Date
July 18, 2025, 1:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.289131] ================================================================== [ 34.289184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 34.289237] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.289288] [ 34.289319] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.289403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.289582] Hardware name: linux,dummy-virt (DT) [ 34.289650] Call trace: [ 34.289677] show_stack+0x20/0x38 (C) [ 34.289963] dump_stack_lvl+0x8c/0xd0 [ 34.290017] print_report+0x118/0x5e8 [ 34.290230] kasan_report+0xdc/0x128 [ 34.290284] kasan_check_range+0x100/0x1a8 [ 34.290423] __kasan_check_read+0x20/0x30 [ 34.290475] kasan_atomics_helper+0xdd4/0x4858 [ 34.290526] kasan_atomics+0x198/0x2e0 [ 34.290580] kunit_try_run_case+0x170/0x3f0 [ 34.290627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.290681] kthread+0x328/0x630 [ 34.290725] ret_from_fork+0x10/0x20 [ 34.290987] [ 34.291174] Allocated by task 296: [ 34.291212] kasan_save_stack+0x3c/0x68 [ 34.291256] kasan_save_track+0x20/0x40 [ 34.291294] kasan_save_alloc_info+0x40/0x58 [ 34.291407] __kasan_kmalloc+0xd4/0xd8 [ 34.291447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.291489] kasan_atomics+0xb8/0x2e0 [ 34.291554] kunit_try_run_case+0x170/0x3f0 [ 34.291733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.291821] kthread+0x328/0x630 [ 34.292021] ret_from_fork+0x10/0x20 [ 34.292320] [ 34.292451] The buggy address belongs to the object at fff00000c9708480 [ 34.292451] which belongs to the cache kmalloc-64 of size 64 [ 34.292532] The buggy address is located 0 bytes to the right of [ 34.292532] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.292599] [ 34.292855] The buggy address belongs to the physical page: [ 34.292958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.293045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.293171] page_type: f5(slab) [ 34.293247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.293495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.293646] page dumped because: kasan: bad access detected [ 34.293713] [ 34.293764] Memory state around the buggy address: [ 34.293887] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.293954] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.294018] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.294093] ^ [ 34.294129] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.294173] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.294420] ================================================================== [ 34.388983] ================================================================== [ 34.389035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 34.389342] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.389507] [ 34.389614] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.389699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.389727] Hardware name: linux,dummy-virt (DT) [ 34.389760] Call trace: [ 34.389784] show_stack+0x20/0x38 (C) [ 34.389836] dump_stack_lvl+0x8c/0xd0 [ 34.389884] print_report+0x118/0x5e8 [ 34.389940] kasan_report+0xdc/0x128 [ 34.390107] __asan_report_load8_noabort+0x20/0x30 [ 34.390155] kasan_atomics_helper+0x3f04/0x4858 [ 34.390207] kasan_atomics+0x198/0x2e0 [ 34.390255] kunit_try_run_case+0x170/0x3f0 [ 34.390650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.391128] kthread+0x328/0x630 [ 34.391270] ret_from_fork+0x10/0x20 [ 34.391442] [ 34.391538] Allocated by task 296: [ 34.391678] kasan_save_stack+0x3c/0x68 [ 34.391799] kasan_save_track+0x20/0x40 [ 34.391836] kasan_save_alloc_info+0x40/0x58 [ 34.391876] __kasan_kmalloc+0xd4/0xd8 [ 34.391912] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.391954] kasan_atomics+0xb8/0x2e0 [ 34.392117] kunit_try_run_case+0x170/0x3f0 [ 34.392157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.392202] kthread+0x328/0x630 [ 34.392236] ret_from_fork+0x10/0x20 [ 34.392273] [ 34.392296] The buggy address belongs to the object at fff00000c9708480 [ 34.392296] which belongs to the cache kmalloc-64 of size 64 [ 34.392355] The buggy address is located 0 bytes to the right of [ 34.392355] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.392761] [ 34.393033] The buggy address belongs to the physical page: [ 34.393070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.393137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.393580] page_type: f5(slab) [ 34.393817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.393908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.393978] page dumped because: kasan: bad access detected [ 34.394159] [ 34.394296] Memory state around the buggy address: [ 34.394344] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.394739] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.394788] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.394828] ^ [ 34.394979] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.395112] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.395153] ================================================================== [ 34.416888] ================================================================== [ 34.417065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 34.417347] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.417404] [ 34.417436] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.417929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.417984] Hardware name: linux,dummy-virt (DT) [ 34.418121] Call trace: [ 34.418336] show_stack+0x20/0x38 (C) [ 34.418497] dump_stack_lvl+0x8c/0xd0 [ 34.418546] print_report+0x118/0x5e8 [ 34.418592] kasan_report+0xdc/0x128 [ 34.418636] kasan_check_range+0x100/0x1a8 [ 34.418681] __kasan_check_write+0x20/0x30 [ 34.418728] kasan_atomics_helper+0x154c/0x4858 [ 34.418778] kasan_atomics+0x198/0x2e0 [ 34.418826] kunit_try_run_case+0x170/0x3f0 [ 34.418873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.418935] kthread+0x328/0x630 [ 34.418979] ret_from_fork+0x10/0x20 [ 34.419143] [ 34.419323] Allocated by task 296: [ 34.419636] kasan_save_stack+0x3c/0x68 [ 34.419763] kasan_save_track+0x20/0x40 [ 34.419802] kasan_save_alloc_info+0x40/0x58 [ 34.419878] __kasan_kmalloc+0xd4/0xd8 [ 34.419952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.419994] kasan_atomics+0xb8/0x2e0 [ 34.420034] kunit_try_run_case+0x170/0x3f0 [ 34.420815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.420886] kthread+0x328/0x630 [ 34.420921] ret_from_fork+0x10/0x20 [ 34.421089] [ 34.421114] The buggy address belongs to the object at fff00000c9708480 [ 34.421114] which belongs to the cache kmalloc-64 of size 64 [ 34.421242] The buggy address is located 0 bytes to the right of [ 34.421242] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.421417] [ 34.421509] The buggy address belongs to the physical page: [ 34.421903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.422014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.422171] page_type: f5(slab) [ 34.422251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.422405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.422475] page dumped because: kasan: bad access detected [ 34.422592] [ 34.422614] Memory state around the buggy address: [ 34.422712] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.422818] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.422896] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.423063] ^ [ 34.423385] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.423559] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.423602] ================================================================== [ 34.295071] ================================================================== [ 34.295147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 34.295201] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.295253] [ 34.295282] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.295475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.295535] Hardware name: linux,dummy-virt (DT) [ 34.295569] Call trace: [ 34.295600] show_stack+0x20/0x38 (C) [ 34.295893] dump_stack_lvl+0x8c/0xd0 [ 34.295975] print_report+0x118/0x5e8 [ 34.296150] kasan_report+0xdc/0x128 [ 34.296212] __asan_report_load8_noabort+0x20/0x30 [ 34.296274] kasan_atomics_helper+0x3f58/0x4858 [ 34.296326] kasan_atomics+0x198/0x2e0 [ 34.296437] kunit_try_run_case+0x170/0x3f0 [ 34.296487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.296541] kthread+0x328/0x630 [ 34.296585] ret_from_fork+0x10/0x20 [ 34.296827] [ 34.296865] Allocated by task 296: [ 34.297065] kasan_save_stack+0x3c/0x68 [ 34.297357] kasan_save_track+0x20/0x40 [ 34.297413] kasan_save_alloc_info+0x40/0x58 [ 34.297461] __kasan_kmalloc+0xd4/0xd8 [ 34.297498] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.297564] kasan_atomics+0xb8/0x2e0 [ 34.297800] kunit_try_run_case+0x170/0x3f0 [ 34.297881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.298061] kthread+0x328/0x630 [ 34.298143] ret_from_fork+0x10/0x20 [ 34.298434] [ 34.298529] The buggy address belongs to the object at fff00000c9708480 [ 34.298529] which belongs to the cache kmalloc-64 of size 64 [ 34.298630] The buggy address is located 0 bytes to the right of [ 34.298630] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.298699] [ 34.298720] The buggy address belongs to the physical page: [ 34.298789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.299034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.299225] page_type: f5(slab) [ 34.299292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.299559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.299607] page dumped because: kasan: bad access detected [ 34.299649] [ 34.299695] Memory state around the buggy address: [ 34.299753] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.299915] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.299969] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.300088] ^ [ 34.300137] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.300182] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.300222] ================================================================== [ 34.507295] ================================================================== [ 34.507353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 34.507409] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.507461] [ 34.507496] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.507584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.507616] Hardware name: linux,dummy-virt (DT) [ 34.507650] Call trace: [ 34.507675] show_stack+0x20/0x38 (C) [ 34.507732] dump_stack_lvl+0x8c/0xd0 [ 34.510851] print_report+0x118/0x5e8 [ 34.511179] kasan_report+0xdc/0x128 [ 34.511230] kasan_check_range+0x100/0x1a8 [ 34.511277] __kasan_check_write+0x20/0x30 [ 34.511327] kasan_atomics_helper+0x175c/0x4858 [ 34.512254] kasan_atomics+0x198/0x2e0 [ 34.512595] kunit_try_run_case+0x170/0x3f0 [ 34.512671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.512726] kthread+0x328/0x630 [ 34.513387] ret_from_fork+0x10/0x20 [ 34.513822] [ 34.513848] Allocated by task 296: [ 34.514283] kasan_save_stack+0x3c/0x68 [ 34.514329] kasan_save_track+0x20/0x40 [ 34.514366] kasan_save_alloc_info+0x40/0x58 [ 34.514407] __kasan_kmalloc+0xd4/0xd8 [ 34.514445] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.514489] kasan_atomics+0xb8/0x2e0 [ 34.515650] kunit_try_run_case+0x170/0x3f0 [ 34.515711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.517700] kthread+0x328/0x630 [ 34.517802] ret_from_fork+0x10/0x20 [ 34.518005] [ 34.518053] The buggy address belongs to the object at fff00000c9708480 [ 34.518053] which belongs to the cache kmalloc-64 of size 64 [ 34.518196] The buggy address is located 0 bytes to the right of [ 34.518196] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.518314] [ 34.518466] The buggy address belongs to the physical page: [ 34.518575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.519141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.519621] page_type: f5(slab) [ 34.520619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.520700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.520770] page dumped because: kasan: bad access detected [ 34.520890] [ 34.520911] Memory state around the buggy address: [ 34.521051] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.521774] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.521980] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.522198] ^ [ 34.522473] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.522635] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.523030] ================================================================== [ 34.439434] ================================================================== [ 34.439679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 34.439801] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.439851] [ 34.440093] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.440220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.440416] Hardware name: linux,dummy-virt (DT) [ 34.440508] Call trace: [ 34.440533] show_stack+0x20/0x38 (C) [ 34.440672] dump_stack_lvl+0x8c/0xd0 [ 34.440782] print_report+0x118/0x5e8 [ 34.440826] kasan_report+0xdc/0x128 [ 34.440872] kasan_check_range+0x100/0x1a8 [ 34.441267] __kasan_check_write+0x20/0x30 [ 34.441415] kasan_atomics_helper+0x1644/0x4858 [ 34.441468] kasan_atomics+0x198/0x2e0 [ 34.441555] kunit_try_run_case+0x170/0x3f0 [ 34.441797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.441886] kthread+0x328/0x630 [ 34.441950] ret_from_fork+0x10/0x20 [ 34.442106] [ 34.442127] Allocated by task 296: [ 34.442157] kasan_save_stack+0x3c/0x68 [ 34.442199] kasan_save_track+0x20/0x40 [ 34.442237] kasan_save_alloc_info+0x40/0x58 [ 34.442277] __kasan_kmalloc+0xd4/0xd8 [ 34.442593] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.442696] kasan_atomics+0xb8/0x2e0 [ 34.442900] kunit_try_run_case+0x170/0x3f0 [ 34.442943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.443213] kthread+0x328/0x630 [ 34.443351] ret_from_fork+0x10/0x20 [ 34.443390] [ 34.443413] The buggy address belongs to the object at fff00000c9708480 [ 34.443413] which belongs to the cache kmalloc-64 of size 64 [ 34.443474] The buggy address is located 0 bytes to the right of [ 34.443474] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.443539] [ 34.443560] The buggy address belongs to the physical page: [ 34.443593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.443646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.443736] page_type: f5(slab) [ 34.443778] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.443827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.443869] page dumped because: kasan: bad access detected [ 34.444177] [ 34.444200] Memory state around the buggy address: [ 34.444236] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.444280] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.444324] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.444363] ^ [ 34.444398] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.444443] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.444482] ================================================================== [ 34.541037] ================================================================== [ 34.541121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 34.541196] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.541247] [ 34.541302] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.541405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.541459] Hardware name: linux,dummy-virt (DT) [ 34.541522] Call trace: [ 34.541547] show_stack+0x20/0x38 (C) [ 34.541614] dump_stack_lvl+0x8c/0xd0 [ 34.541684] print_report+0x118/0x5e8 [ 34.541737] kasan_report+0xdc/0x128 [ 34.541781] kasan_check_range+0x100/0x1a8 [ 34.541828] __kasan_check_write+0x20/0x30 [ 34.541875] kasan_atomics_helper+0x17ec/0x4858 [ 34.541925] kasan_atomics+0x198/0x2e0 [ 34.541971] kunit_try_run_case+0x170/0x3f0 [ 34.542273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.542378] kthread+0x328/0x630 [ 34.542438] ret_from_fork+0x10/0x20 [ 34.542504] [ 34.542542] Allocated by task 296: [ 34.542608] kasan_save_stack+0x3c/0x68 [ 34.542654] kasan_save_track+0x20/0x40 [ 34.542700] kasan_save_alloc_info+0x40/0x58 [ 34.542746] __kasan_kmalloc+0xd4/0xd8 [ 34.542914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.542960] kasan_atomics+0xb8/0x2e0 [ 34.542999] kunit_try_run_case+0x170/0x3f0 [ 34.543051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.543122] kthread+0x328/0x630 [ 34.543159] ret_from_fork+0x10/0x20 [ 34.543242] [ 34.543281] The buggy address belongs to the object at fff00000c9708480 [ 34.543281] which belongs to the cache kmalloc-64 of size 64 [ 34.543342] The buggy address is located 0 bytes to the right of [ 34.543342] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.543425] [ 34.543472] The buggy address belongs to the physical page: [ 34.543506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.543558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.543608] page_type: f5(slab) [ 34.543647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.543720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.544006] page dumped because: kasan: bad access detected [ 34.544094] [ 34.544164] Memory state around the buggy address: [ 34.544221] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.544267] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.544311] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.544351] ^ [ 34.544398] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.544445] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.544498] ================================================================== [ 34.153520] ================================================================== [ 34.153584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 34.153636] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.153688] [ 34.153718] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.153803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.153831] Hardware name: linux,dummy-virt (DT) [ 34.153862] Call trace: [ 34.153887] show_stack+0x20/0x38 (C) [ 34.153934] dump_stack_lvl+0x8c/0xd0 [ 34.153983] print_report+0x118/0x5e8 [ 34.154034] kasan_report+0xdc/0x128 [ 34.154091] kasan_check_range+0x100/0x1a8 [ 34.154276] __kasan_check_write+0x20/0x30 [ 34.154330] kasan_atomics_helper+0x760/0x4858 [ 34.154735] kasan_atomics+0x198/0x2e0 [ 34.154829] kunit_try_run_case+0x170/0x3f0 [ 34.155133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.155225] kthread+0x328/0x630 [ 34.155283] ret_from_fork+0x10/0x20 [ 34.155340] [ 34.155362] Allocated by task 296: [ 34.155393] kasan_save_stack+0x3c/0x68 [ 34.155440] kasan_save_track+0x20/0x40 [ 34.155479] kasan_save_alloc_info+0x40/0x58 [ 34.155525] __kasan_kmalloc+0xd4/0xd8 [ 34.155562] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.155603] kasan_atomics+0xb8/0x2e0 [ 34.155643] kunit_try_run_case+0x170/0x3f0 [ 34.155690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.155979] kthread+0x328/0x630 [ 34.156069] ret_from_fork+0x10/0x20 [ 34.156321] [ 34.156355] The buggy address belongs to the object at fff00000c9708480 [ 34.156355] which belongs to the cache kmalloc-64 of size 64 [ 34.156761] The buggy address is located 0 bytes to the right of [ 34.156761] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.156925] [ 34.157117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.157635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.158475] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.158534] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.158866] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.159027] ^ [ 34.159115] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.159244] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.159298] ================================================================== [ 34.348159] ================================================================== [ 34.348256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 34.348357] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.348432] [ 34.348743] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.348871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.349030] Hardware name: linux,dummy-virt (DT) [ 34.349093] Call trace: [ 34.349117] show_stack+0x20/0x38 (C) [ 34.349175] dump_stack_lvl+0x8c/0xd0 [ 34.349225] print_report+0x118/0x5e8 [ 34.349494] kasan_report+0xdc/0x128 [ 34.349617] kasan_check_range+0x100/0x1a8 [ 34.349710] __kasan_check_write+0x20/0x30 [ 34.349885] kasan_atomics_helper+0x1128/0x4858 [ 34.350105] kasan_atomics+0x198/0x2e0 [ 34.350185] kunit_try_run_case+0x170/0x3f0 [ 34.350349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.350444] kthread+0x328/0x630 [ 34.350579] ret_from_fork+0x10/0x20 [ 34.350855] [ 34.350987] Allocated by task 296: [ 34.351046] kasan_save_stack+0x3c/0x68 [ 34.351174] kasan_save_track+0x20/0x40 [ 34.351262] kasan_save_alloc_info+0x40/0x58 [ 34.351503] __kasan_kmalloc+0xd4/0xd8 [ 34.351643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.351721] kasan_atomics+0xb8/0x2e0 [ 34.351807] kunit_try_run_case+0x170/0x3f0 [ 34.352092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.352151] kthread+0x328/0x630 [ 34.352279] ret_from_fork+0x10/0x20 [ 34.352347] [ 34.352468] The buggy address belongs to the object at fff00000c9708480 [ 34.352468] which belongs to the cache kmalloc-64 of size 64 [ 34.352597] The buggy address is located 0 bytes to the right of [ 34.352597] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.352846] [ 34.352916] The buggy address belongs to the physical page: [ 34.352997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.353219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.353387] page_type: f5(slab) [ 34.353447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.353540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.353621] page dumped because: kasan: bad access detected [ 34.353833] [ 34.353924] Memory state around the buggy address: [ 34.354057] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.354242] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.354337] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.354445] ^ [ 34.354533] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.354598] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.354782] ================================================================== [ 34.282320] ================================================================== [ 34.282371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 34.282423] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.282473] [ 34.282532] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.282627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.282657] Hardware name: linux,dummy-virt (DT) [ 34.282689] Call trace: [ 34.282722] show_stack+0x20/0x38 (C) [ 34.282781] dump_stack_lvl+0x8c/0xd0 [ 34.282830] print_report+0x118/0x5e8 [ 34.282877] kasan_report+0xdc/0x128 [ 34.282923] __asan_report_load4_noabort+0x20/0x30 [ 34.282981] kasan_atomics_helper+0x3e04/0x4858 [ 34.283041] kasan_atomics+0x198/0x2e0 [ 34.283484] kunit_try_run_case+0x170/0x3f0 [ 34.283636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.283715] kthread+0x328/0x630 [ 34.283961] ret_from_fork+0x10/0x20 [ 34.284035] [ 34.284058] Allocated by task 296: [ 34.284295] kasan_save_stack+0x3c/0x68 [ 34.284491] kasan_save_track+0x20/0x40 [ 34.284572] kasan_save_alloc_info+0x40/0x58 [ 34.284667] __kasan_kmalloc+0xd4/0xd8 [ 34.284954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.285053] kasan_atomics+0xb8/0x2e0 [ 34.285221] kunit_try_run_case+0x170/0x3f0 [ 34.285265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.285317] kthread+0x328/0x630 [ 34.285548] ret_from_fork+0x10/0x20 [ 34.285633] [ 34.285743] The buggy address belongs to the object at fff00000c9708480 [ 34.285743] which belongs to the cache kmalloc-64 of size 64 [ 34.285833] The buggy address is located 0 bytes to the right of [ 34.285833] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.286066] [ 34.286104] The buggy address belongs to the physical page: [ 34.286138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.286330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.286420] page_type: f5(slab) [ 34.286572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.286670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.286953] page dumped because: kasan: bad access detected [ 34.287146] [ 34.287228] Memory state around the buggy address: [ 34.287304] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.287443] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.287517] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.287566] ^ [ 34.287602] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288007] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288102] ================================================================== [ 34.342465] ================================================================== [ 34.342544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 34.342596] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.342727] [ 34.342759] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.342850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.343055] Hardware name: linux,dummy-virt (DT) [ 34.343126] Call trace: [ 34.343201] show_stack+0x20/0x38 (C) [ 34.343254] dump_stack_lvl+0x8c/0xd0 [ 34.343321] print_report+0x118/0x5e8 [ 34.343375] kasan_report+0xdc/0x128 [ 34.343418] kasan_check_range+0x100/0x1a8 [ 34.343463] __kasan_check_write+0x20/0x30 [ 34.343510] kasan_atomics_helper+0x10c0/0x4858 [ 34.343677] kasan_atomics+0x198/0x2e0 [ 34.343857] kunit_try_run_case+0x170/0x3f0 [ 34.343943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.344091] kthread+0x328/0x630 [ 34.344160] ret_from_fork+0x10/0x20 [ 34.344255] [ 34.344277] Allocated by task 296: [ 34.344307] kasan_save_stack+0x3c/0x68 [ 34.344347] kasan_save_track+0x20/0x40 [ 34.344693] kasan_save_alloc_info+0x40/0x58 [ 34.344770] __kasan_kmalloc+0xd4/0xd8 [ 34.344860] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.345016] kasan_atomics+0xb8/0x2e0 [ 34.345242] kunit_try_run_case+0x170/0x3f0 [ 34.345336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.345468] kthread+0x328/0x630 [ 34.345554] ret_from_fork+0x10/0x20 [ 34.345600] [ 34.345623] The buggy address belongs to the object at fff00000c9708480 [ 34.345623] which belongs to the cache kmalloc-64 of size 64 [ 34.345859] The buggy address is located 0 bytes to the right of [ 34.345859] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.346025] [ 34.346077] The buggy address belongs to the physical page: [ 34.346502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.346596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.346720] page_type: f5(slab) [ 34.346760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.346814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.346865] page dumped because: kasan: bad access detected [ 34.346897] [ 34.346937] Memory state around the buggy address: [ 34.346991] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.347037] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.347091] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.347130] ^ [ 34.347166] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.347210] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.347250] ================================================================== [ 34.272413] ================================================================== [ 34.272464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 34.272518] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.272570] [ 34.272602] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.272687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.272717] Hardware name: linux,dummy-virt (DT) [ 34.272750] Call trace: [ 34.272774] show_stack+0x20/0x38 (C) [ 34.272823] dump_stack_lvl+0x8c/0xd0 [ 34.272872] print_report+0x118/0x5e8 [ 34.272919] kasan_report+0xdc/0x128 [ 34.272963] __asan_report_load4_noabort+0x20/0x30 [ 34.273015] kasan_atomics_helper+0x3dd8/0x4858 [ 34.273066] kasan_atomics+0x198/0x2e0 [ 34.273129] kunit_try_run_case+0x170/0x3f0 [ 34.273177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.273230] kthread+0x328/0x630 [ 34.273274] ret_from_fork+0x10/0x20 [ 34.273419] [ 34.273462] Allocated by task 296: [ 34.273499] kasan_save_stack+0x3c/0x68 [ 34.273546] kasan_save_track+0x20/0x40 [ 34.273903] kasan_save_alloc_info+0x40/0x58 [ 34.274065] __kasan_kmalloc+0xd4/0xd8 [ 34.274134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.274177] kasan_atomics+0xb8/0x2e0 [ 34.274381] kunit_try_run_case+0x170/0x3f0 [ 34.274420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.274472] kthread+0x328/0x630 [ 34.274682] ret_from_fork+0x10/0x20 [ 34.274753] [ 34.274776] The buggy address belongs to the object at fff00000c9708480 [ 34.274776] which belongs to the cache kmalloc-64 of size 64 [ 34.274907] The buggy address is located 0 bytes to the right of [ 34.274907] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.274990] [ 34.275175] The buggy address belongs to the physical page: [ 34.275221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.275388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.275444] page_type: f5(slab) [ 34.275501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.275571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.275615] page dumped because: kasan: bad access detected [ 34.275648] [ 34.275670] Memory state around the buggy address: [ 34.275702] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.275944] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.276101] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.276146] ^ [ 34.276206] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.276258] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.276308] ================================================================== [ 34.487095] ================================================================== [ 34.487147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 34.487989] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.488343] [ 34.488378] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.488522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.488582] Hardware name: linux,dummy-virt (DT) [ 34.488629] Call trace: [ 34.489371] show_stack+0x20/0x38 (C) [ 34.489705] dump_stack_lvl+0x8c/0xd0 [ 34.490280] print_report+0x118/0x5e8 [ 34.490955] kasan_report+0xdc/0x128 [ 34.491088] __asan_report_load8_noabort+0x20/0x30 [ 34.491143] kasan_atomics_helper+0x3e10/0x4858 [ 34.491195] kasan_atomics+0x198/0x2e0 [ 34.491242] kunit_try_run_case+0x170/0x3f0 [ 34.492382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.492614] kthread+0x328/0x630 [ 34.493609] ret_from_fork+0x10/0x20 [ 34.493817] [ 34.493877] Allocated by task 296: [ 34.494047] kasan_save_stack+0x3c/0x68 [ 34.494227] kasan_save_track+0x20/0x40 [ 34.494894] kasan_save_alloc_info+0x40/0x58 [ 34.495013] __kasan_kmalloc+0xd4/0xd8 [ 34.495254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.495692] kasan_atomics+0xb8/0x2e0 [ 34.496120] kunit_try_run_case+0x170/0x3f0 [ 34.496192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.496237] kthread+0x328/0x630 [ 34.496958] ret_from_fork+0x10/0x20 [ 34.497065] [ 34.497329] The buggy address belongs to the object at fff00000c9708480 [ 34.497329] which belongs to the cache kmalloc-64 of size 64 [ 34.497502] The buggy address is located 0 bytes to the right of [ 34.497502] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.497779] [ 34.497838] The buggy address belongs to the physical page: [ 34.498453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.498611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.498756] page_type: f5(slab) [ 34.498853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.499984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.500123] page dumped because: kasan: bad access detected [ 34.500187] [ 34.500207] Memory state around the buggy address: [ 34.500426] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.500475] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.500521] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.501462] ^ [ 34.501584] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.501769] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.501857] ================================================================== [ 34.305777] ================================================================== [ 34.305825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 34.305884] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.305943] [ 34.305983] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.306698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.306750] Hardware name: linux,dummy-virt (DT) [ 34.306785] Call trace: [ 34.307199] show_stack+0x20/0x38 (C) [ 34.307271] dump_stack_lvl+0x8c/0xd0 [ 34.307322] print_report+0x118/0x5e8 [ 34.307565] kasan_report+0xdc/0x128 [ 34.307633] __asan_report_store8_noabort+0x20/0x30 [ 34.307748] kasan_atomics_helper+0x3e5c/0x4858 [ 34.307817] kasan_atomics+0x198/0x2e0 [ 34.307949] kunit_try_run_case+0x170/0x3f0 [ 34.308040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.308149] kthread+0x328/0x630 [ 34.308194] ret_from_fork+0x10/0x20 [ 34.308257] [ 34.308517] Allocated by task 296: [ 34.308585] kasan_save_stack+0x3c/0x68 [ 34.308693] kasan_save_track+0x20/0x40 [ 34.308772] kasan_save_alloc_info+0x40/0x58 [ 34.309047] __kasan_kmalloc+0xd4/0xd8 [ 34.309130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.309218] kasan_atomics+0xb8/0x2e0 [ 34.309304] kunit_try_run_case+0x170/0x3f0 [ 34.309374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.309620] kthread+0x328/0x630 [ 34.309718] ret_from_fork+0x10/0x20 [ 34.309796] [ 34.310049] The buggy address belongs to the object at fff00000c9708480 [ 34.310049] which belongs to the cache kmalloc-64 of size 64 [ 34.310206] The buggy address is located 0 bytes to the right of [ 34.310206] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.310302] [ 34.310385] The buggy address belongs to the physical page: [ 34.310465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.310565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.310618] page_type: f5(slab) [ 34.310657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.310716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.310991] page dumped because: kasan: bad access detected [ 34.311312] [ 34.311384] Memory state around the buggy address: [ 34.311606] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.311704] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.311806] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.311873] ^ [ 34.311965] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.312012] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.312160] ================================================================== [ 34.318844] ================================================================== [ 34.318911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 34.319055] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.319121] [ 34.319160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.319252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.319310] Hardware name: linux,dummy-virt (DT) [ 34.319343] Call trace: [ 34.319367] show_stack+0x20/0x38 (C) [ 34.319415] dump_stack_lvl+0x8c/0xd0 [ 34.319464] print_report+0x118/0x5e8 [ 34.319509] kasan_report+0xdc/0x128 [ 34.319554] kasan_check_range+0x100/0x1a8 [ 34.319602] __kasan_check_write+0x20/0x30 [ 34.319649] kasan_atomics_helper+0xf20/0x4858 [ 34.319699] kasan_atomics+0x198/0x2e0 [ 34.320303] kunit_try_run_case+0x170/0x3f0 [ 34.320383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.320521] kthread+0x328/0x630 [ 34.320673] ret_from_fork+0x10/0x20 [ 34.320728] [ 34.320750] Allocated by task 296: [ 34.321055] kasan_save_stack+0x3c/0x68 [ 34.321222] kasan_save_track+0x20/0x40 [ 34.321323] kasan_save_alloc_info+0x40/0x58 [ 34.321401] __kasan_kmalloc+0xd4/0xd8 [ 34.321648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.321790] kasan_atomics+0xb8/0x2e0 [ 34.321851] kunit_try_run_case+0x170/0x3f0 [ 34.321930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.322074] kthread+0x328/0x630 [ 34.322182] ret_from_fork+0x10/0x20 [ 34.322221] [ 34.322266] The buggy address belongs to the object at fff00000c9708480 [ 34.322266] which belongs to the cache kmalloc-64 of size 64 [ 34.322548] The buggy address is located 0 bytes to the right of [ 34.322548] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.322700] [ 34.322750] The buggy address belongs to the physical page: [ 34.322988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.323148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.323236] page_type: f5(slab) [ 34.323348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.323402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.323488] page dumped because: kasan: bad access detected [ 34.323568] [ 34.323848] Memory state around the buggy address: [ 34.324059] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.324210] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.324287] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.324398] ^ [ 34.324443] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.324558] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.324624] ================================================================== [ 34.445667] ================================================================== [ 34.445820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 34.445876] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.445932] [ 34.446372] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.446724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.446818] Hardware name: linux,dummy-virt (DT) [ 34.447123] Call trace: [ 34.447441] show_stack+0x20/0x38 (C) [ 34.448067] dump_stack_lvl+0x8c/0xd0 [ 34.448201] print_report+0x118/0x5e8 [ 34.448246] kasan_report+0xdc/0x128 [ 34.448293] __asan_report_load8_noabort+0x20/0x30 [ 34.449271] kasan_atomics_helper+0x3df4/0x4858 [ 34.449935] kasan_atomics+0x198/0x2e0 [ 34.450072] kunit_try_run_case+0x170/0x3f0 [ 34.450132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.450188] kthread+0x328/0x630 [ 34.451582] ret_from_fork+0x10/0x20 [ 34.451942] [ 34.452001] Allocated by task 296: [ 34.452033] kasan_save_stack+0x3c/0x68 [ 34.452076] kasan_save_track+0x20/0x40 [ 34.452125] kasan_save_alloc_info+0x40/0x58 [ 34.452167] __kasan_kmalloc+0xd4/0xd8 [ 34.452922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.453618] kasan_atomics+0xb8/0x2e0 [ 34.453939] kunit_try_run_case+0x170/0x3f0 [ 34.454209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.454851] kthread+0x328/0x630 [ 34.454896] ret_from_fork+0x10/0x20 [ 34.455108] [ 34.455626] The buggy address belongs to the object at fff00000c9708480 [ 34.455626] which belongs to the cache kmalloc-64 of size 64 [ 34.455983] The buggy address is located 0 bytes to the right of [ 34.455983] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.456052] [ 34.456075] The buggy address belongs to the physical page: [ 34.456829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.457115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.457175] page_type: f5(slab) [ 34.458046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.459115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.459247] page dumped because: kasan: bad access detected [ 34.459320] [ 34.459353] Memory state around the buggy address: [ 34.459455] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.459757] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.460300] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.460511] ^ [ 34.460557] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.461116] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.463076] ================================================================== [ 34.355649] ================================================================== [ 34.355750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 34.355840] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.355972] [ 34.356029] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.356284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.356410] Hardware name: linux,dummy-virt (DT) [ 34.356482] Call trace: [ 34.356541] show_stack+0x20/0x38 (C) [ 34.356710] dump_stack_lvl+0x8c/0xd0 [ 34.356805] print_report+0x118/0x5e8 [ 34.356931] kasan_report+0xdc/0x128 [ 34.356986] kasan_check_range+0x100/0x1a8 [ 34.357051] __kasan_check_write+0x20/0x30 [ 34.357107] kasan_atomics_helper+0x1190/0x4858 [ 34.357157] kasan_atomics+0x198/0x2e0 [ 34.357204] kunit_try_run_case+0x170/0x3f0 [ 34.357252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.357359] kthread+0x328/0x630 [ 34.357404] ret_from_fork+0x10/0x20 [ 34.357469] [ 34.357490] Allocated by task 296: [ 34.357530] kasan_save_stack+0x3c/0x68 [ 34.357590] kasan_save_track+0x20/0x40 [ 34.357628] kasan_save_alloc_info+0x40/0x58 [ 34.357668] __kasan_kmalloc+0xd4/0xd8 [ 34.357706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.357749] kasan_atomics+0xb8/0x2e0 [ 34.357788] kunit_try_run_case+0x170/0x3f0 [ 34.357833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.357888] kthread+0x328/0x630 [ 34.357922] ret_from_fork+0x10/0x20 [ 34.357960] [ 34.357990] The buggy address belongs to the object at fff00000c9708480 [ 34.357990] which belongs to the cache kmalloc-64 of size 64 [ 34.358053] The buggy address is located 0 bytes to the right of [ 34.358053] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.358654] [ 34.358695] The buggy address belongs to the physical page: [ 34.358818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.358916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.359213] page_type: f5(slab) [ 34.359280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.359419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.359490] page dumped because: kasan: bad access detected [ 34.359530] [ 34.359550] Memory state around the buggy address: [ 34.359900] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.360000] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.360269] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.360314] ^ [ 34.360380] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.360443] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.360550] ================================================================== [ 34.368787] ================================================================== [ 34.368838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 34.368891] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.368967] [ 34.368998] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.369550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.369610] Hardware name: linux,dummy-virt (DT) [ 34.369644] Call trace: [ 34.369868] show_stack+0x20/0x38 (C) [ 34.369943] dump_stack_lvl+0x8c/0xd0 [ 34.370002] print_report+0x118/0x5e8 [ 34.370165] kasan_report+0xdc/0x128 [ 34.370221] kasan_check_range+0x100/0x1a8 [ 34.370340] __kasan_check_write+0x20/0x30 [ 