Date
July 23, 2025, 3:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.473249] ================================================================== [ 33.473338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.473415] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.473480] [ 33.473519] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.473610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.473642] Hardware name: linux,dummy-virt (DT) [ 33.473746] Call trace: [ 33.473772] show_stack+0x20/0x38 (C) [ 33.473819] dump_stack_lvl+0x8c/0xd0 [ 33.473922] print_report+0x118/0x5e8 [ 33.473983] kasan_report+0xdc/0x128 [ 33.474030] __asan_report_load4_noabort+0x20/0x30 [ 33.474097] kasan_atomics_helper+0x3e04/0x4858 [ 33.474168] kasan_atomics+0x198/0x2e0 [ 33.474218] kunit_try_run_case+0x170/0x3f0 [ 33.474519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.474608] kthread+0x328/0x630 [ 33.474652] ret_from_fork+0x10/0x20 [ 33.474744] [ 33.474785] Allocated by task 298: [ 33.474844] kasan_save_stack+0x3c/0x68 [ 33.474917] kasan_save_track+0x20/0x40 [ 33.475150] kasan_save_alloc_info+0x40/0x58 [ 33.475213] __kasan_kmalloc+0xd4/0xd8 [ 33.475251] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.475430] kasan_atomics+0xb8/0x2e0 [ 33.475502] kunit_try_run_case+0x170/0x3f0 [ 33.475552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.475596] kthread+0x328/0x630 [ 33.475686] ret_from_fork+0x10/0x20 [ 33.475726] [ 33.475748] The buggy address belongs to the object at fff00000c9c2de00 [ 33.475748] which belongs to the cache kmalloc-64 of size 64 [ 33.475835] The buggy address is located 0 bytes to the right of [ 33.475835] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.476123] [ 33.476173] The buggy address belongs to the physical page: [ 33.476210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.476263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.476339] page_type: f5(slab) [ 33.476541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.477090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.477195] page dumped because: kasan: bad access detected [ 33.477348] [ 33.477392] Memory state around the buggy address: [ 33.477428] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.477672] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.477770] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.477959] ^ [ 33.477998] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.478053] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.478093] ================================================================== [ 33.664837] ================================================================== [ 33.664891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 33.665399] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.666569] [ 33.666686] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.666792] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.667043] Hardware name: linux,dummy-virt (DT) [ 33.667382] Call trace: [ 33.667440] show_stack+0x20/0x38 (C) [ 33.667735] dump_stack_lvl+0x8c/0xd0 [ 33.667827] print_report+0x118/0x5e8 [ 33.667882] kasan_report+0xdc/0x128 [ 33.667970] kasan_check_range+0x100/0x1a8 [ 33.668022] __kasan_check_write+0x20/0x30 [ 33.668070] kasan_atomics_helper+0x16d0/0x4858 [ 33.668147] kasan_atomics+0x198/0x2e0 [ 33.668196] kunit_try_run_case+0x170/0x3f0 [ 33.668243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.668296] kthread+0x328/0x630 [ 33.668339] ret_from_fork+0x10/0x20 [ 33.668387] [ 33.668408] Allocated by task 298: [ 33.668458] kasan_save_stack+0x3c/0x68 [ 33.668503] kasan_save_track+0x20/0x40 [ 33.668777] kasan_save_alloc_info+0x40/0x58 [ 33.668917] __kasan_kmalloc+0xd4/0xd8 [ 33.668981] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.669033] kasan_atomics+0xb8/0x2e0 [ 33.669073] kunit_try_run_case+0x170/0x3f0 [ 33.669113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.669331] kthread+0x328/0x630 [ 33.669507] ret_from_fork+0x10/0x20 [ 33.669586] [ 33.669654] The buggy address belongs to the object at fff00000c9c2de00 [ 33.669654] which belongs to the cache kmalloc-64 of size 64 [ 33.670008] The buggy address is located 0 bytes to the right of [ 33.670008] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.670123] [ 33.670178] The buggy address belongs to the physical page: [ 33.670214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.670400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.670627] page_type: f5(slab) [ 33.670889] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.671044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.671131] page dumped because: kasan: bad access detected [ 33.671245] [ 33.671305] Memory state around the buggy address: [ 33.671417] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.671493] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.671808] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.671950] ^ [ 33.672043] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.672255] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.672427] ================================================================== [ 33.681605] ================================================================== [ 33.681660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 33.681715] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.681768] [ 33.681800] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.681891] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.681937] Hardware name: linux,dummy-virt (DT) [ 33.681968] Call trace: [ 33.681993] show_stack+0x20/0x38 (C) [ 33.683628] dump_stack_lvl+0x8c/0xd0 [ 33.683719] print_report+0x118/0x5e8 [ 33.684191] kasan_report+0xdc/0x128 [ 33.684340] kasan_check_range+0x100/0x1a8 [ 33.684390] __kasan_check_write+0x20/0x30 [ 33.684730] kasan_atomics_helper+0x175c/0x4858 [ 33.685245] kasan_atomics+0x198/0x2e0 [ 33.685307] kunit_try_run_case+0x170/0x3f0 [ 33.685356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.685579] kthread+0x328/0x630 [ 33.685758] ret_from_fork+0x10/0x20 [ 33.686191] [ 33.686441] Allocated by task 298: [ 33.686673] kasan_save_stack+0x3c/0x68 [ 33.686872] kasan_save_track+0x20/0x40 [ 33.687144] kasan_save_alloc_info+0x40/0x58 [ 33.687454] __kasan_kmalloc+0xd4/0xd8 [ 33.687504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.687876] kasan_atomics+0xb8/0x2e0 [ 33.688136] kunit_try_run_case+0x170/0x3f0 [ 33.688510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.688640] kthread+0x328/0x630 [ 33.688703] ret_from_fork+0x10/0x20 [ 33.688742] [ 33.688867] The buggy address belongs to the object at fff00000c9c2de00 [ 33.688867] which belongs to the cache kmalloc-64 of size 64 [ 33.689136] The buggy address is located 0 bytes to the right of [ 33.689136] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.689206] [ 33.689439] The buggy address belongs to the physical page: [ 33.689531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.689689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.690281] page_type: f5(slab) [ 33.690592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.691010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.691358] page dumped because: kasan: bad access detected [ 33.691558] [ 33.691597] Memory state around the buggy address: [ 33.691756] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.692125] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.692176] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.692217] ^ [ 33.692654] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.692719] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.692767] ================================================================== [ 33.524244] ================================================================== [ 33.524341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.524439] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.524494] [ 33.524533] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.524656] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.524748] Hardware name: linux,dummy-virt (DT) [ 33.524783] Call trace: [ 33.524809] show_stack+0x20/0x38 (C) [ 33.525040] dump_stack_lvl+0x8c/0xd0 [ 33.525265] print_report+0x118/0x5e8 [ 33.525510] kasan_report+0xdc/0x128 [ 33.525728] kasan_check_range+0x100/0x1a8 [ 33.525970] __kasan_check_write+0x20/0x30 [ 33.526177] kasan_atomics_helper+0x1058/0x4858 [ 33.526266] kasan_atomics+0x198/0x2e0 [ 33.526525] kunit_try_run_case+0x170/0x3f0 [ 33.526725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.527021] kthread+0x328/0x630 [ 33.527225] ret_from_fork+0x10/0x20 [ 33.527505] [ 33.527612] Allocated by task 298: [ 33.527652] kasan_save_stack+0x3c/0x68 [ 33.527698] kasan_save_track+0x20/0x40 [ 33.527945] kasan_save_alloc_info+0x40/0x58 [ 33.528330] __kasan_kmalloc+0xd4/0xd8 [ 33.528674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.528741] kasan_atomics+0xb8/0x2e0 [ 33.528953] kunit_try_run_case+0x170/0x3f0 [ 33.529077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.529486] kthread+0x328/0x630 [ 33.529601] ret_from_fork+0x10/0x20 [ 33.529645] [ 33.529667] The buggy address belongs to the object at fff00000c9c2de00 [ 33.529667] which belongs to the cache kmalloc-64 of size 64 [ 33.529891] The buggy address is located 0 bytes to the right of [ 33.529891] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.530201] [ 33.530285] The buggy address belongs to the physical page: [ 33.530480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.530549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.530601] page_type: f5(slab) [ 33.530641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.530693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.530735] page dumped because: kasan: bad access detected [ 33.530770] [ 33.530790] Memory state around the buggy address: [ 33.530823] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.530876] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.530934] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.530985] ^ [ 33.531040] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.531120] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.531170] ================================================================== [ 33.508210] ================================================================== [ 33.508266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.508319] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.508387] [ 33.508435] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.508528] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.508612] Hardware name: linux,dummy-virt (DT) [ 33.508684] Call trace: [ 33.508708] show_stack+0x20/0x38 (C) [ 33.508757] dump_stack_lvl+0x8c/0xd0 [ 33.508970] print_report+0x118/0x5e8 [ 33.509019] kasan_report+0xdc/0x128 [ 33.509064] kasan_check_range+0x100/0x1a8 [ 33.509344] __kasan_check_write+0x20/0x30 [ 33.509432] kasan_atomics_helper+0xf88/0x4858 [ 33.509824] kasan_atomics+0x198/0x2e0 [ 33.509953] kunit_try_run_case+0x170/0x3f0 [ 33.510100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.510194] kthread+0x328/0x630 [ 33.510299] ret_from_fork+0x10/0x20 [ 33.510415] [ 33.510439] Allocated by task 298: [ 33.510469] kasan_save_stack+0x3c/0x68 [ 33.510822] kasan_save_track+0x20/0x40 [ 33.510912] kasan_save_alloc_info+0x40/0x58 [ 33.510980] __kasan_kmalloc+0xd4/0xd8 [ 33.511040] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.511336] kasan_atomics+0xb8/0x2e0 [ 33.511429] kunit_try_run_case+0x170/0x3f0 [ 33.511487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.511534] kthread+0x328/0x630 [ 33.511574] ret_from_fork+0x10/0x20 [ 33.511621] [ 33.511652] The buggy address belongs to the object at fff00000c9c2de00 [ 33.511652] which belongs to the cache kmalloc-64 of size 64 [ 33.511803] The buggy address is located 0 bytes to the right of [ 33.511803] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.511872] [ 33.512128] The buggy address belongs to the physical page: [ 33.512391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.512466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.512942] page_type: f5(slab) [ 33.513067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.513144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.513189] page dumped because: kasan: bad access detected [ 33.513588] [ 33.513688] Memory state around the buggy address: [ 33.514058] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.514196] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.514281] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.514419] ^ [ 33.514477] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.514552] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.514594] ================================================================== [ 33.633371] ================================================================== [ 33.633448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 33.633501] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.633797] [ 33.633851] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.634031] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.634068] Hardware name: linux,dummy-virt (DT) [ 33.634117] Call trace: [ 33.634143] show_stack+0x20/0x38 (C) [ 33.634225] dump_stack_lvl+0x8c/0xd0 [ 33.634302] print_report+0x118/0x5e8 [ 33.634360] kasan_report+0xdc/0x128 [ 33.634405] __asan_report_load8_noabort+0x20/0x30 [ 33.634480] kasan_atomics_helper+0x3db0/0x4858 [ 33.634534] kasan_atomics+0x198/0x2e0 [ 33.634600] kunit_try_run_case+0x170/0x3f0 [ 33.634839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.634914] kthread+0x328/0x630 [ 33.634959] ret_from_fork+0x10/0x20 [ 33.635042] [ 33.635083] Allocated by task 298: [ 33.635116] kasan_save_stack+0x3c/0x68 [ 33.635164] kasan_save_track+0x20/0x40 [ 33.635450] kasan_save_alloc_info+0x40/0x58 [ 33.635510] __kasan_kmalloc+0xd4/0xd8 [ 33.635556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.635599] kasan_atomics+0xb8/0x2e0 [ 33.635666] kunit_try_run_case+0x170/0x3f0 [ 33.635714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.635760] kthread+0x328/0x630 [ 33.635796] ret_from_fork+0x10/0x20 [ 33.636084] [ 33.636152] The buggy address belongs to the object at fff00000c9c2de00 [ 33.636152] which belongs to the cache kmalloc-64 of size 64 [ 33.636218] The buggy address is located 0 bytes to the right of [ 33.636218] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.636283] [ 