [ 28.685031] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.685401] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.685679] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.685989] ^ [ 28.686228] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.686520] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.686782] ================================================================== [ 28.730878] ================================================================== [ 28.731179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 28.731637] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.731868] [ 28.731944] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.731989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.732002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.732023] Call Trace: [ 28.732037] <TASK> [ 28.732052] dump_stack_lvl+0x73/0xb0 [ 28.732092] print_report+0xd1/0x610 [ 28.732116] ? __virt_addr_valid+0x1db/0x2d0 [ 28.732139] ? kasan_atomics_helper+0x1217/0x5450 [ 28.732160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.732187] ? kasan_atomics_helper+0x1217/0x5450 [ 28.732209] kasan_report+0x141/0x180 [ 28.732231] ? kasan_atomics_helper+0x1217/0x5450 [ 28.732258] kasan_check_range+0x10c/0x1c0 [ 28.732518] __kasan_check_write+0x18/0x20 [ 28.732546] kasan_atomics_helper+0x1217/0x5450 [ 28.732569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.732591] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.732616] ? kasan_atomics+0x152/0x310 [ 28.732642] kasan_atomics+0x1dc/0x310 [ 28.732665] ? __pfx_kasan_atomics+0x10/0x10 [ 28.732689] ? __pfx_read_tsc+0x10/0x10 [ 28.732711] ? ktime_get_ts64+0x86/0x230 [ 28.732735] kunit_try_run_case+0x1a5/0x480 [ 28.732758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.732781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.732804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.732827] ? __kthread_parkme+0x82/0x180 [ 28.732852] ? preempt_count_sub+0x50/0x80 [ 28.732874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.732898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.732921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.732945] kthread+0x337/0x6f0 [ 28.732964] ? trace_preempt_on+0x20/0xc0 [ 28.732990] ? __pfx_kthread+0x10/0x10 [ 28.733014] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.733037] ? calculate_sigpending+0x7b/0xa0 [ 28.733060] ? __pfx_kthread+0x10/0x10 [ 28.733093] ret_from_fork+0x116/0x1d0 [ 28.733114] ? __pfx_kthread+0x10/0x10 [ 28.733135] ret_from_fork_asm+0x1a/0x30 [ 28.733169] </TASK> [ 28.733180] [ 28.742728] Allocated by task 314: [ 28.742909] kasan_save_stack+0x45/0x70 [ 28.743115] kasan_save_track+0x18/0x40 [ 28.743269] kasan_save_alloc_info+0x3b/0x50 [ 28.743745] __kasan_kmalloc+0xb7/0xc0 [ 28.743988] __kmalloc_cache_noprof+0x189/0x420 [ 28.744169] kasan_atomics+0x95/0x310 [ 28.744408] kunit_try_run_case+0x1a5/0x480 [ 28.744791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.745011] kthread+0x337/0x6f0 [ 28.745288] ret_from_fork+0x116/0x1d0 [ 28.745447] ret_from_fork_asm+0x1a/0x30 [ 28.745693] [ 28.745765] The buggy address belongs to the object at ffff88810458d180 [ 28.745765] which belongs to the cache kmalloc-64 of size 64 [ 28.746259] The buggy address is located 0 bytes to the right of [ 28.746259] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.747045] [ 28.747142] The buggy address belongs to the physical page: [ 28.747312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.747783] flags: 0x200000000000000(node=0|zone=2) [ 28.748061] page_type: f5(slab) [ 28.748206] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.748579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.749035] page dumped because: kasan: bad access detected [ 28.749276] [ 28.749418] Memory state around the buggy address: [ 28.749687] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.749976] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.750273] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.750554] ^ [ 28.750746] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.751033] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.751701] ================================================================== [ 28.142993] ================================================================== [ 28.143632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 28.144663] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.145232] [ 28.145580] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.145635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.145649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.145670] Call Trace: [ 28.145686] <TASK> [ 28.145703] dump_stack_lvl+0x73/0xb0 [ 28.145735] print_report+0xd1/0x610 [ 28.145759] ? __virt_addr_valid+0x1db/0x2d0 [ 28.145785] ? kasan_atomics_helper+0x3df/0x5450 [ 28.145809] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.145836] ? kasan_atomics_helper+0x3df/0x5450 [ 28.145858] kasan_report+0x141/0x180 [ 28.145881] ? kasan_atomics_helper+0x3df/0x5450 [ 28.145907] kasan_check_range+0x10c/0x1c0 [ 28.145936] __kasan_check_read+0x15/0x20 [ 28.145959] kasan_atomics_helper+0x3df/0x5450 [ 28.145982] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.146004] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.146029] ? kasan_atomics+0x152/0x310 [ 28.146057] kasan_atomics+0x1dc/0x310 [ 28.146092] ? __pfx_kasan_atomics+0x10/0x10 [ 28.146116] ? __pfx_read_tsc+0x10/0x10 [ 28.146137] ? ktime_get_ts64+0x86/0x230 [ 28.146162] kunit_try_run_case+0x1a5/0x480 [ 28.146186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.146209] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.146236] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.146261] ? __kthread_parkme+0x82/0x180 [ 28.146286] ? preempt_count_sub+0x50/0x80 [ 28.146310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.146334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.146371] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.146394] kthread+0x337/0x6f0 [ 28.146413] ? trace_preempt_on+0x20/0xc0 [ 28.146436] ? __pfx_kthread+0x10/0x10 [ 28.146458] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.146479] ? calculate_sigpending+0x7b/0xa0 [ 28.146503] ? __pfx_kthread+0x10/0x10 [ 28.146683] ret_from_fork+0x116/0x1d0 [ 28.146714] ? __pfx_kthread+0x10/0x10 [ 28.146738] ret_from_fork_asm+0x1a/0x30 [ 28.146770] </TASK> [ 28.146781] [ 28.156452] Allocated by task 314: [ 28.156628] kasan_save_stack+0x45/0x70 [ 28.156823] kasan_save_track+0x18/0x40 [ 28.157024] kasan_save_alloc_info+0x3b/0x50 [ 28.157343] __kasan_kmalloc+0xb7/0xc0 [ 28.157514] __kmalloc_cache_noprof+0x189/0x420 [ 28.157665] kasan_atomics+0x95/0x310 [ 28.157854] kunit_try_run_case+0x1a5/0x480 [ 28.158100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.158561] kthread+0x337/0x6f0 [ 28.158746] ret_from_fork+0x116/0x1d0 [ 28.158919] ret_from_fork_asm+0x1a/0x30 [ 28.159118] [ 28.159207] The buggy address belongs to the object at ffff88810458d180 [ 28.159207] which belongs to the cache kmalloc-64 of size 64 [ 28.159661] The buggy address is located 0 bytes to the right of [ 28.159661] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.160093] [ 28.160171] The buggy address belongs to the physical page: [ 28.160343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.160578] flags: 0x200000000000000(node=0|zone=2) [ 28.160761] page_type: f5(slab) [ 28.160922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.161406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.161749] page dumped because: kasan: bad access detected [ 28.162004] [ 28.162096] Memory state around the buggy address: [ 28.162452] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.162738] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.163024] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.163345] ^ [ 28.163503] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.163768] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.164095] ================================================================== [ 28.074536] ================================================================== [ 28.074951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 28.075226] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314 [ 28.075821] [ 28.075923] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.075987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.075998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.076030] Call Trace: [ 28.076042] <TASK> [ 28.076056] dump_stack_lvl+0x73/0xb0 [ 28.076093] print_report+0xd1/0x610 [ 28.076114] ? __virt_addr_valid+0x1db/0x2d0 [ 28.076136] ? kasan_atomics_helper+0x4ba2/0x5450 [ 28.076157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.076182] ? kasan_atomics_helper+0x4ba2/0x5450 [ 28.076203] kasan_report+0x141/0x180 [ 28.076226] ? kasan_atomics_helper+0x4ba2/0x5450 [ 28.076325] __asan_report_store4_noabort+0x1b/0x30 [ 28.076353] kasan_atomics_helper+0x4ba2/0x5450 [ 28.076375] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.076407] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.076431] ? kasan_atomics+0x152/0x310 [ 28.076457] kasan_atomics+0x1dc/0x310 [ 28.076479] ? __pfx_kasan_atomics+0x10/0x10 [ 28.076502] ? __pfx_read_tsc+0x10/0x10 [ 28.076522] ? ktime_get_ts64+0x86/0x230 [ 28.076545] kunit_try_run_case+0x1a5/0x480 [ 28.076568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.076590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.076613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.076635] ? __kthread_parkme+0x82/0x180 [ 28.076658] ? preempt_count_sub+0x50/0x80 [ 28.076680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.076703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.076735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.076758] kthread+0x337/0x6f0 [ 28.076776] ? trace_preempt_on+0x20/0xc0 [ 28.076808] ? __pfx_kthread+0x10/0x10 [ 28.076828] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.076849] ? calculate_sigpending+0x7b/0xa0 [ 28.076872] ? __pfx_kthread+0x10/0x10 [ 28.076892] ret_from_fork+0x116/0x1d0 [ 28.076910] ? __pfx_kthread+0x10/0x10 [ 28.076930] ret_from_fork_asm+0x1a/0x30 [ 28.076960] </TASK> [ 28.076970] [ 28.085186] Allocated by task 314: [ 28.085311] kasan_save_stack+0x45/0x70 [ 28.085446] kasan_save_track+0x18/0x40 [ 28.085578] kasan_save_alloc_info+0x3b/0x50 [ 28.085797] __kasan_kmalloc+0xb7/0xc0 [ 28.085982] __kmalloc_cache_noprof+0x189/0x420 [ 28.086202] kasan_atomics+0x95/0x310 [ 28.086506] kunit_try_run_case+0x1a5/0x480 [ 28.086911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.087106] kthread+0x337/0x6f0 [ 28.087353] ret_from_fork+0x116/0x1d0 [ 28.087564] ret_from_fork_asm+0x1a/0x30 [ 28.087772] [ 28.087859] The buggy address belongs to the object at ffff88810458d180 [ 28.087859] which belongs to the cache kmalloc-64 of size 64 [ 28.088477] The buggy address is located 0 bytes to the right of [ 28.088477] allocated 48-byte region [ffff88810458d180, ffff88810458d1b0) [ 28.088994] [ 28.089110] The buggy address belongs to the physical page: [ 28.089396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d [ 28.089746] flags: 0x200000000000000(node=0|zone=2) [ 28.089951] page_type: f5(slab) [ 28.090128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.090649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.090971] page dumped because: kasan: bad access detected [ 28.091219] [ 28.091373] Memory state around the buggy address: [ 28.091570] ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.091782] ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.091991] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.092270] ^ [ 28.092502] ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.092862] ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.093218] ==================================================================