34.370395] kasan_atomics_helper+0x126c/0x4858 [ 34.370447] kasan_atomics+0x198/0x2e0 [ 34.370501] kunit_try_run_case+0x170/0x3f0 [ 34.370624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.370681] kthread+0x328/0x630 [ 34.370724] ret_from_fork+0x10/0x20 [ 34.370910] [ 34.371043] Allocated by task 296: [ 34.371094] kasan_save_stack+0x3c/0x68 [ 34.371138] kasan_save_track+0x20/0x40 [ 34.371378] kasan_save_alloc_info+0x40/0x58 [ 34.371583] __kasan_kmalloc+0xd4/0xd8 [ 34.371628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.371753] kasan_atomics+0xb8/0x2e0 [ 34.371815] kunit_try_run_case+0x170/0x3f0 [ 34.371878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.371932] kthread+0x328/0x630 [ 34.371966] ret_from_fork+0x10/0x20 [ 34.372219] [ 34.372353] The buggy address belongs to the object at fff00000c9708480 [ 34.372353] which belongs to the cache kmalloc-64 of size 64 [ 34.372438] The buggy address is located 0 bytes to the right of [ 34.372438] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.372701] [ 34.372771] The buggy address belongs to the physical page: [ 34.372867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.372940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.373048] page_type: f5(slab) [ 34.373102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.373337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.373524] page dumped because: kasan: bad access detected [ 34.373598] [ 34.373657] Memory state around the buggy address: [ 34.373907] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.374169] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.374235] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.374299] ^ [ 34.374408] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.374653] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.374735] ================================================================== [ 34.431891] ================================================================== [ 34.432025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 34.432110] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.432160] [ 34.432192] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.432552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.432675] Hardware name: linux,dummy-virt (DT) [ 34.432710] Call trace: [ 34.432733] show_stack+0x20/0x38 (C) [ 34.432786] dump_stack_lvl+0x8c/0xd0 [ 34.432835] print_report+0x118/0x5e8 [ 34.432882] kasan_report+0xdc/0x128 [ 34.433276] __asan_report_load8_noabort+0x20/0x30 [ 34.433402] kasan_atomics_helper+0x3db0/0x4858 [ 34.433591] kasan_atomics+0x198/0x2e0 [ 34.433641] kunit_try_run_case+0x170/0x3f0 [ 34.434074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.434144] kthread+0x328/0x630 [ 34.434190] ret_from_fork+0x10/0x20 [ 34.434240] [ 34.434508] Allocated by task 296: [ 34.434642] kasan_save_stack+0x3c/0x68 [ 34.434703] kasan_save_track+0x20/0x40 [ 34.434791] kasan_save_alloc_info+0x40/0x58 [ 34.434851] __kasan_kmalloc+0xd4/0xd8 [ 34.434995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.435090] kasan_atomics+0xb8/0x2e0 [ 34.435129] kunit_try_run_case+0x170/0x3f0 [ 34.435168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.435213] kthread+0x328/0x630 [ 34.435246] ret_from_fork+0x10/0x20 [ 34.435284] [ 34.435307] The buggy address belongs to the object at fff00000c9708480 [ 34.435307] which belongs to the cache kmalloc-64 of size 64 [ 34.435397] The buggy address is located 0 bytes to the right of [ 34.435397] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.435847] [ 34.436057] The buggy address belongs to the physical page: [ 34.436294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.436490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.436539] page_type: f5(slab) [ 34.436578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.436833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.436882] page dumped because: kasan: bad access detected [ 34.436915] [ 34.436935] Memory state around the buggy address: [ 34.437354] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.437418] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.437779] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.437902] ^ [ 34.437940] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.437985] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.438029] ================================================================== [ 34.424852] ================================================================== [ 34.424946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 34.425297] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.425355] [ 34.425385] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.425470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.425498] Hardware name: linux,dummy-virt (DT) [ 34.425530] Call trace: [ 34.425553] show_stack+0x20/0x38 (C) [ 34.425613] dump_stack_lvl+0x8c/0xd0 [ 34.425744] print_report+0x118/0x5e8 [ 34.425832] kasan_report+0xdc/0x128 [ 34.426028] kasan_check_range+0x100/0x1a8 [ 34.426179] __kasan_check_write+0x20/0x30 [ 34.426354] kasan_atomics_helper+0x15b4/0x4858 [ 34.426582] kasan_atomics+0x198/0x2e0 [ 34.426738] kunit_try_run_case+0x170/0x3f0 [ 34.426786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.426847] kthread+0x328/0x630 [ 34.427047] ret_from_fork+0x10/0x20 [ 34.427466] [ 34.427571] Allocated by task 296: [ 34.427671] kasan_save_stack+0x3c/0x68 [ 34.428511] kasan_save_track+0x20/0x40 [ 34.428741] kasan_save_alloc_info+0x40/0x58 [ 34.428785] __kasan_kmalloc+0xd4/0xd8 [ 34.428822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.428864] kasan_atomics+0xb8/0x2e0 [ 34.428905] kunit_try_run_case+0x170/0x3f0 [ 34.428946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.429137] kthread+0x328/0x630 [ 34.429187] ret_from_fork+0x10/0x20 [ 34.429226] [ 34.429250] The buggy address belongs to the object at fff00000c9708480 [ 34.429250] which belongs to the cache kmalloc-64 of size 64 [ 34.429311] The buggy address is located 0 bytes to the right of [ 34.429311] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.429385] [ 34.429408] The buggy address belongs to the physical page: [ 34.429441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.429753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.429869] page_type: f5(slab) [ 34.429908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.430056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.430204] page dumped because: kasan: bad access detected [ 34.430343] [ 34.430365] Memory state around the buggy address: [ 34.430420] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.430487] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.430531] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.430571] ^ [ 34.431021] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.431141] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.431209] ================================================================== [ 34.145697] ================================================================== [ 34.145757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 34.145823] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.145875] [ 34.145906] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.145992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.146030] Hardware name: linux,dummy-virt (DT) [ 34.146061] Call trace: [ 34.146100] show_stack+0x20/0x38 (C) [ 34.146148] dump_stack_lvl+0x8c/0xd0 [ 34.146196] print_report+0x118/0x5e8 [ 34.146240] kasan_report+0xdc/0x128 [ 34.146296] kasan_check_range+0x100/0x1a8 [ 34.146342] __kasan_check_write+0x20/0x30 [ 34.146389] kasan_atomics_helper+0x6ec/0x4858 [ 34.146439] kasan_atomics+0x198/0x2e0 [ 34.146485] kunit_try_run_case+0x170/0x3f0 [ 34.146532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.146584] kthread+0x328/0x630 [ 34.146640] ret_from_fork+0x10/0x20 [ 34.146693] [ 34.146715] Allocated by task 296: [ 34.146743] kasan_save_stack+0x3c/0x68 [ 34.146782] kasan_save_track+0x20/0x40 [ 34.146829] kasan_save_alloc_info+0x40/0x58 [ 34.146867] __kasan_kmalloc+0xd4/0xd8 [ 34.146904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.146945] kasan_atomics+0xb8/0x2e0 [ 34.147071] kthread+0x328/0x630 [ 34.147115] ret_from_fork+0x10/0x20 [ 34.147151] [ 34.147428] The buggy address is located 0 bytes to the right of [ 34.147428] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.148019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.148874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.149460] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.149510] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.149717] ^ [ 34.149784] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.149935] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.152029] ================================================================== [ 34.276645] ================================================================== [ 34.276717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 34.276858] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.276945] [ 34.276993] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.277312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.277366] Hardware name: linux,dummy-virt (DT) [ 34.277550] Call trace: [ 34.277581] show_stack+0x20/0x38 (C) [ 34.277633] dump_stack_lvl+0x8c/0xd0 [ 34.277751] print_report+0x118/0x5e8 [ 34.277827] kasan_report+0xdc/0x128 [ 34.277882] kasan_check_range+0x100/0x1a8 [ 34.277937] __kasan_check_write+0x20/0x30 [ 34.278207] kasan_atomics_helper+0xd3c/0x4858 [ 34.278543] kasan_atomics+0x198/0x2e0 [ 34.278639] kunit_try_run_case+0x170/0x3f0 [ 34.278700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.278754] kthread+0x328/0x630 [ 34.278797] ret_from_fork+0x10/0x20 [ 34.278845] [ 34.279032] Allocated by task 296: [ 34.279118] kasan_save_stack+0x3c/0x68 [ 34.279346] kasan_save_track+0x20/0x40 [ 34.279397] kasan_save_alloc_info+0x40/0x58 [ 34.279474] __kasan_kmalloc+0xd4/0xd8 [ 34.279511] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.279555] kasan_atomics+0xb8/0x2e0 [ 34.279595] kunit_try_run_case+0x170/0x3f0 [ 34.279695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.279909] kthread+0x328/0x630 [ 34.279948] ret_from_fork+0x10/0x20 [ 34.279992] [ 34.280041] The buggy address belongs to the object at fff00000c9708480 [ 34.280041] which belongs to the cache kmalloc-64 of size 64 [ 34.280208] The buggy address is located 0 bytes to the right of [ 34.280208] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.280279] [ 34.280301] The buggy address belongs to the physical page: [ 34.280343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.280587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.280742] page_type: f5(slab) [ 34.280831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.281108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.281183] page dumped because: kasan: bad access detected [ 34.281248] [ 34.281292] Memory state around the buggy address: [ 34.281390] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.281475] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.281535] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.281646] ^ [ 34.281689] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.281734] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.281780] ================================================================== [ 34.401950] ================================================================== [ 34.401996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 34.402053] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.402115] [ 34.402494] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.402948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.403520] Hardware name: linux,dummy-virt (DT) [ 34.403558] Call trace: [ 34.403581] show_stack+0x20/0x38 (C) [ 34.403632] dump_stack_lvl+0x8c/0xd0 [ 34.403679] print_report+0x118/0x5e8 [ 34.403779] kasan_report+0xdc/0x128 [ 34.403823] kasan_check_range+0x100/0x1a8 [ 34.403869] __kasan_check_write+0x20/0x30 [ 34.403916] kasan_atomics_helper+0x147c/0x4858 [ 34.404108] kasan_atomics+0x198/0x2e0 [ 34.404170] kunit_try_run_case+0x170/0x3f0 [ 34.404217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.404503] kthread+0x328/0x630 [ 34.404557] ret_from_fork+0x10/0x20 [ 34.405025] [ 34.405055] Allocated by task 296: [ 34.405098] kasan_save_stack+0x3c/0x68 [ 34.405141] kasan_save_track+0x20/0x40 [ 34.405195] kasan_save_alloc_info+0x40/0x58 [ 34.405235] __kasan_kmalloc+0xd4/0xd8 [ 34.405380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.405433] kasan_atomics+0xb8/0x2e0 [ 34.405473] kunit_try_run_case+0x170/0x3f0 [ 34.406043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.406357] kthread+0x328/0x630 [ 34.406396] ret_from_fork+0x10/0x20 [ 34.406653] [ 34.406722] The buggy address belongs to the object at fff00000c9708480 [ 34.406722] which belongs to the cache kmalloc-64 of size 64 [ 34.407140] The buggy address is located 0 bytes to the right of [ 34.407140] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.407405] [ 34.407456] The buggy address belongs to the physical page: [ 34.407548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.407602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.407685] page_type: f5(slab) [ 34.407768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.407820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.407879] page dumped because: kasan: bad access detected [ 34.407911] [ 34.408093] Memory state around the buggy address: [ 34.408134] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.408181] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.408227] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.408268] ^ [ 34.408819] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.408901] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.409131] ================================================================== [ 34.301270] ================================================================== [ 34.301322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 34.301436] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.301491] [ 34.301549] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.301953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.302003] Hardware name: linux,dummy-virt (DT) [ 34.302042] Call trace: [ 34.302068] show_stack+0x20/0x38 (C) [ 34.302131] dump_stack_lvl+0x8c/0xd0 [ 34.302181] print_report+0x118/0x5e8 [ 34.302226] kasan_report+0xdc/0x128 [ 34.302467] kasan_check_range+0x100/0x1a8 [ 34.302533] __kasan_check_write+0x20/0x30 [ 34.302641] kasan_atomics_helper+0xe44/0x4858 [ 34.302695] kasan_atomics+0x198/0x2e0 [ 34.302918] kunit_try_run_case+0x170/0x3f0 [ 34.302997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.303107] kthread+0x328/0x630 [ 34.303162] ret_from_fork+0x10/0x20 [ 34.303380] [ 34.303528] Allocated by task 296: [ 34.303563] kasan_save_stack+0x3c/0x68 [ 34.303608] kasan_save_track+0x20/0x40 [ 34.303711] kasan_save_alloc_info+0x40/0x58 [ 34.303796] __kasan_kmalloc+0xd4/0xd8 [ 34.304030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.304099] kasan_atomics+0xb8/0x2e0 [ 34.304146] kunit_try_run_case+0x170/0x3f0 [ 34.304270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.304322] kthread+0x328/0x630 [ 34.304576] ret_from_fork+0x10/0x20 [ 34.304637] [ 34.304662] The buggy address belongs to the object at fff00000c9708480 [ 34.304662] which belongs to the cache kmalloc-64 of size 64 [ 34.304727] The buggy address is located 0 bytes to the right of [ 34.304727] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.304811] [ 34.304836] The buggy address belongs to the physical page: [ 34.304873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.304927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.304977] page_type: f5(slab) [ 34.305029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.305097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.305149] page dumped because: kasan: bad access detected [ 34.305182] [ 34.305207] Memory state around the buggy address: [ 34.305252] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.305306] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.305355] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.305404] ^ [ 34.305455] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.305516] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.305556] ================================================================== [ 34.410641] ================================================================== [ 34.410692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 34.410744] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.410794] [ 34.410824] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.410909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.410938] Hardware name: linux,dummy-virt (DT) [ 34.410970] Call trace: [ 34.410993] show_stack+0x20/0x38 (C) [ 34.411203] dump_stack_lvl+0x8c/0xd0 [ 34.411408] print_report+0x118/0x5e8 [ 34.411607] kasan_report+0xdc/0x128 [ 34.411960] kasan_check_range+0x100/0x1a8 [ 34.412011] __kasan_check_write+0x20/0x30 [ 34.412059] kasan_atomics_helper+0x14e4/0x4858 [ 34.412120] kasan_atomics+0x198/0x2e0 [ 34.412168] kunit_try_run_case+0x170/0x3f0 [ 34.412215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.413033] kthread+0x328/0x630 [ 34.413150] ret_from_fork+0x10/0x20 [ 34.413235] [ 34.413334] Allocated by task 296: [ 34.413393] kasan_save_stack+0x3c/0x68 [ 34.413433] kasan_save_track+0x20/0x40 [ 34.413471] kasan_save_alloc_info+0x40/0x58 [ 34.413551] __kasan_kmalloc+0xd4/0xd8 [ 34.413589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.413642] kasan_atomics+0xb8/0x2e0 [ 34.413743] kunit_try_run_case+0x170/0x3f0 [ 34.413823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.413984] kthread+0x328/0x630 [ 34.414035] ret_from_fork+0x10/0x20 [ 34.414090] [ 34.414112] The buggy address belongs to the object at fff00000c9708480 [ 34.414112] which belongs to the cache kmalloc-64 of size 64 [ 34.414172] The buggy address is located 0 bytes to the right of [ 34.414172] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.414237] [ 34.414260] The buggy address belongs to the physical page: [ 34.414294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.414346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.414395] page_type: f5(slab) [ 34.414433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.414737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.415019] page dumped because: kasan: bad access detected [ 34.415057] [ 34.415089] Memory state around the buggy address: [ 34.415321] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.415439] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.415558] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.415639] ^ [ 34.415769] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.415814] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.415873] ================================================================== [ 34.325553] ================================================================== [ 34.325614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 34.325664] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.325714] [ 34.325931] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.326105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.326139] Hardware name: linux,dummy-virt (DT) [ 34.326173] Call trace: [ 34.326199] show_stack+0x20/0x38 (C) [ 34.326415] dump_stack_lvl+0x8c/0xd0 [ 34.326547] print_report+0x118/0x5e8 [ 34.326614] kasan_report+0xdc/0x128 [ 34.326669] kasan_check_range+0x100/0x1a8 [ 34.326868] __kasan_check_write+0x20/0x30 [ 34.326941] kasan_atomics_helper+0xf88/0x4858 [ 34.327025] kasan_atomics+0x198/0x2e0 [ 34.327095] kunit_try_run_case+0x170/0x3f0 [ 34.327190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.327246] kthread+0x328/0x630 [ 34.327313] ret_from_fork+0x10/0x20 [ 34.327402] [ 34.327442] Allocated by task 296: [ 34.327490] kasan_save_stack+0x3c/0x68 [ 34.327644] kasan_save_track+0x20/0x40 [ 34.327688] kasan_save_alloc_info+0x40/0x58 [ 34.327749] __kasan_kmalloc+0xd4/0xd8 [ 34.327870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.327955] kasan_atomics+0xb8/0x2e0 [ 34.328066] kunit_try_run_case+0x170/0x3f0 [ 34.328119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.328164] kthread+0x328/0x630 [ 34.328201] ret_from_fork+0x10/0x20 [ 34.328237] [ 34.328260] The buggy address belongs to the object at fff00000c9708480 [ 34.328260] which belongs to the cache kmalloc-64 of size 64 [ 34.328318] The buggy address is located 0 bytes to the right of [ 34.328318] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.328395] [ 34.328441] The buggy address belongs to the physical page: [ 34.328481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.328533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.328592] page_type: f5(slab) [ 34.328647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.328699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.328740] page dumped because: kasan: bad access detected [ 34.328774] [ 34.328794] Memory state around the buggy address: [ 34.328834] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.328888] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.328932] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.328982] ^ [ 34.329015] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.329062] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.329510] ================================================================== [ 34.381857] ================================================================== [ 34.382590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 34.382661] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.382721] [ 34.382882] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.383063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.383182] Hardware name: linux,dummy-virt (DT) [ 34.383222] Call trace: [ 34.383342] show_stack+0x20/0x38 (C) [ 34.383408] dump_stack_lvl+0x8c/0xd0 [ 34.383464] print_report+0x118/0x5e8 [ 34.383685] kasan_report+0xdc/0x128 [ 34.383790] kasan_check_range+0x100/0x1a8 [ 34.383836] __kasan_check_write+0x20/0x30 [ 34.383882] kasan_atomics_helper+0x1384/0x4858 [ 34.383934] kasan_atomics+0x198/0x2e0 [ 34.384102] kunit_try_run_case+0x170/0x3f0 [ 34.384160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.384214] kthread+0x328/0x630 [ 34.384257] ret_from_fork+0x10/0x20 [ 34.384305] [ 34.384326] Allocated by task 296: [ 34.384693] kasan_save_stack+0x3c/0x68 [ 34.384792] kasan_save_track+0x20/0x40 [ 34.384831] kasan_save_alloc_info+0x40/0x58 [ 34.384871] __kasan_kmalloc+0xd4/0xd8 [ 34.384908] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.384949] kasan_atomics+0xb8/0x2e0 [ 34.385247] kunit_try_run_case+0x170/0x3f0 [ 34.385337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.385384] kthread+0x328/0x630 [ 34.385417] ret_from_fork+0x10/0x20 [ 34.385455] [ 34.385488] The buggy address belongs to the object at fff00000c9708480 [ 34.385488] which belongs to the cache kmalloc-64 of size 64 [ 34.385549] The buggy address is located 0 bytes to the right of [ 34.385549] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.385794] [ 34.386218] The buggy address belongs to the physical page: [ 34.386275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.386332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.386405] page_type: f5(slab) [ 34.386503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.386555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.386597] page dumped because: kasan: bad access detected [ 34.386629] [ 34.386651] Memory state around the buggy address: [ 34.386733] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.386812] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.386892] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.387012] ^ [ 34.387373] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.387692] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.387750] ================================================================== [ 34.337419] ================================================================== [ 34.337483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 34.337569] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.337643] [ 34.337702] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.337925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.337954] Hardware name: linux,dummy-virt (DT) [ 34.338004] Call trace: [ 34.338034] show_stack+0x20/0x38 (C) [ 34.338096] dump_stack_lvl+0x8c/0xd0 [ 34.338179] print_report+0x118/0x5e8 [ 34.338238] kasan_report+0xdc/0x128 [ 34.338282] kasan_check_range+0x100/0x1a8 [ 34.338356] __kasan_check_write+0x20/0x30 [ 34.338415] kasan_atomics_helper+0x1058/0x4858 [ 34.338475] kasan_atomics+0x198/0x2e0 [ 34.338523] kunit_try_run_case+0x170/0x3f0 [ 34.338570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.338623] kthread+0x328/0x630 [ 34.338674] ret_from_fork+0x10/0x20 [ 34.338722] [ 34.338744] Allocated by task 296: [ 34.338772] kasan_save_stack+0x3c/0x68 [ 34.338812] kasan_save_track+0x20/0x40 [ 34.338850] kasan_save_alloc_info+0x40/0x58 [ 34.338889] __kasan_kmalloc+0xd4/0xd8 [ 34.338925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.338968] kasan_atomics+0xb8/0x2e0 [ 34.339016] kunit_try_run_case+0x170/0x3f0 [ 34.339055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.339523] kthread+0x328/0x630 [ 34.339575] ret_from_fork+0x10/0x20 [ 34.339613] [ 34.339637] The buggy address belongs to the object at fff00000c9708480 [ 34.339637] which belongs to the cache kmalloc-64 of size 64 [ 34.339846] The buggy address is located 0 bytes to the right of [ 34.339846] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.340069] [ 34.340152] The buggy address belongs to the physical page: [ 34.340239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.340324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.340538] page_type: f5(slab) [ 34.340667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.340757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.340845] page dumped because: kasan: bad access detected [ 34.340979] [ 34.341000] Memory state around the buggy address: [ 34.341034] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.341233] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.341397] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.341474] ^ [ 34.341601] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.341675] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.341897] ================================================================== [ 34.465498] ================================================================== [ 34.465551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 34.467477] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.467628] [ 34.467663] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.467760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.467789] Hardware name: linux,dummy-virt (DT) [ 34.467822] Call trace: [ 34.467846] show_stack+0x20/0x38 (C) [ 34.467900] dump_stack_lvl+0x8c/0xd0 [ 34.469558] print_report+0x118/0x5e8 [ 34.469824] kasan_report+0xdc/0x128 [ 34.470348] kasan_check_range+0x100/0x1a8 [ 34.471028] __kasan_check_write+0x20/0x30 [ 34.471225] kasan_atomics_helper+0x16d0/0x4858 [ 34.471277] kasan_atomics+0x198/0x2e0 [ 34.471327] kunit_try_run_case+0x170/0x3f0 [ 34.471375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.472323] kthread+0x328/0x630 [ 34.472846] ret_from_fork+0x10/0x20 [ 34.473473] [ 34.473734] Allocated by task 296: [ 34.473771] kasan_save_stack+0x3c/0x68 [ 34.474301] kasan_save_track+0x20/0x40 [ 34.474726] kasan_save_alloc_info+0x40/0x58 [ 34.474784] __kasan_kmalloc+0xd4/0xd8 [ 34.474821] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.474864] kasan_atomics+0xb8/0x2e0 [ 34.475763] kunit_try_run_case+0x170/0x3f0 [ 34.475831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.475879] kthread+0x328/0x630 [ 34.475915] ret_from_fork+0x10/0x20 [ 34.475954] [ 34.475977] The buggy address belongs to the object at fff00000c9708480 [ 34.475977] which belongs to the cache kmalloc-64 of size 64 [ 34.476038] The buggy address is located 0 bytes to the right of [ 34.476038] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.477239] [ 34.477619] The buggy address belongs to the physical page: [ 34.477991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.478523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.478584] page_type: f5(slab) [ 34.478625] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.479216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.479869] page dumped because: kasan: bad access detected [ 34.479914] [ 34.479936] Memory state around the buggy address: [ 34.481060] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.481368] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.481614] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.482409] ^ [ 34.482464] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.482611] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.482785] ================================================================== [ 34.136980] ================================================================== [ 34.137268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 34.137331] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.137386] [ 34.137491] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.137585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.137862] Hardware name: linux,dummy-virt (DT) [ 34.137923] Call trace: [ 34.137950] show_stack+0x20/0x38 (C) [ 34.138007] dump_stack_lvl+0x8c/0xd0 [ 34.138353] print_report+0x118/0x5e8 [ 34.138431] kasan_report+0xdc/0x128 [ 34.138700] kasan_check_range+0x100/0x1a8 [ 34.138844] __kasan_check_write+0x20/0x30 [ 34.138899] kasan_atomics_helper+0x684/0x4858 [ 34.138951] kasan_atomics+0x198/0x2e0 [ 34.139157] kunit_try_run_case+0x170/0x3f0 [ 34.139325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.139393] kthread+0x328/0x630 [ 34.139438] ret_from_fork+0x10/0x20 [ 34.139731] [ 34.139783] Allocated by task 296: [ 34.139924] kasan_save_stack+0x3c/0x68 [ 34.139992] kasan_save_track+0x20/0x40 [ 34.140031] kasan_save_alloc_info+0x40/0x58 [ 34.140076] __kasan_kmalloc+0xd4/0xd8 [ 34.140123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.140710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.140784] kthread+0x328/0x630 [ 34.140826] ret_from_fork+0x10/0x20 [ 34.141125] [ 34.141213] The buggy address belongs to the object at fff00000c9708480 [ 34.141213] which belongs to the cache kmalloc-64 of size 64 [ 34.141554] [ 34.141684] The buggy address belongs to the physical page: [ 34.141789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.142164] page_type: f5(slab) [ 34.142242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.142621] page dumped because: kasan: bad access detected [ 34.142765] [ 34.142849] Memory state around the buggy address: [ 34.143164] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.143216] ^ [ 34.143295] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.143570] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.143625] ================================================================== [ 34.361639] ================================================================== [ 34.361853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 34.362035] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.362117] [ 34.362178] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.362350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.362409] Hardware name: linux,dummy-virt (DT) [ 34.362444] Call trace: [ 34.362546] show_stack+0x20/0x38 (C) [ 34.362599] dump_stack_lvl+0x8c/0xd0 [ 34.362648] print_report+0x118/0x5e8 [ 34.362692] kasan_report+0xdc/0x128 [ 34.362951] kasan_check_range+0x100/0x1a8 [ 34.363107] __kasan_check_write+0x20/0x30 [ 34.363176] kasan_atomics_helper+0x11f8/0x4858 [ 34.363396] kasan_atomics+0x198/0x2e0 [ 34.363593] kunit_try_run_case+0x170/0x3f0 [ 34.363675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.363800] kthread+0x328/0x630 [ 34.363877] ret_from_fork+0x10/0x20 [ 34.364072] [ 34.364150] Allocated by task 296: [ 34.364387] kasan_save_stack+0x3c/0x68 [ 34.364666] kasan_save_track+0x20/0x40 [ 34.364713] kasan_save_alloc_info+0x40/0x58 [ 34.364762] __kasan_kmalloc+0xd4/0xd8 [ 34.364800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.364843] kasan_atomics+0xb8/0x2e0 [ 34.364960] kunit_try_run_case+0x170/0x3f0 [ 34.365038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.365180] kthread+0x328/0x630 [ 34.365279] ret_from_fork+0x10/0x20 [ 34.365608] [ 34.365664] The buggy address belongs to the object at fff00000c9708480 [ 34.365664] which belongs to the cache kmalloc-64 of size 64 [ 34.365758] The buggy address is located 0 bytes to the right of [ 34.365758] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.365907] [ 34.365965] The buggy address belongs to the physical page: [ 34.366192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.366365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.366458] page_type: f5(slab) [ 34.366526] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.366761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.366949] page dumped because: kasan: bad access detected [ 34.367020] [ 34.367119] Memory state around the buggy address: [ 34.367157] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.367420] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.367558] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.367626] ^ [ 34.367873] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.368063] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.368151] ================================================================== [ 34.313160] ================================================================== [ 34.313216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 34.313276] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.313392] [ 34.313452] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.313569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.313600] Hardware name: linux,dummy-virt (DT) [ 34.313630] Call trace: [ 34.313654] show_stack+0x20/0x38 (C) [ 34.313877] dump_stack_lvl+0x8c/0xd0 [ 34.313942] print_report+0x118/0x5e8 [ 34.314050] kasan_report+0xdc/0x128 [ 34.314136] kasan_check_range+0x100/0x1a8 [ 34.314353] __kasan_check_write+0x20/0x30 [ 34.314456] kasan_atomics_helper+0xeb8/0x4858 [ 34.314512] kasan_atomics+0x198/0x2e0 [ 34.314558] kunit_try_run_case+0x170/0x3f0 [ 34.314612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.314664] kthread+0x328/0x630 [ 34.314826] ret_from_fork+0x10/0x20 [ 34.314890] [ 34.315026] Allocated by task 296: [ 34.315075] kasan_save_stack+0x3c/0x68 [ 34.315195] kasan_save_track+0x20/0x40 [ 34.315244] kasan_save_alloc_info+0x40/0x58 [ 34.315299] __kasan_kmalloc+0xd4/0xd8 [ 34.315337] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.315387] kasan_atomics+0xb8/0x2e0 [ 34.315425] kunit_try_run_case+0x170/0x3f0 [ 34.315465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.315609] kthread+0x328/0x630 [ 34.315657] ret_from_fork+0x10/0x20 [ 34.315696] [ 34.315992] The buggy address belongs to the object at fff00000c9708480 [ 34.315992] which belongs to the cache kmalloc-64 of size 64 [ 34.316127] The buggy address is located 0 bytes to the right of [ 34.316127] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.316432] [ 34.316583] The buggy address belongs to the physical page: [ 34.316642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.316769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.316909] page_type: f5(slab) [ 34.317030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.317093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.317136] page dumped because: kasan: bad access detected [ 34.317175] [ 34.317195] Memory state around the buggy address: [ 34.317227] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.317491] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.317597] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.317666] ^ [ 34.317861] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.318108] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.318197] ================================================================== [ 34.330553] ================================================================== [ 34.330607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 34.330659] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.330719] [ 34.330749] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.331071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.331192] Hardware name: linux,dummy-virt (DT) [ 34.331248] Call trace: [ 34.331275] show_stack+0x20/0x38 (C) [ 34.331331] dump_stack_lvl+0x8c/0xd0 [ 34.331524] print_report+0x118/0x5e8 [ 34.331810] kasan_report+0xdc/0x128 [ 34.331874] kasan_check_range+0x100/0x1a8 [ 34.331952] __kasan_check_write+0x20/0x30 [ 34.332040] kasan_atomics_helper+0xff0/0x4858 [ 34.332121] kasan_atomics+0x198/0x2e0 [ 34.332224] kunit_try_run_case+0x170/0x3f0 [ 34.332374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.332471] kthread+0x328/0x630 [ 34.332579] ret_from_fork+0x10/0x20 [ 34.332630] [ 34.332666] Allocated by task 296: [ 34.332701] kasan_save_stack+0x3c/0x68 [ 34.332977] kasan_save_track+0x20/0x40 [ 34.333050] kasan_save_alloc_info+0x40/0x58 [ 34.333530] __kasan_kmalloc+0xd4/0xd8 [ 34.333614] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.333678] kasan_atomics+0xb8/0x2e0 [ 34.333751] kunit_try_run_case+0x170/0x3f0 [ 34.333979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.334075] kthread+0x328/0x630 [ 34.334205] ret_from_fork+0x10/0x20 [ 34.334246] [ 34.334275] The buggy address belongs to the object at fff00000c9708480 [ 34.334275] which belongs to the cache kmalloc-64 of size 64 [ 34.334552] The buggy address is located 0 bytes to the right of [ 34.334552] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.334675] [ 34.334724] The buggy address belongs to the physical page: [ 34.334787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.334950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.335138] page_type: f5(slab) [ 34.335213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.335280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.335393] page dumped because: kasan: bad access detected [ 34.335462] [ 34.335536] Memory state around the buggy address: [ 34.335575] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.335620] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.335908] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.336023] ^ [ 34.336102] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.336191] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.336444] ================================================================== [ 34.172580] ================================================================== [ 34.172633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 34.172765] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.172819] [ 34.172877] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.172969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.172997] Hardware name: linux,dummy-virt (DT) [ 34.173337] Call trace: [ 34.173387] show_stack+0x20/0x38 (C) [ 34.173453] dump_stack_lvl+0x8c/0xd0 [ 34.173574] print_report+0x118/0x5e8 [ 34.173638] kasan_report+0xdc/0x128 [ 34.173705] __asan_report_load4_noabort+0x20/0x30 [ 34.176866] page_type: f5(slab) [ 34.178033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.181623] kasan_save_alloc_info+0x40/0x58 [ 34.181689] __kasan_kmalloc+0xd4/0xd8 [ 34.182037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.182161] kasan_atomics+0xb8/0x2e0 [ 34.182218] kunit_try_run_case+0x170/0x3f0 [ 34.182297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.182675] kthread+0x328/0x630 [ 34.182749] ret_from_fork+0x10/0x20 [ 34.183033] [ 34.183071] The buggy address belongs to the object at fff00000c9708480 [ 34.183071] which belongs to the cache kmalloc-64 of size 64 [ 34.183169] The buggy address is located 0 bytes to the right of [ 34.183169] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.183302] [ 34.183381] The buggy address belongs to the physical page: [ 34.183738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.183816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.183933] page_type: f5(slab) [ 34.184017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.184328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.184541] page dumped because: kasan: bad access detected [ 34.184616] [ 34.184646] Memory state around the buggy address: [ 34.184932] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.185011] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.185815] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.190271] kasan_save_alloc_info+0x40/0x58 [ 34.194675] kasan_atomics+0x198/0x2e0 [ 34.196971] [ 34.197032] The buggy address belongs to the physical page: [ 34.197140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.197196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.197248] page_type: f5(slab) [ 34.197287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.197574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.198041] page dumped because: kasan: bad access detected [ 34.198157] [ 34.198216] Memory state around the buggy address: [ 34.198337] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.198386] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.198456] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.198757] ^ [ 34.198825] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.198908] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.198963] ================================================================== [ 34.396860] ================================================================== [ 34.396917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 34.396970] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.397022] [ 34.397059] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.397461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.397601] Hardware name: linux,dummy-virt (DT) [ 34.397755] Call trace: [ 34.397801] show_stack+0x20/0x38 (C) [ 34.397850] dump_stack_lvl+0x8c/0xd0 [ 34.397899] print_report+0x118/0x5e8 [ 34.397942] kasan_report+0xdc/0x128 [ 34.397988] kasan_check_range+0x100/0x1a8 [ 34.398046] __kasan_check_write+0x20/0x30 [ 34.398123] kasan_atomics_helper+0x1414/0x4858 [ 34.398173] kasan_atomics+0x198/0x2e0 [ 34.398220] kunit_try_run_case+0x170/0x3f0 [ 34.398267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.398320] kthread+0x328/0x630 [ 34.398457] ret_from_fork+0x10/0x20 [ 34.398680] [ 34.398736] Allocated by task 296: [ 34.398768] kasan_save_stack+0x3c/0x68 [ 34.398810] kasan_save_track+0x20/0x40 [ 34.398848] kasan_save_alloc_info+0x40/0x58 [ 34.399378] __kasan_kmalloc+0xd4/0xd8 [ 34.399442] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.399574] kasan_atomics+0xb8/0x2e0 [ 34.399673] kunit_try_run_case+0x170/0x3f0 [ 34.399815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.399904] kthread+0x328/0x630 [ 34.399940] ret_from_fork+0x10/0x20 [ 34.400090] [ 34.400115] The buggy address belongs to the object at fff00000c9708480 [ 34.400115] which belongs to the cache kmalloc-64 of size 64 [ 34.400265] The