33.636304] The buggy address belongs to the physical page: [ 33.636340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.636395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.636458] page_type: f5(slab) [ 33.636532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.637007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.637051] page dumped because: kasan: bad access detected [ 33.637260] [ 33.637283] Memory state around the buggy address: [ 33.637499] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.637572] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.637619] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.638219] ^ [ 33.638310] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.638366] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.638839] ================================================================== [ 33.565839] ================================================================== [ 33.565930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 33.566165] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.566342] [ 33.566411] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.566510] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.566631] Hardware name: linux,dummy-virt (DT) [ 33.566687] Call trace: [ 33.566713] show_stack+0x20/0x38 (C) [ 33.566766] dump_stack_lvl+0x8c/0xd0 [ 33.567023] print_report+0x118/0x5e8 [ 33.567103] kasan_report+0xdc/0x128 [ 33.567257] kasan_check_range+0x100/0x1a8 [ 33.567318] __kasan_check_write+0x20/0x30 [ 33.567612] kasan_atomics_helper+0x126c/0x4858 [ 33.567833] kasan_atomics+0x198/0x2e0 [ 33.568079] kunit_try_run_case+0x170/0x3f0 [ 33.568147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.568201] kthread+0x328/0x630 [ 33.568511] ret_from_fork+0x10/0x20 [ 33.568805] [ 33.568995] Allocated by task 298: [ 33.569171] kasan_save_stack+0x3c/0x68 [ 33.569223] kasan_save_track+0x20/0x40 [ 33.569615] kasan_save_alloc_info+0x40/0x58 [ 33.569778] __kasan_kmalloc+0xd4/0xd8 [ 33.570123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.570197] kasan_atomics+0xb8/0x2e0 [ 33.570240] kunit_try_run_case+0x170/0x3f0 [ 33.570299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.570345] kthread+0x328/0x630 [ 33.570402] ret_from_fork+0x10/0x20 [ 33.570453] [ 33.570485] The buggy address belongs to the object at fff00000c9c2de00 [ 33.570485] which belongs to the cache kmalloc-64 of size 64 [ 33.570546] The buggy address is located 0 bytes to the right of [ 33.570546] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.570623] [ 33.570645] The buggy address belongs to the physical page: [ 33.570682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.570746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.570797] page_type: f5(slab) [ 33.570836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.571507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.571571] page dumped because: kasan: bad access detected [ 33.571630] [ 33.571678] Memory state around the buggy address: [ 33.571778] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.571825] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.571916] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.572320] ^ [ 33.572637] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.572891] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.572986] ================================================================== [ 33.693352] ================================================================== [ 33.693402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 33.693454] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.693506] [ 33.694367] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.694484] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.694516] Hardware name: linux,dummy-virt (DT) [ 33.694547] Call trace: [ 33.695194] show_stack+0x20/0x38 (C) [ 33.695264] dump_stack_lvl+0x8c/0xd0 [ 33.695314] print_report+0x118/0x5e8 [ 33.695362] kasan_report+0xdc/0x128 [ 33.695802] __asan_report_load8_noabort+0x20/0x30 [ 33.696042] kasan_atomics_helper+0x3e20/0x4858 [ 33.696094] kasan_atomics+0x198/0x2e0 [ 33.696143] kunit_try_run_case+0x170/0x3f0 [ 33.696191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.696246] kthread+0x328/0x630 [ 33.696289] ret_from_fork+0x10/0x20 [ 33.697088] [ 33.697139] Allocated by task 298: [ 33.697171] kasan_save_stack+0x3c/0x68 [ 33.697226] kasan_save_track+0x20/0x40 [ 33.697628] kasan_save_alloc_info+0x40/0x58 [ 33.697674] __kasan_kmalloc+0xd4/0xd8 [ 33.697711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.697925] kasan_atomics+0xb8/0x2e0 [ 33.698190] kunit_try_run_case+0x170/0x3f0 [ 33.698239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.698515] kthread+0x328/0x630 [ 33.698750] ret_from_fork+0x10/0x20 [ 33.698877] [ 33.698950] The buggy address belongs to the object at fff00000c9c2de00 [ 33.698950] which belongs to the cache kmalloc-64 of size 64 [ 33.699041] The buggy address is located 0 bytes to the right of [ 33.699041] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.699107] [ 33.699428] The buggy address belongs to the physical page: [ 33.699554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.700199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.700557] page_type: f5(slab) [ 33.700783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.701009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.701058] page dumped because: kasan: bad access detected [ 33.701092] [ 33.701119] Memory state around the buggy address: [ 33.701153] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.701200] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.701673] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.701807] ^ [ 33.702298] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.702814] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.703156] ================================================================== [ 33.389693] ================================================================== [ 33.389750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.389806] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.389858] [ 33.389983] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.391021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.391172] Hardware name: linux,dummy-virt (DT) [ 33.391208] Call trace: [ 33.391646] show_stack+0x20/0x38 (C) [ 33.391703] dump_stack_lvl+0x8c/0xd0 [ 33.391753] print_report+0x118/0x5e8 [ 33.391800] kasan_report+0xdc/0x128 [ 33.392092] kasan_check_range+0x100/0x1a8 [ 33.392142] __kasan_check_write+0x20/0x30 [ 33.392192] kasan_atomics_helper+0xa6c/0x4858 [ 33.392805] kasan_atomics+0x198/0x2e0 [ 33.393090] kunit_try_run_case+0x170/0x3f0 [ 33.393440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.393538] kthread+0x328/0x630 [ 33.393585] ret_from_fork+0x10/0x20 [ 33.394153] [ 33.394191] Allocated by task 298: [ 33.394226] kasan_save_stack+0x3c/0x68 [ 33.394274] kasan_save_track+0x20/0x40 [ 33.394312] kasan_save_alloc_info+0x40/0x58 [ 33.394358] __kasan_kmalloc+0xd4/0xd8 [ 33.395146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.395214] kasan_atomics+0xb8/0x2e0 [ 33.395258] kunit_try_run_case+0x170/0x3f0 [ 33.395297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.395343] kthread+0x328/0x630 [ 33.395376] ret_from_fork+0x10/0x20 [ 33.395415] [ 33.395437] The buggy address belongs to the object at fff00000c9c2de00 [ 33.395437] which belongs to the cache kmalloc-64 of size 64 [ 33.396691] The buggy address is located 0 bytes to the right of [ 33.396691] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.396801] [ 33.396826] The buggy address belongs to the physical page: [ 33.396863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.396977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.397053] page_type: f5(slab) [ 33.397112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.397189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.397231] page dumped because: kasan: bad access detected [ 33.397265] [ 33.397329] Memory state around the buggy address: [ 33.397420] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.397936] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.398270] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.398661] ^ [ 33.398731] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.399218] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.399322] ================================================================== [ 33.478559] ================================================================== [ 33.478626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.478706] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.478758] [ 33.478808] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.478913] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.478951] Hardware name: linux,dummy-virt (DT) [ 33.479001] Call trace: [ 33.479041] show_stack+0x20/0x38 (C) [ 33.479091] dump_stack_lvl+0x8c/0xd0 [ 33.479157] print_report+0x118/0x5e8 [ 33.479201] kasan_report+0xdc/0x128 [ 33.479246] kasan_check_range+0x100/0x1a8 [ 33.479309] __kasan_check_read+0x20/0x30 [ 33.479374] kasan_atomics_helper+0xdd4/0x4858 [ 33.479428] kasan_atomics+0x198/0x2e0 [ 33.479481] kunit_try_run_case+0x170/0x3f0 [ 33.479537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.479591] kthread+0x328/0x630 [ 33.479634] ret_from_fork+0x10/0x20 [ 33.479682] [ 33.479702] Allocated by task 298: [ 33.479732] kasan_save_stack+0x3c/0x68 [ 33.479771] kasan_save_track+0x20/0x40 [ 33.479809] kasan_save_alloc_info+0x40/0x58 [ 33.479849] __kasan_kmalloc+0xd4/0xd8 [ 33.479885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.479937] kasan_atomics+0xb8/0x2e0 [ 33.480229] kunit_try_run_case+0x170/0x3f0 [ 33.480335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.480392] kthread+0x328/0x630 [ 33.480430] ret_from_fork+0x10/0x20 [ 33.480468] [ 33.480498] The buggy address belongs to the object at fff00000c9c2de00 [ 33.480498] which belongs to the cache kmalloc-64 of size 64 [ 33.480576] The buggy address is located 0 bytes to the right of [ 33.480576] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.480653] [ 33.480865] The buggy address belongs to the physical page: [ 33.480941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.481046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.481134] page_type: f5(slab) [ 33.481193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.481245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.481486] page dumped because: kasan: bad access detected [ 33.481524] [ 33.481544] Memory state around the buggy address: [ 33.481578] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.481681] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.481750] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.481801] ^ [ 33.481891] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.481964] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.482042] ================================================================== [ 33.531766] ================================================================== [ 33.532135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.532208] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.532268] [ 33.532303] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.532394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.532632] Hardware name: linux,dummy-virt (DT) [ 33.532727] Call trace: [ 33.532800] show_stack+0x20/0x38 (C) [ 33.532989] dump_stack_lvl+0x8c/0xd0 [ 33.533249] print_report+0x118/0x5e8 [ 33.533655] kasan_report+0xdc/0x128 [ 33.533742] kasan_check_range+0x100/0x1a8 [ 33.533885] __kasan_check_write+0x20/0x30 [ 33.533988] kasan_atomics_helper+0x10c0/0x4858 [ 33.534222] kasan_atomics+0x198/0x2e0 [ 33.534666] kunit_try_run_case+0x170/0x3f0 [ 33.535024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.535219] kthread+0x328/0x630 [ 33.535455] ret_from_fork+0x10/0x20 [ 33.535827] [ 33.535976] Allocated by task 298: [ 33.536231] kasan_save_stack+0x3c/0x68 [ 33.536462] kasan_save_track+0x20/0x40 [ 33.536982] kasan_save_alloc_info+0x40/0x58 [ 33.537196] __kasan_kmalloc+0xd4/0xd8 [ 33.537261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.537375] kasan_atomics+0xb8/0x2e0 [ 33.537418] kunit_try_run_case+0x170/0x3f0 [ 33.537459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.537529] kthread+0x328/0x630 [ 33.537568] ret_from_fork+0x10/0x20 [ 33.537747] [ 33.537935] The buggy address belongs to the object at fff00000c9c2de00 [ 33.537935] which belongs to the cache kmalloc-64 of size 64 [ 33.538163] The buggy address is located 0 bytes to the right of [ 33.538163] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.538523] [ 33.538709] The buggy address belongs to the physical page: [ 33.539330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.539568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.539675] page_type: f5(slab) [ 33.539743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.539883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.540172] page dumped because: kasan: bad access detected [ 33.540369] [ 33.540465] Memory state around the buggy address: [ 33.540662] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.540714] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.540758] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.540797] ^ [ 33.540835] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.541270] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.541329] ================================================================== [ 33.487153] ================================================================== [ 33.487202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.487252] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.487314] [ 33.487344] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.487437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.487479] Hardware name: linux,dummy-virt (DT) [ 33.487514] Call trace: [ 33.487539] show_stack+0x20/0x38 (C) [ 33.487586] dump_stack_lvl+0x8c/0xd0 [ 33.487643] print_report+0x118/0x5e8 [ 33.487689] kasan_report+0xdc/0x128 [ 33.487742] kasan_check_range+0x100/0x1a8 [ 33.487788] __kasan_check_write+0x20/0x30 [ 33.487845] kasan_atomics_helper+0xe44/0x4858 [ 33.488414] kasan_atomics+0x198/0x2e0 [ 33.488485] kunit_try_run_case+0x170/0x3f0 [ 33.488537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.488591] kthread+0x328/0x630 [ 33.488768] ret_from_fork+0x10/0x20 [ 33.488892] [ 33.488982] Allocated by task 298: [ 33.489059] kasan_save_stack+0x3c/0x68 [ 33.489155] kasan_save_track+0x20/0x40 [ 33.489242] kasan_save_alloc_info+0x40/0x58 [ 33.489570] __kasan_kmalloc+0xd4/0xd8 [ 33.489660] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.489715] kasan_atomics+0xb8/0x2e0 [ 33.489785] kunit_try_run_case+0x170/0x3f0 [ 33.489869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.489927] kthread+0x328/0x630 [ 33.489963] ret_from_fork+0x10/0x20 [ 33.490124] [ 33.490150] The buggy address belongs to the object at fff00000c9c2de00 [ 33.490150] which belongs to the cache kmalloc-64 of size 64 [ 33.490213] The buggy address is located 0 bytes to the right of [ 33.490213] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.490322] [ 33.490398] The buggy address belongs to the physical page: [ 33.490494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.490594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.490719] page_type: f5(slab) [ 33.490925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.491054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.491223] page dumped because: kasan: bad access detected [ 33.491294] [ 33.491353] Memory state around the buggy address: [ 33.491431] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.491497] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.491583] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.491635] ^ [ 33.491714] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.491759] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.491797] ================================================================== [ 33.651509] ================================================================== [ 33.651705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 33.652450] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.652507] [ 33.652540] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.652631] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.652782] Hardware name: linux,dummy-virt (DT) [ 33.652820] Call trace: [ 33.652845] show_stack+0x20/0x38 (C) [ 33.653471] dump_stack_lvl+0x8c/0xd0 [ 33.653758] print_report+0x118/0x5e8 [ 33.653934] kasan_report+0xdc/0x128 [ 33.654041] __asan_report_load8_noabort+0x20/0x30 [ 33.654165] kasan_atomics_helper+0x3df4/0x4858 [ 33.654217] kasan_atomics+0x198/0x2e0 [ 33.654265] kunit_try_run_case+0x170/0x3f0 [ 33.654314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.655701] kthread+0x328/0x630 [ 33.655840] ret_from_fork+0x10/0x20 [ 33.656607] [ 33.656684] Allocated by task 298: [ 33.656764] kasan_save_stack+0x3c/0x68 [ 33.657004] kasan_save_track+0x20/0x40 [ 33.657158] kasan_save_alloc_info+0x40/0x58 [ 33.657489] __kasan_kmalloc+0xd4/0xd8 [ 33.657711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.657832] kasan_atomics+0xb8/0x2e0 [ 33.658237] kunit_try_run_case+0x170/0x3f0 [ 33.658578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.658634] kthread+0x328/0x630 [ 33.658672] ret_from_fork+0x10/0x20 [ 33.659621] [ 33.659798] The buggy address belongs to the object at fff00000c9c2de00 [ 33.659798] which belongs to the cache kmalloc-64 of size 64 [ 33.660226] The buggy address is located 0 bytes to the right of [ 33.660226] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.660657] [ 33.660686] The buggy address belongs to the physical page: [ 33.660967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.661411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.661588] page_type: f5(slab) [ 33.661631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.661826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.661882] page dumped because: kasan: bad access detected [ 33.661923] [ 33.661945] Memory state around the buggy address: [ 33.662371] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.662668] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.662725] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.662767] ^ [ 33.663118] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.663261] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.663584] ================================================================== [ 33.704136] ================================================================== [ 33.704192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 33.704245] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.704297] [ 33.704787] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.705128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.705429] Hardware name: linux,dummy-virt (DT) [ 33.705464] Call trace: [ 33.705502] show_stack+0x20/0x38 (C) [ 33.705782] dump_stack_lvl+0x8c/0xd0 [ 33.705921] print_report+0x118/0x5e8 [ 33.705967] kasan_report+0xdc/0x128 [ 33.706013] kasan_check_range+0x100/0x1a8 [ 33.706060] __kasan_check_write+0x20/0x30 [ 33.706107] kasan_atomics_helper+0x17ec/0x4858 [ 33.706159] kasan_atomics+0x198/0x2e0 [ 33.706206] kunit_try_run_case+0x170/0x3f0 [ 33.706255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.707222] kthread+0x328/0x630 [ 33.707714] ret_from_fork+0x10/0x20 [ 33.707965] [ 33.707991] Allocated by task 298: [ 33.708133] kasan_save_stack+0x3c/0x68 [ 33.708194] kasan_save_track+0x20/0x40 [ 33.708366] kasan_save_alloc_info+0x40/0x58 [ 33.708432] __kasan_kmalloc+0xd4/0xd8 [ 33.708619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.709016] kasan_atomics+0xb8/0x2e0 [ 33.709134] kunit_try_run_case+0x170/0x3f0 [ 33.709237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.709393] kthread+0x328/0x630 [ 33.709573] ret_from_fork+0x10/0x20 [ 33.709665] [ 33.709689] The buggy address belongs to the object at fff00000c9c2de00 [ 33.709689] which belongs to the cache kmalloc-64 of size 64 [ 33.709954] The buggy address is located 0 bytes to the right of [ 33.709954] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.710281] [ 33.710306] The buggy address belongs to the physical page: [ 33.710343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.710923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.711281] page_type: f5(slab) [ 33.711462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.711517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.711561] page dumped because: kasan: bad access detected [ 33.711595] [ 33.711615] Memory state around the buggy address: [ 33.711649] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.711696] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.712219] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.712691] ^ [ 33.712735] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.712820] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.712863] ================================================================== [ 33.361707] ================================================================== [ 33.361764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.361818] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.361869] [ 33.361917] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.363542] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.363591] Hardware name: linux,dummy-virt (DT) [ 33.363639] Call trace: [ 33.363663] show_stack+0x20/0x38 (C) [ 33.363765] dump_stack_lvl+0x8c/0xd0 [ 33.363860] print_report+0x118/0x5e8 [ 33.363916] kasan_report+0xdc/0x128 [ 33.363961] kasan_check_range+0x100/0x1a8 [ 33.364382] __kasan_check_write+0x20/0x30 [ 33.364785] kasan_atomics_helper+0x99c/0x4858 [ 33.364917] kasan_atomics+0x198/0x2e0 [ 33.365309] kunit_try_run_case+0x170/0x3f0 [ 33.365613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.365925] kthread+0x328/0x630 [ 33.366236] ret_from_fork+0x10/0x20 [ 33.366651] [ 33.366679] Allocated by task 298: [ 33.367110] kasan_save_stack+0x3c/0x68 [ 33.367211] kasan_save_track+0x20/0x40 [ 33.367593] kasan_save_alloc_info+0x40/0x58 [ 33.367646] __kasan_kmalloc+0xd4/0xd8 [ 33.368075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.368286] kasan_atomics+0xb8/0x2e0 [ 33.368613] kunit_try_run_case+0x170/0x3f0 [ 33.368670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.368715] kthread+0x328/0x630 [ 33.368750] ret_from_fork+0x10/0x20 [ 33.368788] [ 33.369231] The buggy address belongs to the object at fff00000c9c2de00 [ 33.369231] which belongs to the cache kmalloc-64 of size 64 [ 33.369646] The buggy address is located 0 bytes to the right of [ 33.369646] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.369931] [ 33.370250] The buggy address belongs to the physical page: [ 33.370388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.370824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.370984] page_type: f5(slab) [ 33.371332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.371441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.371801] page dumped because: kasan: bad access detected [ 33.372048] [ 33.372255] Memory state around the buggy address: [ 33.372509] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.372721] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.372821] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.372866] ^ [ 33.373199] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.373503] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.373626] ================================================================== [ 33.515659] ================================================================== [ 33.515978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.516043] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.516153] [ 33.516378] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.516481] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.516514] Hardware name: linux,dummy-virt (DT) [ 33.516547] Call trace: [ 33.516571] show_stack+0x20/0x38 (C) [ 33.517385] dump_stack_lvl+0x8c/0xd0 [ 33.517449] print_report+0x118/0x5e8 [ 33.517496] kasan_report+0xdc/0x128 [ 33.517962] kasan_check_range+0x100/0x1a8 [ 33.518123] __kasan_check_write+0x20/0x30 [ 33.518272] kasan_atomics_helper+0xff0/0x4858 [ 33.518330] kasan_atomics+0x198/0x2e0 [ 33.518410] kunit_try_run_case+0x170/0x3f0 [ 33.518461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.518530] kthread+0x328/0x630 [ 33.518572] ret_from_fork+0x10/0x20 [ 33.518630] [ 33.518658] Allocated by task 298: [ 33.518692] kasan_save_stack+0x3c/0x68 [ 33.518735] kasan_save_track+0x20/0x40 [ 33.518772] kasan_save_alloc_info+0x40/0x58 [ 33.518820] __kasan_kmalloc+0xd4/0xd8 [ 33.518866] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.518920] kasan_atomics+0xb8/0x2e0 [ 33.519003] kunit_try_run_case+0x170/0x3f0 [ 33.519829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.519940] kthread+0x328/0x630 [ 33.520019] ret_from_fork+0x10/0x20 [ 33.520098] [ 33.520339] The buggy address belongs to the object at fff00000c9c2de00 [ 33.520339] which belongs to the cache kmalloc-64 of size 64 [ 33.520455] The buggy address is located 0 bytes to the right of [ 33.520455] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.520531] [ 33.520595] The buggy address belongs to the physical page: [ 33.520632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.520687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.520738] page_type: f5(slab) [ 33.521329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.521570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.521692] page dumped because: kasan: bad access detected [ 33.521776] [ 33.521859] Memory state around the buggy address: [ 33.521998] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.522049] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.522111] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.522332] ^ [ 33.522730] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.522972] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.523087] ================================================================== [ 33.503702] ================================================================== [ 33.503974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.504058] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.504109] [ 33.504181] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.504293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.504338] Hardware name: linux,dummy-virt (DT) [ 33.504373] Call trace: [ 33.504416] show_stack+0x20/0x38 (C) [ 33.504472] dump_stack_lvl+0x8c/0xd0 [ 33.504563] print_report+0x118/0x5e8 [ 33.504661] kasan_report+0xdc/0x128 [ 33.504718] kasan_check_range+0x100/0x1a8 [ 33.504765] __kasan_check_write+0x20/0x30 [ 33.504813] kasan_atomics_helper+0xf20/0x4858 [ 33.504910] kasan_atomics+0x198/0x2e0 [ 33.504957] kunit_try_run_case+0x170/0x3f0 [ 33.505004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505197] kthread+0x328/0x630 [ 33.505311] ret_from_fork+0x10/0x20 [ 33.505380] [ 33.505403] Allocated by task 298: [ 33.505442] kasan_save_stack+0x3c/0x68 [ 33.505507] kasan_save_track+0x20/0x40 [ 33.505555] kasan_save_alloc_info+0x40/0x58 [ 33.505605] __kasan_kmalloc+0xd4/0xd8 [ 33.505641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.505685] kasan_atomics+0xb8/0x2e0 [ 33.505737] kunit_try_run_case+0x170/0x3f0 [ 33.505778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505835] kthread+0x328/0x630 [ 33.505872] ret_from_fork+0x10/0x20 [ 33.505919] [ 33.505939] The buggy address belongs to the object at fff00000c9c2de00 [ 33.505939] which belongs to the cache kmalloc-64 of size 64 [ 33.505997] The buggy address is located 0 bytes to the right of [ 33.505997] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.506063] [ 33.506087] The buggy address belongs to the physical page: [ 33.506122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.506390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.506478] page_type: f5(slab) [ 33.506519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.506586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.506702] page dumped because: kasan: bad access detected [ 33.506782] [ 33.506830] Memory state around the buggy address: [ 33.506863] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.506918] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.507007] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.507050] ^ [ 33.507241] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.507327] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.507460] ================================================================== [ 33.542164] ================================================================== [ 33.542218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.542271] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.542751] [ 33.542803] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.543065] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.543145] Hardware name: linux,dummy-virt (DT) [ 33.543193] Call trace: [ 33.543353] show_stack+0x20/0x38 (C) [ 33.543417] dump_stack_lvl+0x8c/0xd0 [ 33.543468] print_report+0x118/0x5e8 [ 33.543827] kasan_report+0xdc/0x128 [ 33.543911] kasan_check_range+0x100/0x1a8 [ 33.543964] __kasan_check_write+0x20/0x30 [ 33.544239] kasan_atomics_helper+0x1128/0x4858 [ 33.544354] kasan_atomics+0x198/0x2e0 [ 33.544408] kunit_try_run_case+0x170/0x3f0 [ 33.545002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.545122] kthread+0x328/0x630 [ 33.545179] ret_from_fork+0x10/0x20 [ 33.545229] [ 33.545250] Allocated by task 298: [ 33.545526] kasan_save_stack+0x3c/0x68 [ 33.545612] kasan_save_track+0x20/0x40 [ 33.545677] kasan_save_alloc_info+0x40/0x58 [ 33.545894] __kasan_kmalloc+0xd4/0xd8 [ 33.545962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.546006] kasan_atomics+0xb8/0x2e0 [ 33.546488] kunit_try_run_case+0x170/0x3f0 [ 33.546877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.547184] kthread+0x328/0x630 [ 33.547397] ret_from_fork+0x10/0x20 [ 33.547650] [ 33.547700] The buggy address belongs to the object at fff00000c9c2de00 [ 33.547700] which belongs to the cache kmalloc-64 of size 64 [ 33.548021] The buggy address is located 0 bytes to the right of [ 33.548021] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.548232] [ 33.548452] The buggy address belongs to the physical page: [ 33.548546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.548634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.548731] page_type: f5(slab) [ 33.548785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.548860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.548939] page dumped because: kasan: bad access detected [ 33.549234] [ 33.549461] Memory state around the buggy address: [ 33.549779] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.549847] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.549984] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.550076] ^ [ 33.550459] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.550537] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.550637] ================================================================== [ 33.375221] ================================================================== [ 33.376159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.376250] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.376704] [ 33.377033] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.377956] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.378243] Hardware name: linux,dummy-virt (DT) [ 33.378399] Call trace: [ 33.378564] show_stack+0x20/0x38 (C) [ 33.378626] dump_stack_lvl+0x8c/0xd0 [ 33.378857] print_report+0x118/0x5e8 [ 33.379251] kasan_report+0xdc/0x128 [ 33.379365] kasan_check_range+0x100/0x1a8 [ 33.379971] __kasan_check_write+0x20/0x30 [ 33.380036] kasan_atomics_helper+0xa04/0x4858 [ 33.380098] kasan_atomics+0x198/0x2e0 [ 33.380144] kunit_try_run_case+0x170/0x3f0 [ 33.380610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.380675] kthread+0x328/0x630 [ 33.380719] ret_from_fork+0x10/0x20 [ 33.381162] [ 33.381201] Allocated by task 298: [ 33.381236] kasan_save_stack+0x3c/0x68 [ 33.381504] kasan_save_track+0x20/0x40 [ 33.381545] kasan_save_alloc_info+0x40/0x58 [ 33.381917] __kasan_kmalloc+0xd4/0xd8 [ 33.382173] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.382220] kasan_atomics+0xb8/0x2e0 [ 33.382597] kunit_try_run_case+0x170/0x3f0 [ 33.382649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.382696] kthread+0x328/0x630 [ 33.382733] ret_from_fork+0x10/0x20 [ 33.382770] [ 33.383352] The buggy address belongs to the object at fff00000c9c2de00 [ 33.383352] which belongs to the cache kmalloc-64 of size 64 [ 33.383694] The buggy address is located 0 bytes to the right of [ 33.383694] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.384174] [ 33.385142] The buggy address belongs to the physical page: [ 33.385422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.385558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.385702] page_type: f5(slab) [ 33.385754] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.386066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.386257] page dumped because: kasan: bad access detected [ 33.386330] [ 33.386374] Memory state around the buggy address: [ 33.386658] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.386796] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.386842] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.387163] ^ [ 33.387516] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.387568] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.387884] ================================================================== [ 33.338358] ================================================================== [ 33.338409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.338465] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.338517] [ 33.338550] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.338640] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.338673] Hardware name: linux,dummy-virt (DT) [ 33.338704] Call trace: [ 33.338727] show_stack+0x20/0x38 (C) [ 33.338775] dump_stack_lvl+0x8c/0xd0 [ 33.338825] print_report+0x118/0x5e8 [ 33.338870] kasan_report+0xdc/0x128 [ 33.339325] __asan_report_load4_noabort+0x20/0x30 [ 33.339400] kasan_atomics_helper+0x42d8/0x4858 [ 33.339540] kasan_atomics+0x198/0x2e0 [ 33.340014] kunit_try_run_case+0x170/0x3f0 [ 33.340509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.340585] kthread+0x328/0x630 [ 33.340944] ret_from_fork+0x10/0x20 [ 33.340998] [ 33.341019] Allocated by task 298: [ 33.341051] kasan_save_stack+0x3c/0x68 [ 33.341651] kasan_save_track+0x20/0x40 [ 33.341711] kasan_save_alloc_info+0x40/0x58 [ 33.341755] __kasan_kmalloc+0xd4/0xd8 [ 33.342380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.342793] kasan_atomics+0xb8/0x2e0 [ 33.343037] kunit_try_run_case+0x170/0x3f0 [ 33.343082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.343129] kthread+0x328/0x630 [ 33.343165] ret_from_fork+0x10/0x20 [ 33.343204] [ 33.343226] The buggy address belongs to the object at fff00000c9c2de00 [ 33.343226] which belongs to the cache kmalloc-64 of size 64 [ 33.343288] The buggy address is located 0 bytes to the right of [ 33.343288] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.343355] [ 33.344463] The buggy address belongs to the physical page: [ 33.344506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.344843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.344895] page_type: f5(slab) [ 33.344946] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.345000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.345043] page dumped because: kasan: bad access detected [ 33.345074] [ 33.345624] Memory state around the buggy address: [ 33.345667] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.345717] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.346036] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.346080] ^ [ 33.346119] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.346701] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.346751] ================================================================== [ 33.600776] ================================================================== [ 33.601053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 33.601125] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.602057] [ 33.602144] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.602303] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.602388] Hardware name: linux,dummy-virt (DT) [ 33.602424] Call trace: [ 33.602449] show_stack+0x20/0x38 (C) [ 33.602693] dump_stack_lvl+0x8c/0xd0 [ 33.602811] print_report+0x118/0x5e8 [ 33.603190] kasan_report+0xdc/0x128 [ 33.603373] kasan_check_range+0x100/0x1a8 [ 33.603589] __kasan_check_write+0x20/0x30 [ 33.604005] kasan_atomics_helper+0x1414/0x4858 [ 33.604561] kasan_atomics+0x198/0x2e0 [ 33.604766] kunit_try_run_case+0x170/0x3f0 [ 33.604876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.604945] kthread+0x328/0x630 [ 33.605126] ret_from_fork+0x10/0x20 [ 33.605344] [ 33.605537] Allocated by task 298: [ 33.605628] kasan_save_stack+0x3c/0x68 [ 33.605915] kasan_save_track+0x20/0x40 [ 33.606074] kasan_save_alloc_info+0x40/0x58 [ 33.606410] __kasan_kmalloc+0xd4/0xd8 [ 33.606643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.606838] kasan_atomics+0xb8/0x2e0 [ 33.607224] kunit_try_run_case+0x170/0x3f0 [ 33.607333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.607382] kthread+0x328/0x630 [ 33.607548] ret_from_fork+0x10/0x20 [ 33.608023] [ 33.608076] The buggy address belongs to the object at fff00000c9c2de00 [ 33.608076] which belongs to the cache kmalloc-64 of size 64 [ 33.608421] The buggy address is located 0 bytes to the right of [ 33.608421] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.608540] [ 33.608609] The buggy address belongs to the physical page: [ 33.608867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.608950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.609060] page_type: f5(slab) [ 33.609469] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.609572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.610101] page dumped because: kasan: bad access detected [ 33.610187] [ 33.610365] Memory state around the buggy address: [ 33.610490] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.610729] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.611107] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.611321] ^ [ 33.611435] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.611530] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.611667] ================================================================== [ 33.090069] ================================================================== [ 33.090127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 33.091032] Call trace: [ 33.091849] __kasan_check_read+0x20/0x30 [ 33.093200] kthread+0x328/0x630 [ 33.093736] [ 33.094631] kasan_save_alloc_info+0x40/0x58 [ 33.095325] kunit_try_run_case+0x170/0x3f0 [ 33.096337] [ 33.096876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.098128] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.099982] ================================================================== [ 33.412262] ================================================================== [ 33.412314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.412366] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.412418] [ 33.412449] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.413936] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.413990] Hardware name: linux,dummy-virt (DT) [ 33.414026] Call trace: [ 33.414638] show_stack+0x20/0x38 (C) [ 33.414865] dump_stack_lvl+0x8c/0xd0 [ 33.415218] print_report+0x118/0x5e8 [ 33.415563] kasan_report+0xdc/0x128 [ 33.416056] __asan_report_load4_noabort+0x20/0x30 [ 33.416439] kasan_atomics_helper+0x3dcc/0x4858 [ 33.416498] kasan_atomics+0x198/0x2e0 [ 33.416885] kunit_try_run_case+0x170/0x3f0 [ 33.417252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.417357] kthread+0x328/0x630 [ 33.418861] __kasan_kmalloc+0xd4/0xd8 [ 33.420660] ret_from_fork+0x10/0x20 [ 33.421243] [ 33.422042] page_type: f5(slab) [ 33.423659] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.424985] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.427161] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.427302] dump_stack_lvl+0x8c/0xd0 [ 33.429061] kasan_atomics_helper+0xb70/0x4858 [ 33.429367] kthread+0x328/0x630 [ 33.431029] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.432719] [ 33.433135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.434449] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.434925] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.438817] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.439130] Hardware name: linux,dummy-virt (DT) [ 33.439328] Call trace: [ 33.439490] dump_stack_lvl+0x8c/0xd0 [ 33.439681] kasan_atomics_helper+0x3dbc/0x4858 [ 33.439939] ret_from_fork+0x10/0x20 [ 33.442674] kasan_atomics+0xb8/0x2e0 [ 33.444919] The buggy address is located 0 bytes to the right of [ 33.444919] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.447230] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.447695] ^ [ 33.451609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 33.452066] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.452396] __kasan_check_write+0x20/0x30 [ 33.455984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.456307] __kasan_kmalloc+0xd4/0xd8 [ 33.456463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.457129] page dumped because: kasan: bad access detected [ 33.457292] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.458058] ================================================================== [ 33.557093] ================================================================== [ 33.557147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 33.557501] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.557707] [ 33.557753] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.557847] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.557879] Hardware name: linux,dummy-virt (DT) [ 33.557923] Call trace: [ 33.557947] show_stack+0x20/0x38 (C) [ 33.558166] dump_stack_lvl+0x8c/0xd0 [ 33.558476] print_report+0x118/0x5e8 [ 33.558527] kasan_report+0xdc/0x128 [ 33.558571] kasan_check_range+0x100/0x1a8 [ 33.558618] __kasan_check_write+0x20/0x30 [ 33.559009] kasan_atomics_helper+0x11f8/0x4858 [ 33.559338] kasan_atomics+0x198/0x2e0 [ 33.559469] kunit_try_run_case+0x170/0x3f0 [ 33.559524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.559607] kthread+0x328/0x630 [ 33.560026] ret_from_fork+0x10/0x20 [ 33.560257] [ 33.560298] Allocated by task 298: [ 33.560332] kasan_save_stack+0x3c/0x68 [ 33.560377] kasan_save_track+0x20/0x40 [ 33.560461] kasan_save_alloc_info+0x40/0x58 [ 33.560508] __kasan_kmalloc+0xd4/0xd8 [ 