buggy address is located 0 bytes to the right of [ 34.400265] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.400399] [ 34.400469] The buggy address belongs to the physical page: [ 34.400519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.400572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.400659] page_type: f5(slab) [ 34.400741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.400792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.400933] page dumped because: kasan: bad access detected [ 34.400966] [ 34.401033] Memory state around the buggy address: [ 34.401138] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.401183] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.401296] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.401473] ^ [ 34.401508] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.401564] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.401622] ================================================================== [ 34.160591] ================================================================== [ 34.160645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 34.160858] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.161031] [ 34.161102] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.161190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.161218] Hardware name: linux,dummy-virt (DT) [ 34.161338] Call trace: [ 34.161396] show_stack+0x20/0x38 (C) [ 34.161451] dump_stack_lvl+0x8c/0xd0 [ 34.161643] print_report+0x118/0x5e8 [ 34.161693] kasan_report+0xdc/0x128 [ 34.161753] kasan_check_range+0x100/0x1a8 [ 34.161801] __kasan_check_write+0x20/0x30 [ 34.161849] kasan_atomics_helper+0x7cc/0x4858 [ 34.161898] kasan_atomics+0x198/0x2e0 [ 34.161946] kunit_try_run_case+0x170/0x3f0 [ 34.161993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.162049] kthread+0x328/0x630 [ 34.162102] ret_from_fork+0x10/0x20 [ 34.162150] [ 34.162171] Allocated by task 296: [ 34.162200] kasan_save_stack+0x3c/0x68 [ 34.162241] kasan_save_track+0x20/0x40 [ 34.162278] kasan_save_alloc_info+0x40/0x58 [ 34.162318] __kasan_kmalloc+0xd4/0xd8 [ 34.162408] kasan_atomics+0xb8/0x2e0 [ 34.164060] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.165857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.168835] [ 34.170094] page dumped because: kasan: bad access detected [ 34.170658] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.170750] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.170860] ^ [ 34.170928] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.170981] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.171297] ================================================================== [ 34.526711] ================================================================== [ 34.526763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 34.526819] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.526871] [ 34.526904] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.528334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.528479] Hardware name: linux,dummy-virt (DT) [ 34.528618] Call trace: [ 34.528877] show_stack+0x20/0x38 (C) [ 34.528974] dump_stack_lvl+0x8c/0xd0 [ 34.529026] print_report+0x118/0x5e8 [ 34.529071] kasan_report+0xdc/0x128 [ 34.530441] __asan_report_load8_noabort+0x20/0x30 [ 34.530710] kasan_atomics_helper+0x3e20/0x4858 [ 34.531460] kasan_atomics+0x198/0x2e0 [ 34.532444] kunit_try_run_case+0x170/0x3f0 [ 34.532617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.533088] kthread+0x328/0x630 [ 34.533341] ret_from_fork+0x10/0x20 [ 34.533762] [ 34.533882] Allocated by task 296: [ 34.533980] kasan_save_stack+0x3c/0x68 [ 34.534104] kasan_save_track+0x20/0x40 [ 34.534290] kasan_save_alloc_info+0x40/0x58 [ 34.534910] __kasan_kmalloc+0xd4/0xd8 [ 34.535525] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.535638] kasan_atomics+0xb8/0x2e0 [ 34.535917] kunit_try_run_case+0x170/0x3f0 [ 34.536212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.536568] kthread+0x328/0x630 [ 34.536623] ret_from_fork+0x10/0x20 [ 34.536661] [ 34.536850] The buggy address belongs to the object at fff00000c9708480 [ 34.536850] which belongs to the cache kmalloc-64 of size 64 [ 34.537333] The buggy address is located 0 bytes to the right of [ 34.537333] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.538210] [ 34.538236] The buggy address belongs to the physical page: [ 34.538272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.538328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.538381] page_type: f5(slab) [ 34.538423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.538473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.538515] page dumped because: kasan: bad access detected [ 34.538546] [ 34.538567] Memory state around the buggy address: [ 34.538601] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.538645] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.538690] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.538730] ^ [ 34.538765] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.538807] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.538848] ================================================================== [ 34.375257] ================================================================== [ 34.375777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 34.375901] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.375989] [ 34.376149] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.376273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.376408] Hardware name: linux,dummy-virt (DT) [ 34.376453] Call trace: [ 34.376478] show_stack+0x20/0x38 (C) [ 34.376551] dump_stack_lvl+0x8c/0xd0 [ 34.376606] print_report+0x118/0x5e8 [ 34.376833] kasan_report+0xdc/0x128 [ 34.376937] kasan_check_range+0x100/0x1a8 [ 34.377181] __kasan_check_write+0x20/0x30 [ 34.377290] kasan_atomics_helper+0x12d8/0x4858 [ 34.377347] kasan_atomics+0x198/0x2e0 [ 34.377643] kunit_try_run_case+0x170/0x3f0 [ 34.377742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.377927] kthread+0x328/0x630 [ 34.377997] ret_from_fork+0x10/0x20 [ 34.378107] [ 34.378137] Allocated by task 296: [ 34.378168] kasan_save_stack+0x3c/0x68 [ 34.378210] kasan_save_track+0x20/0x40 [ 34.378256] kasan_save_alloc_info+0x40/0x58 [ 34.378306] __kasan_kmalloc+0xd4/0xd8 [ 34.378343] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.378388] kasan_atomics+0xb8/0x2e0 [ 34.378425] kunit_try_run_case+0x170/0x3f0 [ 34.378472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.378536] kthread+0x328/0x630 [ 34.378573] ret_from_fork+0x10/0x20 [ 34.378622] [ 34.378646] The buggy address belongs to the object at fff00000c9708480 [ 34.378646] which belongs to the cache kmalloc-64 of size 64 [ 34.378706] The buggy address is located 0 bytes to the right of [ 34.378706] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.378773] [ 34.378804] The buggy address belongs to the physical page: [ 34.378839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.378903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.378951] page_type: f5(slab) [ 34.379006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.379064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.379568] page dumped because: kasan: bad access detected [ 34.379609] [ 34.379630] Memory state around the buggy address: [ 34.379666] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.379879] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.379966] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.380373] ^ [ 34.380449] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.380533] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.380677] ==================================================================
[ 27.711638] ================================================================== [ 27.712293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 27.712642] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.713199] [ 27.713325] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.713377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.713391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.713416] Call Trace: [ 27.713436] <TASK> [ 27.713454] dump_stack_lvl+0x73/0xb0 [ 27.713487] print_report+0xd1/0x640 [ 27.713776] ? __virt_addr_valid+0x1db/0x2d0 [ 27.713808] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.713840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.713868] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.713890] kasan_report+0x141/0x180 [ 27.714126] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.714157] kasan_check_range+0x10c/0x1c0 [ 27.714182] __kasan_check_write+0x18/0x20 [ 27.714207] kasan_atomics_helper+0x12e6/0x5450 [ 27.714231] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.714254] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.714279] ? kasan_atomics+0x152/0x310 [ 27.714318] kasan_atomics+0x1dc/0x310 [ 27.714344] ? __pfx_kasan_atomics+0x10/0x10 [ 27.714368] ? __pfx_read_tsc+0x10/0x10 [ 27.714391] ? ktime_get_ts64+0x86/0x230 [ 27.714417] kunit_try_run_case+0x1a5/0x480 [ 27.714443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.714466] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.714502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.714536] ? __kthread_parkme+0x82/0x180 [ 27.714557] ? preempt_count_sub+0x50/0x80 [ 27.714582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.714607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.714635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.714665] kthread+0x337/0x6f0 [ 27.714686] ? trace_preempt_on+0x20/0xc0 [ 27.714711] ? __pfx_kthread+0x10/0x10 [ 27.714733] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.714763] ? calculate_sigpending+0x7b/0xa0 [ 27.714788] ? __pfx_kthread+0x10/0x10 [ 27.714825] ret_from_fork+0x116/0x1d0 [ 27.714860] ? __pfx_kthread+0x10/0x10 [ 27.714881] ret_from_fork_asm+0x1a/0x30 [ 27.714914] </TASK> [ 27.714926] [ 27.726883] Allocated by task 313: [ 27.727227] kasan_save_stack+0x45/0x70 [ 27.727622] kasan_save_track+0x18/0x40 [ 27.727917] kasan_save_alloc_info+0x3b/0x50 [ 27.728240] __kasan_kmalloc+0xb7/0xc0 [ 27.728438] __kmalloc_cache_noprof+0x189/0x420 [ 27.728636] kasan_atomics+0x95/0x310 [ 27.728802] kunit_try_run_case+0x1a5/0x480 [ 27.729351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.729786] kthread+0x337/0x6f0 [ 27.730142] ret_from_fork+0x116/0x1d0 [ 27.730333] ret_from_fork_asm+0x1a/0x30 [ 27.730518] [ 27.730606] The buggy address belongs to the object at ffff8881053c7b80 [ 27.730606] which belongs to the cache kmalloc-64 of size 64 [ 27.731738] The buggy address is located 0 bytes to the right of [ 27.731738] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.732649] [ 27.732878] The buggy address belongs to the physical page: [ 27.733428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.734290] flags: 0x200000000000000(node=0|zone=2) [ 27.734549] page_type: f5(slab) [ 27.734713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.735336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.735838] page dumped because: kasan: bad access detected [ 27.736210] [ 27.736299] Memory state around the buggy address: [ 27.736508] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.737058] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.737480] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.738037] ^ [ 27.738419] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.738730] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.739289] ================================================================== [ 27.296070] ================================================================== [ 27.297034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 27.297335] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.297929] [ 27.298257] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.298326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.298398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.298421] Call Trace: [ 27.298440] <TASK> [ 27.298459] dump_stack_lvl+0x73/0xb0 [ 27.298493] print_report+0xd1/0x640 [ 27.298516] ? __virt_addr_valid+0x1db/0x2d0 [ 27.298540] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.298560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.298585] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.298606] kasan_report+0x141/0x180 [ 27.298627] ? kasan_atomics_helper+0xa2b/0x5450 [ 27.298657] kasan_check_range+0x10c/0x1c0 [ 27.298680] __kasan_check_write+0x18/0x20 [ 27.298702] kasan_atomics_helper+0xa2b/0x5450 [ 27.298724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.298745] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.298769] ? kasan_atomics+0x152/0x310 [ 27.298846] kasan_atomics+0x1dc/0x310 [ 27.298873] ? __pfx_kasan_atomics+0x10/0x10 [ 27.298896] ? __pfx_read_tsc+0x10/0x10 [ 27.298917] ? ktime_get_ts64+0x86/0x230 [ 27.298943] kunit_try_run_case+0x1a5/0x480 [ 27.298970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.298993] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.299028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.299061] ? __kthread_parkme+0x82/0x180 [ 27.299082] ? preempt_count_sub+0x50/0x80 [ 27.299105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.299128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.299151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.299173] kthread+0x337/0x6f0 [ 27.299193] ? trace_preempt_on+0x20/0xc0 [ 27.299216] ? __pfx_kthread+0x10/0x10 [ 27.299236] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.299266] ? calculate_sigpending+0x7b/0xa0 [ 27.299301] ? __pfx_kthread+0x10/0x10 [ 27.299322] ret_from_fork+0x116/0x1d0 [ 27.299342] ? __pfx_kthread+0x10/0x10 [ 27.299361] ret_from_fork_asm+0x1a/0x30 [ 27.299392] </TASK> [ 27.299403] [ 27.310615] Allocated by task 313: [ 27.310877] kasan_save_stack+0x45/0x70 [ 27.311281] kasan_save_track+0x18/0x40 [ 27.311454] kasan_save_alloc_info+0x3b/0x50 [ 27.311670] __kasan_kmalloc+0xb7/0xc0 [ 27.311814] __kmalloc_cache_noprof+0x189/0x420 [ 27.312511] kasan_atomics+0x95/0x310 [ 27.312682] kunit_try_run_case+0x1a5/0x480 [ 27.312898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.313381] kthread+0x337/0x6f0 [ 27.313544] ret_from_fork+0x116/0x1d0 [ 27.313713] ret_from_fork_asm+0x1a/0x30 [ 27.314309] [ 27.314407] The buggy address belongs to the object at ffff8881053c7b80 [ 27.314407] which belongs to the cache kmalloc-64 of size 64 [ 27.314832] The buggy address is located 0 bytes to the right of [ 27.314832] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.315537] [ 27.315611] The buggy address belongs to the physical page: [ 27.315845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.316175] flags: 0x200000000000000(node=0|zone=2) [ 27.316391] page_type: f5(slab) [ 27.316547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.316840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.317147] page dumped because: kasan: bad access detected [ 27.317996] [ 27.318092] Memory state around the buggy address: [ 27.318250] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.318721] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.319184] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.319443] ^ [ 27.319909] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.320338] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.320713] ================================================================== [ 28.183375] ================================================================== [ 28.183608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 28.183910] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.184198] [ 28.184380] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.184432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.184445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.184469] Call Trace: [ 28.184487] <TASK> [ 28.184503] dump_stack_lvl+0x73/0xb0 [ 28.184537] print_report+0xd1/0x640 [ 28.184560] ? __virt_addr_valid+0x1db/0x2d0 [ 28.184585] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.184606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.184632] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.184653] kasan_report+0x141/0x180 [ 28.184677] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.184703] kasan_check_range+0x10c/0x1c0 [ 28.184726] __kasan_check_write+0x18/0x20 [ 28.184750] kasan_atomics_helper+0x1e12/0x5450 [ 28.184798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.184822] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.184847] ? kasan_atomics+0x152/0x310 [ 28.184885] kasan_atomics+0x1dc/0x310 [ 28.184907] ? __pfx_kasan_atomics+0x10/0x10 [ 28.184931] ? __pfx_read_tsc+0x10/0x10 [ 28.184983] ? ktime_get_ts64+0x86/0x230 [ 28.185008] kunit_try_run_case+0x1a5/0x480 [ 28.185043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.185066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.185102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.185136] ? __kthread_parkme+0x82/0x180 [ 28.185156] ? preempt_count_sub+0x50/0x80 [ 28.185200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.185224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.185248] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.185271] kthread+0x337/0x6f0 [ 28.185291] ? trace_preempt_on+0x20/0xc0 [ 28.185316] ? __pfx_kthread+0x10/0x10 [ 28.185346] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.185377] ? calculate_sigpending+0x7b/0xa0 [ 28.185434] ? __pfx_kthread+0x10/0x10 [ 28.185459] ret_from_fork+0x116/0x1d0 [ 28.185479] ? __pfx_kthread+0x10/0x10 [ 28.185511] ret_from_fork_asm+0x1a/0x30 [ 28.185543] </TASK> [ 28.185554] [ 28.200115] Allocated by task 313: [ 28.200313] kasan_save_stack+0x45/0x70 [ 28.200785] kasan_save_track+0x18/0x40 [ 28.201076] kasan_save_alloc_info+0x3b/0x50 [ 28.201252] __kasan_kmalloc+0xb7/0xc0 [ 28.201431] __kmalloc_cache_noprof+0x189/0x420 [ 28.201617] kasan_atomics+0x95/0x310 [ 28.201785] kunit_try_run_case+0x1a5/0x480 [ 28.202408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.202896] kthread+0x337/0x6f0 [ 28.203185] ret_from_fork+0x116/0x1d0 [ 28.203359] ret_from_fork_asm+0x1a/0x30 [ 28.203495] [ 28.203562] The buggy address belongs to the object at ffff8881053c7b80 [ 28.203562] which belongs to the cache kmalloc-64 of size 64 [ 28.204044] The buggy address is located 0 bytes to the right of [ 28.204044] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.204624] [ 28.204796] The buggy address belongs to the physical page: [ 28.205090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.205506] flags: 0x200000000000000(node=0|zone=2) [ 28.205671] page_type: f5(slab) [ 28.205888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.206198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.206541] page dumped because: kasan: bad access detected [ 28.206712] [ 28.206775] Memory state around the buggy address: [ 28.206921] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.207335] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.207726] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.207924] ^ [ 28.208185] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.208879] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.209142] ================================================================== [ 28.469618] ================================================================== [ 28.469997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 28.470327] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.470623] [ 28.470728] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.470776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.470789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.470830] Call Trace: [ 28.470847] <TASK> [ 28.470863] dump_stack_lvl+0x73/0xb0 [ 28.470894] print_report+0xd1/0x640 [ 28.470916] ? __virt_addr_valid+0x1db/0x2d0 [ 28.470940] ? kasan_atomics_helper+0x5115/0x5450 [ 28.470962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.470988] ? kasan_atomics_helper+0x5115/0x5450 [ 28.471010] kasan_report+0x141/0x180 [ 28.471050] ? kasan_atomics_helper+0x5115/0x5450 [ 28.471077] __asan_report_load8_noabort+0x18/0x20 [ 28.471115] kasan_atomics_helper+0x5115/0x5450 [ 28.471138] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.471174] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.471211] ? kasan_atomics+0x152/0x310 [ 28.471251] kasan_atomics+0x1dc/0x310 [ 28.471288] ? __pfx_kasan_atomics+0x10/0x10 [ 28.471325] ? __pfx_read_tsc+0x10/0x10 [ 28.471372] ? ktime_get_ts64+0x86/0x230 [ 28.471410] kunit_try_run_case+0x1a5/0x480 [ 28.471449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.471485] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.471535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.471569] ? __kthread_parkme+0x82/0x180 [ 28.471590] ? preempt_count_sub+0x50/0x80 [ 28.471614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.471641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.471667] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.471692] kthread+0x337/0x6f0 [ 28.471712] ? trace_preempt_on+0x20/0xc0 [ 28.471736] ? __pfx_kthread+0x10/0x10 [ 28.471757] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.471788] ? calculate_sigpending+0x7b/0xa0 [ 28.471812] ? __pfx_kthread+0x10/0x10 [ 28.471834] ret_from_fork+0x116/0x1d0 [ 28.471855] ? __pfx_kthread+0x10/0x10 [ 28.471875] ret_from_fork_asm+0x1a/0x30 [ 28.471907] </TASK> [ 28.471919] [ 28.479088] Allocated by task 313: [ 28.479257] kasan_save_stack+0x45/0x70 [ 28.479429] kasan_save_track+0x18/0x40 [ 28.479556] kasan_save_alloc_info+0x3b/0x50 [ 28.479695] __kasan_kmalloc+0xb7/0xc0 [ 28.479845] __kmalloc_cache_noprof+0x189/0x420 [ 28.480060] kasan_atomics+0x95/0x310 [ 28.480260] kunit_try_run_case+0x1a5/0x480 [ 28.480485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.480680] kthread+0x337/0x6f0 [ 28.480842] ret_from_fork+0x116/0x1d0 [ 28.481020] ret_from_fork_asm+0x1a/0x30 [ 28.481207] [ 28.481304] The buggy address belongs to the object at ffff8881053c7b80 [ 28.481304] which belongs to the cache kmalloc-64 of size 64 [ 28.481788] The buggy address is located 0 bytes to the right of [ 28.481788] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.482282] [ 28.482379] The buggy address belongs to the physical page: [ 28.482596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.482929] flags: 0x200000000000000(node=0|zone=2) [ 28.483155] page_type: f5(slab) [ 28.483315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.483615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.483970] page dumped because: kasan: bad access detected [ 28.484247] [ 28.484347] Memory state around the buggy address: [ 28.484553] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.484894] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.485201] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.485514] ^ [ 28.485724] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.486024] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.486260] ================================================================== [ 28.150398] ================================================================== [ 28.151504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 28.151766] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.152074] [ 28.152164] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.152215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.152228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.152252] Call Trace: [ 28.152273] <TASK> [ 28.152292] dump_stack_lvl+0x73/0xb0 [ 28.152338] print_report+0xd1/0x640 [ 28.152381] ? __virt_addr_valid+0x1db/0x2d0 [ 28.152405] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.152427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.152453] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.152475] kasan_report+0x141/0x180 [ 28.152498] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.152524] kasan_check_range+0x10c/0x1c0 [ 28.152548] __kasan_check_write+0x18/0x20 [ 28.152572] kasan_atomics_helper+0x1d7a/0x5450 [ 28.152595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.152617] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.152642] ? kasan_atomics+0x152/0x310 [ 28.152668] kasan_atomics+0x1dc/0x310 [ 28.152691] ? __pfx_kasan_atomics+0x10/0x10 [ 28.152715] ? __pfx_read_tsc+0x10/0x10 [ 28.152737] ? ktime_get_ts64+0x86/0x230 [ 28.152763] kunit_try_run_case+0x1a5/0x480 [ 28.152788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.152811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.152847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.152921] ? __kthread_parkme+0x82/0x180 [ 28.152968] ? preempt_count_sub+0x50/0x80 [ 28.152992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.153016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.153040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.153064] kthread+0x337/0x6f0 [ 28.153084] ? trace_preempt_on+0x20/0xc0 [ 28.153108] ? __pfx_kthread+0x10/0x10 [ 28.153129] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.153160] ? calculate_sigpending+0x7b/0xa0 [ 28.153185] ? __pfx_kthread+0x10/0x10 [ 28.153207] ret_from_fork+0x116/0x1d0 [ 28.153227] ? __pfx_kthread+0x10/0x10 [ 28.153248] ret_from_fork_asm+0x1a/0x30 [ 28.153280] </TASK> [ 28.153293] [ 28.168043] Allocated by task 313: [ 28.168293] kasan_save_stack+0x45/0x70 [ 28.168660] kasan_save_track+0x18/0x40 [ 28.169100] kasan_save_alloc_info+0x3b/0x50 [ 28.169662] __kasan_kmalloc+0xb7/0xc0 [ 28.170061] __kmalloc_cache_noprof+0x189/0x420 [ 28.170547] kasan_atomics+0x95/0x310 [ 28.170826] kunit_try_run_case+0x1a5/0x480 [ 28.171332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.171592] kthread+0x337/0x6f0 [ 28.171941] ret_from_fork+0x116/0x1d0 [ 28.172408] ret_from_fork_asm+0x1a/0x30 [ 28.172587] [ 28.172658] The buggy address belongs to the object at ffff8881053c7b80 [ 28.172658] which belongs to the cache kmalloc-64 of size 64 [ 28.173606] The buggy address is located 0 bytes to the right of [ 28.173606] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.174634] [ 28.174818] The buggy address belongs to the physical page: [ 28.175438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.176122] flags: 0x200000000000000(node=0|zone=2) [ 28.176631] page_type: f5(slab) [ 28.176913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.177579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.177803] page dumped because: kasan: bad access detected [ 28.177970] [ 28.178127] Memory state around the buggy address: [ 28.178596] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.179591] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.180455] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.181237] ^ [ 28.181677] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.182258] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.182972] ================================================================== [ 27.617442] ================================================================== [ 27.618062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 27.618407] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.618962] [ 27.619044] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.619092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.619105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.619129] Call Trace: [ 27.619145] <TASK> [ 27.619161] dump_stack_lvl+0x73/0xb0 [ 27.619191] print_report+0xd1/0x640 [ 27.619214] ? __virt_addr_valid+0x1db/0x2d0 [ 27.619237] ? kasan_atomics_helper+0x1148/0x5450 [ 27.619258] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.619285] ? kasan_atomics_helper+0x1148/0x5450 [ 27.619319] kasan_report+0x141/0x180 [ 27.619341] ? kasan_atomics_helper+0x1148/0x5450 [ 27.619367] kasan_check_range+0x10c/0x1c0 [ 27.619391] __kasan_check_write+0x18/0x20 [ 27.619415] kasan_atomics_helper+0x1148/0x5450 [ 27.619438] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.619461] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.619487] ? kasan_atomics+0x152/0x310 [ 27.619513] kasan_atomics+0x1dc/0x310 [ 27.619536] ? __pfx_kasan_atomics+0x10/0x10 [ 27.619560] ? __pfx_read_tsc+0x10/0x10 [ 27.619582] ? ktime_get_ts64+0x86/0x230 [ 27.619608] kunit_try_run_case+0x1a5/0x480 [ 27.619632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.619655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.619690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.619724] ? __kthread_parkme+0x82/0x180 [ 27.619745] ? preempt_count_sub+0x50/0x80 [ 27.619769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.619793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.619816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.619841] kthread+0x337/0x6f0 [ 27.619861] ? trace_preempt_on+0x20/0xc0 [ 27.619885] ? __pfx_kthread+0x10/0x10 [ 27.619906] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.619936] ? calculate_sigpending+0x7b/0xa0 [ 27.619961] ? __pfx_kthread+0x10/0x10 [ 27.619983] ret_from_fork+0x116/0x1d0 [ 27.620037] ? __pfx_kthread+0x10/0x10 [ 27.620059] ret_from_fork_asm+0x1a/0x30 [ 27.620090] </TASK> [ 27.620102] [ 27.628555] Allocated by task 313: [ 27.628732] kasan_save_stack+0x45/0x70 [ 27.628946] kasan_save_track+0x18/0x40 [ 27.629139] kasan_save_alloc_info+0x3b/0x50 [ 27.629353] __kasan_kmalloc+0xb7/0xc0 [ 27.629536] __kmalloc_cache_noprof+0x189/0x420 [ 27.629750] kasan_atomics+0x95/0x310 [ 27.629931] kunit_try_run_case+0x1a5/0x480 [ 27.630131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.630366] kthread+0x337/0x6f0 [ 27.630482] ret_from_fork+0x116/0x1d0 [ 27.630610] ret_from_fork_asm+0x1a/0x30 [ 27.630827] [ 27.630921] The buggy address belongs to the object at ffff8881053c7b80 [ 27.630921] which belongs to the cache kmalloc-64 of size 64 [ 27.631634] The buggy address is located 0 bytes to the right of [ 27.631634] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.632138] [ 27.632232] The buggy address belongs to the physical page: [ 27.632423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.632779] flags: 0x200000000000000(node=0|zone=2) [ 27.633052] page_type: f5(slab) [ 27.633198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.633545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.633854] page dumped because: kasan: bad access detected [ 27.634044] [ 27.634133] Memory state around the buggy address: [ 27.634342] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.634613] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.634879] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.635183] ^ [ 27.635412] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.635656] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.635865] ================================================================== [ 28.299063] ================================================================== [ 28.299763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 28.300446] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.301087] [ 28.301270] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.301334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.301360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.301383] Call Trace: [ 28.301400] <TASK> [ 28.301417] dump_stack_lvl+0x73/0xb0 [ 28.301449] print_report+0xd1/0x640 [ 28.301472] ? __virt_addr_valid+0x1db/0x2d0 [ 28.301495] ? kasan_atomics_helper+0x2006/0x5450 [ 28.301516] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.301542] ? kasan_atomics_helper+0x2006/0x5450 [ 28.301573] kasan_report+0x141/0x180 [ 28.301596] ? kasan_atomics_helper+0x2006/0x5450 [ 28.301622] kasan_check_range+0x10c/0x1c0 [ 28.301646] __kasan_check_write+0x18/0x20 [ 28.301670] kasan_atomics_helper+0x2006/0x5450 [ 28.301693] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.301714] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.301739] ? kasan_atomics+0x152/0x310 [ 28.301765] kasan_atomics+0x1dc/0x310 [ 28.301787] ? __pfx_kasan_atomics+0x10/0x10 [ 28.301812] ? __pfx_read_tsc+0x10/0x10 [ 28.301862] ? ktime_get_ts64+0x86/0x230 [ 28.301904] kunit_try_run_case+0x1a5/0x480 [ 28.301930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.301953] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.301990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.302025] ? __kthread_parkme+0x82/0x180 [ 28.302045] ? preempt_count_sub+0x50/0x80 [ 28.302070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.302094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.302118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.302142] kthread+0x337/0x6f0 [ 28.302161] ? trace_preempt_on+0x20/0xc0 [ 28.302185] ? __pfx_kthread+0x10/0x10 [ 28.302206] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.302236] ? calculate_sigpending+0x7b/0xa0 [ 28.302261] ? __pfx_kthread+0x10/0x10 [ 28.302282] ret_from_fork+0x116/0x1d0 [ 28.302301] ? __pfx_kthread+0x10/0x10 [ 28.302321] ret_from_fork_asm+0x1a/0x30 [ 28.302362] </TASK> [ 28.302373] [ 28.315572] Allocated by task 313: [ 28.315948] kasan_save_stack+0x45/0x70 [ 28.316320] kasan_save_track+0x18/0x40 [ 28.316706] kasan_save_alloc_info+0x3b/0x50 [ 28.317139] __kasan_kmalloc+0xb7/0xc0 [ 28.317638] __kmalloc_cache_noprof+0x189/0x420 [ 28.317846] kasan_atomics+0x95/0x310 [ 28.317980] kunit_try_run_case+0x1a5/0x480 [ 28.318353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.318851] kthread+0x337/0x6f0 [ 28.319186] ret_from_fork+0x116/0x1d0 [ 28.319577] ret_from_fork_asm+0x1a/0x30 [ 28.319978] [ 28.320134] The buggy address belongs to the object at ffff8881053c7b80 [ 28.320134] which belongs to the cache kmalloc-64 of size 64 [ 28.321246] The buggy address is located 0 bytes to the right of [ 28.321246] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.322205] [ 28.322369] The buggy address belongs to the physical page: [ 28.322845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.323141] flags: 0x200000000000000(node=0|zone=2) [ 28.323562] page_type: f5(slab) [ 28.323858] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.324622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.325297] page dumped because: kasan: bad access detected [ 28.325496] [ 28.325560] Memory state around the buggy address: [ 28.325789] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.326277] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.326519] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.326731] ^ [ 28.326880] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.327105] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.327364] ================================================================== [ 27.429460] ================================================================== [ 27.429692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 27.430217] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.430573] [ 27.430764] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.430841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.430854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.430877] Call Trace: [ 27.430896] <TASK> [ 27.430913] dump_stack_lvl+0x73/0xb0 [ 27.430946] print_report+0xd1/0x640 [ 27.430970] ? __virt_addr_valid+0x1db/0x2d0 [ 27.430995] ? kasan_atomics_helper+0xde0/0x5450 [ 27.431016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.431043] ? kasan_atomics_helper+0xde0/0x5450 [ 27.431065] kasan_report+0x141/0x180 [ 27.431087] ? kasan_atomics_helper+0xde0/0x5450 [ 27.431114] kasan_check_range+0x10c/0x1c0 [ 27.431138] __kasan_check_write+0x18/0x20 [ 27.431162] kasan_atomics_helper+0xde0/0x5450 [ 27.431389] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.431424] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.431450] ? kasan_atomics+0x152/0x310 [ 27.431477] kasan_atomics+0x1dc/0x310 [ 27.431500] ? __pfx_kasan_atomics+0x10/0x10 [ 27.431569] ? __pfx_read_tsc+0x10/0x10 [ 27.431593] ? ktime_get_ts64+0x86/0x230 [ 27.431619] kunit_try_run_case+0x1a5/0x480 [ 27.431644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.431667] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.431735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.431768] ? __kthread_parkme+0x82/0x180 [ 27.431789] ? preempt_count_sub+0x50/0x80 [ 27.431927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.431953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.431977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.432001] kthread+0x337/0x6f0 [ 27.432021] ? trace_preempt_on+0x20/0xc0 [ 27.432045] ? __pfx_kthread+0x10/0x10 [ 27.432097] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.432129] ? calculate_sigpending+0x7b/0xa0 [ 27.432154] ? __pfx_kthread+0x10/0x10 [ 27.432176] ret_from_fork+0x116/0x1d0 [ 27.432196] ? __pfx_kthread+0x10/0x10 [ 27.432245] ret_from_fork_asm+0x1a/0x30 [ 27.432278] </TASK> [ 27.432289] [ 27.441387] Allocated by task 313: [ 27.441608] kasan_save_stack+0x45/0x70 [ 27.441927] kasan_save_track+0x18/0x40 [ 27.442195] kasan_save_alloc_info+0x3b/0x50 [ 27.442416] __kasan_kmalloc+0xb7/0xc0 [ 27.442560] __kmalloc_cache_noprof+0x189/0x420 [ 27.442710] kasan_atomics+0x95/0x310 [ 27.442833] kunit_try_run_case+0x1a5/0x480 [ 27.443029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.443284] kthread+0x337/0x6f0 [ 27.443683] ret_from_fork+0x116/0x1d0 [ 27.443881] ret_from_fork_asm+0x1a/0x30 [ 27.444085] [ 27.444174] The buggy address belongs to the object at ffff8881053c7b80 [ 27.444174] which belongs to the cache kmalloc-64 of size 64 [ 27.444558] The buggy address is located 0 bytes to the right of [ 27.444558] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.444935] [ 27.445022] The buggy address belongs to the physical page: [ 27.445261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.445997] flags: 0x200000000000000(node=0|zone=2) [ 27.446285] page_type: f5(slab) [ 27.446418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.446679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.447279] page dumped because: kasan: bad access detected [ 27.447757] [ 27.447971] Memory state around the buggy address: [ 27.448247] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.448891] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.449180] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.449478] ^ [ 27.449676] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.449957] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.450229] ================================================================== [ 27.653773] ================================================================== [ 27.654102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 27.654419] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.654667] [ 27.654743] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.654789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.654802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.654824] Call Trace: [ 27.654839] <TASK> [ 27.654853] dump_stack_lvl+0x73/0xb0 [ 27.654882] print_report+0xd1/0x640 [ 27.654904] ? __virt_addr_valid+0x1db/0x2d0 [ 27.654927] ? kasan_atomics_helper+0x1217/0x5450 [ 27.654947] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.654973] ? kasan_atomics_helper+0x1217/0x5450 [ 27.654994] kasan_report+0x141/0x180 [ 27.655016] ? kasan_atomics_helper+0x1217/0x5450 [ 27.655041] kasan_check_range+0x10c/0x1c0 [ 27.655064] __kasan_check_write+0x18/0x20 [ 27.655088] kasan_atomics_helper+0x1217/0x5450 [ 27.655110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.655131] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.655155] ? kasan_atomics+0x152/0x310 [ 27.655181] kasan_atomics+0x1dc/0x310 [ 27.655203] ? __pfx_kasan_atomics+0x10/0x10 [ 27.655226] ? __pfx_read_tsc+0x10/0x10 [ 27.655248] ? ktime_get_ts64+0x86/0x230 [ 27.655272] kunit_try_run_case+0x1a5/0x480 [ 27.655296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.655350] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.655388] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.655422] ? __kthread_parkme+0x82/0x180 [ 27.655443] ? preempt_count_sub+0x50/0x80 [ 27.655466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.655490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.655514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.655538] kthread+0x337/0x6f0 [ 27.655558] ? trace_preempt_on+0x20/0xc0 [ 27.655581] ? __pfx_kthread+0x10/0x10 [ 27.655602] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.655633] ? calculate_sigpending+0x7b/0xa0 [ 27.655658] ? __pfx_kthread+0x10/0x10 [ 27.655680] ret_from_fork+0x116/0x1d0 [ 27.655699] ? __pfx_kthread+0x10/0x10 [ 27.655720] ret_from_fork_asm+0x1a/0x30 [ 27.655752] </TASK> [ 27.655762] [ 27.668264] Allocated by task 313: [ 27.668413] kasan_save_stack+0x45/0x70 [ 27.669334] kasan_save_track+0x18/0x40 [ 27.669618] kasan_save_alloc_info+0x3b/0x50 [ 27.670262] __kasan_kmalloc+0xb7/0xc0 [ 27.670534] __kmalloc_cache_noprof+0x189/0x420 [ 27.671006] kasan_atomics+0x95/0x310 [ 27.671406] kunit_try_run_case+0x1a5/0x480 [ 27.671732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.672197] kthread+0x337/0x6f0 [ 27.672500] ret_from_fork+0x116/0x1d0 [ 27.672963] ret_from_fork_asm+0x1a/0x30 [ 27.673365] [ 27.673455] The buggy address belongs to the object at ffff8881053c7b80 [ 27.673455] which belongs to the cache kmalloc-64 of size 64 [ 27.674583] The buggy address is located 0 bytes to the right of [ 27.674583] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.675540] [ 27.675776] The buggy address belongs to the physical page: [ 27.676390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.677125] flags: 0x200000000000000(node=0|zone=2) [ 27.677515] page_type: f5(slab) [ 27.677674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.678492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.678956] page dumped because: kasan: bad access detected [ 27.679406] [ 27.679497] Memory state around the buggy address: [ 27.679982] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.680588] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.681080] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.681527] ^ [ 27.681743] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.682475] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.683001] ================================================================== [ 27.784187] ================================================================== [ 27.784528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 27.784851] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.785120] [ 27.785200] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.785248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.785262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.785284] Call Trace: [ 27.785303] <TASK> [ 27.785329] dump_stack_lvl+0x73/0xb0 [ 27.785359] print_report+0xd1/0x640 [ 27.785383] ? __virt_addr_valid+0x1db/0x2d0 [ 27.785406] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.785426] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.785453] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.785475] kasan_report+0x141/0x180 [ 27.785497] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.785523] __asan_report_load8_noabort+0x18/0x20 [ 27.785548] kasan_atomics_helper+0x4eae/0x5450 [ 27.785570] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.785591] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.785616] ? kasan_atomics+0x152/0x310 [ 27.785642] kasan_atomics+0x1dc/0x310 [ 27.785664] ? __pfx_kasan_atomics+0x10/0x10 [ 27.785688] ? __pfx_read_tsc+0x10/0x10 [ 27.785710] ? ktime_get_ts64+0x86/0x230 [ 27.785735] kunit_try_run_case+0x1a5/0x480 [ 27.785777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.785809] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.785845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.785906] ? __kthread_parkme+0x82/0x180 [ 27.785930] ? preempt_count_sub+0x50/0x80 [ 27.785955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.785980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.786003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.786046] kthread+0x337/0x6f0 [ 27.786067] ? trace_preempt_on+0x20/0xc0 [ 27.786102] ? __pfx_kthread+0x10/0x10 [ 27.786123] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.786154] ? calculate_sigpending+0x7b/0xa0 [ 27.786196] ? __pfx_kthread+0x10/0x10 [ 27.786217] ret_from_fork+0x116/0x1d0 [ 27.786249] ? __pfx_kthread+0x10/0x10 [ 27.786270] ret_from_fork_asm+0x1a/0x30 [ 27.786302] </TASK> [ 27.786342] [ 27.795687] Allocated by task 313: [ 27.797131] kasan_save_stack+0x45/0x70 [ 27.797330] kasan_save_track+0x18/0x40 [ 27.797466] kasan_save_alloc_info+0x3b/0x50 [ 27.797611] __kasan_kmalloc+0xb7/0xc0 [ 27.797739] __kmalloc_cache_noprof+0x189/0x420 [ 27.798108] kasan_atomics+0x95/0x310 [ 27.798429] kunit_try_run_case+0x1a5/0x480 [ 27.798790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.799030] kthread+0x337/0x6f0 [ 27.799235] ret_from_fork+0x116/0x1d0 [ 27.799912] ret_from_fork_asm+0x1a/0x30 [ 27.800348] [ 27.800610] The buggy address belongs to the object at ffff8881053c7b80 [ 27.800610] which belongs to the cache kmalloc-64 of size 64 [ 27.801530] The buggy address is located 0 bytes to the right of [ 27.801530] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.802440] [ 27.802684] The buggy address belongs to the physical page: [ 27.802931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.803481] flags: 0x200000000000000(node=0|zone=2) [ 27.803931] page_type: f5(slab) [ 27.804286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.804620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.805121] page dumped because: kasan: bad access detected [ 27.805534] [ 27.805632] Memory state around the buggy address: [ 27.806003] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.806605] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.807027] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.807351] ^ [ 27.807565] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.808071] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.808568] ================================================================== [ 27.321621] ================================================================== [ 27.321954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 27.322456] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.322757] [ 27.323263] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.323331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.323344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.323368] Call Trace: [ 27.323386] <TASK> [ 27.323403] dump_stack_lvl+0x73/0xb0 [ 27.323437] print_report+0xd1/0x640 [ 27.323459] ? __virt_addr_valid+0x1db/0x2d0 [ 27.323641] ? kasan_atomics_helper+0xac7/0x5450 [ 27.323666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.323692] ? kasan_atomics_helper+0xac7/0x5450 [ 27.323713] kasan_report+0x141/0x180 [ 27.323735] ? kasan_atomics_helper+0xac7/0x5450 [ 27.323760] kasan_check_range+0x10c/0x1c0 [ 27.323782] __kasan_check_write+0x18/0x20 [ 27.323865] kasan_atomics_helper+0xac7/0x5450 [ 27.323887] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.323908] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.323932] ? kasan_atomics+0x152/0x310 [ 27.323958] kasan_atomics+0x1dc/0x310 [ 27.323979] ? __pfx_kasan_atomics+0x10/0x10 [ 27.324002] ? __pfx_read_tsc+0x10/0x10 [ 27.324024] ? ktime_get_ts64+0x86/0x230 [ 27.324049] kunit_try_run_case+0x1a5/0x480 [ 27.324073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.324094] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.324128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.324161] ? __kthread_parkme+0x82/0x180 [ 27.324181] ? preempt_count_sub+0x50/0x80 [ 27.324204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.324227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.324249] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.324272] kthread+0x337/0x6f0 [ 27.324306] ? trace_preempt_on+0x20/0xc0 [ 27.324329] ? __pfx_kthread+0x10/0x10 [ 27.324348] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.324378] ? calculate_sigpending+0x7b/0xa0 [ 27.324402] ? __pfx_kthread+0x10/0x10 [ 27.324422] ret_from_fork+0x116/0x1d0 [ 27.324441] ? __pfx_kthread+0x10/0x10 [ 27.324461] ret_from_fork_asm+0x1a/0x30 [ 27.324491] </TASK> [ 27.324501] [ 27.335499] Allocated by task 313: [ 27.335691] kasan_save_stack+0x45/0x70 [ 27.335839] kasan_save_track+0x18/0x40 [ 27.335967] kasan_save_alloc_info+0x3b/0x50 [ 27.336338] __kasan_kmalloc+0xb7/0xc0 [ 27.336665] __kmalloc_cache_noprof+0x189/0x420 [ 27.336879] kasan_atomics+0x95/0x310 [ 27.337121] kunit_try_run_case+0x1a5/0x480 [ 27.337324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.337560] kthread+0x337/0x6f0 [ 27.337676] ret_from_fork+0x116/0x1d0 [ 27.337808] ret_from_fork_asm+0x1a/0x30 [ 27.337999] [ 27.338156] The buggy address belongs to the object at ffff8881053c7b80 [ 27.338156] which belongs to the cache kmalloc-64 of size 64 [ 27.338688] The buggy address is located 0 bytes to the right of [ 27.338688] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.339314] [ 27.339380] The buggy address belongs to the physical page: [ 27.339544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.340073] flags: 0x200000000000000(node=0|zone=2) [ 27.340336] page_type: f5(slab) [ 27.340495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.340856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.341100] page dumped because: kasan: bad access detected [ 27.341363] [ 27.341451] Memory state around the buggy address: [ 27.341670] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.342021] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.342330] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.342612] ^ [ 27.342784] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.343064] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.343270] ================================================================== [ 27.051937] ================================================================== [ 27.052274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 27.053438] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.053788] [ 27.054097] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.054163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.054175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.054197] Call Trace: [ 27.054220] <TASK> [ 27.054235] dump_stack_lvl+0x73/0xb0 [ 27.054267] print_report+0xd1/0x640 [ 27.054298] ? __virt_addr_valid+0x1db/0x2d0 [ 27.054322] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.054342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.054366] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.054386] kasan_report+0x141/0x180 [ 27.054408] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.054432] __asan_report_load4_noabort+0x18/0x20 [ 27.054456] kasan_atomics_helper+0x4b54/0x5450 [ 27.054477] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.054498] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.054522] ? kasan_atomics+0x152/0x310 [ 27.054547] kasan_atomics+0x1dc/0x310 [ 27.054568] ? __pfx_kasan_atomics+0x10/0x10 [ 27.054591] ? __pfx_read_tsc+0x10/0x10 [ 27.054612] ? ktime_get_ts64+0x86/0x230 [ 27.054636] kunit_try_run_case+0x1a5/0x480 [ 27.054665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.054686] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.054721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.054763] ? __kthread_parkme+0x82/0x180 [ 27.054783] ? preempt_count_sub+0x50/0x80 [ 27.054831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.054854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.054876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.054898] kthread+0x337/0x6f0 [ 27.054917] ? trace_preempt_on+0x20/0xc0 [ 27.054941] ? __pfx_kthread+0x10/0x10 [ 27.054960] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.054990] ? calculate_sigpending+0x7b/0xa0 [ 27.055014] ? __pfx_kthread+0x10/0x10 [ 27.055034] ret_from_fork+0x116/0x1d0 [ 27.055052] ? __pfx_kthread+0x10/0x10 [ 27.055072] ret_from_fork_asm+0x1a/0x30 [ 27.055101] </TASK> [ 27.055111] [ 27.063581] Allocated by task 313: [ 27.063795] kasan_save_stack+0x45/0x70 [ 27.063996] kasan_save_track+0x18/0x40 [ 27.064263] kasan_save_alloc_info+0x3b/0x50 [ 27.064477] __kasan_kmalloc+0xb7/0xc0 [ 27.064674] __kmalloc_cache_noprof+0x189/0x420 [ 27.064919] kasan_atomics+0x95/0x310 [ 27.065101] kunit_try_run_case+0x1a5/0x480 [ 27.065462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.065690] kthread+0x337/0x6f0 [ 27.066032] ret_from_fork+0x116/0x1d0 [ 27.066231] ret_from_fork_asm+0x1a/0x30 [ 27.066423] [ 27.066510] The buggy address belongs to the object at ffff8881053c7b80 [ 27.066510] which belongs to the cache kmalloc-64 of size 64 [ 27.066995] The buggy address is located 0 bytes to the right of [ 27.066995] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.067524] [ 27.067591] The buggy address belongs to the physical page: [ 27.067755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.067986] flags: 0x200000000000000(node=0|zone=2) [ 27.068139] page_type: f5(slab) [ 27.068252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.068921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.069407] page dumped because: kasan: bad access detected [ 27.069651] [ 27.069734] Memory state around the buggy address: [ 27.070130] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.070402] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.070613] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.070884] ^ [ 27.071097] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.071653] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.071952] ================================================================== [ 27.136256] ================================================================== [ 27.136597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 27.137118] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.137390] [ 27.137481] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.137528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.137539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.137562] Call Trace: [ 27.137579] <TASK> [ 27.137593] dump_stack_lvl+0x73/0xb0 [ 27.137625] print_report+0xd1/0x640 [ 27.137659] ? __virt_addr_valid+0x1db/0x2d0 [ 27.137682] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.137702] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.137739] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.137760] kasan_report+0x141/0x180 [ 27.137781] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.137865] kasan_check_range+0x10c/0x1c0 [ 27.137890] __kasan_check_write+0x18/0x20 [ 27.137913] kasan_atomics_helper+0x5fe/0x5450 [ 27.137934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.137955] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.137979] ? kasan_atomics+0x152/0x310 [ 27.138004] kasan_atomics+0x1dc/0x310 [ 27.138026] ? __pfx_kasan_atomics+0x10/0x10 [ 27.138049] ? __pfx_read_tsc+0x10/0x10 [ 27.138070] ? ktime_get_ts64+0x86/0x230 [ 27.138094] kunit_try_run_case+0x1a5/0x480 [ 27.138118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.138140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.138174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.138207] ? __kthread_parkme+0x82/0x180 [ 27.138226] ? preempt_count_sub+0x50/0x80 [ 27.138249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.138272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.138307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.138329] kthread+0x337/0x6f0 [ 27.138359] ? trace_preempt_on+0x20/0xc0 [ 27.138381] ? __pfx_kthread+0x10/0x10 [ 27.138401] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.138441] ? calculate_sigpending+0x7b/0xa0 [ 27.138466] ? __pfx_kthread+0x10/0x10 [ 27.138486] ret_from_fork+0x116/0x1d0 [ 27.138504] ? __pfx_kthread+0x10/0x10 [ 27.138524] ret_from_fork_asm+0x1a/0x30 [ 27.138554] </TASK> [ 27.138565] [ 27.146975] Allocated by task 313: [ 27.147290] kasan_save_stack+0x45/0x70 [ 27.147511] kasan_save_track+0x18/0x40 [ 27.147713] kasan_save_alloc_info+0x3b/0x50 [ 27.148064] __kasan_kmalloc+0xb7/0xc0 [ 27.148300] __kmalloc_cache_noprof+0x189/0x420 [ 27.148554] kasan_atomics+0x95/0x310 [ 27.148755] kunit_try_run_case+0x1a5/0x480 [ 27.149120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.149404] kthread+0x337/0x6f0 [ 27.149555] ret_from_fork+0x116/0x1d0 [ 27.149727] ret_from_fork_asm+0x1a/0x30 [ 27.149940] [ 27.150025] The buggy address belongs to the object at ffff8881053c7b80 [ 27.150025] which belongs to the cache kmalloc-64 of size 64 [ 27.150630] The buggy address is located 0 bytes to the right of [ 27.150630] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.151256] [ 27.151362] The buggy address belongs to the physical page: [ 27.151599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.152002] flags: 0x200000000000000(node=0|zone=2) [ 27.152237] page_type: f5(slab) [ 27.152392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.152697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.153213] page dumped because: kasan: bad access detected [ 27.153479] [ 27.153568] Memory state around the buggy address: [ 27.153773] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.154143] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.154467] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.154684] ^ [ 27.154834] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.155041] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.155246] ================================================================== [ 27.247039] ================================================================== [ 27.247581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 27.248304] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.248744] [ 27.249109] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.249164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.249241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.249265] Call Trace: [ 27.249279] <TASK> [ 27.249308] dump_stack_lvl+0x73/0xb0 [ 27.249344] print_report+0xd1/0x640 [ 27.249367] ? __virt_addr_valid+0x1db/0x2d0 [ 27.249390] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.249410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.249435] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.249455] kasan_report+0x141/0x180 [ 27.249476] ? kasan_atomics_helper+0x8f9/0x5450 [ 27.249501] kasan_check_range+0x10c/0x1c0 [ 27.249525] __kasan_check_write+0x18/0x20 [ 27.249551] kasan_atomics_helper+0x8f9/0x5450 [ 27.249573] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.249594] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.249618] ? kasan_atomics+0x152/0x310 [ 27.249644] kasan_atomics+0x1dc/0x310 [ 27.249666] ? __pfx_kasan_atomics+0x10/0x10 [ 27.249689] ? __pfx_read_tsc+0x10/0x10 [ 27.249710] ? ktime_get_ts64+0x86/0x230 [ 27.249735] kunit_try_run_case+0x1a5/0x480 [ 27.249759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.249780] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.249815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.249848] ? __kthread_parkme+0x82/0x180 [ 27.249868] ? preempt_count_sub+0x50/0x80 [ 27.249890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.249912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.249935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.249957] kthread+0x337/0x6f0 [ 27.249976] ? trace_preempt_on+0x20/0xc0 [ 27.249999] ? __pfx_kthread+0x10/0x10 [ 27.250018] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.250063] ? calculate_sigpending+0x7b/0xa0 [ 27.250088] ? __pfx_kthread+0x10/0x10 [ 27.250109] ret_from_fork+0x116/0x1d0 [ 27.250127] ? __pfx_kthread+0x10/0x10 [ 27.250147] ret_from_fork_asm+0x1a/0x30 [ 27.250177] </TASK> [ 27.250187] [ 27.260667] Allocated by task 313: [ 27.260992] kasan_save_stack+0x45/0x70 [ 27.261154] kasan_save_track+0x18/0x40 [ 27.261532] kasan_save_alloc_info+0x3b/0x50 [ 27.261732] __kasan_kmalloc+0xb7/0xc0 [ 27.262006] __kmalloc_cache_noprof+0x189/0x420 [ 27.262442] kasan_atomics+0x95/0x310 [ 27.262595] kunit_try_run_case+0x1a5/0x480 [ 27.262785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.263442] kthread+0x337/0x6f0 [ 27.263582] ret_from_fork+0x116/0x1d0 [ 27.264057] ret_from_fork_asm+0x1a/0x30 [ 27.264214] [ 27.264323] The buggy address belongs to the object at ffff8881053c7b80 [ 27.264323] which belongs to the cache kmalloc-64 of size 64 [ 27.264903] The buggy address is located 0 bytes to the right of [ 27.264903] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.265661] [ 27.265755] The buggy address belongs to the physical page: [ 27.266264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.266628] flags: 0x200000000000000(node=0|zone=2) [ 27.267139] page_type: f5(slab) [ 27.267314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.267633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.267955] page dumped because: kasan: bad access detected [ 27.268172] [ 27.268260] Memory state around the buggy address: [ 27.268893] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.269206] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.269509] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.269796] ^ [ 27.270371] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.270635] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.271170] ================================================================== [ 28.027265] ================================================================== [ 28.027606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 28.027935] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.028308] [ 28.028438] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.028486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.028499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.028522] Call Trace: [ 28.028541] <TASK> [ 28.028556] dump_stack_lvl+0x73/0xb0 [ 28.028586] print_report+0xd1/0x640 [ 28.028609] ? __virt_addr_valid+0x1db/0x2d0 [ 28.028634] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.028655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.028682] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.028704] kasan_report+0x141/0x180 [ 28.028726] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.028752] kasan_check_range+0x10c/0x1c0 [ 28.028777] __kasan_check_write+0x18/0x20 [ 28.028801] kasan_atomics_helper+0x19e3/0x5450 [ 28.028824] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.028847] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.028873] ? kasan_atomics+0x152/0x310 [ 28.028899] kasan_atomics+0x1dc/0x310 [ 28.028922] ? __pfx_kasan_atomics+0x10/0x10 [ 28.028946] ? __pfx_read_tsc+0x10/0x10 [ 28.028968] ? ktime_get_ts64+0x86/0x230 [ 28.028994] kunit_try_run_case+0x1a5/0x480 [ 28.029018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.029041] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.029077] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.029111] ? __kthread_parkme+0x82/0x180 [ 28.029132] ? preempt_count_sub+0x50/0x80 [ 28.029156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.029180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.029204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.029227] kthread+0x337/0x6f0 [ 28.029248] ? trace_preempt_on+0x20/0xc0 [ 28.029271] ? __pfx_kthread+0x10/0x10 [ 28.029293] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.029333] ? calculate_sigpending+0x7b/0xa0 [ 28.029357] ? __pfx_kthread+0x10/0x10 [ 28.029379] ret_from_fork+0x116/0x1d0 [ 28.029399] ? __pfx_kthread+0x10/0x10 [ 28.029420] ret_from_fork_asm+0x1a/0x30 [ 28.029452] </TASK> [ 28.029463] [ 28.037738] Allocated by task 313: [ 28.038074] kasan_save_stack+0x45/0x70 [ 28.038272] kasan_save_track+0x18/0x40 [ 28.038475] kasan_save_alloc_info+0x3b/0x50 [ 28.038683] __kasan_kmalloc+0xb7/0xc0 [ 28.038838] __kmalloc_cache_noprof+0x189/0x420 [ 28.039025] kasan_atomics+0x95/0x310 [ 28.039178] kunit_try_run_case+0x1a5/0x480 [ 28.039604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.039924] kthread+0x337/0x6f0 [ 28.040085] ret_from_fork+0x116/0x1d0 [ 28.040249] ret_from_fork_asm+0x1a/0x30 [ 28.040463] [ 28.040559] The buggy address belongs to the object at ffff8881053c7b80 [ 28.040559] which belongs to the cache kmalloc-64 of size 64 [ 28.041239] The buggy address is located 0 bytes to the right of [ 28.041239] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.041731] [ 28.041817] The buggy address belongs to the physical page: [ 28.042052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.042384] flags: 0x200000000000000(node=0|zone=2) [ 28.042614] page_type: f5(slab) [ 28.042744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.043010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.043644] page dumped because: kasan: bad access detected [ 28.043997] [ 28.044074] Memory state around the buggy address: [ 28.044266] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.044573] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.044820] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.045027] ^ [ 28.045178] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.045399] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.045608] ================================================================== [ 27.175733] ================================================================== [ 27.175954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 27.176236] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.176569] [ 27.176802] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.176854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.176867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.176889] Call Trace: [ 27.176906] <TASK> [ 27.176921] dump_stack_lvl+0x73/0xb0 [ 27.176952] print_report+0xd1/0x640 [ 27.176974] ? __virt_addr_valid+0x1db/0x2d0 [ 27.176997] ? kasan_atomics_helper+0x72f/0x5450 [ 27.177017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.177042] ? kasan_atomics_helper+0x72f/0x5450 [ 27.177063] kasan_report+0x141/0x180 [ 27.177084] ? kasan_atomics_helper+0x72f/0x5450 [ 27.177110] kasan_check_range+0x10c/0x1c0 [ 27.177133] __kasan_check_write+0x18/0x20 [ 27.177155] kasan_atomics_helper+0x72f/0x5450 [ 27.177177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.177197] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.177222] ? kasan_atomics+0x152/0x310 [ 27.177247] kasan_atomics+0x1dc/0x310 [ 27.177269] ? __pfx_kasan_atomics+0x10/0x10 [ 27.177303] ? __pfx_read_tsc+0x10/0x10 [ 27.177325] ? ktime_get_ts64+0x86/0x230 [ 27.177349] kunit_try_run_case+0x1a5/0x480 [ 27.177372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.177393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.177472] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.177510] ? __kthread_parkme+0x82/0x180 [ 27.177530] ? preempt_count_sub+0x50/0x80 [ 27.177553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.177577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.177599] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.177622] kthread+0x337/0x6f0 [ 27.177652] ? trace_preempt_on+0x20/0xc0 [ 27.177675] ? __pfx_kthread+0x10/0x10 [ 27.177694] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.177736] ? calculate_sigpending+0x7b/0xa0 [ 27.177760] ? __pfx_kthread+0x10/0x10 [ 27.177780] ret_from_fork+0x116/0x1d0 [ 27.177847] ? __pfx_kthread+0x10/0x10 [ 27.177870] ret_from_fork_asm+0x1a/0x30 [ 27.177900] </TASK> [ 27.177911] [ 27.186202] Allocated by task 313: [ 27.186404] kasan_save_stack+0x45/0x70 [ 27.186704] kasan_save_track+0x18/0x40 [ 27.187009] kasan_save_alloc_info+0x3b/0x50 [ 27.187273] __kasan_kmalloc+0xb7/0xc0 [ 27.187462] __kmalloc_cache_noprof+0x189/0x420 [ 27.187680] kasan_atomics+0x95/0x310 [ 27.187922] kunit_try_run_case+0x1a5/0x480 [ 27.188172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.188455] kthread+0x337/0x6f0 [ 27.188601] ret_from_fork+0x116/0x1d0 [ 27.188977] ret_from_fork_asm+0x1a/0x30 [ 27.189253] [ 27.189356] The buggy address belongs to the object at ffff8881053c7b80 [ 27.189356] which belongs to the cache kmalloc-64 of size 64 [ 27.190044] The buggy address is located 0 bytes to the right of [ 27.190044] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.190610] [ 27.190688] The buggy address belongs to the physical page: [ 27.190893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.191576] flags: 0x200000000000000(node=0|zone=2) [ 27.191948] page_type: f5(slab) [ 27.192145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.192392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.192614] page dumped because: kasan: bad access detected [ 27.192779] [ 27.192841] Memory state around the buggy address: [ 27.192989] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.193291] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.193950] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.194308] ^ [ 27.194535] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.195158] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.195580] ================================================================== [ 27.568604] ================================================================== [ 27.569167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 27.569612] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.570119] [ 27.570249] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.570307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.570321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.570344] Call Trace: [ 27.570576] <TASK> [ 27.570597] dump_stack_lvl+0x73/0xb0 [ 27.570633] print_report+0xd1/0x640 [ 27.570664] ? __virt_addr_valid+0x1db/0x2d0 [ 27.570689] ? kasan_atomics_helper+0x1079/0x5450 [ 27.570915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.570946] ? kasan_atomics_helper+0x1079/0x5450 [ 27.570968] kasan_report+0x141/0x180 [ 27.571005] ? kasan_atomics_helper+0x1079/0x5450 [ 27.571031] kasan_check_range+0x10c/0x1c0 [ 27.571064] __kasan_check_write+0x18/0x20 [ 27.571088] kasan_atomics_helper+0x1079/0x5450 [ 27.571110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.571133] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.571158] ? kasan_atomics+0x152/0x310 [ 27.571184] kasan_atomics+0x1dc/0x310 [ 27.571207] ? __pfx_kasan_atomics+0x10/0x10 [ 27.571231] ? __pfx_read_tsc+0x10/0x10 [ 27.571254] ? ktime_get_ts64+0x86/0x230 [ 27.571280] kunit_try_run_case+0x1a5/0x480 [ 27.571317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.571340] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.571376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.571410] ? __kthread_parkme+0x82/0x180 [ 27.571431] ? preempt_count_sub+0x50/0x80 [ 27.571455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.571479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.571503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.571527] kthread+0x337/0x6f0 [ 27.571548] ? trace_preempt_on+0x20/0xc0 [ 27.571572] ? __pfx_kthread+0x10/0x10 [ 27.571595] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.571626] ? calculate_sigpending+0x7b/0xa0 [ 27.571652] ? __pfx_kthread+0x10/0x10 [ 27.571675] ret_from_fork+0x116/0x1d0 [ 27.571695] ? __pfx_kthread+0x10/0x10 [ 27.571716] ret_from_fork_asm+0x1a/0x30 [ 27.571749] </TASK> [ 27.571760] [ 27.584697] Allocated by task 313: [ 27.584997] kasan_save_stack+0x45/0x70 [ 27.585433] kasan_save_track+0x18/0x40 [ 27.585781] kasan_save_alloc_info+0x3b/0x50 [ 27.586157] __kasan_kmalloc+0xb7/0xc0 [ 27.586541] __kmalloc_cache_noprof+0x189/0x420 [ 27.586748] kasan_atomics+0x95/0x310 [ 27.587133] kunit_try_run_case+0x1a5/0x480 [ 27.587620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.587971] kthread+0x337/0x6f0 [ 27.588397] ret_from_fork+0x116/0x1d0 [ 27.588707] ret_from_fork_asm+0x1a/0x30 [ 27.589068] [ 27.589218] The buggy address belongs to the object at ffff8881053c7b80 [ 27.589218] which belongs to the cache kmalloc-64 of size 64 [ 27.590190] The buggy address is located 0 bytes to the right of [ 27.590190] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.590971] [ 27.591061] The buggy address belongs to the physical page: [ 27.591549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.592155] flags: 0x200000000000000(node=0|zone=2) [ 27.592587] page_type: f5(slab) [ 27.592873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.593551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.593950] page dumped because: kasan: bad access detected [ 27.594317] [ 27.594408] Memory state around the buggy address: [ 27.594611] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.595192] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.595691] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.596354] ^ [ 27.596740] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.597328] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.597810] ================================================================== [ 27.852411] ================================================================== [ 27.853120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 27.853580] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.854471] [ 27.854586] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.854636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.854651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.854680] Call Trace: [ 27.854697] <TASK> [ 27.854711] dump_stack_lvl+0x73/0xb0 [ 27.854744] print_report+0xd1/0x640 [ 27.854766] ? __virt_addr_valid+0x1db/0x2d0 [ 27.854790] ? kasan_atomics_helper+0x151d/0x5450 [ 27.854811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.854837] ? kasan_atomics_helper+0x151d/0x5450 [ 27.854858] kasan_report+0x141/0x180 [ 27.854880] ? kasan_atomics_helper+0x151d/0x5450 [ 27.854906] kasan_check_range+0x10c/0x1c0 [ 27.854949] __kasan_check_write+0x18/0x20 [ 27.855087] kasan_atomics_helper+0x151d/0x5450 [ 27.855122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.855145] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.855171] ? kasan_atomics+0x152/0x310 [ 27.855198] kasan_atomics+0x1dc/0x310 [ 27.855220] ? __pfx_kasan_atomics+0x10/0x10 [ 27.855244] ? __pfx_read_tsc+0x10/0x10 [ 27.855266] ? ktime_get_ts64+0x86/0x230 [ 27.855292] kunit_try_run_case+0x1a5/0x480 [ 27.855330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.855353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.855387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.855421] ? __kthread_parkme+0x82/0x180 [ 27.855442] ? preempt_count_sub+0x50/0x80 [ 27.855466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.855489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.855513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.855536] kthread+0x337/0x6f0 [ 27.855555] ? trace_preempt_on+0x20/0xc0 [ 27.855580] ? __pfx_kthread+0x10/0x10 [ 27.855601] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.855632] ? calculate_sigpending+0x7b/0xa0 [ 27.855656] ? __pfx_kthread+0x10/0x10 [ 27.855677] ret_from_fork+0x116/0x1d0 [ 27.855697] ? __pfx_kthread+0x10/0x10 [ 27.855717] ret_from_fork_asm+0x1a/0x30 [ 27.855748] </TASK> [ 27.855760] [ 27.866236] Allocated by task 313: [ 27.866495] kasan_save_stack+0x45/0x70 [ 27.866651] kasan_save_track+0x18/0x40 [ 27.867135] kasan_save_alloc_info+0x3b/0x50 [ 27.867448] __kasan_kmalloc+0xb7/0xc0 [ 27.867669] __kmalloc_cache_noprof+0x189/0x420 [ 27.867860] kasan_atomics+0x95/0x310 [ 27.868089] kunit_try_run_case+0x1a5/0x480 [ 27.868518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.868893] kthread+0x337/0x6f0 [ 27.869046] ret_from_fork+0x116/0x1d0 [ 27.869376] ret_from_fork_asm+0x1a/0x30 [ 27.869549] [ 27.869642] The buggy address belongs to the object at ffff8881053c7b80 [ 27.869642] which belongs to the cache kmalloc-64 of size 64 [ 27.870492] The buggy address is located 0 bytes to the right of [ 27.870492] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.871281] [ 27.871411] The buggy address belongs to the physical page: [ 27.871781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.872178] flags: 0x200000000000000(node=0|zone=2) [ 27.872589] page_type: f5(slab) [ 27.873022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.873402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.873705] page dumped because: kasan: bad access detected [ 27.874056] [ 27.874137] Memory state around the buggy address: [ 27.874504] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.874977] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.875324] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.875601] ^ [ 27.875785] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.876325] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.876779] ================================================================== [ 27.683774] ================================================================== [ 27.684469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 27.684782] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.685284] [ 27.685396] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.685448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.685462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.685486] Call Trace: [ 27.685508] <TASK> [ 27.685528] dump_stack_lvl+0x73/0xb0 [ 27.685563] print_report+0xd1/0x640 [ 27.685586] ? __virt_addr_valid+0x1db/0x2d0 [ 27.685610] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.685634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.685660] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.685682] kasan_report+0x141/0x180 [ 27.685706] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.685733] __asan_report_load4_noabort+0x18/0x20 [ 27.685760] kasan_atomics_helper+0x49e8/0x5450 [ 27.685785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.686100] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.686128] ? kasan_atomics+0x152/0x310 [ 27.686156] kasan_atomics+0x1dc/0x310 [ 27.686181] ? __pfx_kasan_atomics+0x10/0x10 [ 27.686205] ? __pfx_read_tsc+0x10/0x10 [ 27.686274] ? ktime_get_ts64+0x86/0x230 [ 27.686311] kunit_try_run_case+0x1a5/0x480 [ 27.686338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.686361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.686398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.686434] ? __kthread_parkme+0x82/0x180 [ 27.686457] ? preempt_count_sub+0x50/0x80 [ 27.686481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.686506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.686529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.686553] kthread+0x337/0x6f0 [ 27.686573] ? trace_preempt_on+0x20/0xc0 [ 27.686597] ? __pfx_kthread+0x10/0x10 [ 27.686618] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.686648] ? calculate_sigpending+0x7b/0xa0 [ 27.686677] ? __pfx_kthread+0x10/0x10 [ 27.686698] ret_from_fork+0x116/0x1d0 [ 27.686718] ? __pfx_kthread+0x10/0x10 [ 27.686739] ret_from_fork_asm+0x1a/0x30 [ 27.686770] </TASK> [ 27.686781] [ 27.698715] Allocated by task 313: [ 27.699165] kasan_save_stack+0x45/0x70 [ 27.699499] kasan_save_track+0x18/0x40 [ 27.699795] kasan_save_alloc_info+0x3b/0x50 [ 27.700186] __kasan_kmalloc+0xb7/0xc0 [ 27.700384] __kmalloc_cache_noprof+0x189/0x420 [ 27.700587] kasan_atomics+0x95/0x310 [ 27.700754] kunit_try_run_case+0x1a5/0x480 [ 27.701300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.701664] kthread+0x337/0x6f0 [ 27.702041] ret_from_fork+0x116/0x1d0 [ 27.702377] ret_from_fork_asm+0x1a/0x30 [ 27.702738] [ 27.702877] The buggy address belongs to the object at ffff8881053c7b80 [ 27.702877] which belongs to the cache kmalloc-64 of size 64 [ 27.703541] The buggy address is located 0 bytes to the right of [ 27.703541] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.704513] [ 27.704736] The buggy address belongs to the physical page: [ 27.705218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.705727] flags: 0x200000000000000(node=0|zone=2) [ 27.706188] page_type: f5(slab) [ 27.706521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.707051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.707465] page dumped because: kasan: bad access detected [ 27.707703] [ 27.707784] Memory state around the buggy address: [ 27.708210] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.708515] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.709036] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.709484] ^ [ 27.709856] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.710417] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.710720] ================================================================== [ 27.945904] ================================================================== [ 27.946206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 27.946533] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.946968] [ 27.947069] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.947120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.947133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.947157] Call Trace: [ 27.947173] <TASK> [ 27.947189] dump_stack_lvl+0x73/0xb0 [ 27.947221] print_report+0xd1/0x640 [ 27.947244] ? __virt_addr_valid+0x1db/0x2d0 [ 27.947267] ? kasan_atomics_helper+0x177f/0x5450 [ 27.947291] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.947332] ? kasan_atomics_helper+0x177f/0x5450 [ 27.947354] kasan_report+0x141/0x180 [ 27.947377] ? kasan_atomics_helper+0x177f/0x5450 [ 27.947403] kasan_check_range+0x10c/0x1c0 [ 27.947427] __kasan_check_write+0x18/0x20 [ 27.947451] kasan_atomics_helper+0x177f/0x5450 [ 27.947474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.947497] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.947522] ? kasan_atomics+0x152/0x310 [ 27.947549] kasan_atomics+0x1dc/0x310 [ 27.947573] ? __pfx_kasan_atomics+0x10/0x10 [ 27.947597] ? __pfx_read_tsc+0x10/0x10 [ 27.947619] ? ktime_get_ts64+0x86/0x230 [ 27.947645] kunit_try_run_case+0x1a5/0x480 [ 27.947669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.947692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.947727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.947761] ? __kthread_parkme+0x82/0x180 [ 27.947782] ? preempt_count_sub+0x50/0x80 [ 27.947967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.947992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.948018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.948041] kthread+0x337/0x6f0 [ 27.948063] ? trace_preempt_on+0x20/0xc0 [ 27.948086] ? __pfx_kthread+0x10/0x10 [ 27.948108] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.948139] ? calculate_sigpending+0x7b/0xa0 [ 27.948164] ? __pfx_kthread+0x10/0x10 [ 27.948186] ret_from_fork+0x116/0x1d0 [ 27.948206] ? __pfx_kthread+0x10/0x10 [ 27.948226] ret_from_fork_asm+0x1a/0x30 [ 27.948258] </TASK> [ 27.948269] [ 27.955763] Allocated by task 313: [ 27.955944] kasan_save_stack+0x45/0x70 [ 27.956162] kasan_save_track+0x18/0x40 [ 27.956524] kasan_save_alloc_info+0x3b/0x50 [ 27.956748] __kasan_kmalloc+0xb7/0xc0 [ 27.956935] __kmalloc_cache_noprof+0x189/0x420 [ 27.957125] kasan_atomics+0x95/0x310 [ 27.957251] kunit_try_run_case+0x1a5/0x480 [ 27.957635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.958030] kthread+0x337/0x6f0 [ 27.958228] ret_from_fork+0x116/0x1d0 [ 27.958419] ret_from_fork_asm+0x1a/0x30 [ 27.958591] [ 27.958689] The buggy address belongs to the object at ffff8881053c7b80 [ 27.958689] which belongs to the cache kmalloc-64 of size 64 [ 27.959298] The buggy address is located 0 bytes to the right of [ 27.959298] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.959790] [ 27.959894] The buggy address belongs to the physical page: [ 27.960060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.960297] flags: 0x200000000000000(node=0|zone=2) [ 27.960465] page_type: f5(slab) [ 27.960580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.960806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.961119] page dumped because: kasan: bad access detected [ 27.961565] [ 27.961662] Memory state around the buggy address: [ 27.961972] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.962297] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.962594] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.965319] ^ [ 27.965548] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.965814] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.966104] ================================================================== [ 28.210202] ================================================================== [ 28.210827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 28.211411] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.211639] [ 28.211726] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.211776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.211789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.211813] Call Trace: [ 28.211833] <TASK> [ 28.211852] dump_stack_lvl+0x73/0xb0 [ 28.211885] print_report+0xd1/0x640 [ 28.211908] ? __virt_addr_valid+0x1db/0x2d0 [ 28.211933] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.211954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.212375] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.212397] kasan_report+0x141/0x180 [ 28.212421] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.212447] kasan_check_range+0x10c/0x1c0 [ 28.212470] __kasan_check_write+0x18/0x20 [ 28.212493] kasan_atomics_helper+0x1eaa/0x5450 [ 28.212515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.212539] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.212564] ? kasan_atomics+0x152/0x310 [ 28.212590] kasan_atomics+0x1dc/0x310 [ 28.212613] ? __pfx_kasan_atomics+0x10/0x10 [ 28.212637] ? __pfx_read_tsc+0x10/0x10 [ 28.212661] ? ktime_get_ts64+0x86/0x230 [ 28.212687] kunit_try_run_case+0x1a5/0x480 [ 28.212711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.212734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.212770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.212822] ? __kthread_parkme+0x82/0x180 [ 28.212844] ? preempt_count_sub+0x50/0x80 [ 28.212868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.212893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.212917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.212941] kthread+0x337/0x6f0 [ 28.212961] ? trace_preempt_on+0x20/0xc0 [ 28.212986] ? __pfx_kthread+0x10/0x10 [ 28.213007] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.213038] ? calculate_sigpending+0x7b/0xa0 [ 28.213063] ? __pfx_kthread+0x10/0x10 [ 28.213086] ret_from_fork+0x116/0x1d0 [ 28.213105] ? __pfx_kthread+0x10/0x10 [ 28.213126] ret_from_fork_asm+0x1a/0x30 [ 28.213158] </TASK> [ 28.213169] [ 28.227717] Allocated by task 313: [ 28.228146] kasan_save_stack+0x45/0x70 [ 28.228849] kasan_save_track+0x18/0x40 [ 28.229249] kasan_save_alloc_info+0x3b/0x50 [ 28.229537] __kasan_kmalloc+0xb7/0xc0 [ 28.229667] __kmalloc_cache_noprof+0x189/0x420 [ 28.229814] kasan_atomics+0x95/0x310 [ 