33.560546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.560592] kasan_atomics+0xb8/0x2e0 [ 33.560963] kunit_try_run_case+0x170/0x3f0 [ 33.561046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.561284] kthread+0x328/0x630 [ 33.561475] ret_from_fork+0x10/0x20 [ 33.561537] [ 33.561561] The buggy address belongs to the object at fff00000c9c2de00 [ 33.561561] which belongs to the cache kmalloc-64 of size 64 [ 33.561871] The buggy address is located 0 bytes to the right of [ 33.561871] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.562259] [ 33.562469] The buggy address belongs to the physical page: [ 33.562699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.562789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.563181] page_type: f5(slab) [ 33.563446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.563649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.563745] page dumped because: kasan: bad access detected [ 33.563880] [ 33.563960] Memory state around the buggy address: [ 33.564187] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.564395] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.564722] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.564794] ^ [ 33.564920] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.564987] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.565144] ================================================================== [ 33.616892] ================================================================== [ 33.616962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 33.617016] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.617068] [ 33.617101] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.617190] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.617222] Hardware name: linux,dummy-virt (DT) [ 33.617255] Call trace: [ 33.617279] show_stack+0x20/0x38 (C) [ 33.617327] dump_stack_lvl+0x8c/0xd0 [ 33.617375] print_report+0x118/0x5e8 [ 33.617419] kasan_report+0xdc/0x128 [ 33.617463] kasan_check_range+0x100/0x1a8 [ 33.617510] __kasan_check_write+0x20/0x30 [ 33.617557] kasan_atomics_helper+0x14e4/0x4858 [ 33.617607] kasan_atomics+0x198/0x2e0 [ 33.617655] kunit_try_run_case+0x170/0x3f0 [ 33.617702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.617754] kthread+0x328/0x630 [ 33.617797] ret_from_fork+0x10/0x20 [ 33.617845] [ 33.617867] Allocated by task 298: [ 33.617905] kasan_save_stack+0x3c/0x68 [ 33.617946] kasan_save_track+0x20/0x40 [ 33.617984] kasan_save_alloc_info+0x40/0x58 [ 33.618086] __kasan_kmalloc+0xd4/0xd8 [ 33.618142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.618186] kasan_atomics+0xb8/0x2e0 [ 33.618277] kunit_try_run_case+0x170/0x3f0 [ 33.618323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.618373] kthread+0x328/0x630 [ 33.618489] ret_from_fork+0x10/0x20 [ 33.618532] [ 33.618555] The buggy address belongs to the object at fff00000c9c2de00 [ 33.618555] which belongs to the cache kmalloc-64 of size 64 [ 33.618613] The buggy address is located 0 bytes to the right of [ 33.618613] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.618677] [ 33.618700] The buggy address belongs to the physical page: [ 33.618735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.618789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.619157] page_type: f5(slab) [ 33.619224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.619474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.619560] page dumped because: kasan: bad access detected [ 33.619671] [ 33.619697] Memory state around the buggy address: [ 33.619733] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.619778] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.620067] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.620123] ^ [ 33.620217] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.620439] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.620503] ================================================================== [ 33.469381] ================================================================== [ 33.469451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.469506] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.469574] [ 33.469623] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.469735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.469785] Hardware name: linux,dummy-virt (DT) [ 33.469834] Call trace: [ 33.469858] show_stack+0x20/0x38 (C) [ 33.469917] dump_stack_lvl+0x8c/0xd0 [ 33.469963] print_report+0x118/0x5e8 [ 33.470008] kasan_report+0xdc/0x128 [ 33.470052] kasan_check_range+0x100/0x1a8 [ 33.470119] __kasan_check_write+0x20/0x30 [ 33.470168] kasan_atomics_helper+0xd3c/0x4858 [ 33.470218] kasan_atomics+0x198/0x2e0 [ 33.470497] kunit_try_run_case+0x170/0x3f0 [ 33.470604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.470679] kthread+0x328/0x630 [ 33.470723] ret_from_fork+0x10/0x20 [ 33.470782] [ 33.470821] Allocated by task 298: [ 33.470870] kasan_save_stack+0x3c/0x68 [ 33.470922] kasan_save_track+0x20/0x40 [ 33.470977] kasan_save_alloc_info+0x40/0x58 [ 33.471037] __kasan_kmalloc+0xd4/0xd8 [ 33.471072] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.471115] kasan_atomics+0xb8/0x2e0 [ 33.471184] kunit_try_run_case+0x170/0x3f0 [ 33.471241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.471308] kthread+0x328/0x630 [ 33.471363] ret_from_fork+0x10/0x20 [ 33.471431] [ 33.471459] The buggy address belongs to the object at fff00000c9c2de00 [ 33.471459] which belongs to the cache kmalloc-64 of size 64 [ 33.471519] The buggy address is located 0 bytes to the right of [ 33.471519] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.471585] [ 33.471625] The buggy address belongs to the physical page: [ 33.471862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.471942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.471993] page_type: f5(slab) [ 33.472030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.472098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.472140] page dumped because: kasan: bad access detected [ 33.472213] [ 33.472253] Memory state around the buggy address: [ 33.472288] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.472365] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.472409] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.472462] ^ [ 33.472498] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.472571] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.472657] ================================================================== [ 33.400626] ================================================================== [ 33.400681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.400734] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.400787] [ 33.400818] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.402424] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.402769] Hardware name: linux,dummy-virt (DT) [ 33.402810] Call trace: [ 33.403104] show_stack+0x20/0x38 (C) [ 33.403163] dump_stack_lvl+0x8c/0xd0 [ 33.403216] print_report+0x118/0x5e8 [ 33.403263] kasan_report+0xdc/0x128 [ 33.403309] kasan_check_range+0x100/0x1a8 [ 33.403357] __kasan_check_write+0x20/0x30 [ 33.404089] kasan_atomics_helper+0xad4/0x4858 [ 33.404577] kasan_atomics+0x198/0x2e0 [ 33.404703] kunit_try_run_case+0x170/0x3f0 [ 33.404753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.405202] kthread+0x328/0x630 [ 33.405478] ret_from_fork+0x10/0x20 [ 33.405580] [ 33.405601] Allocated by task 298: [ 33.406084] kasan_save_stack+0x3c/0x68 [ 33.406135] kasan_save_track+0x20/0x40 [ 33.406182] kasan_save_alloc_info+0x40/0x58 [ 33.406223] __kasan_kmalloc+0xd4/0xd8 [ 33.406259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.406303] kasan_atomics+0xb8/0x2e0 [ 33.407105] kunit_try_run_case+0x170/0x3f0 [ 33.407388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.407773] kthread+0x328/0x630 [ 33.407985] ret_from_fork+0x10/0x20 [ 33.408110] [ 33.408133] The buggy address belongs to the object at fff00000c9c2de00 [ 33.408133] which belongs to the cache kmalloc-64 of size 64 [ 33.408724] The buggy address is located 0 bytes to the right of [ 33.408724] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.408930] [ 33.409042] The buggy address belongs to the physical page: [ 33.409081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.409415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.409470] page_type: f5(slab) [ 33.409612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.409828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.409873] page dumped because: kasan: bad access detected [ 33.410545] [ 33.410936] Memory state around the buggy address: [ 33.411060] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.411330] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.411552] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.411719] ^ [ 33.411789] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.411835] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.411877] ================================================================== [ 33.466263] ================================================================== [ 33.466314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.466373] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.466425] [ 33.466456] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.466545] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.466577] Hardware name: linux,dummy-virt (DT) [ 33.466610] Call trace: [ 33.466633] show_stack+0x20/0x38 (C) [ 33.466684] dump_stack_lvl+0x8c/0xd0 [ 33.466732] print_report+0x118/0x5e8 [ 33.466778] kasan_report+0xdc/0x128 [ 33.466823] __asan_report_load4_noabort+0x20/0x30 [ 33.466873] kasan_atomics_helper+0x3dd8/0x4858 [ 33.466955] kasan_atomics+0x198/0x2e0 [ 33.467016] kunit_try_run_case+0x170/0x3f0 [ 33.467073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.467129] kthread+0x328/0x630 [ 33.467171] ret_from_fork+0x10/0x20 [ 33.467220] [ 33.467239] Allocated by task 298: [ 33.467269] kasan_save_stack+0x3c/0x68 [ 33.467315] kasan_save_track+0x20/0x40 [ 33.467365] kasan_save_alloc_info+0x40/0x58 [ 33.467413] __kasan_kmalloc+0xd4/0xd8 [ 33.467449] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.467492] kasan_atomics+0xb8/0x2e0 [ 33.467529] kunit_try_run_case+0x170/0x3f0 [ 33.467567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.467622] kthread+0x328/0x630 [ 33.467658] ret_from_fork+0x10/0x20 [ 33.467693] [ 33.467713] The buggy address belongs to the object at fff00000c9c2de00 [ 33.467713] which belongs to the cache kmalloc-64 of size 64 [ 33.467780] The buggy address is located 0 bytes to the right of [ 33.467780] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.467845] [ 33.467875] The buggy address belongs to the physical page: [ 33.467920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.467974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.468022] page_type: f5(slab) [ 33.468060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.468111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.468153] page dumped because: kasan: bad access detected [ 33.468185] [ 33.468204] Memory state around the buggy address: [ 33.468237] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.468282] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.468662] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.468711] ^ [ 33.468749] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.468822] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.468888] ================================================================== [ 33.492596] ================================================================== [ 33.492797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.492886] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.493012] [ 33.493080] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.493213] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.493282] Hardware name: linux,dummy-virt (DT) [ 33.493354] Call trace: [ 33.493419] show_stack+0x20/0x38 (C) [ 33.493505] dump_stack_lvl+0x8c/0xd0 [ 33.493552] print_report+0x118/0x5e8 [ 33.493842] kasan_report+0xdc/0x128 [ 33.493934] __asan_report_store8_noabort+0x20/0x30 [ 33.494089] kasan_atomics_helper+0x3e5c/0x4858 [ 33.494189] kasan_atomics+0x198/0x2e0 [ 33.494285] kunit_try_run_case+0x170/0x3f0 [ 33.494414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.494720] kthread+0x328/0x630 [ 33.494884] ret_from_fork+0x10/0x20 [ 33.495013] [ 33.495053] Allocated by task 298: [ 33.495084] kasan_save_stack+0x3c/0x68 [ 33.495136] kasan_save_track+0x20/0x40 [ 33.495353] kasan_save_alloc_info+0x40/0x58 [ 33.495509] __kasan_kmalloc+0xd4/0xd8 [ 33.495619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.495706] kasan_atomics+0xb8/0x2e0 [ 33.496016] kunit_try_run_case+0x170/0x3f0 [ 33.496111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.496200] kthread+0x328/0x630 [ 33.496269] ret_from_fork+0x10/0x20 [ 33.496307] [ 33.496330] The buggy address belongs to the object at fff00000c9c2de00 [ 33.496330] which belongs to the cache kmalloc-64 of size 64 [ 33.496538] The buggy address is located 0 bytes to the right of [ 33.496538] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.496783] [ 33.496823] The buggy address belongs to the physical page: [ 33.496905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.497161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.497368] page_type: f5(slab) [ 33.497459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.497591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.497678] page dumped because: kasan: bad access detected [ 33.497722] [ 33.497768] Memory state around the buggy address: [ 33.497809] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.497873] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.497932] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.497972] ^ [ 33.498368] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.498452] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.498493] ================================================================== [ 33.551623] ================================================================== [ 33.551731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 33.551792] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.551933] [ 33.551990] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.552221] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.552255] Hardware