28.230080] kunit_try_run_case+0x1a5/0x480 [ 28.230738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.231413] kthread+0x337/0x6f0 [ 28.231863] ret_from_fork+0x116/0x1d0 [ 28.232387] ret_from_fork_asm+0x1a/0x30 [ 28.232897] [ 28.233067] The buggy address belongs to the object at ffff8881053c7b80 [ 28.233067] which belongs to the cache kmalloc-64 of size 64 [ 28.233826] The buggy address is located 0 bytes to the right of [ 28.233826] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.234204] [ 28.234274] The buggy address belongs to the physical page: [ 28.234479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.234746] flags: 0x200000000000000(node=0|zone=2) [ 28.235221] page_type: f5(slab) [ 28.235510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.236584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.237031] page dumped because: kasan: bad access detected [ 28.237466] [ 28.237804] Memory state around the buggy address: [ 28.238247] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.238599] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.239120] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.239422] ^ [ 28.239720] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.240212] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.240683] ================================================================== [ 28.447398] ================================================================== [ 28.448075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 28.448553] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.449920] [ 28.450435] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.450496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.450779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.450818] Call Trace: [ 28.450836] <TASK> [ 28.450855] dump_stack_lvl+0x73/0xb0 [ 28.450893] print_report+0xd1/0x640 [ 28.450918] ? __virt_addr_valid+0x1db/0x2d0 [ 28.450943] ? kasan_atomics_helper+0x224c/0x5450 [ 28.450967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.450993] ? kasan_atomics_helper+0x224c/0x5450 [ 28.451015] kasan_report+0x141/0x180 [ 28.451037] ? kasan_atomics_helper+0x224c/0x5450 [ 28.451063] kasan_check_range+0x10c/0x1c0 [ 28.451087] __kasan_check_write+0x18/0x20 [ 28.451110] kasan_atomics_helper+0x224c/0x5450 [ 28.451133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.451155] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.451180] ? kasan_atomics+0x152/0x310 [ 28.451206] kasan_atomics+0x1dc/0x310 [ 28.451229] ? __pfx_kasan_atomics+0x10/0x10 [ 28.451253] ? __pfx_read_tsc+0x10/0x10 [ 28.451274] ? ktime_get_ts64+0x86/0x230 [ 28.451299] kunit_try_run_case+0x1a5/0x480 [ 28.451324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.451362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.451397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.451431] ? __kthread_parkme+0x82/0x180 [ 28.451452] ? preempt_count_sub+0x50/0x80 [ 28.451475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.451499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.451523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.451546] kthread+0x337/0x6f0 [ 28.451566] ? trace_preempt_on+0x20/0xc0 [ 28.451590] ? __pfx_kthread+0x10/0x10 [ 28.451611] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.451641] ? calculate_sigpending+0x7b/0xa0 [ 28.451666] ? __pfx_kthread+0x10/0x10 [ 28.451687] ret_from_fork+0x116/0x1d0 [ 28.451707] ? __pfx_kthread+0x10/0x10 [ 28.451728] ret_from_fork_asm+0x1a/0x30 [ 28.451758] </TASK> [ 28.451770] [ 28.461122] Allocated by task 313: [ 28.461245] kasan_save_stack+0x45/0x70 [ 28.461423] kasan_save_track+0x18/0x40 [ 28.461611] kasan_save_alloc_info+0x3b/0x50 [ 28.461865] __kasan_kmalloc+0xb7/0xc0 [ 28.462068] __kmalloc_cache_noprof+0x189/0x420 [ 28.462319] kasan_atomics+0x95/0x310 [ 28.462550] kunit_try_run_case+0x1a5/0x480 [ 28.462781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.463041] kthread+0x337/0x6f0 [ 28.463209] ret_from_fork+0x116/0x1d0 [ 28.463404] ret_from_fork_asm+0x1a/0x30 [ 28.463536] [ 28.463598] The buggy address belongs to the object at ffff8881053c7b80 [ 28.463598] which belongs to the cache kmalloc-64 of size 64 [ 28.463933] The buggy address is located 0 bytes to the right of [ 28.463933] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.464408] [ 28.464522] The buggy address belongs to the physical page: [ 28.464769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.465133] flags: 0x200000000000000(node=0|zone=2) [ 28.465375] page_type: f5(slab) [ 28.465561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.465917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.466220] page dumped because: kasan: bad access detected [ 28.466404] [ 28.466466] Memory state around the buggy address: [ 28.466683] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.467022] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.467296] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.467643] ^ [ 28.467866] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.468160] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.468408] ================================================================== [ 28.100619] ================================================================== [ 28.100840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 28.101062] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.101277] [ 28.101382] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.101443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.101456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.101477] Call Trace: [ 28.101491] <TASK> [ 28.101505] dump_stack_lvl+0x73/0xb0 [ 28.101534] print_report+0xd1/0x640 [ 28.101556] ? __virt_addr_valid+0x1db/0x2d0 [ 28.101579] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.101600] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.101626] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.101648] kasan_report+0x141/0x180 [ 28.101671] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.101696] __asan_report_load8_noabort+0x18/0x20 [ 28.101721] kasan_atomics_helper+0x4f30/0x5450 [ 28.101745] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.101767] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.101791] ? kasan_atomics+0x152/0x310 [ 28.101817] kasan_atomics+0x1dc/0x310 [ 28.101840] ? __pfx_kasan_atomics+0x10/0x10 [ 28.101864] ? __pfx_read_tsc+0x10/0x10 [ 28.101886] ? ktime_get_ts64+0x86/0x230 [ 28.101910] kunit_try_run_case+0x1a5/0x480 [ 28.101934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.101957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.101992] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.102026] ? __kthread_parkme+0x82/0x180 [ 28.102046] ? preempt_count_sub+0x50/0x80 [ 28.102070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.102094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.102118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.102142] kthread+0x337/0x6f0 [ 28.102162] ? trace_preempt_on+0x20/0xc0 [ 28.102185] ? __pfx_kthread+0x10/0x10 [ 28.102207] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.102237] ? calculate_sigpending+0x7b/0xa0 [ 28.102261] ? __pfx_kthread+0x10/0x10 [ 28.102282] ret_from_fork+0x116/0x1d0 [ 28.102302] ? __pfx_kthread+0x10/0x10 [ 28.102332] ret_from_fork_asm+0x1a/0x30 [ 28.102364] </TASK> [ 28.102375] [ 28.110585] Allocated by task 313: [ 28.110719] kasan_save_stack+0x45/0x70 [ 28.110883] kasan_save_track+0x18/0x40 [ 28.111150] kasan_save_alloc_info+0x3b/0x50 [ 28.111367] __kasan_kmalloc+0xb7/0xc0 [ 28.111548] __kmalloc_cache_noprof+0x189/0x420 [ 28.111774] kasan_atomics+0x95/0x310 [ 28.111957] kunit_try_run_case+0x1a5/0x480 [ 28.112153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.112620] kthread+0x337/0x6f0 [ 28.112800] ret_from_fork+0x116/0x1d0 [ 28.113033] ret_from_fork_asm+0x1a/0x30 [ 28.113173] [ 28.113263] The buggy address belongs to the object at ffff8881053c7b80 [ 28.113263] which belongs to the cache kmalloc-64 of size 64 [ 28.113786] The buggy address is located 0 bytes to the right of [ 28.113786] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.114415] [ 28.114515] The buggy address belongs to the physical page: [ 28.114823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.115164] flags: 0x200000000000000(node=0|zone=2) [ 28.115386] page_type: f5(slab) [ 28.115526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.115839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.116125] page dumped because: kasan: bad access detected [ 28.116341] [ 28.116442] Memory state around the buggy address: [ 28.116591] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.116802] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.117011] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.117217] ^ [ 28.117375] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.117583] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.117789] ================================================================== [ 27.092081] ================================================================== [ 27.092393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 27.092717] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.093192] [ 27.093313] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.093381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.093405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.093426] Call Trace: [ 27.093441] <TASK> [ 27.093455] dump_stack_lvl+0x73/0xb0 [ 27.093486] print_report+0xd1/0x640 [ 27.093507] ? __virt_addr_valid+0x1db/0x2d0 [ 27.093530] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.093552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.093577] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.093598] kasan_report+0x141/0x180 [ 27.093619] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.093644] __asan_report_store4_noabort+0x1b/0x30 [ 27.093668] kasan_atomics_helper+0x4b3a/0x5450 [ 27.093689] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.093711] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.093734] ? kasan_atomics+0x152/0x310 [ 27.093759] kasan_atomics+0x1dc/0x310 [ 27.093780] ? __pfx_kasan_atomics+0x10/0x10 [ 27.093803] ? __pfx_read_tsc+0x10/0x10 [ 27.093833] ? ktime_get_ts64+0x86/0x230 [ 27.093858] kunit_try_run_case+0x1a5/0x480 [ 27.093882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.093914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.093948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.093980] ? __kthread_parkme+0x82/0x180 [ 27.093999] ? preempt_count_sub+0x50/0x80 [ 27.094022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.094046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.094068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.094091] kthread+0x337/0x6f0 [ 27.094110] ? trace_preempt_on+0x20/0xc0 [ 27.094132] ? __pfx_kthread+0x10/0x10 [ 27.094152] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.094182] ? calculate_sigpending+0x7b/0xa0 [ 27.094206] ? __pfx_kthread+0x10/0x10 [ 27.094329] ret_from_fork+0x116/0x1d0 [ 27.094349] ? __pfx_kthread+0x10/0x10 [ 27.094369] ret_from_fork_asm+0x1a/0x30 [ 27.094399] </TASK> [ 27.094410] [ 27.103060] Allocated by task 313: [ 27.103237] kasan_save_stack+0x45/0x70 [ 27.103448] kasan_save_track+0x18/0x40 [ 27.103624] kasan_save_alloc_info+0x3b/0x50 [ 27.103843] __kasan_kmalloc+0xb7/0xc0 [ 27.104002] __kmalloc_cache_noprof+0x189/0x420 [ 27.104319] kasan_atomics+0x95/0x310 [ 27.104459] kunit_try_run_case+0x1a5/0x480 [ 27.104598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.104765] kthread+0x337/0x6f0 [ 27.105013] ret_from_fork+0x116/0x1d0 [ 27.105405] ret_from_fork_asm+0x1a/0x30 [ 27.105595] [ 27.105682] The buggy address belongs to the object at ffff8881053c7b80 [ 27.105682] which belongs to the cache kmalloc-64 of size 64 [ 27.106185] The buggy address is located 0 bytes to the right of [ 27.106185] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.108366] [ 27.108678] The buggy address belongs to the physical page: [ 27.109263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.109613] flags: 0x200000000000000(node=0|zone=2) [ 27.109821] page_type: f5(slab) [ 27.109971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.110261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.111447] page dumped because: kasan: bad access detected [ 27.111681] [ 27.111760] Memory state around the buggy address: [ 27.112506] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.113353] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.113842] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.114141] ^ [ 27.114351] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.114633] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.115412] ================================================================== [ 27.155773] ================================================================== [ 27.156503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 27.156896] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.157328] [ 27.157413] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.157462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.157474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.157496] Call Trace: [ 27.157513] <TASK> [ 27.157528] dump_stack_lvl+0x73/0xb0 [ 27.157558] print_report+0xd1/0x640 [ 27.157581] ? __virt_addr_valid+0x1db/0x2d0 [ 27.157604] ? kasan_atomics_helper+0x697/0x5450 [ 27.157625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.157649] ? kasan_atomics_helper+0x697/0x5450 [ 27.157669] kasan_report+0x141/0x180 [ 27.157690] ? kasan_atomics_helper+0x697/0x5450 [ 27.157728] kasan_check_range+0x10c/0x1c0 [ 27.157752] __kasan_check_write+0x18/0x20 [ 27.157774] kasan_atomics_helper+0x697/0x5450 [ 27.157810] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.157831] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.157856] ? kasan_atomics+0x152/0x310 [ 27.157880] kasan_atomics+0x1dc/0x310 [ 27.157902] ? __pfx_kasan_atomics+0x10/0x10 [ 27.157935] ? __pfx_read_tsc+0x10/0x10 [ 27.157956] ? ktime_get_ts64+0x86/0x230 [ 27.157980] kunit_try_run_case+0x1a5/0x480 [ 27.158069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.158092] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.158142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.158175] ? __kthread_parkme+0x82/0x180 [ 27.158195] ? preempt_count_sub+0x50/0x80 [ 27.158229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.158251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.158274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.158305] kthread+0x337/0x6f0 [ 27.158333] ? trace_preempt_on+0x20/0xc0 [ 27.158356] ? __pfx_kthread+0x10/0x10 [ 27.158376] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.158415] ? calculate_sigpending+0x7b/0xa0 [ 27.158440] ? __pfx_kthread+0x10/0x10 [ 27.158461] ret_from_fork+0x116/0x1d0 [ 27.158479] ? __pfx_kthread+0x10/0x10 [ 27.158499] ret_from_fork_asm+0x1a/0x30 [ 27.158540] </TASK> [ 27.158550] [ 27.166954] Allocated by task 313: [ 27.167135] kasan_save_stack+0x45/0x70 [ 27.167308] kasan_save_track+0x18/0x40 [ 27.167437] kasan_save_alloc_info+0x3b/0x50 [ 27.167637] __kasan_kmalloc+0xb7/0xc0 [ 27.167829] __kmalloc_cache_noprof+0x189/0x420 [ 27.168131] kasan_atomics+0x95/0x310 [ 27.168265] kunit_try_run_case+0x1a5/0x480 [ 27.168416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.168584] kthread+0x337/0x6f0 [ 27.168696] ret_from_fork+0x116/0x1d0 [ 27.168839] ret_from_fork_asm+0x1a/0x30 [ 27.169118] [ 27.169208] The buggy address belongs to the object at ffff8881053c7b80 [ 27.169208] which belongs to the cache kmalloc-64 of size 64 [ 27.170065] The buggy address is located 0 bytes to the right of [ 27.170065] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.170497] [ 27.170588] The buggy address belongs to the physical page: [ 27.170840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.171485] flags: 0x200000000000000(node=0|zone=2) [ 27.171725] page_type: f5(slab) [ 27.172052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.172400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.172734] page dumped because: kasan: bad access detected [ 27.173023] [ 27.173140] Memory state around the buggy address: [ 27.173339] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.173659] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.174025] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.174341] ^ [ 27.174557] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.175032] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.175368] ================================================================== [ 27.481941] ================================================================== [ 27.482609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 27.483179] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.483480] [ 27.483684] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.483734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.483748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.483772] Call Trace: [ 27.483786] <TASK> [ 27.484137] dump_stack_lvl+0x73/0xb0 [ 27.484177] print_report+0xd1/0x640 [ 27.484203] ? __virt_addr_valid+0x1db/0x2d0 [ 27.484230] ? kasan_atomics_helper+0xf10/0x5450 [ 27.484252] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.484330] ? kasan_atomics_helper+0xf10/0x5450 [ 27.484352] kasan_report+0x141/0x180 [ 27.484376] ? kasan_atomics_helper+0xf10/0x5450 [ 27.484401] kasan_check_range+0x10c/0x1c0 [ 27.484425] __kasan_check_write+0x18/0x20 [ 27.484449] kasan_atomics_helper+0xf10/0x5450 [ 27.484472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.484495] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.484520] ? kasan_atomics+0x152/0x310 [ 27.484547] kasan_atomics+0x1dc/0x310 [ 27.484570] ? __pfx_kasan_atomics+0x10/0x10 [ 27.484594] ? __pfx_read_tsc+0x10/0x10 [ 27.484616] ? ktime_get_ts64+0x86/0x230 [ 27.484642] kunit_try_run_case+0x1a5/0x480 [ 27.484666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.484689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.484725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.484758] ? __kthread_parkme+0x82/0x180 [ 27.484779] ? preempt_count_sub+0x50/0x80 [ 27.484816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.484840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.484864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.484897] kthread+0x337/0x6f0 [ 27.484917] ? trace_preempt_on+0x20/0xc0 [ 27.484942] ? __pfx_kthread+0x10/0x10 [ 27.484963] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.484994] ? calculate_sigpending+0x7b/0xa0 [ 27.485020] ? __pfx_kthread+0x10/0x10 [ 27.485043] ret_from_fork+0x116/0x1d0 [ 27.485064] ? __pfx_kthread+0x10/0x10 [ 27.485085] ret_from_fork_asm+0x1a/0x30 [ 27.485116] </TASK> [ 27.485128] [ 27.497049] Allocated by task 313: [ 27.497664] kasan_save_stack+0x45/0x70 [ 27.498081] kasan_save_track+0x18/0x40 [ 27.498557] kasan_save_alloc_info+0x3b/0x50 [ 27.498928] __kasan_kmalloc+0xb7/0xc0 [ 27.499257] __kmalloc_cache_noprof+0x189/0x420 [ 27.499606] kasan_atomics+0x95/0x310 [ 27.499780] kunit_try_run_case+0x1a5/0x480 [ 27.500213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.500466] kthread+0x337/0x6f0 [ 27.500611] ret_from_fork+0x116/0x1d0 [ 27.500783] ret_from_fork_asm+0x1a/0x30 [ 27.501274] [ 27.501545] The buggy address belongs to the object at ffff8881053c7b80 [ 27.501545] which belongs to the cache kmalloc-64 of size 64 [ 27.502402] The buggy address is located 0 bytes to the right of [ 27.502402] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.503424] [ 27.503658] The buggy address belongs to the physical page: [ 27.504255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.504768] flags: 0x200000000000000(node=0|zone=2) [ 27.505153] page_type: f5(slab) [ 27.505328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.505628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.506200] page dumped because: kasan: bad access detected [ 27.506596] [ 27.506827] Memory state around the buggy address: [ 27.507251] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.507685] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.508127] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.508430] ^ [ 27.508640] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.509200] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.509712] ================================================================== [ 27.004258] ================================================================== [ 27.005086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 27.005384] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.005835] [ 27.006171] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.006225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.006238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.006386] Call Trace: [ 27.006409] <TASK> [ 27.006427] dump_stack_lvl+0x73/0xb0 [ 27.006462] print_report+0xd1/0x640 [ 27.006485] ? __virt_addr_valid+0x1db/0x2d0 [ 27.006508] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.006529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.006554] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.006574] kasan_report+0x141/0x180 [ 27.006596] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.006621] __asan_report_store4_noabort+0x1b/0x30 [ 27.006644] kasan_atomics_helper+0x4b6e/0x5450 [ 27.006674] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.006695] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.006721] ? kasan_atomics+0x152/0x310 [ 27.006746] kasan_atomics+0x1dc/0x310 [ 27.006769] ? __pfx_kasan_atomics+0x10/0x10 [ 27.006792] ? __pfx_read_tsc+0x10/0x10 [ 27.006870] ? ktime_get_ts64+0x86/0x230 [ 27.006897] kunit_try_run_case+0x1a5/0x480 [ 27.006921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.006943] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.006978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.007010] ? __kthread_parkme+0x82/0x180 [ 27.007030] ? preempt_count_sub+0x50/0x80 [ 27.007053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.007076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.007098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.007120] kthread+0x337/0x6f0 [ 27.007139] ? trace_preempt_on+0x20/0xc0 [ 27.007162] ? __pfx_kthread+0x10/0x10 [ 27.007182] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.007211] ? calculate_sigpending+0x7b/0xa0 [ 27.007235] ? __pfx_kthread+0x10/0x10 [ 27.007255] ret_from_fork+0x116/0x1d0 [ 27.007274] ? __pfx_kthread+0x10/0x10 [ 27.007305] ret_from_fork_asm+0x1a/0x30 [ 27.007336] </TASK> [ 27.007347] [ 27.017310] Allocated by task 313: [ 27.018030] kasan_save_stack+0x45/0x70 [ 27.018472] kasan_save_track+0x18/0x40 [ 27.019092] kasan_save_alloc_info+0x3b/0x50 [ 27.019430] __kasan_kmalloc+0xb7/0xc0 [ 27.019659] __kmalloc_cache_noprof+0x189/0x420 [ 27.020146] kasan_atomics+0x95/0x310 [ 27.020289] kunit_try_run_case+0x1a5/0x480 [ 27.020427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.020591] kthread+0x337/0x6f0 [ 27.020700] ret_from_fork+0x116/0x1d0 [ 27.021040] ret_from_fork_asm+0x1a/0x30 [ 27.021438] [ 27.021593] The buggy address belongs to the object at ffff8881053c7b80 [ 27.021593] which belongs to the cache kmalloc-64 of size 64 [ 27.022991] The buggy address is located 0 bytes to the right of [ 27.022991] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.024195] [ 27.024368] The buggy address belongs to the physical page: [ 27.024738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.025290] flags: 0x200000000000000(node=0|zone=2) [ 27.025457] page_type: f5(slab) [ 27.025574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.025915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.026605] page dumped because: kasan: bad access detected [ 27.027248] [ 27.027420] Memory state around the buggy address: [ 27.027935] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.028572] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.029139] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.029403] ^ [ 27.029904] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.030338] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.030546] ================================================================== [ 27.199241] ================================================================== [ 27.199668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 27.200702] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.201524] [ 27.201860] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.201920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.201933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.201956] Call Trace: [ 27.201976] <TASK> [ 27.201995] dump_stack_lvl+0x73/0xb0 [ 27.202030] print_report+0xd1/0x640 [ 27.202054] ? __virt_addr_valid+0x1db/0x2d0 [ 27.202078] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.202098] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.202125] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.202147] kasan_report+0x141/0x180 [ 27.202168] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.202193] kasan_check_range+0x10c/0x1c0 [ 27.202217] __kasan_check_write+0x18/0x20 [ 27.202240] kasan_atomics_helper+0x7c7/0x5450 [ 27.202262] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.202299] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.202450] ? kasan_atomics+0x152/0x310 [ 27.202481] kasan_atomics+0x1dc/0x310 [ 27.202505] ? __pfx_kasan_atomics+0x10/0x10 [ 27.202529] ? __pfx_read_tsc+0x10/0x10 [ 27.202551] ? ktime_get_ts64+0x86/0x230 [ 27.202575] kunit_try_run_case+0x1a5/0x480 [ 27.202640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.202668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.202706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.202738] ? __kthread_parkme+0x82/0x180 [ 27.202758] ? preempt_count_sub+0x50/0x80 [ 27.202781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.202827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.202865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.202887] kthread+0x337/0x6f0 [ 27.202906] ? trace_preempt_on+0x20/0xc0 [ 27.202929] ? __pfx_kthread+0x10/0x10 [ 27.202948] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.202978] ? calculate_sigpending+0x7b/0xa0 [ 27.203002] ? __pfx_kthread+0x10/0x10 [ 27.203022] ret_from_fork+0x116/0x1d0 [ 27.203041] ? __pfx_kthread+0x10/0x10 [ 27.203060] ret_from_fork_asm+0x1a/0x30 [ 27.203091] </TASK> [ 27.203101] [ 27.213685] Allocated by task 313: [ 27.213833] kasan_save_stack+0x45/0x70 [ 27.213985] kasan_save_track+0x18/0x40 [ 27.214252] kasan_save_alloc_info+0x3b/0x50 [ 27.214598] __kasan_kmalloc+0xb7/0xc0 [ 27.214791] __kmalloc_cache_noprof+0x189/0x420 [ 27.215116] kasan_atomics+0x95/0x310 [ 27.215331] kunit_try_run_case+0x1a5/0x480 [ 27.215477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.215688] kthread+0x337/0x6f0 [ 27.216041] ret_from_fork+0x116/0x1d0 [ 27.216267] ret_from_fork_asm+0x1a/0x30 [ 27.216476] [ 27.216567] The buggy address belongs to the object at ffff8881053c7b80 [ 27.216567] which belongs to the cache kmalloc-64 of size 64 [ 27.217154] The buggy address is located 0 bytes to the right of [ 27.217154] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.217656] [ 27.217770] The buggy address belongs to the physical page: [ 27.218147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.218465] flags: 0x200000000000000(node=0|zone=2) [ 27.218708] page_type: f5(slab) [ 27.218935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.219237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.219606] page dumped because: kasan: bad access detected [ 27.219855] [ 27.219944] Memory state around the buggy address: [ 27.220163] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.220737] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.221377] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.221589] ^ [ 27.221848] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.222194] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.222519] ================================================================== [ 27.343766] ================================================================== [ 27.344096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 27.344598] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.344975] [ 27.345084] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.345132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.345144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.345167] Call Trace: [ 27.345185] <TASK> [ 27.345201] dump_stack_lvl+0x73/0xb0 [ 27.345232] print_report+0xd1/0x640 [ 27.345253] ? __virt_addr_valid+0x1db/0x2d0 [ 27.345276] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.345311] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.345337] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.345359] kasan_report+0x141/0x180 [ 27.345381] ? kasan_atomics_helper+0xb6a/0x5450 [ 27.345405] kasan_check_range+0x10c/0x1c0 [ 27.345428] __kasan_check_write+0x18/0x20 [ 27.345450] kasan_atomics_helper+0xb6a/0x5450 [ 27.345471] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.345493] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.345517] ? kasan_atomics+0x152/0x310 [ 27.345542] kasan_atomics+0x1dc/0x310 [ 27.345564] ? __pfx_kasan_atomics+0x10/0x10 [ 27.345587] ? __pfx_read_tsc+0x10/0x10 [ 27.345609] ? ktime_get_ts64+0x86/0x230 [ 27.345633] kunit_try_run_case+0x1a5/0x480 [ 27.345656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.345678] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.345711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.345744] ? __kthread_parkme+0x82/0x180 [ 27.345764] ? preempt_count_sub+0x50/0x80 [ 27.345787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.345821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.345844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.345866] kthread+0x337/0x6f0 [ 27.345885] ? trace_preempt_on+0x20/0xc0 [ 27.345909] ? __pfx_kthread+0x10/0x10 [ 27.345929] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.345964] ? calculate_sigpending+0x7b/0xa0 [ 27.345989] ? __pfx_kthread+0x10/0x10 [ 27.346011] ret_from_fork+0x116/0x1d0 [ 27.346030] ? __pfx_kthread+0x10/0x10 [ 27.346051] ret_from_fork_asm+0x1a/0x30 [ 27.346082] </TASK> [ 27.346094] [ 27.353798] Allocated by task 313: [ 27.353970] kasan_save_stack+0x45/0x70 [ 27.354144] kasan_save_track+0x18/0x40 [ 27.354309] kasan_save_alloc_info+0x3b/0x50 [ 27.354512] __kasan_kmalloc+0xb7/0xc0 [ 27.354697] __kmalloc_cache_noprof+0x189/0x420 [ 27.354905] kasan_atomics+0x95/0x310 [ 27.355058] kunit_try_run_case+0x1a5/0x480 [ 27.356640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.356824] kthread+0x337/0x6f0 [ 27.356938] ret_from_fork+0x116/0x1d0 [ 27.357063] ret_from_fork_asm+0x1a/0x30 [ 27.357196] [ 27.357262] The buggy address belongs to the object at ffff8881053c7b80 [ 27.357262] which belongs to the cache kmalloc-64 of size 64 [ 27.357792] The buggy address is located 0 bytes to the right of [ 27.357792] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.358632] [ 27.358733] The buggy address belongs to the physical page: [ 27.359129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.359451] flags: 0x200000000000000(node=0|zone=2) [ 27.359612] page_type: f5(slab) [ 27.359763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.360216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.360557] page dumped because: kasan: bad access detected [ 27.360724] [ 27.360786] Memory state around the buggy address: [ 27.361286] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.361622] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.362013] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.362326] ^ [ 27.362643] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.363052] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.363362] ================================================================== [ 27.386694] ================================================================== [ 27.387260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 27.387514] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.388188] [ 27.388318] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.388367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.388381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.388405] Call Trace: [ 27.388423] <TASK> [ 27.388440] dump_stack_lvl+0x73/0xb0 [ 27.388474] print_report+0xd1/0x640 [ 27.388498] ? __virt_addr_valid+0x1db/0x2d0 [ 27.388523] ? kasan_atomics_helper+0x4a84/0x5450 [ 27.388544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.388571] ? kasan_atomics_helper+0x4a84/0x5450 [ 27.388592] kasan_report+0x141/0x180 [ 27.388615] ? kasan_atomics_helper+0x4a84/0x5450 [ 27.388641] __asan_report_load4_noabort+0x18/0x20 [ 27.388666] kasan_atomics_helper+0x4a84/0x5450 [ 27.388689] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.388711] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.388736] ? kasan_atomics+0x152/0x310 [ 27.388762] kasan_atomics+0x1dc/0x310 [ 27.388786] ? __pfx_kasan_atomics+0x10/0x10 [ 27.388849] ? __pfx_read_tsc+0x10/0x10 [ 27.388871] ? ktime_get_ts64+0x86/0x230 [ 27.388897] kunit_try_run_case+0x1a5/0x480 [ 27.388923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.388946] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.388981] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.389015] ? __kthread_parkme+0x82/0x180 [ 27.389036] ? preempt_count_sub+0x50/0x80 [ 27.389061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.389085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.389108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.389131] kthread+0x337/0x6f0 [ 27.389152] ? trace_preempt_on+0x20/0xc0 [ 27.389187] ? __pfx_kthread+0x10/0x10 [ 27.389208] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.389239] ? calculate_sigpending+0x7b/0xa0 [ 27.389263] ? __pfx_kthread+0x10/0x10 [ 27.389329] ret_from_fork+0x116/0x1d0 [ 27.389349] ? __pfx_kthread+0x10/0x10 [ 27.389370] ret_from_fork_asm+0x1a/0x30 [ 27.389402] </TASK> [ 27.389414] [ 27.398258] Allocated by task 313: [ 27.398488] kasan_save_stack+0x45/0x70 [ 27.398697] kasan_save_track+0x18/0x40 [ 27.399063] kasan_save_alloc_info+0x3b/0x50 [ 27.399224] __kasan_kmalloc+0xb7/0xc0 [ 27.399426] __kmalloc_cache_noprof+0x189/0x420 [ 27.399598] kasan_atomics+0x95/0x310 [ 27.399724] kunit_try_run_case+0x1a5/0x480 [ 27.399885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.400136] kthread+0x337/0x6f0 [ 27.400505] ret_from_fork+0x116/0x1d0 [ 27.400839] ret_from_fork_asm+0x1a/0x30 [ 27.401155] [ 27.401250] The buggy address belongs to the object at ffff8881053c7b80 [ 27.401250] which belongs to the cache kmalloc-64 of size 64 [ 27.401810] The buggy address is located 0 bytes to the right of [ 27.401810] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.402259] [ 27.402546] The buggy address belongs to the physical page: [ 27.402967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.403395] flags: 0x200000000000000(node=0|zone=2) [ 27.403604] page_type: f5(slab) [ 27.403798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.404261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.404751] page dumped because: kasan: bad access detected [ 27.405052] [ 27.405147] Memory state around the buggy address: [ 27.405439] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.405775] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.406189] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.406548] ^ [ 27.406748] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.407232] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.407625] ================================================================== [ 27.116781] ================================================================== [ 27.117401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 27.117875] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.118554] [ 27.118677] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.118728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.118740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.118763] Call Trace: [ 27.118781] <TASK> [ 27.118798] dump_stack_lvl+0x73/0xb0 [ 27.118833] print_report+0xd1/0x640 [ 27.118856] ? __virt_addr_valid+0x1db/0x2d0 [ 27.118879] ? kasan_atomics_helper+0x565/0x5450 [ 27.118899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.118924] ? kasan_atomics_helper+0x565/0x5450 [ 27.118944] kasan_report+0x141/0x180 [ 27.118965] ? kasan_atomics_helper+0x565/0x5450 [ 27.118990] kasan_check_range+0x10c/0x1c0 [ 27.119013] __kasan_check_write+0x18/0x20 [ 27.119035] kasan_atomics_helper+0x565/0x5450 [ 27.119056] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.119077] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.119101] ? kasan_atomics+0x152/0x310 [ 27.119126] kasan_atomics+0x1dc/0x310 [ 27.119148] ? __pfx_kasan_atomics+0x10/0x10 [ 27.119170] ? __pfx_read_tsc+0x10/0x10 [ 27.119192] ? ktime_get_ts64+0x86/0x230 [ 27.119216] kunit_try_run_case+0x1a5/0x480 [ 27.119240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.119262] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.119308] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.119340] ? __kthread_parkme+0x82/0x180 [ 27.119361] ? preempt_count_sub+0x50/0x80 [ 27.119384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.119407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.119430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.119465] kthread+0x337/0x6f0 [ 27.119484] ? trace_preempt_on+0x20/0xc0 [ 27.119507] ? __pfx_kthread+0x10/0x10 [ 27.119540] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.119569] ? calculate_sigpending+0x7b/0xa0 [ 27.119593] ? __pfx_kthread+0x10/0x10 [ 27.119614] ret_from_fork+0x116/0x1d0 [ 27.119633] ? __pfx_kthread+0x10/0x10 [ 27.119662] ret_from_fork_asm+0x1a/0x30 [ 27.119693] </TASK> [ 27.119703] [ 27.127904] Allocated by task 313: [ 27.128084] kasan_save_stack+0x45/0x70 [ 27.128230] kasan_save_track+0x18/0x40 [ 27.128413] kasan_save_alloc_info+0x3b/0x50 [ 27.128622] __kasan_kmalloc+0xb7/0xc0 [ 27.128802] __kmalloc_cache_noprof+0x189/0x420 [ 27.128982] kasan_atomics+0x95/0x310 [ 27.129376] kunit_try_run_case+0x1a5/0x480 [ 27.129575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.129846] kthread+0x337/0x6f0 [ 27.130054] ret_from_fork+0x116/0x1d0 [ 27.130204] ret_from_fork_asm+0x1a/0x30 [ 27.130421] [ 27.130492] The buggy address belongs to the object at ffff8881053c7b80 [ 27.130492] which belongs to the cache kmalloc-64 of size 64 [ 27.130850] The buggy address is located 0 bytes to the right of [ 27.130850] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.131210] [ 27.131332] The buggy address belongs to the physical page: [ 27.131586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.131931] flags: 0x200000000000000(node=0|zone=2) [ 27.132154] page_type: f5(slab) [ 27.132324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.132987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.133226] page dumped because: kasan: bad access detected [ 27.133465] [ 27.133552] Memory state around the buggy address: [ 27.133783] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.134114] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.134461] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.134767] ^ [ 27.135005] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.135327] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.135635] ================================================================== [ 27.408128] ================================================================== [ 27.408929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 27.409255] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.409607] [ 27.409710] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.409758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.409772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.409955] Call Trace: [ 27.409979] <TASK> [ 27.410033] dump_stack_lvl+0x73/0xb0 [ 27.410068] print_report+0xd1/0x640 [ 27.410091] ? __virt_addr_valid+0x1db/0x2d0 [ 27.410115] ? kasan_atomics_helper+0xd47/0x5450 [ 27.410136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.410192] ? kasan_atomics_helper+0xd47/0x5450 [ 27.410214] kasan_report+0x141/0x180 [ 27.410236] ? kasan_atomics_helper+0xd47/0x5450 [ 27.410262] kasan_check_range+0x10c/0x1c0 [ 27.410287] __kasan_check_write+0x18/0x20 [ 27.410322] kasan_atomics_helper+0xd47/0x5450 [ 27.410345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.410367] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.410393] ? kasan_atomics+0x152/0x310 [ 27.410419] kasan_atomics+0x1dc/0x310 [ 27.410442] ? __pfx_kasan_atomics+0x10/0x10 [ 27.410501] ? __pfx_read_tsc+0x10/0x10 [ 27.410524] ? ktime_get_ts64+0x86/0x230 [ 27.410550] kunit_try_run_case+0x1a5/0x480 [ 27.410576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.410598] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.410665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.410745] ? __kthread_parkme+0x82/0x180 [ 27.410767] ? preempt_count_sub+0x50/0x80 [ 27.410791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.410838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.410863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.410910] kthread+0x337/0x6f0 [ 27.410993] ? trace_preempt_on+0x20/0xc0 [ 27.411018] ? __pfx_kthread+0x10/0x10 [ 27.411039] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.411070] ? calculate_sigpending+0x7b/0xa0 [ 27.411096] ? __pfx_kthread+0x10/0x10 [ 27.411118] ret_from_fork+0x116/0x1d0 [ 27.411137] ? __pfx_kthread+0x10/0x10 [ 27.411158] ret_from_fork_asm+0x1a/0x30 [ 27.411189] </TASK> [ 27.411201] [ 27.420272] Allocated by task 313: [ 27.420469] kasan_save_stack+0x45/0x70 [ 27.420618] kasan_save_track+0x18/0x40 [ 27.420877] kasan_save_alloc_info+0x3b/0x50 [ 27.421080] __kasan_kmalloc+0xb7/0xc0 [ 27.421258] __kmalloc_cache_noprof+0x189/0x420 [ 27.421570] kasan_atomics+0x95/0x310 [ 27.421718] kunit_try_run_case+0x1a5/0x480 [ 27.422008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.422253] kthread+0x337/0x6f0 [ 27.422380] ret_from_fork+0x116/0x1d0 [ 27.422503] ret_from_fork_asm+0x1a/0x30 [ 27.422632] [ 27.422702] The buggy address belongs to the object at ffff8881053c7b80 [ 27.422702] which belongs to the cache kmalloc-64 of size 64 [ 27.423163] The buggy address is located 0 bytes to the right of [ 27.423163] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.423813] [ 27.423908] The buggy address belongs to the physical page: [ 27.424378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.424942] flags: 0x200000000000000(node=0|zone=2) [ 27.425349] page_type: f5(slab) [ 27.425469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.425716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.426394] page dumped because: kasan: bad access detected [ 27.426631] [ 27.426700] Memory state around the buggy address: [ 27.426845] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.427077] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.427632] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.427959] ^ [ 27.428356] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.428669] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.429059] ================================================================== [ 28.082691] ================================================================== [ 28.083191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 28.083446] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.083782] [ 28.083939] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.083986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.083999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.084020] Call Trace: [ 28.084036] <TASK> [ 28.084049] dump_stack_lvl+0x73/0xb0 [ 28.084079] print_report+0xd1/0x640 [ 28.084101] ? __virt_addr_valid+0x1db/0x2d0 [ 28.084124] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.084145] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.084171] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.084194] kasan_report+0x141/0x180 [ 28.084216] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.084241] kasan_check_range+0x10c/0x1c0 [ 28.084266] __kasan_check_write+0x18/0x20 [ 28.084289] kasan_atomics_helper+0x1c18/0x5450 [ 28.084312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.084348] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.084372] ? kasan_atomics+0x152/0x310 [ 28.084399] kasan_atomics+0x1dc/0x310 [ 28.084423] ? __pfx_kasan_atomics+0x10/0x10 [ 28.084447] ? __pfx_read_tsc+0x10/0x10 [ 28.084469] ? ktime_get_ts64+0x86/0x230 [ 28.084494] kunit_try_run_case+0x1a5/0x480 [ 28.084521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.084543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.084579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.084613] ? __kthread_parkme+0x82/0x180 [ 28.084633] ? preempt_count_sub+0x50/0x80 [ 28.084657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.084681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.084704] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.084728] kthread+0x337/0x6f0 [ 28.084749] ? trace_preempt_on+0x20/0xc0 [ 28.084771] ? __pfx_kthread+0x10/0x10 [ 28.084793] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.084824] ? calculate_sigpending+0x7b/0xa0 [ 28.084848] ? __pfx_kthread+0x10/0x10 [ 28.084869] ret_from_fork+0x116/0x1d0 [ 28.084889] ? __pfx_kthread+0x10/0x10 [ 28.084910] ret_from_fork_asm+0x1a/0x30 [ 28.084942] </TASK> [ 28.084953] [ 28.092993] Allocated by task 313: [ 28.093167] kasan_save_stack+0x45/0x70 [ 28.093309] kasan_save_track+0x18/0x40 [ 28.093457] kasan_save_alloc_info+0x3b/0x50 [ 28.093599] __kasan_kmalloc+0xb7/0xc0 [ 28.093725] __kmalloc_cache_noprof+0x189/0x420 [ 28.093920] kasan_atomics+0x95/0x310 [ 28.094176] kunit_try_run_case+0x1a5/0x480 [ 28.094392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.094637] kthread+0x337/0x6f0 [ 28.094806] ret_from_fork+0x116/0x1d0 [ 28.094987] ret_from_fork_asm+0x1a/0x30 [ 28.095177] [ 28.095265] The buggy address belongs to the object at ffff8881053c7b80 [ 28.095265] which belongs to the cache kmalloc-64 of size 64 [ 28.095661] The buggy address is located 0 bytes to the right of [ 28.095661] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.096202] [ 28.096280] The buggy address belongs to the physical page: [ 28.096663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.097097] flags: 0x200000000000000(node=0|zone=2) [ 28.097314] page_type: f5(slab) [ 28.097493] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.097778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.098070] page dumped because: kasan: bad access detected [ 28.098274] [ 28.098368] Memory state around the buggy address: [ 28.098565] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.098793] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.099104] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.099439] ^ [ 28.099665] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.100087] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.100304] ================================================================== [ 28.328176] ================================================================== [ 28.329054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 28.329605] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.329819] [ 28.329897] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.329942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.329955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.329978] Call Trace: [ 28.329996] <TASK> [ 28.330011] dump_stack_lvl+0x73/0xb0 [ 28.330042] print_report+0xd1/0x640 [ 28.330081] ? __virt_addr_valid+0x1db/0x2d0 [ 28.330105] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.330126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.330152] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.330174] kasan_report+0x141/0x180 [ 28.330197] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.330223] __asan_report_load8_noabort+0x18/0x20 [ 28.330260] kasan_atomics_helper+0x4f98/0x5450 [ 28.330284] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.330305] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.330340] ? kasan_atomics+0x152/0x310 [ 28.330366] kasan_atomics+0x1dc/0x310 [ 28.330389] ? __pfx_kasan_atomics+0x10/0x10 [ 28.330413] ? __pfx_read_tsc+0x10/0x10 [ 28.330435] ? ktime_get_ts64+0x86/0x230 [ 28.330460] kunit_try_run_case+0x1a5/0x480 [ 28.330484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.330507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.330542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.330576] ? __kthread_parkme+0x82/0x180 [ 28.330596] ? preempt_count_sub+0x50/0x80 [ 28.330619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.330643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.330672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.330695] kthread+0x337/0x6f0 [ 28.330715] ? trace_preempt_on+0x20/0xc0 [ 28.330739] ? __pfx_kthread+0x10/0x10 [ 28.330760] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.330790] ? calculate_sigpending+0x7b/0xa0 [ 28.330826] ? __pfx_kthread+0x10/0x10 [ 28.330859] ret_from_fork+0x116/0x1d0 [ 28.330878] ? __pfx_kthread+0x10/0x10 [ 28.331140] ret_from_fork_asm+0x1a/0x30 [ 28.331171] </TASK> [ 28.331182] [ 28.339720] Allocated by task 313: [ 28.339847] kasan_save_stack+0x45/0x70 [ 28.339990] kasan_save_track+0x18/0x40 [ 28.340182] kasan_save_alloc_info+0x3b/0x50 [ 28.340487] __kasan_kmalloc+0xb7/0xc0 [ 28.341343] __kmalloc_cache_noprof+0x189/0x420 [ 28.341533] kasan_atomics+0x95/0x310 [ 28.341720] kunit_try_run_case+0x1a5/0x480 [ 28.342031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.342365] kthread+0x337/0x6f0 [ 28.342537] ret_from_fork+0x116/0x1d0 [ 28.342815] ret_from_fork_asm+0x1a/0x30 [ 28.343160] [ 28.343317] The buggy address belongs to the object at ffff8881053c7b80 [ 28.343317] which belongs to the cache kmalloc-64 of size 64 [ 28.343791] The buggy address is located 0 bytes to the right of [ 28.343791] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.344576] [ 28.344658] The buggy address belongs to the physical page: [ 28.344901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.345663] flags: 0x200000000000000(node=0|zone=2) [ 28.345958] page_type: f5(slab) [ 28.346118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.346432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.346801] page dumped because: kasan: bad access detected [ 28.347056] [ 28.347146] Memory state around the buggy address: [ 28.347573] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.348056] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.348391] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.348808] ^ [ 28.349153] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.349893] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.350534] ================================================================== [ 28.008528] ================================================================== [ 28.008831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 28.009180] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.009450] [ 28.009555] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.009613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.009626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.009649] Call Trace: [ 28.009664] <TASK> [ 28.009678] dump_stack_lvl+0x73/0xb0 [ 28.009708] print_report+0xd1/0x640 [ 28.009731] ? __virt_addr_valid+0x1db/0x2d0 [ 28.009754] ? kasan_atomics_helper+0x194a/0x5450 [ 28.009775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.009943] ? kasan_atomics_helper+0x194a/0x5450 [ 28.009972] kasan_report+0x141/0x180 [ 28.009995] ? kasan_atomics_helper+0x194a/0x5450 [ 28.010022] kasan_check_range+0x10c/0x1c0 [ 28.010046] __kasan_check_write+0x18/0x20 [ 28.010070] kasan_atomics_helper+0x194a/0x5450 [ 28.010093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.010115] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.010140] ? kasan_atomics+0x152/0x310 [ 28.010166] kasan_atomics+0x1dc/0x310 [ 28.010188] ? __pfx_kasan_atomics+0x10/0x10 [ 28.010214] ? __pfx_read_tsc+0x10/0x10 [ 28.010235] ? ktime_get_ts64+0x86/0x230 [ 28.010260] kunit_try_run_case+0x1a5/0x480 [ 28.010284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.010307] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.010359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.010393] ? __kthread_parkme+0x82/0x180 [ 28.010413] ? preempt_count_sub+0x50/0x80 [ 28.010439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.010462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.010486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.010509] kthread+0x337/0x6f0 [ 28.010530] ? trace_preempt_on+0x20/0xc0 [ 28.010553] ? __pfx_kthread+0x10/0x10 [ 28.010574] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.010604] ? calculate_sigpending+0x7b/0xa0 [ 28.010628] ? __pfx_kthread+0x10/0x10 [ 28.010650] ret_from_fork+0x116/0x1d0 [ 28.010673] ? __pfx_kthread+0x10/0x10 [ 28.010694] ret_from_fork_asm+0x1a/0x30 [ 28.010725] </TASK> [ 28.010736] [ 28.019371] Allocated by task 313: [ 28.019537] kasan_save_stack+0x45/0x70 [ 28.019715] kasan_save_track+0x18/0x40 [ 28.019907] kasan_save_alloc_info+0x3b/0x50 [ 28.020168] __kasan_kmalloc+0xb7/0xc0 [ 28.020370] __kmalloc_cache_noprof+0x189/0x420 [ 28.020541] kasan_atomics+0x95/0x310 [ 28.020669] kunit_try_run_case+0x1a5/0x480 [ 28.020808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.020977] kthread+0x337/0x6f0 [ 28.021095] ret_from_fork+0x116/0x1d0 [ 28.021291] ret_from_fork_asm+0x1a/0x30 [ 28.021491] [ 28.021582] The buggy address belongs to the object at ffff8881053c7b80 [ 28.021582] which belongs to the cache kmalloc-64 of size 64 [ 28.022078] The buggy address is located 0 bytes to the right of [ 28.022078] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.022774] [ 28.022877] The buggy address belongs to the physical page: [ 28.023058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.023410] flags: 0x200000000000000(node=0|zone=2) [ 28.023627] page_type: f5(slab) [ 28.023758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.024034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.024255] page dumped because: kasan: bad access detected [ 28.024707] [ 28.024808] Memory state around the buggy address: [ 28.025096] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.025426] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.025739] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.026277] ^ [ 28.026471] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.026691] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.026898] ================================================================== [ 28.118148] ================================================================== [ 28.118494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 28.119225] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.119558] [ 28.119663] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.119709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.119722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.119744] Call Trace: [ 28.119760] <TASK> [ 28.119776] dump_stack_lvl+0x73/0xb0 [ 28.119805] print_report+0xd1/0x640 [ 28.119827] ? __virt_addr_valid+0x1db/0x2d0 [ 28.119850] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.119872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.119899] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.119920] kasan_report+0x141/0x180 [ 28.119943] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.119969] kasan_check_range+0x10c/0x1c0 [ 28.119993] __kasan_check_write+0x18/0x20 [ 28.120016] kasan_atomics_helper+0x1ce1/0x5450 [ 28.120039] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.120062] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.120087] ? kasan_atomics+0x152/0x310 [ 28.120113] kasan_atomics+0x1dc/0x310 [ 28.120137] ? __pfx_kasan_atomics+0x10/0x10 [ 28.120161] ? __pfx_read_tsc+0x10/0x10 [ 28.120183] ? ktime_get_ts64+0x86/0x230 [ 28.120209] kunit_try_run_case+0x1a5/0x480 [ 28.120233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.120256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.120292] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.120336] ? __kthread_parkme+0x82/0x180 [ 28.120356] ? preempt_count_sub+0x50/0x80 [ 28.120379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.120403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.120427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.120450] kthread+0x337/0x6f0 [ 28.120470] ? trace_preempt_on+0x20/0xc0 [ 28.120494] ? __pfx_kthread+0x10/0x10 [ 28.120515] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.120546] ? calculate_sigpending+0x7b/0xa0 [ 28.120570] ? __pfx_kthread+0x10/0x10 [ 28.120592] ret_from_fork+0x116/0x1d0 [ 28.120611] ? __pfx_kthread+0x10/0x10 [ 28.120632] ret_from_fork_asm+0x1a/0x30 [ 28.120663] </TASK> [ 28.120674] [ 28.132371] Allocated by task 313: [ 28.132530] kasan_save_stack+0x45/0x70 [ 28.132723] kasan_save_track+0x18/0x40 [ 28.132927] kasan_save_alloc_info+0x3b/0x50 [ 28.133901] __kasan_kmalloc+0xb7/0xc0 [ 28.134048] __kmalloc_cache_noprof+0x189/0x420 [ 28.134285] kasan_atomics+0x95/0x310 [ 28.134492] kunit_try_run_case+0x1a5/0x480 [ 28.134696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.135674] kthread+0x337/0x6f0 [ 28.136000] ret_from_fork+0x116/0x1d0 [ 28.136132] ret_from_fork_asm+0x1a/0x30 [ 28.136348] [ 28.136441] The buggy address belongs to the object at ffff8881053c7b80 [ 28.136441] which belongs to the cache kmalloc-64 of size 64 [ 28.137181] The buggy address is located 0 bytes to the right of [ 28.137181] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.137570] [ 28.137639] The buggy address belongs to the physical page: [ 28.137806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.138047] flags: 0x200000000000000(node=0|zone=2) [ 28.139446] page_type: f5(slab) [ 28.140159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.141407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.142793] page dumped because: kasan: bad access detected [ 28.143916] [ 28.144307] Memory state around the buggy address: [ 28.144929] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.145165] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.145833] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.146908] ^ [ 28.147736] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.148700] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.149503] ================================================================== [ 27.511054] ================================================================== [ 27.511390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 27.511702] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.512376] [ 27.512610] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.512667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.512681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.512808] Call Trace: [ 27.512831] <TASK> [ 27.512849] dump_stack_lvl+0x73/0xb0 [ 27.512885] print_report+0xd1/0x640 [ 27.512908] ? __virt_addr_valid+0x1db/0x2d0 [ 27.512934] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.512964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.512990] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.513026] kasan_report+0x141/0x180 [ 27.513050] ? kasan_atomics_helper+0xfa9/0x5450 [ 27.513076] kasan_check_range+0x10c/0x1c0 [ 27.513100] __kasan_check_write+0x18/0x20 [ 27.513124] kasan_atomics_helper+0xfa9/0x5450 [ 27.513146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.513169] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.513194] ? kasan_atomics+0x152/0x310 [ 27.513220] kasan_atomics+0x1dc/0x310 [ 27.513243] ? __pfx_kasan_atomics+0x10/0x10 [ 27.513268] ? __pfx_read_tsc+0x10/0x10 [ 27.513292] ? ktime_get_ts64+0x86/0x230 [ 27.513327] kunit_try_run_case+0x1a5/0x480 [ 27.513353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.513376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.513412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.513446] ? __kthread_parkme+0x82/0x180 [ 27.513468] ? preempt_count_sub+0x50/0x80 [ 27.513493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.513518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.513541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.513566] kthread+0x337/0x6f0 [ 27.513586] ? trace_preempt_on+0x20/0xc0 [ 27.513610] ? __pfx_kthread+0x10/0x10 [ 27.513631] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.513662] ? calculate_sigpending+0x7b/0xa0 [ 27.513686] ? __pfx_kthread+0x10/0x10 [ 27.513709] ret_from_fork+0x116/0x1d0 [ 27.513728] ? __pfx_kthread+0x10/0x10 [ 27.513749] ret_from_fork_asm+0x1a/0x30 [ 27.513780] </TASK> [ 27.513793] [ 27.526156] Allocated by task 313: [ 27.526364] kasan_save_stack+0x45/0x70 [ 27.526560] kasan_save_track+0x18/0x40 [ 27.526741] kasan_save_alloc_info+0x3b/0x50 [ 27.527284] __kasan_kmalloc+0xb7/0xc0 [ 27.527659] __kmalloc_cache_noprof+0x189/0x420 [ 27.527996] kasan_atomics+0x95/0x310 [ 27.528372] kunit_try_run_case+0x1a5/0x480 [ 27.528569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.528789] kthread+0x337/0x6f0 [ 27.529205] ret_from_fork+0x116/0x1d0 [ 27.529498] ret_from_fork_asm+0x1a/0x30 [ 27.529827] [ 27.530075] The buggy address belongs to the object at ffff8881053c7b80 [ 27.530075] which belongs to the cache kmalloc-64 of size 64 [ 27.530557] The buggy address is located 0 bytes to the right of [ 27.530557] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.531535] [ 27.531772] The buggy address belongs to the physical page: [ 27.532257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.532845] flags: 0x200000000000000(node=0|zone=2) [ 27.533196] page_type: f5(slab) [ 27.533514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.534037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.534442] page dumped because: kasan: bad access detected [ 27.534803] [ 27.534982] Memory state around the buggy address: [ 27.535407] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.535696] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.536486] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.536956] ^ [ 27.537438] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.537944] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.538621] ================================================================== [ 27.988248] ================================================================== [ 27.988561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 27.988846] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.989164] [ 27.989242] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.989287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.989300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.989334] Call Trace: [ 27.989352] <TASK> [ 27.989368] dump_stack_lvl+0x73/0xb0 [ 27.989398] print_report+0xd1/0x640 [ 27.989421] ? __virt_addr_valid+0x1db/0x2d0 [ 27.989445] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.989466] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.989493] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.989515] kasan_report+0x141/0x180 [ 27.989538] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.989564] kasan_check_range+0x10c/0x1c0 [ 27.989589] __kasan_check_write+0x18/0x20 [ 27.989613] kasan_atomics_helper+0x18b1/0x5450 [ 27.989636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.989658] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.989683] ? kasan_atomics+0x152/0x310 [ 27.989709] kasan_atomics+0x1dc/0x310 [ 27.989732] ? __pfx_kasan_atomics+0x10/0x10 [ 27.989757] ? __pfx_read_tsc+0x10/0x10 [ 27.989779] ? ktime_get_ts64+0x86/0x230 [ 27.989803] kunit_try_run_case+0x1a5/0x480 [ 27.989828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.989851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.989887] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.989933] ? __kthread_parkme+0x82/0x180 [ 27.989954] ? preempt_count_sub+0x50/0x80 [ 27.989978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.990013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.990037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.990060] kthread+0x337/0x6f0 [ 27.990081] ? trace_preempt_on+0x20/0xc0 [ 27.990105] ? __pfx_kthread+0x10/0x10 [ 27.990126] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.990157] ? calculate_sigpending+0x7b/0xa0 [ 27.990182] ? __pfx_kthread+0x10/0x10 [ 27.990203] ret_from_fork+0x116/0x1d0 [ 27.990224] ? __pfx_kthread+0x10/0x10 [ 27.990244] ret_from_fork_asm+0x1a/0x30 [ 27.990275] </TASK> [ 27.990286] [ 27.998261] Allocated by task 313: [ 27.998398] kasan_save_stack+0x45/0x70 [ 27.998538] kasan_save_track+0x18/0x40 [ 27.998669] kasan_save_alloc_info+0x3b/0x50 [ 27.998882] __kasan_kmalloc+0xb7/0xc0 [ 27.999368] __kmalloc_cache_noprof+0x189/0x420 [ 27.999587] kasan_atomics+0x95/0x310 [ 27.999766] kunit_try_run_case+0x1a5/0x480 [ 27.999967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.000209] kthread+0x337/0x6f0 [ 28.000388] ret_from_fork+0x116/0x1d0 [ 28.000568] ret_from_fork_asm+0x1a/0x30 [ 28.000758] [ 28.000846] The buggy address belongs to the object at ffff8881053c7b80 [ 28.000846] which belongs to the cache kmalloc-64 of size 64 [ 28.002633] The buggy address is located 0 bytes to the right of [ 28.002633] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.003714] [ 28.003956] The buggy address belongs to the physical page: [ 28.004209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.004513] flags: 0x200000000000000(node=0|zone=2) [ 28.004745] page_type: f5(slab) [ 28.005036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.005338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.005611] page dumped because: kasan: bad access detected [ 28.006065] [ 28.006148] Memory state around the buggy address: [ 28.006349] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.006651] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.007000] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.007305] ^ [ 28.007509] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.007791] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.008064] ================================================================== [ 28.269632] ================================================================== [ 28.270381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 28.271169] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.271881] [ 28.272057] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.272105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.272119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.272141] Call Trace: [ 28.272171] <TASK> [ 28.272185] dump_stack_lvl+0x73/0xb0 [ 28.272238] print_report+0xd1/0x640 [ 28.272262] ? __virt_addr_valid+0x1db/0x2d0 [ 28.272285] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.272305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.272341] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.272362] kasan_report+0x141/0x180 [ 28.272385] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.272411] __asan_report_load8_noabort+0x18/0x20 [ 28.272444] kasan_atomics_helper+0x4f71/0x5450 [ 28.272467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.272490] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.272521] ? kasan_atomics+0x152/0x310 [ 28.272547] kasan_atomics+0x1dc/0x310 [ 28.272570] ? __pfx_kasan_atomics+0x10/0x10 [ 28.272594] ? __pfx_read_tsc+0x10/0x10 [ 28.272616] ? ktime_get_ts64+0x86/0x230 [ 28.272642] kunit_try_run_case+0x1a5/0x480 [ 28.272667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.272690] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.272729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.272765] ? __kthread_parkme+0x82/0x180 [ 28.272786] ? preempt_count_sub+0x50/0x80 [ 28.272810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.272834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.272859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.272882] kthread+0x337/0x6f0 [ 28.272902] ? trace_preempt_on+0x20/0xc0 [ 28.272925] ? __pfx_kthread+0x10/0x10 [ 28.272946] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.272977] ? calculate_sigpending+0x7b/0xa0 [ 28.273002] ? __pfx_kthread+0x10/0x10 [ 28.273045] ret_from_fork+0x116/0x1d0 [ 28.273066] ? __pfx_kthread+0x10/0x10 [ 28.273094] ret_from_fork_asm+0x1a/0x30 [ 28.273126] </TASK> [ 28.273137] [ 28.285916] Allocated by task 313: [ 28.286067] kasan_save_stack+0x45/0x70 [ 28.286209] kasan_save_track+0x18/0x40 [ 28.286347] kasan_save_alloc_info+0x3b/0x50 [ 28.286555] __kasan_kmalloc+0xb7/0xc0 [ 28.286777] __kmalloc_cache_noprof+0x189/0x420 [ 28.287138] kasan_atomics+0x95/0x310 [ 28.287443] kunit_try_run_case+0x1a5/0x480 [ 28.287694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.288252] kthread+0x337/0x6f0 [ 28.288593] ret_from_fork+0x116/0x1d0 [ 28.288929] ret_from_fork_asm+0x1a/0x30 [ 28.289315] [ 28.289449] The buggy address belongs to the object at ffff8881053c7b80 [ 28.289449] which belongs to the cache kmalloc-64 of size 64 [ 28.290349] The buggy address is located 0 bytes to the right of [ 28.290349] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.291312] [ 28.291474] The buggy address belongs to the physical page: [ 28.291731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.292211] flags: 0x200000000000000(node=0|zone=2) [ 28.292699] page_type: f5(slab) [ 28.293091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.293479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.293701] page dumped because: kasan: bad access detected [ 28.294451] [ 28.294603] Memory state around the buggy address: [ 28.295138] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.295881] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.296751] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.297437] ^ [ 28.297893] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.298481] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.298695] ================================================================== [ 27.364301] ================================================================== [ 27.364643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 27.365186] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.365502] [ 27.365589] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.365639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.365652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.365676] Call Trace: [ 27.365689] <TASK> [ 27.365705] dump_stack_lvl+0x73/0xb0 [ 27.365737] print_report+0xd1/0x640 [ 27.365761] ? __virt_addr_valid+0x1db/0x2d0 [ 27.365785] ? kasan_atomics_helper+0xc70/0x5450 [ 27.365878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.365906] ? kasan_atomics_helper+0xc70/0x5450 [ 27.365928] kasan_report+0x141/0x180 [ 27.365951] ? kasan_atomics_helper+0xc70/0x5450 [ 27.365977] kasan_check_range+0x10c/0x1c0 [ 27.366003] __kasan_check_write+0x18/0x20 [ 27.366027] kasan_atomics_helper+0xc70/0x5450 [ 27.366050] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.366073] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.366098] ? kasan_atomics+0x152/0x310 [ 27.366125] kasan_atomics+0x1dc/0x310 [ 27.366148] ? __pfx_kasan_atomics+0x10/0x10 [ 27.366173] ? __pfx_read_tsc+0x10/0x10 [ 27.366196] ? ktime_get_ts64+0x86/0x230 [ 27.366222] kunit_try_run_case+0x1a5/0x480 [ 27.366247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.366271] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.366321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.366405] ? __kthread_parkme+0x82/0x180 [ 27.366430] ? preempt_count_sub+0x50/0x80 [ 27.366455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.366479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.366505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.366529] kthread+0x337/0x6f0 [ 27.366550] ? trace_preempt_on+0x20/0xc0 [ 27.366574] ? __pfx_kthread+0x10/0x10 [ 27.366596] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.366627] ? calculate_sigpending+0x7b/0xa0 [ 27.366659] ? __pfx_kthread+0x10/0x10 [ 27.366681] ret_from_fork+0x116/0x1d0 [ 27.366701] ? __pfx_kthread+0x10/0x10 [ 27.366723] ret_from_fork_asm+0x1a/0x30 [ 27.366755] </TASK> [ 27.366768] [ 27.376722] Allocated by task 313: [ 27.377007] kasan_save_stack+0x45/0x70 [ 27.377256] kasan_save_track+0x18/0x40 [ 27.377477] kasan_save_alloc_info+0x3b/0x50 [ 27.377685] __kasan_kmalloc+0xb7/0xc0 [ 27.378077] __kmalloc_cache_noprof+0x189/0x420 [ 27.378275] kasan_atomics+0x95/0x310 [ 27.378452] kunit_try_run_case+0x1a5/0x480 [ 27.378595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.378770] kthread+0x337/0x6f0 [ 27.379144] ret_from_fork+0x116/0x1d0 [ 27.379364] ret_from_fork_asm+0x1a/0x30 [ 27.379564] [ 27.379655] The buggy address belongs to the object at ffff8881053c7b80 [ 27.379655] which belongs to the cache kmalloc-64 of size 64 [ 27.380341] The buggy address is located 0 bytes to the right of [ 27.380341] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.380799] [ 27.380916] The buggy address belongs to the physical page: [ 27.381166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.381764] flags: 0x200000000000000(node=0|zone=2) [ 27.382209] page_type: f5(slab) [ 27.382357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.382735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.383265] page dumped because: kasan: bad access detected [ 27.383495] [ 27.383560] Memory state around the buggy address: [ 27.383705] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.384462] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.384752] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.385332] ^ [ 27.385572] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.385984] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.386239] ================================================================== [ 27.539489] ================================================================== [ 27.540223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 27.540564] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.540947] [ 27.541242] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.541532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.541553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.541578] Call Trace: [ 27.541599] <TASK> [ 27.541617] dump_stack_lvl+0x73/0xb0 [ 27.541650] print_report+0xd1/0x640 [ 27.541716] ? __virt_addr_valid+0x1db/0x2d0 [ 27.541744] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.541766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.541793] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.541826] kasan_report+0x141/0x180 [ 27.541878] ? kasan_atomics_helper+0x4a36/0x5450 [ 27.541904] __asan_report_load4_noabort+0x18/0x20 [ 27.541929] kasan_atomics_helper+0x4a36/0x5450 [ 27.541951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.541974] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.542000] ? kasan_atomics+0x152/0x310 [ 27.542026] kasan_atomics+0x1dc/0x310 [ 27.542049] ? __pfx_kasan_atomics+0x10/0x10 [ 27.542074] ? __pfx_read_tsc+0x10/0x10 [ 27.542096] ? ktime_get_ts64+0x86/0x230 [ 27.542123] kunit_try_run_case+0x1a5/0x480 [ 27.542147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.542170] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.542207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.542240] ? __kthread_parkme+0x82/0x180 [ 27.542261] ? preempt_count_sub+0x50/0x80 [ 27.542285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.542323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.542348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.542372] kthread+0x337/0x6f0 [ 27.542393] ? trace_preempt_on+0x20/0xc0 [ 27.542417] ? __pfx_kthread+0x10/0x10 [ 27.542438] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.542469] ? calculate_sigpending+0x7b/0xa0 [ 27.542494] ? __pfx_kthread+0x10/0x10 [ 27.542516] ret_from_fork+0x116/0x1d0 [ 27.542536] ? __pfx_kthread+0x10/0x10 [ 27.542557] ret_from_fork_asm+0x1a/0x30 [ 27.542589] </TASK> [ 27.542601] [ 27.554807] Allocated by task 313: [ 27.555162] kasan_save_stack+0x45/0x70 [ 27.555575] kasan_save_track+0x18/0x40 [ 27.555764] kasan_save_alloc_info+0x3b/0x50 [ 27.556110] __kasan_kmalloc+0xb7/0xc0 [ 27.556288] __kmalloc_cache_noprof+0x189/0x420 [ 27.556493] kasan_atomics+0x95/0x310 [ 27.556661] kunit_try_run_case+0x1a5/0x480 [ 27.557110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.557541] kthread+0x337/0x6f0 [ 27.557838] ret_from_fork+0x116/0x1d0 [ 27.558164] ret_from_fork_asm+0x1a/0x30 [ 27.558498] [ 27.558600] The buggy address belongs to the object at ffff8881053c7b80 [ 27.558600] which belongs to the cache kmalloc-64 of size 64 [ 27.559407] The buggy address is located 0 bytes to the right of [ 27.559407] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.560355] [ 27.560586] The buggy address belongs to the physical page: [ 27.561033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.561555] flags: 0x200000000000000(node=0|zone=2) [ 27.561778] page_type: f5(slab) [ 27.562105] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.562633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.563101] page dumped because: kasan: bad access detected [ 27.563499] [ 27.563589] Memory state around the buggy address: [ 27.564009] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.564446] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.564918] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.565604] ^ [ 27.566010] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.566605] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.567134] ================================================================== [ 27.877665] ================================================================== [ 27.878076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 27.878397] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.879170] [ 27.879276] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.879340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.879427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.879452] Call Trace: [ 27.879468] <TASK> [ 27.879484] dump_stack_lvl+0x73/0xb0 [ 27.879517] print_report+0xd1/0x640 [ 27.879540] ? __virt_addr_valid+0x1db/0x2d0 [ 27.879564] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.879586] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.879616] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.879639] kasan_report+0x141/0x180 [ 27.879661] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.879687] kasan_check_range+0x10c/0x1c0 [ 27.879711] __kasan_check_write+0x18/0x20 [ 27.879735] kasan_atomics_helper+0x15b6/0x5450 [ 27.879757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.879780] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.879806] ? kasan_atomics+0x152/0x310 [ 27.879833] kasan_atomics+0x1dc/0x310 [ 27.879925] ? __pfx_kasan_atomics+0x10/0x10 [ 27.879951] ? __pfx_read_tsc+0x10/0x10 [ 27.879973] ? ktime_get_ts64+0x86/0x230 [ 27.879998] kunit_try_run_case+0x1a5/0x480 [ 27.880022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.880045] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.880173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.880208] ? __kthread_parkme+0x82/0x180 [ 27.880228] ? preempt_count_sub+0x50/0x80 [ 27.880251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.880275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.880299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.880335] kthread+0x337/0x6f0 [ 27.880355] ? trace_preempt_on+0x20/0xc0 [ 27.880379] ? __pfx_kthread+0x10/0x10 [ 27.880402] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.880436] ? calculate_sigpending+0x7b/0xa0 [ 27.880462] ? __pfx_kthread+0x10/0x10 [ 27.880485] ret_from_fork+0x116/0x1d0 [ 27.880505] ? __pfx_kthread+0x10/0x10 [ 27.880525] ret_from_fork_asm+0x1a/0x30 [ 27.880558] </TASK> [ 27.880570] [ 27.890536] Allocated by task 313: [ 27.890722] kasan_save_stack+0x45/0x70 [ 27.890967] kasan_save_track+0x18/0x40 [ 27.891103] kasan_save_alloc_info+0x3b/0x50 [ 27.891288] __kasan_kmalloc+0xb7/0xc0 [ 27.891924] __kmalloc_cache_noprof+0x189/0x420 [ 27.892118] kasan_atomics+0x95/0x310 [ 27.892413] kunit_try_run_case+0x1a5/0x480 [ 27.892554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.892829] kthread+0x337/0x6f0 [ 27.892990] ret_from_fork+0x116/0x1d0 [ 27.893140] ret_from_fork_asm+0x1a/0x30 [ 27.893569] [ 27.893674] The buggy address belongs to the object at ffff8881053c7b80 [ 27.893674] which belongs to the cache kmalloc-64 of size 64 [ 27.894497] The buggy address is located 0 bytes to the right of [ 27.894497] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.895109] [ 27.895208] The buggy address belongs to the physical page: [ 27.895511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.896170] flags: 0x200000000000000(node=0|zone=2) [ 27.896397] page_type: f5(slab) [ 27.896571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.896938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.897463] page dumped because: kasan: bad access detected [ 27.897697] [ 27.897782] Memory state around the buggy address: [ 27.898103] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.898577] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.898937] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.899364] ^ [ 27.899549] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.899951] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.900462] ================================================================== [ 27.452441] ================================================================== [ 27.452759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 27.453316] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.453623] [ 27.453728] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.453780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.454136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.454173] Call Trace: [ 27.454194] <TASK> [ 27.454212] dump_stack_lvl+0x73/0xb0 [ 27.454247] print_report+0xd1/0x640 [ 27.454518] ? __virt_addr_valid+0x1db/0x2d0 [ 27.454551] ? kasan_atomics_helper+0xe78/0x5450 [ 27.454575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.454601] ? kasan_atomics_helper+0xe78/0x5450 [ 27.454623] kasan_report+0x141/0x180 [ 27.454646] ? kasan_atomics_helper+0xe78/0x5450 [ 27.454680] kasan_check_range+0x10c/0x1c0 [ 27.454704] __kasan_check_write+0x18/0x20 [ 27.454729] kasan_atomics_helper+0xe78/0x5450 [ 27.454753] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.454777] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.455014] ? kasan_atomics+0x152/0x310 [ 27.455045] kasan_atomics+0x1dc/0x310 [ 27.455069] ? __pfx_kasan_atomics+0x10/0x10 [ 27.455094] ? __pfx_read_tsc+0x10/0x10 [ 27.455116] ? ktime_get_ts64+0x86/0x230 [ 27.455142] kunit_try_run_case+0x1a5/0x480 [ 27.455167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.455191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.455227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.455260] ? __kthread_parkme+0x82/0x180 [ 27.455282] ? preempt_count_sub+0x50/0x80 [ 27.455322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.455346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.455370] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.455394] kthread+0x337/0x6f0 [ 27.455414] ? trace_preempt_on+0x20/0xc0 [ 27.455438] ? __pfx_kthread+0x10/0x10 [ 27.455459] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.455490] ? calculate_sigpending+0x7b/0xa0 [ 27.455515] ? __pfx_kthread+0x10/0x10 [ 27.455537] ret_from_fork+0x116/0x1d0 [ 27.455556] ? __pfx_kthread+0x10/0x10 [ 27.455577] ret_from_fork_asm+0x1a/0x30 [ 27.455609] </TASK> [ 27.455621] [ 27.468403] Allocated by task 313: [ 27.468591] kasan_save_stack+0x45/0x70 [ 27.468786] kasan_save_track+0x18/0x40 [ 27.469627] kasan_save_alloc_info+0x3b/0x50 [ 27.470121] __kasan_kmalloc+0xb7/0xc0 [ 27.470389] __kmalloc_cache_noprof+0x189/0x420 [ 27.470609] kasan_atomics+0x95/0x310 [ 27.470784] kunit_try_run_case+0x1a5/0x480 [ 27.471365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.471602] kthread+0x337/0x6f0 [ 27.471755] ret_from_fork+0x116/0x1d0 [ 27.472074] ret_from_fork_asm+0x1a/0x30 [ 27.472252] [ 27.472346] The buggy address belongs to the object at ffff8881053c7b80 [ 27.472346] which belongs to the cache kmalloc-64 of size 64 [ 27.472821] The buggy address is located 0 bytes to the right of [ 27.472821] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.474079] [ 27.474181] The buggy address belongs to the physical page: [ 27.474669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.475371] flags: 0x200000000000000(node=0|zone=2) [ 27.475833] page_type: f5(slab) [ 27.476124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.476786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.477385] page dumped because: kasan: bad access detected [ 27.477766] [ 27.478028] Memory state around the buggy address: [ 27.478230] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.478543] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.479091] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.479569] ^ [ 27.480039] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.480543] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.480992] ================================================================== [ 27.223183] ================================================================== [ 27.223471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 27.223800] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.224379] [ 27.224489] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.224558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.224584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.224608] Call Trace: [ 27.224639] <TASK> [ 27.224668] dump_stack_lvl+0x73/0xb0 [ 27.224700] print_report+0xd1/0x640 [ 27.224736] ? __virt_addr_valid+0x1db/0x2d0 [ 27.224759] ? kasan_atomics_helper+0x860/0x5450 [ 27.224779] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.224805] ? kasan_atomics_helper+0x860/0x5450 [ 27.224825] kasan_report+0x141/0x180 [ 27.224846] ? kasan_atomics_helper+0x860/0x5450 [ 27.224871] kasan_check_range+0x10c/0x1c0 [ 27.224895] __kasan_check_write+0x18/0x20 [ 27.224937] kasan_atomics_helper+0x860/0x5450 [ 27.224960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.224981] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.225006] ? kasan_atomics+0x152/0x310 [ 27.225030] kasan_atomics+0x1dc/0x310 [ 27.225052] ? __pfx_kasan_atomics+0x10/0x10 [ 27.225075] ? __pfx_read_tsc+0x10/0x10 [ 27.225096] ? ktime_get_ts64+0x86/0x230 [ 