name: linux,dummy-virt (DT) [ 33.552289] Call trace: [ 33.552349] show_stack+0x20/0x38 (C) [ 33.552404] dump_stack_lvl+0x8c/0xd0 [ 33.552477] print_report+0x118/0x5e8 [ 33.552526] kasan_report+0xdc/0x128 [ 33.552570] kasan_check_range+0x100/0x1a8 [ 33.552617] __kasan_check_write+0x20/0x30 [ 33.552665] kasan_atomics_helper+0x1190/0x4858 [ 33.552719] kasan_atomics+0x198/0x2e0 [ 33.552778] kunit_try_run_case+0x170/0x3f0 [ 33.552828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.552887] kthread+0x328/0x630 [ 33.552950] ret_from_fork+0x10/0x20 [ 33.553000] [ 33.553021] Allocated by task 298: [ 33.553052] kasan_save_stack+0x3c/0x68 [ 33.553102] kasan_save_track+0x20/0x40 [ 33.553141] kasan_save_alloc_info+0x40/0x58 [ 33.553181] __kasan_kmalloc+0xd4/0xd8 [ 33.553217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.553260] kasan_atomics+0xb8/0x2e0 [ 33.553300] kunit_try_run_case+0x170/0x3f0 [ 33.553339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.553383] kthread+0x328/0x630 [ 33.553419] ret_from_fork+0x10/0x20 [ 33.553457] [ 33.553478] The buggy address belongs to the object at fff00000c9c2de00 [ 33.553478] which belongs to the cache kmalloc-64 of size 64 [ 33.553547] The buggy address is located 0 bytes to the right of [ 33.553547] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.553611] [ 33.553634] The buggy address belongs to the physical page: [ 33.553686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.553750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.553809] page_type: f5(slab) [ 33.553850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.554434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.554923] page dumped because: kasan: bad access detected [ 33.554998] [ 33.555060] Memory state around the buggy address: [ 33.555122] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.555210] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.555297] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.555517] ^ [ 33.555641] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.556204] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.556311] ================================================================== [ 33.612431] ================================================================== [ 33.612639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 33.612724] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.612849] [ 33.612952] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.613046] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.613274] Hardware name: linux,dummy-virt (DT) [ 33.613330] Call trace: [ 33.613365] show_stack+0x20/0x38 (C) [ 33.613417] dump_stack_lvl+0x8c/0xd0 [ 33.613510] print_report+0x118/0x5e8 [ 33.613598] kasan_report+0xdc/0x128 [ 33.613844] kasan_check_range+0x100/0x1a8 [ 33.613938] __kasan_check_write+0x20/0x30 [ 33.613997] kasan_atomics_helper+0x147c/0x4858 [ 33.614049] kasan_atomics+0x198/0x2e0 [ 33.614097] kunit_try_run_case+0x170/0x3f0 [ 33.614145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.614244] kthread+0x328/0x630 [ 33.614303] ret_from_fork+0x10/0x20 [ 33.614364] [ 33.614406] Allocated by task 298: [ 33.614458] kasan_save_stack+0x3c/0x68 [ 33.614501] kasan_save_track+0x20/0x40 [ 33.614548] kasan_save_alloc_info+0x40/0x58 [ 33.614590] __kasan_kmalloc+0xd4/0xd8 [ 33.614627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.614670] kasan_atomics+0xb8/0x2e0 [ 33.614710] kunit_try_run_case+0x170/0x3f0 [ 33.614758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.614812] kthread+0x328/0x630 [ 33.614848] ret_from_fork+0x10/0x20 [ 33.614906] [ 33.614929] The buggy address belongs to the object at fff00000c9c2de00 [ 33.614929] which belongs to the cache kmalloc-64 of size 64 [ 33.614997] The buggy address is located 0 bytes to the right of [ 33.614997] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.615062] [ 33.615097] The buggy address belongs to the physical page: [ 33.615134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.615189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.615239] page_type: f5(slab) [ 33.615277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.615330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.615384] page dumped because: kasan: bad access detected [ 33.615426] [ 33.615457] Memory state around the buggy address: [ 33.615490] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.615540] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.615590] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.615640] ^ [ 33.615676] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.615719] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.615761] ================================================================== [ 33.639803] ================================================================== [ 33.640411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 33.640485] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.641128] [ 33.641651] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.641857] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.642173] Hardware name: linux,dummy-virt (DT) [ 33.642639] Call trace: [ 33.642854] show_stack+0x20/0x38 (C) [ 33.642972] dump_stack_lvl+0x8c/0xd0 [ 33.643295] print_report+0x118/0x5e8 [ 33.643355] kasan_report+0xdc/0x128 [ 33.643401] kasan_check_range+0x100/0x1a8 [ 33.643449] __kasan_check_write+0x20/0x30 [ 33.644094] kasan_atomics_helper+0x1644/0x4858 [ 33.644426] kasan_atomics+0x198/0x2e0 [ 33.644490] kunit_try_run_case+0x170/0x3f0 [ 33.644540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.645248] kthread+0x328/0x630 [ 33.645582] ret_from_fork+0x10/0x20 [ 33.645777] [ 33.645927] Allocated by task 298: [ 33.645963] kasan_save_stack+0x3c/0x68 [ 33.646125] kasan_save_track+0x20/0x40 [ 33.646173] kasan_save_alloc_info+0x40/0x58 [ 33.646214] __kasan_kmalloc+0xd4/0xd8 [ 33.646250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.646294] kasan_atomics+0xb8/0x2e0 [ 33.646335] kunit_try_run_case+0x170/0x3f0 [ 33.646577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.646780] kthread+0x328/0x630 [ 33.646828] ret_from_fork+0x10/0x20 [ 33.646929] [ 33.646952] The buggy address belongs to the object at fff00000c9c2de00 [ 33.646952] which belongs to the cache kmalloc-64 of size 64 [ 33.647105] The buggy address is located 0 bytes to the right of [ 33.647105] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.647427] [ 33.647600] The buggy address belongs to the physical page: [ 33.647641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.648040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.648346] page_type: f5(slab) [ 33.648714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.648806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.648857] page dumped because: kasan: bad access detected [ 33.648890] [ 33.649093] Memory state around the buggy address: [ 33.649136] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.649196] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.649308] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.649722] ^ [ 33.649781] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.649926] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.650240] ================================================================== [ 33.672845] ================================================================== [ 33.672948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 33.673002] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.673081] [ 33.673112] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.673333] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.673400] Hardware name: linux,dummy-virt (DT) [ 33.673445] Call trace: [ 33.673470] show_stack+0x20/0x38 (C) [ 33.673565] dump_stack_lvl+0x8c/0xd0 [ 33.673646] print_report+0x118/0x5e8 [ 33.673954] kasan_report+0xdc/0x128 [ 33.674027] __asan_report_load8_noabort+0x20/0x30 [ 33.674080] kasan_atomics_helper+0x3e10/0x4858 [ 33.674170] kasan_atomics+0x198/0x2e0 [ 33.674223] kunit_try_run_case+0x170/0x3f0 [ 33.674272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.674326] kthread+0x328/0x630 [ 33.674378] ret_from_fork+0x10/0x20 [ 33.674428] [ 33.674448] Allocated by task 298: [ 33.674478] kasan_save_stack+0x3c/0x68 [ 33.674704] kasan_save_track+0x20/0x40 [ 33.674993] kasan_save_alloc_info+0x40/0x58 [ 33.675364] __kasan_kmalloc+0xd4/0xd8 [ 33.675410] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.675455] kasan_atomics+0xb8/0x2e0 [ 33.675494] kunit_try_run_case+0x170/0x3f0 [ 33.675937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.676081] kthread+0x328/0x630 [ 33.676119] ret_from_fork+0x10/0x20 [ 33.676158] [ 33.676923] The buggy address belongs to the object at fff00000c9c2de00 [ 33.676923] which belongs to the cache kmalloc-64 of size 64 [ 33.677055] The buggy address is located 0 bytes to the right of [ 33.677055] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.677360] [ 33.677387] The buggy address belongs to the physical page: [ 33.677422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.677478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.677528] page_type: f5(slab) [ 33.677766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.678194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.678272] page dumped because: kasan: bad access detected [ 33.678306] [ 33.678334] Memory state around the buggy address: [ 33.678373] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.678420] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.679178] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.679230] ^ [ 33.679682] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.680047] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.680286] ================================================================== [ 33.498978] ================================================================== [ 33.499121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.499216] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.499270] [ 33.499325] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.499436] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.499469] Hardware name: linux,dummy-virt (DT) [ 33.499549] Call trace: [ 33.499575] show_stack+0x20/0x38 (C) [ 33.499643] dump_stack_lvl+0x8c/0xd0 [ 33.499716] print_report+0x118/0x5e8 [ 33.499771] kasan_report+0xdc/0x128 [ 33.499819] kasan_check_range+0x100/0x1a8 [ 33.499868] __kasan_check_write+0x20/0x30 [ 33.499928] kasan_atomics_helper+0xeb8/0x4858 [ 33.500218] kasan_atomics+0x198/0x2e0 [ 33.500309] kunit_try_run_case+0x170/0x3f0 [ 33.500363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.500418] kthread+0x328/0x630 [ 33.500490] ret_from_fork+0x10/0x20 [ 33.500540] [ 33.500563] Allocated by task 298: [ 33.500593] kasan_save_stack+0x3c/0x68 [ 33.500634] kasan_save_track+0x20/0x40 [ 33.500705] kasan_save_alloc_info+0x40/0x58 [ 33.500747] __kasan_kmalloc+0xd4/0xd8 [ 33.500943] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.501066] kasan_atomics+0xb8/0x2e0 [ 33.501154] kunit_try_run_case+0x170/0x3f0 [ 33.501216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.501261] kthread+0x328/0x630 [ 33.501447] ret_from_fork+0x10/0x20 [ 33.501487] [ 33.501516] The buggy address belongs to the object at fff00000c9c2de00 [ 33.501516] which belongs to the cache kmalloc-64 of size 64 [ 33.501720] The buggy address is located 0 bytes to the right of [ 33.501720] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.501833] [ 33.501935] The buggy address belongs to the physical page: [ 33.501999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.502204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.502257] page_type: f5(slab) [ 33.502295] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.502445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.502535] page dumped because: kasan: bad access detected [ 33.502568] [ 33.502599] Memory state around the buggy address: [ 33.502632] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.502677] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.502738] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.502778] ^ [ 33.502813] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.502857] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.503067] ================================================================== [ 33.594122] ================================================================== [ 33.594371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 33.594457] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.594512] [ 33.595067] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.595310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.595548] Hardware name: linux,dummy-virt (DT) [ 33.595594] Call trace: [ 33.595635] show_stack+0x20/0x38 (C) [ 33.595719] dump_stack_lvl+0x8c/0xd0 [ 33.595804] print_report+0x118/0x5e8 [ 33.595861] kasan_report+0xdc/0x128 [ 33.595949] __asan_report_load8_noabort+0x20/0x30 [ 33.596027] kasan_atomics_helper+0x3f04/0x4858 [ 33.596129] kasan_atomics+0x198/0x2e0 [ 33.596179] kunit_try_run_case+0x170/0x3f0 [ 33.596233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.596286] kthread+0x328/0x630 [ 33.596330] ret_from_fork+0x10/0x20 [ 33.596534] [ 33.596933] Allocated by task 298: [ 33.597005] kasan_save_stack+0x3c/0x68 [ 33.597106] kasan_save_track+0x20/0x40 [ 33.597198] kasan_save_alloc_info+0x40/0x58 [ 33.597287] __kasan_kmalloc+0xd4/0xd8 [ 33.597325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.597394] kasan_atomics+0xb8/0x2e0 [ 33.597729] kunit_try_run_case+0x170/0x3f0 [ 33.597809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.598132] kthread+0x328/0x630 [ 33.598305] ret_from_fork+0x10/0x20 [ 33.598360] [ 33.598392] The buggy address belongs to the object at fff00000c9c2de00 [ 33.598392] which belongs to the cache kmalloc-64 of size 64 [ 33.598454] The buggy address is located 0 bytes to the right of [ 33.598454] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.598532] [ 33.598569] The buggy address belongs to the physical page: [ 33.598607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.598676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.598745] page_type: f5(slab) [ 33.598785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.598844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.598913] page dumped because: kasan: bad access detected [ 33.598946] [ 