27.225120] kunit_try_run_case+0x1a5/0x480 [ 27.225144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.225166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.225200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.225329] ? __kthread_parkme+0x82/0x180 [ 27.225352] ? preempt_count_sub+0x50/0x80 [ 27.225375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.225399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.225421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.225443] kthread+0x337/0x6f0 [ 27.225463] ? trace_preempt_on+0x20/0xc0 [ 27.225485] ? __pfx_kthread+0x10/0x10 [ 27.225507] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.225559] ? calculate_sigpending+0x7b/0xa0 [ 27.225585] ? __pfx_kthread+0x10/0x10 [ 27.225606] ret_from_fork+0x116/0x1d0 [ 27.225639] ? __pfx_kthread+0x10/0x10 [ 27.225659] ret_from_fork_asm+0x1a/0x30 [ 27.225703] </TASK> [ 27.225714] [ 27.235726] Allocated by task 313: [ 27.235980] kasan_save_stack+0x45/0x70 [ 27.236160] kasan_save_track+0x18/0x40 [ 27.236338] kasan_save_alloc_info+0x3b/0x50 [ 27.236547] __kasan_kmalloc+0xb7/0xc0 [ 27.236727] __kmalloc_cache_noprof+0x189/0x420 [ 27.236921] kasan_atomics+0x95/0x310 [ 27.237099] kunit_try_run_case+0x1a5/0x480 [ 27.238210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.238464] kthread+0x337/0x6f0 [ 27.238597] ret_from_fork+0x116/0x1d0 [ 27.239020] ret_from_fork_asm+0x1a/0x30 [ 27.239356] [ 27.239456] The buggy address belongs to the object at ffff8881053c7b80 [ 27.239456] which belongs to the cache kmalloc-64 of size 64 [ 27.240206] The buggy address is located 0 bytes to the right of [ 27.240206] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.241005] [ 27.241098] The buggy address belongs to the physical page: [ 27.241501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.241978] flags: 0x200000000000000(node=0|zone=2) [ 27.242325] page_type: f5(slab) [ 27.242458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.242951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.243352] page dumped because: kasan: bad access detected [ 27.243596] [ 27.243666] Memory state around the buggy address: [ 27.244039] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.244352] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.244634] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.244920] ^ [ 27.245114] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.245901] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.246278] ================================================================== [ 26.920902] ================================================================== [ 26.922442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 26.923094] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 26.923392] [ 26.923497] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 26.923548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.923560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.923583] Call Trace: [ 26.923597] <TASK> [ 26.923615] dump_stack_lvl+0x73/0xb0 [ 26.923649] print_report+0xd1/0x640 [ 26.923672] ? __virt_addr_valid+0x1db/0x2d0 [ 26.923697] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.923718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.923743] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.923764] kasan_report+0x141/0x180 [ 26.923786] ? kasan_atomics_helper+0x4bbc/0x5450 [ 26.923869] __asan_report_load4_noabort+0x18/0x20 [ 26.923896] kasan_atomics_helper+0x4bbc/0x5450 [ 26.923918] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.923939] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.923964] ? kasan_atomics+0x152/0x310 [ 26.923990] kasan_atomics+0x1dc/0x310 [ 26.924013] ? __pfx_kasan_atomics+0x10/0x10 [ 26.924036] ? __pfx_read_tsc+0x10/0x10 [ 26.924057] ? ktime_get_ts64+0x86/0x230 [ 26.924082] kunit_try_run_case+0x1a5/0x480 [ 26.924107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.924128] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.924163] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.924196] ? __kthread_parkme+0x82/0x180 [ 26.924216] ? preempt_count_sub+0x50/0x80 [ 26.924239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.924262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.924297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.924320] kthread+0x337/0x6f0 [ 26.924338] ? trace_preempt_on+0x20/0xc0 [ 26.924361] ? __pfx_kthread+0x10/0x10 [ 26.924381] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.924411] ? calculate_sigpending+0x7b/0xa0 [ 26.924435] ? __pfx_kthread+0x10/0x10 [ 26.924456] ret_from_fork+0x116/0x1d0 [ 26.924474] ? __pfx_kthread+0x10/0x10 [ 26.924493] ret_from_fork_asm+0x1a/0x30 [ 26.924523] </TASK> [ 26.924535] [ 26.937467] Allocated by task 313: [ 26.937615] kasan_save_stack+0x45/0x70 [ 26.937762] kasan_save_track+0x18/0x40 [ 26.938523] kasan_save_alloc_info+0x3b/0x50 [ 26.938973] __kasan_kmalloc+0xb7/0xc0 [ 26.939408] __kmalloc_cache_noprof+0x189/0x420 [ 26.939817] kasan_atomics+0x95/0x310 [ 26.940250] kunit_try_run_case+0x1a5/0x480 [ 26.940482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.940658] kthread+0x337/0x6f0 [ 26.940772] ret_from_fork+0x116/0x1d0 [ 26.941162] ret_from_fork_asm+0x1a/0x30 [ 26.941591] [ 26.941741] The buggy address belongs to the object at ffff8881053c7b80 [ 26.941741] which belongs to the cache kmalloc-64 of size 64 [ 26.943102] The buggy address is located 0 bytes to the right of [ 26.943102] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 26.943689] [ 26.943763] The buggy address belongs to the physical page: [ 26.944225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 26.944939] flags: 0x200000000000000(node=0|zone=2) [ 26.945456] page_type: f5(slab) [ 26.945621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.946026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.946855] page dumped because: kasan: bad access detected [ 26.947435] [ 26.947591] Memory state around the buggy address: [ 26.948068] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.948297] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.948508] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.948714] ^ [ 26.948887] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.949257] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.949576] ================================================================== [ 27.636236] ================================================================== [ 27.636828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 27.637186] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.637523] [ 27.637627] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.637674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.637687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.637710] Call Trace: [ 27.637728] <TASK> [ 27.637744] dump_stack_lvl+0x73/0xb0 [ 27.637775] print_report+0xd1/0x640 [ 27.637822] ? __virt_addr_valid+0x1db/0x2d0 [ 27.637871] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.637893] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.637919] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.637941] kasan_report+0x141/0x180 [ 27.637963] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.637990] __asan_report_load4_noabort+0x18/0x20 [ 27.638013] kasan_atomics_helper+0x4a02/0x5450 [ 27.638036] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.638058] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.638083] ? kasan_atomics+0x152/0x310 [ 27.638109] kasan_atomics+0x1dc/0x310 [ 27.638132] ? __pfx_kasan_atomics+0x10/0x10 [ 27.638157] ? __pfx_read_tsc+0x10/0x10 [ 27.638179] ? ktime_get_ts64+0x86/0x230 [ 27.638205] kunit_try_run_case+0x1a5/0x480 [ 27.638231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.638253] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.638289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.638335] ? __kthread_parkme+0x82/0x180 [ 27.638356] ? preempt_count_sub+0x50/0x80 [ 27.638379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.638406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.638430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.638454] kthread+0x337/0x6f0 [ 27.638475] ? trace_preempt_on+0x20/0xc0 [ 27.638499] ? __pfx_kthread+0x10/0x10 [ 27.638520] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.638551] ? calculate_sigpending+0x7b/0xa0 [ 27.638575] ? __pfx_kthread+0x10/0x10 [ 27.638598] ret_from_fork+0x116/0x1d0 [ 27.638617] ? __pfx_kthread+0x10/0x10 [ 27.638638] ret_from_fork_asm+0x1a/0x30 [ 27.638674] </TASK> [ 27.638686] [ 27.645910] Allocated by task 313: [ 27.646058] kasan_save_stack+0x45/0x70 [ 27.646255] kasan_save_track+0x18/0x40 [ 27.646431] kasan_save_alloc_info+0x3b/0x50 [ 27.646633] __kasan_kmalloc+0xb7/0xc0 [ 27.646793] __kmalloc_cache_noprof+0x189/0x420 [ 27.646992] kasan_atomics+0x95/0x310 [ 27.647152] kunit_try_run_case+0x1a5/0x480 [ 27.647379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.647592] kthread+0x337/0x6f0 [ 27.647760] ret_from_fork+0x116/0x1d0 [ 27.647940] ret_from_fork_asm+0x1a/0x30 [ 27.648125] [ 27.648213] The buggy address belongs to the object at ffff8881053c7b80 [ 27.648213] which belongs to the cache kmalloc-64 of size 64 [ 27.648673] The buggy address is located 0 bytes to the right of [ 27.648673] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.649158] [ 27.649251] The buggy address belongs to the physical page: [ 27.649547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.649792] flags: 0x200000000000000(node=0|zone=2) [ 27.649947] page_type: f5(slab) [ 27.650063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.650318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.650651] page dumped because: kasan: bad access detected [ 27.650900] [ 27.650989] Memory state around the buggy address: [ 27.651207] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.651548] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.651860] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.652112] ^ [ 27.652260] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.652594] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.653250] ================================================================== [ 27.765914] ================================================================== [ 27.766634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 27.766984] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.767397] [ 27.767486] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.767536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.767549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.767573] Call Trace: [ 27.767594] <TASK> [ 27.767613] dump_stack_lvl+0x73/0xb0 [ 27.767645] print_report+0xd1/0x640 [ 27.767669] ? __virt_addr_valid+0x1db/0x2d0 [ 27.767693] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.767715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.767741] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.767763] kasan_report+0x141/0x180 [ 27.767786] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.767822] kasan_check_range+0x10c/0x1c0 [ 27.767859] __kasan_check_read+0x15/0x20 [ 27.767884] kasan_atomics_helper+0x13b5/0x5450 [ 27.767908] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.767930] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.767955] ? kasan_atomics+0x152/0x310 [ 27.767982] kasan_atomics+0x1dc/0x310 [ 27.768004] ? __pfx_kasan_atomics+0x10/0x10 [ 27.768029] ? __pfx_read_tsc+0x10/0x10 [ 27.768051] ? ktime_get_ts64+0x86/0x230 [ 27.768078] kunit_try_run_case+0x1a5/0x480 [ 27.768103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.768126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.768169] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.768203] ? __kthread_parkme+0x82/0x180 [ 27.768224] ? preempt_count_sub+0x50/0x80 [ 27.768248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.768272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.768296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.768333] kthread+0x337/0x6f0 [ 27.768353] ? trace_preempt_on+0x20/0xc0 [ 27.768377] ? __pfx_kthread+0x10/0x10 [ 27.768398] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.768429] ? calculate_sigpending+0x7b/0xa0 [ 27.768454] ? __pfx_kthread+0x10/0x10 [ 27.768476] ret_from_fork+0x116/0x1d0 [ 27.768497] ? __pfx_kthread+0x10/0x10 [ 27.768517] ret_from_fork_asm+0x1a/0x30 [ 27.768549] </TASK> [ 27.768561] [ 27.776213] Allocated by task 313: [ 27.776370] kasan_save_stack+0x45/0x70 [ 27.776509] kasan_save_track+0x18/0x40 [ 27.776633] kasan_save_alloc_info+0x3b/0x50 [ 27.776771] __kasan_kmalloc+0xb7/0xc0 [ 27.776963] __kmalloc_cache_noprof+0x189/0x420 [ 27.777178] kasan_atomics+0x95/0x310 [ 27.777375] kunit_try_run_case+0x1a5/0x480 [ 27.777593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.777910] kthread+0x337/0x6f0 [ 27.778022] ret_from_fork+0x116/0x1d0 [ 27.778143] ret_from_fork_asm+0x1a/0x30 [ 27.778273] [ 27.778397] The buggy address belongs to the object at ffff8881053c7b80 [ 27.778397] which belongs to the cache kmalloc-64 of size 64 [ 27.779216] The buggy address is located 0 bytes to the right of [ 27.779216] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.779844] [ 27.779996] The buggy address belongs to the physical page: [ 27.780231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.780569] flags: 0x200000000000000(node=0|zone=2) [ 27.780790] page_type: f5(slab) [ 27.780919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.781137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.781552] page dumped because: kasan: bad access detected [ 27.781852] [ 27.781920] Memory state around the buggy address: [ 27.782221] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.782602] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.783007] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.783209] ^ [ 27.783365] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.783569] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.783768] ================================================================== [ 27.901056] ================================================================== [ 27.901459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 27.901912] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.902196] [ 27.902279] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.902337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.902351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.902374] Call Trace: [ 27.902653] <TASK> [ 27.902682] dump_stack_lvl+0x73/0xb0 [ 27.902716] print_report+0xd1/0x640 [ 27.902738] ? __virt_addr_valid+0x1db/0x2d0 [ 27.902763] ? kasan_atomics_helper+0x164f/0x5450 [ 27.902784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.902821] ? kasan_atomics_helper+0x164f/0x5450 [ 27.902843] kasan_report+0x141/0x180 [ 27.902865] ? kasan_atomics_helper+0x164f/0x5450 [ 27.902891] kasan_check_range+0x10c/0x1c0 [ 27.902914] __kasan_check_write+0x18/0x20 [ 27.902937] kasan_atomics_helper+0x164f/0x5450 [ 27.902961] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.903119] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.903147] ? kasan_atomics+0x152/0x310 [ 27.903173] kasan_atomics+0x1dc/0x310 [ 27.903196] ? __pfx_kasan_atomics+0x10/0x10 [ 27.903220] ? __pfx_read_tsc+0x10/0x10 [ 27.903243] ? ktime_get_ts64+0x86/0x230 [ 27.903269] kunit_try_run_case+0x1a5/0x480 [ 27.903293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.903329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.903365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.903399] ? __kthread_parkme+0x82/0x180 [ 27.903420] ? preempt_count_sub+0x50/0x80 [ 27.903444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.903468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.903491] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.903515] kthread+0x337/0x6f0 [ 27.903535] ? trace_preempt_on+0x20/0xc0 [ 27.903559] ? __pfx_kthread+0x10/0x10 [ 27.903580] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.903611] ? calculate_sigpending+0x7b/0xa0 [ 27.903636] ? __pfx_kthread+0x10/0x10 [ 27.903661] ret_from_fork+0x116/0x1d0 [ 27.903681] ? __pfx_kthread+0x10/0x10 [ 27.903702] ret_from_fork_asm+0x1a/0x30 [ 27.903733] </TASK> [ 27.903744] [ 27.914532] Allocated by task 313: [ 27.914708] kasan_save_stack+0x45/0x70 [ 27.914875] kasan_save_track+0x18/0x40 [ 27.915163] kasan_save_alloc_info+0x3b/0x50 [ 27.915748] __kasan_kmalloc+0xb7/0xc0 [ 27.915978] __kmalloc_cache_noprof+0x189/0x420 [ 27.916279] kasan_atomics+0x95/0x310 [ 27.916510] kunit_try_run_case+0x1a5/0x480 [ 27.916712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.917070] kthread+0x337/0x6f0 [ 27.917375] ret_from_fork+0x116/0x1d0 [ 27.917828] ret_from_fork_asm+0x1a/0x30 [ 27.918024] [ 27.918090] The buggy address belongs to the object at ffff8881053c7b80 [ 27.918090] which belongs to the cache kmalloc-64 of size 64 [ 27.918602] The buggy address is located 0 bytes to the right of [ 27.918602] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.919481] [ 27.919649] The buggy address belongs to the physical page: [ 27.920042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.920495] flags: 0x200000000000000(node=0|zone=2) [ 27.920825] page_type: f5(slab) [ 27.921069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.921742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.922188] page dumped because: kasan: bad access detected [ 27.922424] [ 27.922588] Memory state around the buggy address: [ 27.922775] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.923224] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.923666] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.924067] ^ [ 27.924277] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.924586] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.925197] ================================================================== [ 28.374616] ================================================================== [ 28.374926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 28.375361] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.375598] [ 28.375969] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.376023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.376036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.376058] Call Trace: [ 28.376077] <TASK> [ 28.376094] dump_stack_lvl+0x73/0xb0 [ 28.376125] print_report+0xd1/0x640 [ 28.376148] ? __virt_addr_valid+0x1db/0x2d0 [ 28.376171] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.376192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.376218] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.376241] kasan_report+0x141/0x180 [ 28.376264] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.376289] __asan_report_load8_noabort+0x18/0x20 [ 28.376315] kasan_atomics_helper+0x4fb2/0x5450 [ 28.376351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.376373] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.376398] ? kasan_atomics+0x152/0x310 [ 28.376423] kasan_atomics+0x1dc/0x310 [ 28.376446] ? __pfx_kasan_atomics+0x10/0x10 [ 28.376469] ? __pfx_read_tsc+0x10/0x10 [ 28.376491] ? ktime_get_ts64+0x86/0x230 [ 28.376515] kunit_try_run_case+0x1a5/0x480 [ 28.376540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.376562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.376596] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.376630] ? __kthread_parkme+0x82/0x180 [ 28.376650] ? preempt_count_sub+0x50/0x80 [ 28.376673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.376696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.376720] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.376743] kthread+0x337/0x6f0 [ 28.376763] ? trace_preempt_on+0x20/0xc0 [ 28.376786] ? __pfx_kthread+0x10/0x10 [ 28.376819] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.376850] ? calculate_sigpending+0x7b/0xa0 [ 28.376888] ? __pfx_kthread+0x10/0x10 [ 28.376909] ret_from_fork+0x116/0x1d0 [ 28.376928] ? __pfx_kthread+0x10/0x10 [ 28.376950] ret_from_fork_asm+0x1a/0x30 [ 28.376981] </TASK> [ 28.376992] [ 28.384576] Allocated by task 313: [ 28.384773] kasan_save_stack+0x45/0x70 [ 28.384973] kasan_save_track+0x18/0x40 [ 28.385185] kasan_save_alloc_info+0x3b/0x50 [ 28.385337] __kasan_kmalloc+0xb7/0xc0 [ 28.385464] __kmalloc_cache_noprof+0x189/0x420 [ 28.385613] kasan_atomics+0x95/0x310 [ 28.385739] kunit_try_run_case+0x1a5/0x480 [ 28.385889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.386223] kthread+0x337/0x6f0 [ 28.386405] ret_from_fork+0x116/0x1d0 [ 28.386589] ret_from_fork_asm+0x1a/0x30 [ 28.386797] [ 28.386886] The buggy address belongs to the object at ffff8881053c7b80 [ 28.386886] which belongs to the cache kmalloc-64 of size 64 [ 28.387268] The buggy address is located 0 bytes to the right of [ 28.387268] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.387639] [ 28.387707] The buggy address belongs to the physical page: [ 28.388051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.388424] flags: 0x200000000000000(node=0|zone=2) [ 28.388658] page_type: f5(slab) [ 28.388827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.389452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.389740] page dumped because: kasan: bad access detected [ 28.389912] [ 28.389974] Memory state around the buggy address: [ 28.390124] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.390344] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.390553] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.390920] ^ [ 28.391282] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.391601] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.391864] ================================================================== [ 27.925642] ================================================================== [ 27.926048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 27.926422] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.926643] [ 27.926731] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.926777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.926791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.926814] Call Trace: [ 27.926830] <TASK> [ 27.926843] dump_stack_lvl+0x73/0xb0 [ 27.926884] print_report+0xd1/0x640 [ 27.926907] ? __virt_addr_valid+0x1db/0x2d0 [ 27.926930] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.926952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.926979] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.927000] kasan_report+0x141/0x180 [ 27.927022] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.927048] kasan_check_range+0x10c/0x1c0 [ 27.927072] __kasan_check_write+0x18/0x20 [ 27.927096] kasan_atomics_helper+0x16e7/0x5450 [ 27.927119] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.927141] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.927165] ? kasan_atomics+0x152/0x310 [ 27.927192] kasan_atomics+0x1dc/0x310 [ 27.927215] ? __pfx_kasan_atomics+0x10/0x10 [ 27.927240] ? __pfx_read_tsc+0x10/0x10 [ 27.927261] ? ktime_get_ts64+0x86/0x230 [ 27.927286] kunit_try_run_case+0x1a5/0x480 [ 27.927320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.927343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.927379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.927413] ? __kthread_parkme+0x82/0x180 [ 27.927433] ? preempt_count_sub+0x50/0x80 [ 27.927456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.927480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.927502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.927527] kthread+0x337/0x6f0 [ 27.927546] ? trace_preempt_on+0x20/0xc0 [ 27.927569] ? __pfx_kthread+0x10/0x10 [ 27.927590] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.927620] ? calculate_sigpending+0x7b/0xa0 [ 27.927644] ? __pfx_kthread+0x10/0x10 [ 27.927666] ret_from_fork+0x116/0x1d0 [ 27.927686] ? __pfx_kthread+0x10/0x10 [ 27.927706] ret_from_fork_asm+0x1a/0x30 [ 27.927736] </TASK> [ 27.927748] [ 27.936089] Allocated by task 313: [ 27.936210] kasan_save_stack+0x45/0x70 [ 27.936354] kasan_save_track+0x18/0x40 [ 27.936544] kasan_save_alloc_info+0x3b/0x50 [ 27.936758] __kasan_kmalloc+0xb7/0xc0 [ 27.936936] __kmalloc_cache_noprof+0x189/0x420 [ 27.937151] kasan_atomics+0x95/0x310 [ 27.937355] kunit_try_run_case+0x1a5/0x480 [ 27.937557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.937753] kthread+0x337/0x6f0 [ 27.937868] ret_from_fork+0x116/0x1d0 [ 27.937995] ret_from_fork_asm+0x1a/0x30 [ 27.938144] [ 27.938235] The buggy address belongs to the object at ffff8881053c7b80 [ 27.938235] which belongs to the cache kmalloc-64 of size 64 [ 27.938761] The buggy address is located 0 bytes to the right of [ 27.938761] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.939250] [ 27.939342] The buggy address belongs to the physical page: [ 27.939567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.939883] flags: 0x200000000000000(node=0|zone=2) [ 27.940090] page_type: f5(slab) [ 27.940238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.942151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.942471] page dumped because: kasan: bad access detected [ 27.942727] [ 27.942832] Memory state around the buggy address: [ 27.943427] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.943706] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.944303] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.944632] ^ [ 27.944912] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.945193] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.945461] ================================================================== [ 28.241478] ================================================================== [ 28.241772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 28.242212] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.243291] [ 28.243413] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.243580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.243598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.243623] Call Trace: [ 28.243642] <TASK> [ 28.243658] dump_stack_lvl+0x73/0xb0 [ 28.243809] print_report+0xd1/0x640 [ 28.243877] ? __virt_addr_valid+0x1db/0x2d0 [ 28.243902] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.243924] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.243950] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.243972] kasan_report+0x141/0x180 [ 28.243994] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.244020] kasan_check_range+0x10c/0x1c0 [ 28.244043] __kasan_check_write+0x18/0x20 [ 28.244067] kasan_atomics_helper+0x1f43/0x5450 [ 28.244089] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.244111] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.244135] ? kasan_atomics+0x152/0x310 [ 28.244161] kasan_atomics+0x1dc/0x310 [ 28.244184] ? __pfx_kasan_atomics+0x10/0x10 [ 28.244208] ? __pfx_read_tsc+0x10/0x10 [ 28.244230] ? ktime_get_ts64+0x86/0x230 [ 28.244256] kunit_try_run_case+0x1a5/0x480 [ 28.244280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.244302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.244350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.244383] ? __kthread_parkme+0x82/0x180 [ 28.244404] ? preempt_count_sub+0x50/0x80 [ 28.244428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.244452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.244477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.244500] kthread+0x337/0x6f0 [ 28.244520] ? trace_preempt_on+0x20/0xc0 [ 28.244543] ? __pfx_kthread+0x10/0x10 [ 28.244564] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.244594] ? calculate_sigpending+0x7b/0xa0 [ 28.244620] ? __pfx_kthread+0x10/0x10 [ 28.244642] ret_from_fork+0x116/0x1d0 [ 28.244662] ? __pfx_kthread+0x10/0x10 [ 28.244683] ret_from_fork_asm+0x1a/0x30 [ 28.244714] </TASK> [ 28.244726] [ 28.255551] Allocated by task 313: [ 28.255682] kasan_save_stack+0x45/0x70 [ 28.255837] kasan_save_track+0x18/0x40 [ 28.255967] kasan_save_alloc_info+0x3b/0x50 [ 28.256112] __kasan_kmalloc+0xb7/0xc0 [ 28.256239] __kmalloc_cache_noprof+0x189/0x420 [ 28.256412] kasan_atomics+0x95/0x310 [ 28.256542] kunit_try_run_case+0x1a5/0x480 [ 28.256683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.256850] kthread+0x337/0x6f0 [ 28.256964] ret_from_fork+0x116/0x1d0 [ 28.257089] ret_from_fork_asm+0x1a/0x30 [ 28.257222] [ 28.257288] The buggy address belongs to the object at ffff8881053c7b80 [ 28.257288] which belongs to the cache kmalloc-64 of size 64 [ 28.258293] The buggy address is located 0 bytes to the right of [ 28.258293] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.259341] [ 28.259495] The buggy address belongs to the physical page: [ 28.260115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.261049] flags: 0x200000000000000(node=0|zone=2) [ 28.261534] page_type: f5(slab) [ 28.261836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.262626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.263415] page dumped because: kasan: bad access detected [ 28.263967] [ 28.264131] Memory state around the buggy address: [ 28.264675] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.265412] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.266097] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.266816] ^ [ 28.267437] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.268096] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.268801] ================================================================== [ 28.350927] ================================================================== [ 28.351153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 28.351402] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.351713] [ 28.351801] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.352015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.352030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.352053] Call Trace: [ 28.352070] <TASK> [ 28.352084] dump_stack_lvl+0x73/0xb0 [ 28.352115] print_report+0xd1/0x640 [ 28.352137] ? __virt_addr_valid+0x1db/0x2d0 [ 28.352161] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.352182] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.352208] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.352231] kasan_report+0x141/0x180 [ 28.352253] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.352279] kasan_check_range+0x10c/0x1c0 [ 28.352303] __kasan_check_write+0x18/0x20 [ 28.352342] kasan_atomics_helper+0x20c8/0x5450 [ 28.352365] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.352388] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.352412] ? kasan_atomics+0x152/0x310 [ 28.352438] kasan_atomics+0x1dc/0x310 [ 28.352462] ? __pfx_kasan_atomics+0x10/0x10 [ 28.352486] ? __pfx_read_tsc+0x10/0x10 [ 28.352508] ? ktime_get_ts64+0x86/0x230 [ 28.352532] kunit_try_run_case+0x1a5/0x480 [ 28.352556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.352579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.352614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.352648] ? __kthread_parkme+0x82/0x180 [ 28.352668] ? preempt_count_sub+0x50/0x80 [ 28.352692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.352715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.352739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.352763] kthread+0x337/0x6f0 [ 28.352782] ? trace_preempt_on+0x20/0xc0 [ 28.352805] ? __pfx_kthread+0x10/0x10 [ 28.352827] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.353289] ? calculate_sigpending+0x7b/0xa0 [ 28.353320] ? __pfx_kthread+0x10/0x10 [ 28.353356] ret_from_fork+0x116/0x1d0 [ 28.353376] ? __pfx_kthread+0x10/0x10 [ 28.353397] ret_from_fork_asm+0x1a/0x30 [ 28.353427] </TASK> [ 28.353438] [ 28.363232] Allocated by task 313: [ 28.363557] kasan_save_stack+0x45/0x70 [ 28.363709] kasan_save_track+0x18/0x40 [ 28.363991] kasan_save_alloc_info+0x3b/0x50 [ 28.364484] __kasan_kmalloc+0xb7/0xc0 [ 28.364687] __kmalloc_cache_noprof+0x189/0x420 [ 28.364967] kasan_atomics+0x95/0x310 [ 28.365387] kunit_try_run_case+0x1a5/0x480 [ 28.365658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.366056] kthread+0x337/0x6f0 [ 28.366193] ret_from_fork+0x116/0x1d0 [ 28.366523] ret_from_fork_asm+0x1a/0x30 [ 28.366712] [ 28.366801] The buggy address belongs to the object at ffff8881053c7b80 [ 28.366801] which belongs to the cache kmalloc-64 of size 64 [ 28.367574] The buggy address is located 0 bytes to the right of [ 28.367574] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.368288] [ 28.368459] The buggy address belongs to the physical page: [ 28.368755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.369359] flags: 0x200000000000000(node=0|zone=2) [ 28.369535] page_type: f5(slab) [ 28.369705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.370134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.370571] page dumped because: kasan: bad access detected [ 28.370871] [ 28.371085] Memory state around the buggy address: [ 28.371451] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.371915] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.372260] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.372757] ^ [ 28.372964] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.373462] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.373920] ================================================================== [ 27.031149] ================================================================== [ 27.031875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 27.032556] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.033248] [ 27.033437] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.033487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.033510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.033532] Call Trace: [ 27.033551] <TASK> [ 27.033567] dump_stack_lvl+0x73/0xb0 [ 27.033619] print_report+0xd1/0x640 [ 27.033642] ? __virt_addr_valid+0x1db/0x2d0 [ 27.033665] ? kasan_atomics_helper+0x3df/0x5450 [ 27.033695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.033720] ? kasan_atomics_helper+0x3df/0x5450 [ 27.033741] kasan_report+0x141/0x180 [ 27.033762] ? kasan_atomics_helper+0x3df/0x5450 [ 27.033858] kasan_check_range+0x10c/0x1c0 [ 27.033885] __kasan_check_read+0x15/0x20 [ 27.033908] kasan_atomics_helper+0x3df/0x5450 [ 27.033930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.033954] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.033977] ? kasan_atomics+0x152/0x310 [ 27.034003] kasan_atomics+0x1dc/0x310 [ 27.034024] ? __pfx_kasan_atomics+0x10/0x10 [ 27.034047] ? __pfx_read_tsc+0x10/0x10 [ 27.034068] ? ktime_get_ts64+0x86/0x230 [ 27.034093] kunit_try_run_case+0x1a5/0x480 [ 27.034117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.034138] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.034173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.034205] ? __kthread_parkme+0x82/0x180 [ 27.034225] ? preempt_count_sub+0x50/0x80 [ 27.034247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.034270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.034304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.034326] kthread+0x337/0x6f0 [ 27.034346] ? trace_preempt_on+0x20/0xc0 [ 27.034368] ? __pfx_kthread+0x10/0x10 [ 27.034388] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.034418] ? calculate_sigpending+0x7b/0xa0 [ 27.034441] ? __pfx_kthread+0x10/0x10 [ 27.034462] ret_from_fork+0x116/0x1d0 [ 27.034480] ? __pfx_kthread+0x10/0x10 [ 27.034500] ret_from_fork_asm+0x1a/0x30 [ 27.034530] </TASK> [ 27.034541] [ 27.043434] Allocated by task 313: [ 27.043624] kasan_save_stack+0x45/0x70 [ 27.043940] kasan_save_track+0x18/0x40 [ 27.044138] kasan_save_alloc_info+0x3b/0x50 [ 27.044325] __kasan_kmalloc+0xb7/0xc0 [ 27.044507] __kmalloc_cache_noprof+0x189/0x420 [ 27.044655] kasan_atomics+0x95/0x310 [ 27.044778] kunit_try_run_case+0x1a5/0x480 [ 27.044935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.045191] kthread+0x337/0x6f0 [ 27.045378] ret_from_fork+0x116/0x1d0 [ 27.045633] ret_from_fork_asm+0x1a/0x30 [ 27.045976] [ 27.046083] The buggy address belongs to the object at ffff8881053c7b80 [ 27.046083] which belongs to the cache kmalloc-64 of size 64 [ 27.046514] The buggy address is located 0 bytes to the right of [ 27.046514] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.047215] [ 27.047313] The buggy address belongs to the physical page: [ 27.047593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.048093] flags: 0x200000000000000(node=0|zone=2) [ 27.048319] page_type: f5(slab) [ 27.048438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.048662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.048879] page dumped because: kasan: bad access detected [ 27.049041] [ 27.049102] Memory state around the buggy address: [ 27.049553] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.050263] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.050580] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.050793] ^ [ 27.050941] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.051147] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.051412] ================================================================== [ 28.417050] ================================================================== [ 28.417382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 28.417687] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.418592] [ 28.418825] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.418878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.418901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.418924] Call Trace: [ 28.418941] <TASK> [ 28.419059] dump_stack_lvl+0x73/0xb0 [ 28.419097] print_report+0xd1/0x640 [ 28.419120] ? __virt_addr_valid+0x1db/0x2d0 [ 28.419145] ? kasan_atomics_helper+0x4fa5/0x5450 [ 28.419166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.419201] ? kasan_atomics_helper+0x4fa5/0x5450 [ 28.419224] kasan_report+0x141/0x180 [ 28.419247] ? kasan_atomics_helper+0x4fa5/0x5450 [ 28.419273] __asan_report_load8_noabort+0x18/0x20 [ 28.419297] kasan_atomics_helper+0x4fa5/0x5450 [ 28.419321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.419352] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.419377] ? kasan_atomics+0x152/0x310 [ 28.419403] kasan_atomics+0x1dc/0x310 [ 28.419426] ? __pfx_kasan_atomics+0x10/0x10 [ 28.419451] ? __pfx_read_tsc+0x10/0x10 [ 28.419473] ? ktime_get_ts64+0x86/0x230 [ 28.419498] kunit_try_run_case+0x1a5/0x480 [ 28.419523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.419545] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.419581] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.419614] ? __kthread_parkme+0x82/0x180 [ 28.419635] ? preempt_count_sub+0x50/0x80 [ 28.419659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.419684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.419709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.419733] kthread+0x337/0x6f0 [ 28.419754] ? trace_preempt_on+0x20/0xc0 [ 28.419777] ? __pfx_kthread+0x10/0x10 [ 28.419834] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.419865] ? calculate_sigpending+0x7b/0xa0 [ 28.419890] ? __pfx_kthread+0x10/0x10 [ 28.419912] ret_from_fork+0x116/0x1d0 [ 28.419932] ? __pfx_kthread+0x10/0x10 [ 28.419954] ret_from_fork_asm+0x1a/0x30 [ 28.419986] </TASK> [ 28.419997] [ 28.432300] Allocated by task 313: [ 28.432664] kasan_save_stack+0x45/0x70 [ 28.433137] kasan_save_track+0x18/0x40 [ 28.433522] kasan_save_alloc_info+0x3b/0x50 [ 28.433693] __kasan_kmalloc+0xb7/0xc0 [ 28.434055] __kmalloc_cache_noprof+0x189/0x420 [ 28.434496] kasan_atomics+0x95/0x310 [ 28.434901] kunit_try_run_case+0x1a5/0x480 [ 28.435055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.435225] kthread+0x337/0x6f0 [ 28.435352] ret_from_fork+0x116/0x1d0 [ 28.435479] ret_from_fork_asm+0x1a/0x30 [ 28.435614] [ 28.435679] The buggy address belongs to the object at ffff8881053c7b80 [ 28.435679] which belongs to the cache kmalloc-64 of size 64 [ 28.436985] The buggy address is located 0 bytes to the right of [ 28.436985] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.438179] [ 28.438353] The buggy address belongs to the physical page: [ 28.438904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.439650] flags: 0x200000000000000(node=0|zone=2) [ 28.440262] page_type: f5(slab) [ 28.440596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.441008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.441224] page dumped because: kasan: bad access detected [ 28.441601] [ 28.441762] Memory state around the buggy address: [ 28.442271] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.442956] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.443579] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.444224] ^ [ 28.444406] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.444614] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.444980] ================================================================== [ 27.828641] ================================================================== [ 27.828973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 27.829556] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.829876] [ 27.829979] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.830025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.830038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.830060] Call Trace: [ 27.830078] <TASK> [ 27.830094] dump_stack_lvl+0x73/0xb0 [ 27.830124] print_report+0xd1/0x640 [ 27.830145] ? __virt_addr_valid+0x1db/0x2d0 [ 27.830168] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.830188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.830215] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.830236] kasan_report+0x141/0x180 [ 27.830258] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.830283] __asan_report_store8_noabort+0x1b/0x30 [ 27.830318] kasan_atomics_helper+0x50d4/0x5450 [ 27.830341] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.830362] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.830386] ? kasan_atomics+0x152/0x310 [ 27.830411] kasan_atomics+0x1dc/0x310 [ 27.830434] ? __pfx_kasan_atomics+0x10/0x10 [ 27.830457] ? __pfx_read_tsc+0x10/0x10 [ 27.830479] ? ktime_get_ts64+0x86/0x230 [ 27.830506] kunit_try_run_case+0x1a5/0x480 [ 27.830530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.830552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.830588] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.830620] ? __kthread_parkme+0x82/0x180 [ 27.830640] ? preempt_count_sub+0x50/0x80 [ 27.830669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.830693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.830716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.830739] kthread+0x337/0x6f0 [ 27.830759] ? trace_preempt_on+0x20/0xc0 [ 27.830782] ? __pfx_kthread+0x10/0x10 [ 27.830802] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.830832] ? calculate_sigpending+0x7b/0xa0 [ 27.830857] ? __pfx_kthread+0x10/0x10 [ 27.830878] ret_from_fork+0x116/0x1d0 [ 27.830898] ? __pfx_kthread+0x10/0x10 [ 27.830937] ret_from_fork_asm+0x1a/0x30 [ 27.830970] </TASK> [ 27.830981] [ 27.838719] Allocated by task 313: [ 27.838917] kasan_save_stack+0x45/0x70 [ 27.839288] kasan_save_track+0x18/0x40 [ 27.839503] kasan_save_alloc_info+0x3b/0x50 [ 27.839737] __kasan_kmalloc+0xb7/0xc0 [ 27.839917] __kmalloc_cache_noprof+0x189/0x420 [ 27.840296] kasan_atomics+0x95/0x310 [ 27.840439] kunit_try_run_case+0x1a5/0x480 [ 27.840627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.840794] kthread+0x337/0x6f0 [ 27.841045] ret_from_fork+0x116/0x1d0 [ 27.841371] ret_from_fork_asm+0x1a/0x30 [ 27.841544] [ 27.841613] The buggy address belongs to the object at ffff8881053c7b80 [ 27.841613] which belongs to the cache kmalloc-64 of size 64 [ 27.841959] The buggy address is located 0 bytes to the right of [ 27.841959] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.843671] [ 27.843831] The buggy address belongs to the physical page: [ 27.844105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.845730] flags: 0x200000000000000(node=0|zone=2) [ 27.846391] page_type: f5(slab) [ 27.846588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.847117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.847674] page dumped because: kasan: bad access detected [ 27.848026] [ 27.848215] Memory state around the buggy address: [ 27.848719] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.849356] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.849770] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.850242] ^ [ 27.850625] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.851138] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.851636] ================================================================== [ 28.392294] ================================================================== [ 28.392540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 28.392766] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.393372] [ 28.393478] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.393525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.393538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.393560] Call Trace: [ 28.393579] <TASK> [ 28.393593] dump_stack_lvl+0x73/0xb0 [ 28.393643] print_report+0xd1/0x640 [ 28.393666] ? __virt_addr_valid+0x1db/0x2d0 [ 28.393690] ? kasan_atomics_helper+0x218a/0x5450 [ 28.393711] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.393738] ? kasan_atomics_helper+0x218a/0x5450 [ 28.393759] kasan_report+0x141/0x180 [ 28.393781] ? kasan_atomics_helper+0x218a/0x5450 [ 28.393807] kasan_check_range+0x10c/0x1c0 [ 28.393832] __kasan_check_write+0x18/0x20 [ 28.393855] kasan_atomics_helper+0x218a/0x5450 [ 28.393878] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.393900] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.393925] ? kasan_atomics+0x152/0x310 [ 28.393951] kasan_atomics+0x1dc/0x310 [ 28.393973] ? __pfx_kasan_atomics+0x10/0x10 [ 28.393998] ? __pfx_read_tsc+0x10/0x10 [ 28.394020] ? ktime_get_ts64+0x86/0x230 [ 28.394045] kunit_try_run_case+0x1a5/0x480 [ 28.394070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.394093] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.394129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.394162] ? __kthread_parkme+0x82/0x180 [ 28.394183] ? preempt_count_sub+0x50/0x80 [ 28.394207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.394231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.394255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.394278] kthread+0x337/0x6f0 [ 28.394298] ? trace_preempt_on+0x20/0xc0 [ 28.394322] ? __pfx_kthread+0x10/0x10 [ 28.394356] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.394386] ? calculate_sigpending+0x7b/0xa0 [ 28.394411] ? __pfx_kthread+0x10/0x10 [ 28.394433] ret_from_fork+0x116/0x1d0 [ 28.394453] ? __pfx_kthread+0x10/0x10 [ 28.394474] ret_from_fork_asm+0x1a/0x30 [ 28.394506] </TASK> [ 28.394517] [ 28.403057] Allocated by task 313: [ 28.403194] kasan_save_stack+0x45/0x70 [ 28.403362] kasan_save_track+0x18/0x40 [ 28.403715] kasan_save_alloc_info+0x3b/0x50 [ 28.404136] __kasan_kmalloc+0xb7/0xc0 [ 28.405033] __kmalloc_cache_noprof+0x189/0x420 [ 28.405417] kasan_atomics+0x95/0x310 [ 28.405602] kunit_try_run_case+0x1a5/0x480 [ 28.405798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.406307] kthread+0x337/0x6f0 [ 28.406760] ret_from_fork+0x116/0x1d0 [ 28.406962] ret_from_fork_asm+0x1a/0x30 [ 28.407107] [ 28.407176] The buggy address belongs to the object at ffff8881053c7b80 [ 28.407176] which belongs to the cache kmalloc-64 of size 64 [ 28.408582] The buggy address is located 0 bytes to the right of [ 28.408582] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.409525] [ 28.409632] The buggy address belongs to the physical page: [ 28.410075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.410562] flags: 0x200000000000000(node=0|zone=2) [ 28.410791] page_type: f5(slab) [ 28.411219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.411692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.412325] page dumped because: kasan: bad access detected [ 28.412872] [ 28.413102] Memory state around the buggy address: [ 28.413464] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.413759] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.414406] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.414729] ^ [ 28.414935] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.415785] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.416274] ================================================================== [ 26.972653] ================================================================== [ 26.973291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 26.973803] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 26.974226] [ 26.974650] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 26.974778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.974793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.974817] Call Trace: [ 26.974837] <TASK> [ 26.974855] dump_stack_lvl+0x73/0xb0 [ 26.974891] print_report+0xd1/0x640 [ 26.974914] ? __virt_addr_valid+0x1db/0x2d0 [ 26.974938] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.974958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.974984] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.975004] kasan_report+0x141/0x180 [ 26.975025] ? kasan_atomics_helper+0x4b88/0x5450 [ 26.975050] __asan_report_load4_noabort+0x18/0x20 [ 26.975074] kasan_atomics_helper+0x4b88/0x5450 [ 26.975095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.975118] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.975144] ? kasan_atomics+0x152/0x310 [ 26.975168] kasan_atomics+0x1dc/0x310 [ 26.975190] ? __pfx_kasan_atomics+0x10/0x10 [ 26.975213] ? __pfx_read_tsc+0x10/0x10 [ 26.975236] ? ktime_get_ts64+0x86/0x230 [ 26.975261] kunit_try_run_case+0x1a5/0x480 [ 26.975313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.975335] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.975385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.975419] ? __kthread_parkme+0x82/0x180 [ 26.975439] ? preempt_count_sub+0x50/0x80 [ 26.975462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.975485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.975508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.975530] kthread+0x337/0x6f0 [ 26.975549] ? trace_preempt_on+0x20/0xc0 [ 26.975572] ? __pfx_kthread+0x10/0x10 [ 26.975591] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.975621] ? calculate_sigpending+0x7b/0xa0 [ 26.975645] ? __pfx_kthread+0x10/0x10 [ 26.975666] ret_from_fork+0x116/0x1d0 [ 26.975684] ? __pfx_kthread+0x10/0x10 [ 26.975703] ret_from_fork_asm+0x1a/0x30 [ 26.975734] </TASK> [ 26.975744] [ 26.991572] Allocated by task 313: [ 26.991713] kasan_save_stack+0x45/0x70 [ 26.992413] kasan_save_track+0x18/0x40 [ 26.992768] kasan_save_alloc_info+0x3b/0x50 [ 26.993334] __kasan_kmalloc+0xb7/0xc0 [ 26.993743] __kmalloc_cache_noprof+0x189/0x420 [ 26.994224] kasan_atomics+0x95/0x310 [ 26.994427] kunit_try_run_case+0x1a5/0x480 [ 26.994619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.995036] kthread+0x337/0x6f0 [ 26.995183] ret_from_fork+0x116/0x1d0 [ 26.995364] ret_from_fork_asm+0x1a/0x30 [ 26.995557] [ 26.995631] The buggy address belongs to the object at ffff8881053c7b80 [ 26.995631] which belongs to the cache kmalloc-64 of size 64 [ 26.996691] The buggy address is located 0 bytes to the right of [ 26.996691] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 26.997456] [ 26.997543] The buggy address belongs to the physical page: [ 26.997760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 26.998098] flags: 0x200000000000000(node=0|zone=2) [ 26.998324] page_type: f5(slab) [ 26.998464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.998783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.999078] page dumped because: kasan: bad access detected [ 26.999802] [ 26.999897] Memory state around the buggy address: [ 27.000057] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.000723] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.001025] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.001664] ^ [ 27.001828] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.002039] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.002245] ================================================================== [ 27.739965] ================================================================== [ 27.740277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 27.740602] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.741204] [ 27.741841] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.741898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.741913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.742049] Call Trace: [ 27.742072] <TASK> [ 27.742090] dump_stack_lvl+0x73/0xb0 [ 27.742125] print_report+0xd1/0x640 [ 27.742149] ? __virt_addr_valid+0x1db/0x2d0 [ 27.742215] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.742239] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.742265] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.742287] kasan_report+0x141/0x180 [ 27.742319] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.742346] __asan_report_load4_noabort+0x18/0x20 [ 27.742370] kasan_atomics_helper+0x49ce/0x5450 [ 27.742393] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.742415] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.742441] ? kasan_atomics+0x152/0x310 [ 27.742467] kasan_atomics+0x1dc/0x310 [ 27.742490] ? __pfx_kasan_atomics+0x10/0x10 [ 27.742514] ? __pfx_read_tsc+0x10/0x10 [ 27.742537] ? ktime_get_ts64+0x86/0x230 [ 27.742564] kunit_try_run_case+0x1a5/0x480 [ 27.742590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.742614] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.742650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.742689] ? __kthread_parkme+0x82/0x180 [ 27.742711] ? preempt_count_sub+0x50/0x80 [ 27.742735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.742759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.742783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.742820] kthread+0x337/0x6f0 [ 27.742849] ? trace_preempt_on+0x20/0xc0 [ 27.742873] ? __pfx_kthread+0x10/0x10 [ 27.742895] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.742927] ? calculate_sigpending+0x7b/0xa0 [ 27.742952] ? __pfx_kthread+0x10/0x10 [ 27.742974] ret_from_fork+0x116/0x1d0 [ 27.742994] ? __pfx_kthread+0x10/0x10 [ 27.743014] ret_from_fork_asm+0x1a/0x30 [ 27.743046] </TASK> [ 27.743058] [ 27.754558] Allocated by task 313: [ 27.754739] kasan_save_stack+0x45/0x70 [ 27.755015] kasan_save_track+0x18/0x40 [ 27.755204] kasan_save_alloc_info+0x3b/0x50 [ 27.755420] __kasan_kmalloc+0xb7/0xc0 [ 27.755571] __kmalloc_cache_noprof+0x189/0x420 [ 27.756103] kasan_atomics+0x95/0x310 [ 27.756354] kunit_try_run_case+0x1a5/0x480 [ 27.756535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.756757] kthread+0x337/0x6f0 [ 27.757073] ret_from_fork+0x116/0x1d0 [ 27.757210] ret_from_fork_asm+0x1a/0x30 [ 27.757753] [ 27.757928] The buggy address belongs to the object at ffff8881053c7b80 [ 27.757928] which belongs to the cache kmalloc-64 of size 64 [ 27.758646] The buggy address is located 0 bytes to the right of [ 27.758646] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.759572] [ 27.759737] The buggy address belongs to the physical page: [ 27.760119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.760591] flags: 0x200000000000000(node=0|zone=2) [ 27.760898] page_type: f5(slab) [ 27.761102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.761566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.761882] page dumped because: kasan: bad access detected [ 27.762235] [ 27.762547] Memory state around the buggy address: [ 27.762718] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.763030] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.763550] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.764032] ^ [ 27.764255] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.764717] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.765196] ================================================================== [ 27.272283] ================================================================== [ 27.272602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 27.273076] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.273566] [ 27.273665] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.273779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.273794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.273818] Call Trace: [ 27.273832] <TASK> [ 27.273848] dump_stack_lvl+0x73/0xb0 [ 27.273882] print_report+0xd1/0x640 [ 27.273903] ? __virt_addr_valid+0x1db/0x2d0 [ 27.273927] ? kasan_atomics_helper+0x992/0x5450 [ 27.274017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.274043] ? kasan_atomics_helper+0x992/0x5450 [ 27.274064] kasan_report+0x141/0x180 [ 27.274086] ? kasan_atomics_helper+0x992/0x5450 [ 27.274111] kasan_check_range+0x10c/0x1c0 [ 27.274134] __kasan_check_write+0x18/0x20 [ 27.274157] kasan_atomics_helper+0x992/0x5450 [ 27.274178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.274199] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.274223] ? kasan_atomics+0x152/0x310 [ 27.274248] kasan_atomics+0x1dc/0x310 [ 27.274270] ? __pfx_kasan_atomics+0x10/0x10 [ 27.274305] ? __pfx_read_tsc+0x10/0x10 [ 27.274328] ? ktime_get_ts64+0x86/0x230 [ 27.274352] kunit_try_run_case+0x1a5/0x480 [ 27.274376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.274397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.274431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.274463] ? __kthread_parkme+0x82/0x180 [ 27.274483] ? preempt_count_sub+0x50/0x80 [ 27.274505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.274528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.274551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.274573] kthread+0x337/0x6f0 [ 27.274593] ? trace_preempt_on+0x20/0xc0 [ 27.274615] ? __pfx_kthread+0x10/0x10 [ 27.274634] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.274667] ? calculate_sigpending+0x7b/0xa0 [ 27.274691] ? __pfx_kthread+0x10/0x10 [ 27.274712] ret_from_fork+0x116/0x1d0 [ 27.274730] ? __pfx_kthread+0x10/0x10 [ 27.274750] ret_from_fork_asm+0x1a/0x30 [ 27.274780] </TASK> [ 27.274790] [ 27.285435] Allocated by task 313: [ 27.285632] kasan_save_stack+0x45/0x70 [ 27.285812] kasan_save_track+0x18/0x40 [ 27.285946] kasan_save_alloc_info+0x3b/0x50 [ 27.286153] __kasan_kmalloc+0xb7/0xc0 [ 27.286327] __kmalloc_cache_noprof+0x189/0x420 [ 27.286524] kasan_atomics+0x95/0x310 [ 27.286695] kunit_try_run_case+0x1a5/0x480 [ 27.286865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.287107] kthread+0x337/0x6f0 [ 27.287257] ret_from_fork+0x116/0x1d0 [ 27.288209] ret_from_fork_asm+0x1a/0x30 [ 27.288380] [ 27.288714] The buggy address belongs to the object at ffff8881053c7b80 [ 27.288714] which belongs to the cache kmalloc-64 of size 64 [ 27.289633] The buggy address is located 0 bytes to the right of [ 27.289633] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.290206] [ 27.290323] The buggy address belongs to the physical page: [ 27.290776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.291301] flags: 0x200000000000000(node=0|zone=2) [ 27.291536] page_type: f5(slab) [ 27.292053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.292534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.292991] page dumped because: kasan: bad access detected [ 27.293193] [ 27.293436] Memory state around the buggy address: [ 27.293701] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.294167] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.294469] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.294759] ^ [ 27.294954] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.295243] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.295554] ================================================================== [ 27.966558] ================================================================== [ 27.967136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 27.967464] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.967758] [ 27.967914] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.967960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.967973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.968051] Call Trace: [ 27.968070] <TASK> [ 27.968086] dump_stack_lvl+0x73/0xb0 [ 27.968116] print_report+0xd1/0x640 [ 27.968139] ? __virt_addr_valid+0x1db/0x2d0 [ 27.968163] ? kasan_atomics_helper+0x1818/0x5450 [ 27.968184] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.968211] ? kasan_atomics_helper+0x1818/0x5450 [ 27.968234] kasan_report+0x141/0x180 [ 27.968255] ? kasan_atomics_helper+0x1818/0x5450 [ 27.968282] kasan_check_range+0x10c/0x1c0 [ 27.968310] __kasan_check_write+0x18/0x20 [ 27.968350] kasan_atomics_helper+0x1818/0x5450 [ 27.968373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.968396] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.968421] ? kasan_atomics+0x152/0x310 [ 27.968448] kasan_atomics+0x1dc/0x310 [ 27.968471] ? __pfx_kasan_atomics+0x10/0x10 [ 27.968495] ? __pfx_read_tsc+0x10/0x10 [ 27.968517] ? ktime_get_ts64+0x86/0x230 [ 27.968542] kunit_try_run_case+0x1a5/0x480 [ 27.968567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.968590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.968625] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.968658] ? __kthread_parkme+0x82/0x180 [ 27.968679] ? preempt_count_sub+0x50/0x80 [ 27.968703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.968727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.968751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.968774] kthread+0x337/0x6f0 [ 27.968878] ? trace_preempt_on+0x20/0xc0 [ 27.968905] ? __pfx_kthread+0x10/0x10 [ 27.968927] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.968959] ? calculate_sigpending+0x7b/0xa0 [ 27.968984] ? __pfx_kthread+0x10/0x10 [ 27.969007] ret_from_fork+0x116/0x1d0 [ 27.969027] ? __pfx_kthread+0x10/0x10 [ 27.969048] ret_from_fork_asm+0x1a/0x30 [ 27.969079] </TASK> [ 27.969090] [ 27.980160] Allocated by task 313: [ 27.980353] kasan_save_stack+0x45/0x70 [ 27.980543] kasan_save_track+0x18/0x40 [ 27.980716] kasan_save_alloc_info+0x3b/0x50 [ 27.980898] __kasan_kmalloc+0xb7/0xc0 [ 27.981063] __kmalloc_cache_noprof+0x189/0x420 [ 27.981215] kasan_atomics+0x95/0x310 [ 27.981354] kunit_try_run_case+0x1a5/0x480 [ 27.981497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.981678] kthread+0x337/0x6f0 [ 27.982114] ret_from_fork+0x116/0x1d0 [ 27.982307] ret_from_fork_asm+0x1a/0x30 [ 27.982512] [ 27.982602] The buggy address belongs to the object at ffff8881053c7b80 [ 27.982602] which belongs to the cache kmalloc-64 of size 64 [ 27.983096] The buggy address is located 0 bytes to the right of [ 27.983096] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.983764] [ 27.983919] The buggy address belongs to the physical page: [ 27.984155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.984448] flags: 0x200000000000000(node=0|zone=2) [ 27.984626] page_type: f5(slab) [ 27.984791] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.985216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.985537] page dumped because: kasan: bad access detected [ 27.985725] [ 27.985790] Memory state around the buggy address: [ 27.986066] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.986362] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.986631] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.987045] ^ [ 27.987249] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.987530] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.987807] ================================================================== [ 27.598451] ================================================================== [ 27.598693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 27.599038] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.599334] [ 27.599449] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.599778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.599793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.599817] Call Trace: [ 27.599835] <TASK> [ 27.599850] dump_stack_lvl+0x73/0xb0 [ 27.599881] print_report+0xd1/0x640 [ 27.599904] ? __virt_addr_valid+0x1db/0x2d0 [ 27.599928] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.599949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.599976] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.599998] kasan_report+0x141/0x180 [ 27.600042] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.600075] __asan_report_load4_noabort+0x18/0x20 [ 27.600100] kasan_atomics_helper+0x4a1c/0x5450 [ 27.600123] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.600146] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.600172] ? kasan_atomics+0x152/0x310 [ 27.600198] kasan_atomics+0x1dc/0x310 [ 27.600221] ? __pfx_kasan_atomics+0x10/0x10 [ 27.600245] ? __pfx_read_tsc+0x10/0x10 [ 27.600268] ? ktime_get_ts64+0x86/0x230 [ 27.600294] kunit_try_run_case+0x1a5/0x480 [ 27.600331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.600354] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.600390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.600423] ? __kthread_parkme+0x82/0x180 [ 27.600444] ? preempt_count_sub+0x50/0x80 [ 27.600468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.600492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.600515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.600539] kthread+0x337/0x6f0 [ 27.600559] ? trace_preempt_on+0x20/0xc0 [ 27.600582] ? __pfx_kthread+0x10/0x10 [ 27.600605] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.600635] ? calculate_sigpending+0x7b/0xa0 [ 27.600660] ? __pfx_kthread+0x10/0x10 [ 27.600682] ret_from_fork+0x116/0x1d0 [ 27.600701] ? __pfx_kthread+0x10/0x10 [ 27.600722] ret_from_fork_asm+0x1a/0x30 [ 27.600754] </TASK> [ 27.600766] [ 27.609219] Allocated by task 313: [ 27.609443] kasan_save_stack+0x45/0x70 [ 27.609587] kasan_save_track+0x18/0x40 [ 27.609716] kasan_save_alloc_info+0x3b/0x50 [ 27.609859] __kasan_kmalloc+0xb7/0xc0 [ 27.610203] __kmalloc_cache_noprof+0x189/0x420 [ 27.610523] kasan_atomics+0x95/0x310 [ 27.610701] kunit_try_run_case+0x1a5/0x480 [ 27.611017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.611247] kthread+0x337/0x6f0 [ 27.611397] ret_from_fork+0x116/0x1d0 [ 27.611624] ret_from_fork_asm+0x1a/0x30 [ 27.611785] [ 27.611917] The buggy address belongs to the object at ffff8881053c7b80 [ 27.611917] which belongs to the cache kmalloc-64 of size 64 [ 27.612462] The buggy address is located 0 bytes to the right of [ 27.612462] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.612872] [ 27.612938] The buggy address belongs to the physical page: [ 27.613104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.613644] flags: 0x200000000000000(node=0|zone=2) [ 27.613889] page_type: f5(slab) [ 27.614143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.614405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.614907] page dumped because: kasan: bad access detected [ 27.615128] [ 27.615215] Memory state around the buggy address: [ 27.615395] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.615604] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.615810] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.616015] ^ [ 27.616161] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.616375] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.616950] ================================================================== [ 27.072520] ================================================================== [ 27.073109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 27.073468] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.073839] [ 27.073946] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.073994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.074005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.074121] Call Trace: [ 27.074140] <TASK> [ 27.074154] dump_stack_lvl+0x73/0xb0 [ 27.074187] print_report+0xd1/0x640 [ 27.074210] ? __virt_addr_valid+0x1db/0x2d0 [ 27.074233] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.074253] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.074291] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.074313] kasan_report+0x141/0x180 [ 27.074334] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.074359] kasan_check_range+0x10c/0x1c0 [ 27.074381] __kasan_check_write+0x18/0x20 [ 27.074404] kasan_atomics_helper+0x4a0/0x5450 [ 27.074425] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.074446] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.074470] ? kasan_atomics+0x152/0x310 [ 27.074495] kasan_atomics+0x1dc/0x310 [ 27.074517] ? __pfx_kasan_atomics+0x10/0x10 [ 27.074540] ? __pfx_read_tsc+0x10/0x10 [ 27.074561] ? ktime_get_ts64+0x86/0x230 [ 27.074586] kunit_try_run_case+0x1a5/0x480 [ 27.074609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.074630] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.074679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.074712] ? __kthread_parkme+0x82/0x180 [ 27.074731] ? preempt_count_sub+0x50/0x80 [ 27.074773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.074797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.074819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.074895] kthread+0x337/0x6f0 [ 27.074919] ? trace_preempt_on+0x20/0xc0 [ 27.074941] ? __pfx_kthread+0x10/0x10 [ 27.074961] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.075005] ? calculate_sigpending+0x7b/0xa0 [ 27.075030] ? __pfx_kthread+0x10/0x10 [ 27.075051] ret_from_fork+0x116/0x1d0 [ 27.075080] ? __pfx_kthread+0x10/0x10 [ 27.075100] ret_from_fork_asm+0x1a/0x30 [ 27.075132] </TASK> [ 27.075143] [ 27.083445] Allocated by task 313: [ 27.083623] kasan_save_stack+0x45/0x70 [ 27.083801] kasan_save_track+0x18/0x40 [ 27.083969] kasan_save_alloc_info+0x3b/0x50 [ 27.084164] __kasan_kmalloc+0xb7/0xc0 [ 27.084327] __kmalloc_cache_noprof+0x189/0x420 [ 27.084534] kasan_atomics+0x95/0x310 [ 27.084683] kunit_try_run_case+0x1a5/0x480 [ 27.084885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.085093] kthread+0x337/0x6f0 [ 27.085242] ret_from_fork+0x116/0x1d0 [ 27.085572] ret_from_fork_asm+0x1a/0x30 [ 27.085767] [ 27.086000] The buggy address belongs to the object at ffff8881053c7b80 [ 27.086000] which belongs to the cache kmalloc-64 of size 64 [ 27.086394] The buggy address is located 0 bytes to the right of [ 27.086394] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.086759] [ 27.086844] The buggy address belongs to the physical page: [ 27.087085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.087606] flags: 0x200000000000000(node=0|zone=2) [ 27.087878] page_type: f5(slab) [ 27.088054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.088634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.088851] page dumped because: kasan: bad access detected [ 27.089012] [ 27.089168] Memory state around the buggy address: [ 27.089395] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.090045] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.090396] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.090699] ^ [ 27.090906] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.091259] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.091563] ================================================================== [ 26.950165] ================================================================== [ 26.950530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 26.951055] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 26.951358] [ 26.951466] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 26.951514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.951526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.951549] Call Trace: [ 26.951562] <TASK> [ 26.951579] dump_stack_lvl+0x73/0xb0 [ 26.951610] print_report+0xd1/0x640 [ 26.951633] ? __virt_addr_valid+0x1db/0x2d0 [ 26.951656] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.951676] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.951702] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.951723] kasan_report+0x141/0x180 [ 26.951744] ? kasan_atomics_helper+0x4ba2/0x5450 [ 26.951769] __asan_report_store4_noabort+0x1b/0x30 [ 26.951793] kasan_atomics_helper+0x4ba2/0x5450 [ 26.951877] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.951901] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.951927] ? kasan_atomics+0x152/0x310 [ 26.951952] kasan_atomics+0x1dc/0x310 [ 26.951974] ? __pfx_kasan_atomics+0x10/0x10 [ 26.951998] ? __pfx_read_tsc+0x10/0x10 [ 26.952020] ? ktime_get_ts64+0x86/0x230 [ 26.952045] kunit_try_run_case+0x1a5/0x480 [ 26.952069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.952093] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.952128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.952160] ? __kthread_parkme+0x82/0x180 [ 26.952181] ? preempt_count_sub+0x50/0x80 [ 26.952205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.952229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.952250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.952285] kthread+0x337/0x6f0 [ 26.952305] ? trace_preempt_on+0x20/0xc0 [ 26.952327] ? __pfx_kthread+0x10/0x10 [ 26.952348] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.952378] ? calculate_sigpending+0x7b/0xa0 [ 26.952403] ? __pfx_kthread+0x10/0x10 [ 26.952423] ret_from_fork+0x116/0x1d0 [ 26.952442] ? __pfx_kthread+0x10/0x10 [ 26.952461] ret_from_fork_asm+0x1a/0x30 [ 26.952491] </TASK> [ 26.952502] [ 26.960411] Allocated by task 313: [ 26.960555] kasan_save_stack+0x45/0x70 [ 26.960699] kasan_save_track+0x18/0x40 [ 26.960827] kasan_save_alloc_info+0x3b/0x50 [ 26.960969] __kasan_kmalloc+0xb7/0xc0 [ 26.961092] __kmalloc_cache_noprof+0x189/0x420 [ 26.961315] kasan_atomics+0x95/0x310 [ 26.961492] kunit_try_run_case+0x1a5/0x480 [ 26.961663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.961839] kthread+0x337/0x6f0 [ 26.961955] ret_from_fork+0x116/0x1d0 [ 26.962082] ret_from_fork_asm+0x1a/0x30 [ 26.962215] [ 26.962287] The buggy address belongs to the object at ffff8881053c7b80 [ 26.962287] which belongs to the cache kmalloc-64 of size 64 [ 26.962676] The buggy address is located 0 bytes to the right of [ 26.962676] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 26.964401] [ 26.964483] The buggy address belongs to the physical page: [ 26.964649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 26.964908] flags: 0x200000000000000(node=0|zone=2) [ 26.965067] page_type: f5(slab) [ 26.965186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.967472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.968737] page dumped because: kasan: bad access detected [ 26.969204] [ 26.969321] Memory state around the buggy address: [ 26.969551] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.969953] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.970287] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.970552] ^ [ 26.970758] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.971047] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.972029] ================================================================== [ 28.064603] ================================================================== [ 28.064992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 28.065307] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.065603] [ 28.065697] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.065743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.065755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.065778] Call Trace: [ 28.065812] <TASK> [ 28.065826] dump_stack_lvl+0x73/0xb0 [ 28.065859] print_report+0xd1/0x640 [ 28.065881] ? __virt_addr_valid+0x1db/0x2d0 [ 28.065906] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.065927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.065954] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.065976] kasan_report+0x141/0x180 [ 28.065999] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.066025] kasan_check_range+0x10c/0x1c0 [ 28.066049] __kasan_check_write+0x18/0x20 [ 28.066073] kasan_atomics_helper+0x1b22/0x5450 [ 28.066096] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.066118] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.066143] ? kasan_atomics+0x152/0x310 [ 28.066169] kasan_atomics+0x1dc/0x310 [ 28.066193] ? __pfx_kasan_atomics+0x10/0x10 [ 28.066217] ? __pfx_read_tsc+0x10/0x10 [ 28.066239] ? ktime_get_ts64+0x86/0x230 [ 28.066264] kunit_try_run_case+0x1a5/0x480 [ 28.066289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.066311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.066358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.066392] ? __kthread_parkme+0x82/0x180 [ 28.066412] ? preempt_count_sub+0x50/0x80 [ 28.066436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.066461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.066485] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.066509] kthread+0x337/0x6f0 [ 28.066529] ? trace_preempt_on+0x20/0xc0 [ 28.066553] ? __pfx_kthread+0x10/0x10 [ 28.066575] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.066605] ? calculate_sigpending+0x7b/0xa0 [ 28.066630] ? __pfx_kthread+0x10/0x10 [ 28.066653] ret_from_fork+0x116/0x1d0 [ 28.066677] ? __pfx_kthread+0x10/0x10 [ 28.066698] ret_from_fork_asm+0x1a/0x30 [ 28.066729] </TASK> [ 28.066740] [ 28.074696] Allocated by task 313: [ 28.074823] kasan_save_stack+0x45/0x70 [ 28.074961] kasan_save_track+0x18/0x40 [ 28.075089] kasan_save_alloc_info+0x3b/0x50 [ 28.075230] __kasan_kmalloc+0xb7/0xc0 [ 28.075391] __kmalloc_cache_noprof+0x189/0x420 [ 28.075776] kasan_atomics+0x95/0x310 [ 28.075981] kunit_try_run_case+0x1a5/0x480 [ 28.076181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.076439] kthread+0x337/0x6f0 [ 28.076601] ret_from_fork+0x116/0x1d0 [ 28.076783] ret_from_fork_asm+0x1a/0x30 [ 28.076973] [ 28.077065] The buggy address belongs to the object at ffff8881053c7b80 [ 28.077065] which belongs to the cache kmalloc-64 of size 64 [ 28.077608] The buggy address is located 0 bytes to the right of [ 28.077608] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.078182] [ 28.078277] The buggy address belongs to the physical page: [ 28.078501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.078784] flags: 0x200000000000000(node=0|zone=2) [ 28.079164] page_type: f5(slab) [ 28.079345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.079606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.079913] page dumped because: kasan: bad access detected [ 28.080223] [ 28.080313] Memory state around the buggy address: [ 28.080547] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.080771] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.081168] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.081410] ^ [ 28.081560] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.081849] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.082160] ================================================================== [ 27.809591] ================================================================== [ 27.810442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 27.810771] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 27.811515] [ 27.811630] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 27.811690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.811704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.811729] Call Trace: [ 27.811750] <TASK> [ 27.811768] dump_stack_lvl+0x73/0xb0 [ 27.811804] print_report+0xd1/0x640 [ 27.811828] ? __virt_addr_valid+0x1db/0x2d0 [ 27.811986] ? kasan_atomics_helper+0x1467/0x5450 [ 27.812010] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.812037] ? kasan_atomics_helper+0x1467/0x5450 [ 27.812059] kasan_report+0x141/0x180 [ 27.812117] ? kasan_atomics_helper+0x1467/0x5450 [ 27.812146] kasan_check_range+0x10c/0x1c0 [ 27.812173] __kasan_check_write+0x18/0x20 [ 27.812197] kasan_atomics_helper+0x1467/0x5450 [ 27.812219] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.812242] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.812267] ? kasan_atomics+0x152/0x310 [ 27.812293] kasan_atomics+0x1dc/0x310 [ 27.812328] ? __pfx_kasan_atomics+0x10/0x10 [ 27.812352] ? __pfx_read_tsc+0x10/0x10 [ 27.812375] ? ktime_get_ts64+0x86/0x230 [ 27.812401] kunit_try_run_case+0x1a5/0x480 [ 27.812427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.812451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.812487] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.812521] ? __kthread_parkme+0x82/0x180 [ 27.812542] ? preempt_count_sub+0x50/0x80 [ 27.812566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.812591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.812614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.812638] kthread+0x337/0x6f0 [ 27.812659] ? trace_preempt_on+0x20/0xc0 [ 27.812683] ? __pfx_kthread+0x10/0x10 [ 27.812704] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.812738] ? calculate_sigpending+0x7b/0xa0 [ 27.812765] ? __pfx_kthread+0x10/0x10 [ 27.812789] ret_from_fork+0x116/0x1d0 [ 27.812822] ? __pfx_kthread+0x10/0x10 [ 27.812851] ret_from_fork_asm+0x1a/0x30 [ 27.812884] </TASK> [ 27.812896] [ 27.820372] Allocated by task 313: [ 27.820562] kasan_save_stack+0x45/0x70 [ 27.820759] kasan_save_track+0x18/0x40 [ 27.820945] kasan_save_alloc_info+0x3b/0x50 [ 27.821217] __kasan_kmalloc+0xb7/0xc0 [ 27.821630] __kmalloc_cache_noprof+0x189/0x420 [ 27.821857] kasan_atomics+0x95/0x310 [ 27.821987] kunit_try_run_case+0x1a5/0x480 [ 27.822129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.822684] kthread+0x337/0x6f0 [ 27.822958] ret_from_fork+0x116/0x1d0 [ 27.823122] ret_from_fork_asm+0x1a/0x30 [ 27.823327] [ 27.823410] The buggy address belongs to the object at ffff8881053c7b80 [ 27.823410] which belongs to the cache kmalloc-64 of size 64 [ 27.823758] The buggy address is located 0 bytes to the right of [ 27.823758] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 27.824260] [ 27.824365] The buggy address belongs to the physical page: [ 27.824612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 27.824965] flags: 0x200000000000000(node=0|zone=2) [ 27.825200] page_type: f5(slab) [ 27.825517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.825961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.826371] page dumped because: kasan: bad access detected [ 27.826538] [ 27.826625] Memory state around the buggy address: [ 27.826849] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.827202] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.827470] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.827708] ^ [ 27.827857] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.828064] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.828271] ================================================================== [ 28.046022] ================================================================== [ 28.046357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 28.046692] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313 [ 28.047550] [ 28.047717] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) [ 28.047771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.047784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.047864] Call Trace: [ 28.047884] <TASK> [ 28.047901] dump_stack_lvl+0x73/0xb0 [ 28.047934] print_report+0xd1/0x640 [ 28.047958] ? __virt_addr_valid+0x1db/0x2d0 [ 28.047981] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.048003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.048029] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.048053] kasan_report+0x141/0x180 [ 28.048076] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.048102] kasan_check_range+0x10c/0x1c0 [ 28.048126] __kasan_check_write+0x18/0x20 [ 28.048150] kasan_atomics_helper+0x1a7f/0x5450 [ 28.048176] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.048200] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.048228] ? kasan_atomics+0x152/0x310 [ 28.048256] kasan_atomics+0x1dc/0x310 [ 28.048278] ? __pfx_kasan_atomics+0x10/0x10 [ 28.048303] ? __pfx_read_tsc+0x10/0x10 [ 28.048340] ? ktime_get_ts64+0x86/0x230 [ 28.048367] kunit_try_run_case+0x1a5/0x480 [ 28.048392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.048416] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.048453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.048487] ? __kthread_parkme+0x82/0x180 [ 28.048509] ? preempt_count_sub+0x50/0x80 [ 28.048533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.048557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.048581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.048606] kthread+0x337/0x6f0 [ 28.048627] ? trace_preempt_on+0x20/0xc0 [ 28.048651] ? __pfx_kthread+0x10/0x10 [ 28.048673] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.048704] ? calculate_sigpending+0x7b/0xa0 [ 28.048729] ? __pfx_kthread+0x10/0x10 [ 28.048752] ret_from_fork+0x116/0x1d0 [ 28.048772] ? __pfx_kthread+0x10/0x10 [ 28.048894] ret_from_fork_asm+0x1a/0x30 [ 28.048929] </TASK> [ 28.048942] [ 28.056749] Allocated by task 313: [ 28.056963] kasan_save_stack+0x45/0x70 [ 28.057132] kasan_save_track+0x18/0x40 [ 28.057332] kasan_save_alloc_info+0x3b/0x50 [ 28.057507] __kasan_kmalloc+0xb7/0xc0 [ 28.057676] __kmalloc_cache_noprof+0x189/0x420 [ 28.057861] kasan_atomics+0x95/0x310 [ 28.058025] kunit_try_run_case+0x1a5/0x480 [ 28.058223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.058404] kthread+0x337/0x6f0 [ 28.058521] ret_from_fork+0x116/0x1d0 [ 28.058648] ret_from_fork_asm+0x1a/0x30 [ 28.058788] [ 28.058853] The buggy address belongs to the object at ffff8881053c7b80 [ 28.058853] which belongs to the cache kmalloc-64 of size 64 [ 28.059201] The buggy address is located 0 bytes to the right of [ 28.059201] allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0) [ 28.059875] [ 28.059976] The buggy address belongs to the physical page: [ 28.060225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7 [ 28.060587] flags: 0x200000000000000(node=0|zone=2) [ 28.060816] page_type: f5(slab) [ 28.060976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.061309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.061608] page dumped because: kasan: bad access detected [ 28.061774] [ 28.061837] Memory state around the buggy address: [ 28.061985] ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.062514] ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.062788] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.063256] ^ [ 28.063456] ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.063753] ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.064132] ==================================================================