33.598966] Memory state around the buggy address: [ 33.599011] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.599057] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.599101] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.599143] ^ [ 33.599204] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.599254] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.599303] ================================================================== [ 33.208017] ================================================================== [ 33.208271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 33.209064] [ 33.209646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.210142] Call trace: [ 33.211566] __kasan_check_write+0x20/0x30 [ 33.212117] kasan_atomics_helper+0x5b4/0x4858 [ 33.212523] kasan_atomics+0x198/0x2e0 [ 33.212751] kthread+0x328/0x630 [ 33.213562] ret_from_fork+0x10/0x20 [ 33.214188] [ 33.214269] Allocated by task 298: [ 33.216564] [ 33.217121] [ 33.218353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.220650] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.221426] ================================================================== [ 33.583795] ================================================================== [ 33.583867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 33.584230] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.584369] [ 33.584405] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.584499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.584678] Hardware name: linux,dummy-virt (DT) [ 33.584718] Call trace: [ 33.585110] show_stack+0x20/0x38 (C) [ 33.585651] dump_stack_lvl+0x8c/0xd0 [ 33.585733] print_report+0x118/0x5e8 [ 33.585951] kasan_report+0xdc/0x128 [ 33.586472] kasan_check_range+0x100/0x1a8 [ 33.586563] __kasan_check_write+0x20/0x30 [ 33.587355] kasan_atomics_helper+0x1384/0x4858 [ 33.587554] kasan_atomics+0x198/0x2e0 [ 33.587638] kunit_try_run_case+0x170/0x3f0 [ 33.588005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.588348] kthread+0x328/0x630 [ 33.588506] ret_from_fork+0x10/0x20 [ 33.588666] [ 33.588715] Allocated by task 298: [ 33.588767] kasan_save_stack+0x3c/0x68 [ 33.588819] kasan_save_track+0x20/0x40 [ 33.588858] kasan_save_alloc_info+0x40/0x58 [ 33.588908] __kasan_kmalloc+0xd4/0xd8 [ 33.589219] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.589366] kasan_atomics+0xb8/0x2e0 [ 33.589534] kunit_try_run_case+0x170/0x3f0 [ 33.589576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.589623] kthread+0x328/0x630 [ 33.589807] ret_from_fork+0x10/0x20 [ 33.590117] [ 33.590379] The buggy address belongs to the object at fff00000c9c2de00 [ 33.590379] which belongs to the cache kmalloc-64 of size 64 [ 33.590713] The buggy address is located 0 bytes to the right of [ 33.590713] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.590890] [ 33.590965] The buggy address belongs to the physical page: [ 33.591414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.591574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.591750] page_type: f5(slab) [ 33.591832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.592065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.592163] page dumped because: kasan: bad access detected [ 33.592236] [ 33.592416] Memory state around the buggy address: [ 33.592617] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.592677] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.592722] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.592807] ^ [ 33.592855] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.592918] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.592969] ================================================================== [ 33.574476] ================================================================== [ 33.574669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 33.574872] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.574946] [ 33.574981] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.575180] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.575217] Hardware name: linux,dummy-virt (DT) [ 33.575251] Call trace: [ 33.575313] show_stack+0x20/0x38 (C) [ 33.575941] dump_stack_lvl+0x8c/0xd0 [ 33.576016] print_report+0x118/0x5e8 [ 33.576086] kasan_report+0xdc/0x128 [ 33.576134] kasan_check_range+0x100/0x1a8 [ 33.576181] __kasan_check_write+0x20/0x30 [ 33.576518] kasan_atomics_helper+0x12d8/0x4858 [ 33.576960] kasan_atomics+0x198/0x2e0 [ 33.577075] kunit_try_run_case+0x170/0x3f0 [ 33.577126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.577481] kthread+0x328/0x630 [ 33.577650] ret_from_fork+0x10/0x20 [ 33.577925] [ 33.578004] Allocated by task 298: [ 33.578237] kasan_save_stack+0x3c/0x68 [ 33.578558] kasan_save_track+0x20/0x40 [ 33.578866] kasan_save_alloc_info+0x40/0x58 [ 33.579093] __kasan_kmalloc+0xd4/0xd8 [ 33.579166] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.579322] kasan_atomics+0xb8/0x2e0 [ 33.579508] kunit_try_run_case+0x170/0x3f0 [ 33.579864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.580058] kthread+0x328/0x630 [ 33.580267] ret_from_fork+0x10/0x20 [ 33.580441] [ 33.580557] The buggy address belongs to the object at fff00000c9c2de00 [ 33.580557] which belongs to the cache kmalloc-64 of size 64 [ 33.580919] The buggy address is located 0 bytes to the right of [ 33.580919] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.581008] [ 33.581031] The buggy address belongs to the physical page: [ 33.581370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.581779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.581887] page_type: f5(slab) [ 33.582012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.582135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.582182] page dumped because: kasan: bad access detected [ 33.582231] [ 33.582257] Memory state around the buggy address: [ 33.582292] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.582343] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.582396] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.582442] ^ [ 33.582485] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.582529] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.582575] ================================================================== [ 33.627119] ================================================================== [ 33.627262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 33.627490] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.627573] [ 33.627617] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.627708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.627818] Hardware name: linux,dummy-virt (DT) [ 33.627875] Call trace: [ 33.628186] show_stack+0x20/0x38 (C) [ 33.628256] dump_stack_lvl+0x8c/0xd0 [ 33.628307] print_report+0x118/0x5e8 [ 33.628361] kasan_report+0xdc/0x128 [ 33.628406] kasan_check_range+0x100/0x1a8 [ 33.628625] __kasan_check_write+0x20/0x30 [ 33.628819] kasan_atomics_helper+0x15b4/0x4858 [ 33.628918] kasan_atomics+0x198/0x2e0 [ 33.629201] kunit_try_run_case+0x170/0x3f0 [ 33.629306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.629519] kthread+0x328/0x630 [ 33.629635] ret_from_fork+0x10/0x20 [ 33.629693] [ 33.629716] Allocated by task 298: [ 33.629807] kasan_save_stack+0x3c/0x68 [ 33.629976] kasan_save_track+0x20/0x40 [ 33.630073] kasan_save_alloc_info+0x40/0x58 [ 33.630297] __kasan_kmalloc+0xd4/0xd8 [ 33.630435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.630511] kasan_atomics+0xb8/0x2e0 [ 33.630614] kunit_try_run_case+0x170/0x3f0 [ 33.630654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.630851] kthread+0x328/0x630 [ 33.631003] ret_from_fork+0x10/0x20 [ 33.631082] [ 33.631286] The buggy address belongs to the object at fff00000c9c2de00 [ 33.631286] which belongs to the cache kmalloc-64 of size 64 [ 33.631414] The buggy address is located 0 bytes to the right of [ 33.631414] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.631520] [ 33.631584] The buggy address belongs to the physical page: [ 33.631622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.631711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.631883] page_type: f5(slab) [ 33.632037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.632212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.632415] page dumped because: kasan: bad access detected [ 33.632482] [ 33.632569] Memory state around the buggy address: [ 33.632626] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.632706] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.632791] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.632860] ^ [ 33.633062] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633121] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633161] ================================================================== [ 33.347955] ================================================================== [ 33.348868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 33.348969] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.349319] [ 33.349354] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.350038] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.350074] Hardware name: linux,dummy-virt (DT) [ 33.350383] Call trace: [ 33.350496] show_stack+0x20/0x38 (C) [ 33.350686] dump_stack_lvl+0x8c/0xd0 [ 33.350990] print_report+0x118/0x5e8 [ 33.351348] kasan_report+0xdc/0x128 [ 33.351690] kasan_check_range+0x100/0x1a8 [ 33.351812] __kasan_check_write+0x20/0x30 [ 33.352245] kasan_atomics_helper+0x934/0x4858 [ 33.352616] kasan_atomics+0x198/0x2e0 [ 33.352671] kunit_try_run_case+0x170/0x3f0 [ 33.353017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.353148] kthread+0x328/0x630 [ 33.353400] ret_from_fork+0x10/0x20 [ 33.353594] [ 33.353981] Allocated by task 298: [ 33.354141] kasan_save_stack+0x3c/0x68 [ 33.354263] kasan_save_track+0x20/0x40 [ 33.356500] The buggy address belongs to the object at fff00000c9c2de00 [ 33.356500] which belongs to the cache kmalloc-64 of size 64 [ 33.356593] The buggy address is located 0 bytes to the right of [ 33.356593] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.356833] [ 33.357342] The buggy address belongs to the physical page: [ 33.357564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.357628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.357843] page_type: f5(slab) [ 33.358201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.358270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.358315] page dumped because: kasan: bad access detected [ 33.358352] [ 33.358873] Memory state around the buggy address: [ 33.359564] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.359808] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.360159] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.360248] ^ [ 33.360289] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.360333] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.360777] ================================================================== [ 33.227432] ================================================================== [ 33.227488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 33.230122] Call trace: [ 33.231799] print_report+0x118/0x5e8 [ 33.232477] kasan_atomics+0x198/0x2e0 [ 33.233415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.233471] kthread+0x328/0x630 [ 33.234340] ret_from_fork+0x10/0x20 [ 33.235442] kasan_save_stack+0x3c/0x68 [ 33.236349] kasan_save_alloc_info+0x40/0x58 [ 33.237190] kasan_atomics+0xb8/0x2e0 [ 33.237832] kthread+0x328/0x630 [ 33.237994] ret_from_fork+0x10/0x20 [ 33.238770] The buggy address is located 0 bytes to the right of [ 33.238770] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.241289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.242745] ^ [ 33.248041] ================================================================== [ 33.621195] ================================================================== [ 33.621389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 33.621452] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.621505] [ 33.621537] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.621627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.621750] Hardware name: linux,dummy-virt (DT) [ 33.621817] Call trace: [ 33.621844] show_stack+0x20/0x38 (C) [ 33.622074] dump_stack_lvl+0x8c/0xd0 [ 33.622259] print_report+0x118/0x5e8 [ 33.622312] kasan_report+0xdc/0x128 [ 33.622362] kasan_check_range+0x100/0x1a8 [ 33.622417] __kasan_check_write+0x20/0x30 [ 33.622533] kasan_atomics_helper+0x154c/0x4858 [ 33.622589] kasan_atomics+0x198/0x2e0 [ 33.622713] kunit_try_run_case+0x170/0x3f0 [ 33.622766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.622889] kthread+0x328/0x630 [ 33.622966] ret_from_fork+0x10/0x20 [ 33.623096] [ 33.623121] Allocated by task 298: [ 33.623187] kasan_save_stack+0x3c/0x68 [ 33.623233] kasan_save_track+0x20/0x40 [ 33.623270] kasan_save_alloc_info+0x40/0x58 [ 33.623311] __kasan_kmalloc+0xd4/0xd8 [ 33.623655] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.623716] kasan_atomics+0xb8/0x2e0 [ 33.623774] kunit_try_run_case+0x170/0x3f0 [ 33.624062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624213] kthread+0x328/0x630 [ 33.624283] ret_from_fork+0x10/0x20 [ 33.624323] [ 33.624346] The buggy address belongs to the object at fff00000c9c2de00 [ 33.624346] which belongs to the cache kmalloc-64 of size 64 [ 33.624552] The buggy address is located 0 bytes to the right of [ 33.624552] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.624630] [ 33.624747] The buggy address belongs to the physical page: [ 33.624803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.625139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.625212] page_type: f5(slab) [ 33.625353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.625490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.625589] page dumped because: kasan: bad access detected [ 33.625677] [ 33.625893] Memory state around the buggy address: [ 33.625947] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.626107] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.626192] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.626368] ^ [ 33.626457] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.626605] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.626646] ================================================================== [ 33.482256] ================================================================== [ 33.482414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.482466] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.482555] [ 33.482593] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.482702] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.482740] Hardware name: linux,dummy-virt (DT) [ 33.482788] Call trace: [ 33.482829] show_stack+0x20/0x38 (C) [ 33.482889] dump_stack_lvl+0x8c/0xd0 [ 33.482967] print_report+0x118/0x5e8 [ 33.483035] kasan_report+0xdc/0x128 [ 33.483079] __asan_report_load8_noabort+0x20/0x30 [ 33.483151] kasan_atomics_helper+0x3f58/0x4858 [ 33.483204] kasan_atomics+0x198/0x2e0 [ 33.483253] kunit_try_run_case+0x170/0x3f0 [ 33.483308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.483607] kthread+0x328/0x630 [ 33.483669] ret_from_fork+0x10/0x20 [ 33.483738] [ 33.483764] Allocated by task 298: [ 33.483802] kasan_save_stack+0x3c/0x68 [ 33.483920] kasan_save_track+0x20/0x40 [ 33.483981] kasan_save_alloc_info+0x40/0x58 [ 33.484022] __kasan_kmalloc+0xd4/0xd8 [ 33.484148] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.484263] kasan_atomics+0xb8/0x2e0 [ 33.484331] kunit_try_run_case+0x170/0x3f0 [ 33.484386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.484433] kthread+0x328/0x630 [ 33.484466] ret_from_fork+0x10/0x20 [ 33.484620] [ 33.484852] The buggy address belongs to the object at fff00000c9c2de00 [ 33.484852] which belongs to the cache kmalloc-64 of size 64 [ 33.484954] The buggy address is located 0 bytes to the right of [ 33.484954] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.485065] [ 33.485263] The buggy address belongs to the physical page: [ 33.485436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.485693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.485836] page_type: f5(slab) [ 33.485923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.486010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.486107] page dumped because: kasan: bad access detected [ 33.486195] [ 33.486253] Memory state around the buggy address: [ 33.486317] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.486386] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.486562] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.486739] ^ [ 33.486822] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.486868] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.486917] ==================================================================
[ 28.887329] ================================================================== [ 28.887758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 28.888155] Read of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.888536] [ 28.888662] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.888726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.888740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.888775] Call Trace: [ 28.888797] <TASK> [ 28.888820] dump_stack_lvl+0x73/0xb0 [ 28.888852] print_report+0xd1/0x640 [ 28.888885] ? __virt_addr_valid+0x1db/0x2d0 [ 28.888912] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.888958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.888986] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.889008] kasan_report+0x141/0x180 [ 28.889033] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.889061] __asan_report_load8_noabort+0x18/0x20 [ 28.889094] kasan_atomics_helper+0x4f30/0x5450 [ 28.889118] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.889141] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.889183] ? kasan_atomics+0x152/0x310 [ 28.889210] kasan_atomics+0x1dc/0x310 [ 28.889234] ? __pfx_kasan_atomics+0x10/0x10 [ 28.889268] ? __pfx_read_tsc+0x10/0x10 [ 28.889293] ? ktime_get_ts64+0x86/0x230 [ 28.889320] kunit_try_run_case+0x1a5/0x480 [ 28.889414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.889444] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.889472] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.889499] ? __kthread_parkme+0x82/0x180 [ 28.889521] ? preempt_count_sub+0x50/0x80 [ 28.889547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.889572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.889598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.889623] kthread+0x337/0x6f0 [ 28.889656] ? trace_preempt_on+0x20/0xc0 [ 28.889682] ? __pfx_kthread+0x10/0x10 [ 28.889705] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.889741] ? calculate_sigpending+0x7b/0xa0 [ 28.889767] ? __pfx_kthread+0x10/0x10 [ 28.889791] ret_from_fork+0x116/0x1d0 [ 28.889812] ? __pfx_kthread+0x10/0x10 [ 28.889834] ret_from_fork_asm+0x1a/0x30 [ 28.889867] </TASK> [ 28.889880] [ 28.898193] Allocated by task 314: [ 28.898454] kasan_save_stack+0x45/0x70 [ 28.898684] kasan_save_track+0x18/0x40 [ 28.898878] kasan_save_alloc_info+0x3b/0x50 [ 28.899085] __kasan_kmalloc+0xb7/0xc0 [ 28.899283] __kmalloc_cache_noprof+0x189/0x420 [ 28.899564] kasan_atomics+0x95/0x310 [ 28.899746] kunit_try_run_case+0x1a5/0x480 [ 28.899982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.900227] kthread+0x337/0x6f0 [ 28.900491] ret_from_fork+0x116/0x1d0 [ 28.900654] ret_from_fork_asm+0x1a/0x30 [ 28.900845] [ 28.900952] The buggy address belongs to the object at ffff888106118e00 [ 28.900952] which belongs to the cache kmalloc-64 of size 64 [ 28.901661] The buggy address is located 0 bytes to the right of [ 28.901661] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.902226] [ 28.902325] The buggy address belongs to the physical page: [ 28.902657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.903049] flags: 0x200000000000000(node=0|zone=2) [ 28.903324] page_type: f5(slab) [ 28.903565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.903900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.904152] page dumped because: kasan: bad access detected [ 28.904411] [ 28.904502] Memory state around the buggy address: [ 28.904723] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.905130] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.905496] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.905797] ^ [ 28.905978] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.906229] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.906889] ================================================================== [ 29.008464] ================================================================== [ 29.008856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 29.009115] Read of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.009600] [ 29.009698] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.009751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.009766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.009790] Call Trace: [ 29.009810] <TASK> [ 29.009831] dump_stack_lvl+0x73/0xb0 [ 29.009862] print_report+0xd1/0x640 [ 29.009887] ? __virt_addr_valid+0x1db/0x2d0 [ 29.009913] ? kasan_atomics_helper+0x4f71/0x5450 [ 29.009936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.009963] ? kasan_atomics_helper+0x4f71/0x5450 [ 29.009987] kasan_report+0x141/0x180 [ 29.010011] ? kasan_atomics_helper+0x4f71/0x5450 [ 29.010039] __asan_report_load8_noabort+0x18/0x20 [ 29.010065] kasan_atomics_helper+0x4f71/0x5450 [ 29.010089] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.010113] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.010163] ? kasan_atomics+0x152/0x310 [ 29.010191] kasan_atomics+0x1dc/0x310 [ 29.010215] ? __pfx_kasan_atomics+0x10/0x10 [ 29.010241] ? __pfx_read_tsc+0x10/0x10 [ 29.010265] ? ktime_get_ts64+0x86/0x230 [ 29.010292] kunit_try_run_case+0x1a5/0x480 [ 29.010318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.010342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.010369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.010396] ? __kthread_parkme+0x82/0x180 [ 29.010418] ? preempt_count_sub+0x50/0x80 [ 29.010443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.010468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.010493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.010517] kthread+0x337/0x6f0 [ 29.010540] ? trace_preempt_on+0x20/0xc0 [ 29.010566] ? __pfx_kthread+0x10/0x10 [ 29.010588] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.010613] ? calculate_sigpending+0x7b/0xa0 [ 29.010639] ? __pfx_kthread+0x10/0x10 [ 29.010662] ret_from_fork+0x116/0x1d0 [ 29.010684] ? __pfx_kthread+0x10/0x10 [ 29.010706] ret_from_fork_asm+0x1a/0x30 [ 29.010740] </TASK> [ 29.010753] [ 29.018116] Allocated by task 314: [ 29.018338] kasan_save_stack+0x45/0x70 [ 29.018515] kasan_save_track+0x18/0x40 [ 29.018691] kasan_save_alloc_info+0x3b/0x50 [ 29.018880] __kasan_kmalloc+0xb7/0xc0 [ 29.019023] __kmalloc_cache_noprof+0x189/0x420 [ 29.019186] kasan_atomics+0x95/0x310 [ 29.019317] kunit_try_run_case+0x1a5/0x480 [ 29.019460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.019634] kthread+0x337/0x6f0 [ 29.019753] ret_from_fork+0x116/0x1d0 [ 29.019883] ret_from_fork_asm+0x1a/0x30 [ 29.020050] [ 29.020140] The buggy address belongs to the object at ffff888106118e00 [ 29.020140] which belongs to the cache kmalloc-64 of size 64 [ 29.020678] The buggy address is located 0 bytes to the right of [ 29.020678] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.021467] [ 29.021537] The buggy address belongs to the physical page: [ 29.021712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.021951] flags: 0x200000000000000(node=0|zone=2) [ 29.022118] page_type: f5(slab) [ 29.022247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.022711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.023177] page dumped because: kasan: bad access detected [ 29.023427] [ 29.023516] Memory state around the buggy address: [ 29.023747] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.024062] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.024388] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.024715] ^ [ 29.024912] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.025228] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.025473] ================================================================== [ 27.973174] ================================================================== [ 27.973751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 27.974270] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.974701] [ 27.974798] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.974851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.974864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.974889] Call Trace: [ 27.974906] <TASK> [ 27.974930] dump_stack_lvl+0x73/0xb0 [ 27.975201] print_report+0xd1/0x640 [ 27.975227] ? __virt_addr_valid+0x1db/0x2d0 [ 27.975253] ? kasan_atomics_helper+0x72f/0x5450 [ 27.975276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.975304] ? kasan_atomics_helper+0x72f/0x5450 [ 27.975327] kasan_report+0x141/0x180 [ 27.975351] ? kasan_atomics_helper+0x72f/0x5450 [ 27.975378] kasan_check_range+0x10c/0x1c0 [ 27.975403] __kasan_check_write+0x18/0x20 [ 27.975428] kasan_atomics_helper+0x72f/0x5450 [ 27.975452] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.975489] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.975516] ? kasan_atomics+0x152/0x310 [ 27.975542] kasan_atomics+0x1dc/0x310 [ 27.975567] ? __pfx_kasan_atomics+0x10/0x10 [ 27.975592] ? __pfx_read_tsc+0x10/0x10 [ 27.975616] ? ktime_get_ts64+0x86/0x230 [ 27.975647] kunit_try_run_case+0x1a5/0x480 [ 27.975673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.975697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.975723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.975749] ? __kthread_parkme+0x82/0x180 [ 27.975771] ? preempt_count_sub+0x50/0x80 [ 27.975795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.975821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.975846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.975871] kthread+0x337/0x6f0 [ 27.975892] ? trace_preempt_on+0x20/0xc0 [ 27.975918] ? __pfx_kthread+0x10/0x10 [ 27.975941] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.975966] ? calculate_sigpending+0x7b/0xa0 [ 27.975992] ? __pfx_kthread+0x10/0x10 [ 27.976016] ret_from_fork+0x116/0x1d0 [ 27.976037] ? __pfx_kthread+0x10/0x10 [ 27.976060] ret_from_fork_asm+0x1a/0x30 [ 27.976092] </TASK> [ 27.976105] [ 27.986521] Allocated by task 314: [ 27.986945] kasan_save_stack+0x45/0x70 [ 27.987286] kasan_save_track+0x18/0x40 [ 27.987501] kasan_save_alloc_info+0x3b/0x50 [ 27.987807] __kasan_kmalloc+0xb7/0xc0 [ 27.987956] __kmalloc_cache_noprof+0x189/0x420 [ 27.988176] kasan_atomics+0x95/0x310 [ 27.988379] kunit_try_run_case+0x1a5/0x480 [ 27.988824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.989135] kthread+0x337/0x6f0 [ 27.989421] ret_from_fork+0x116/0x1d0 [ 27.989793] ret_from_fork_asm+0x1a/0x30 [ 27.990069] [ 27.990179] The buggy address belongs to the object at ffff888106118e00 [ 27.990179] which belongs to the cache kmalloc-64 of size 64 [ 27.990950] The buggy address is located 0 bytes to the right of [ 27.990950] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.991602] [ 27.991784] The buggy address belongs to the physical page: [ 27.992122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.992857] flags: 0x200000000000000(node=0|zone=2) [ 27.993077] page_type: f5(slab) [ 27.993425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.993661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.994158] page dumped because: kasan: bad access detected [ 27.994350] [ 27.994440] Memory state around the buggy address: [ 27.994664] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.994934] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.995233] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.996054] ^ [ 27.996252] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.996782] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.997096] ================================================================== [ 27.715862] ================================================================== [ 27.716163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 27.716670] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.716940] [ 27.717271] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.717321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.717334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.717355] Call Trace: [ 27.717421] <TASK> [ 27.717441] dump_stack_lvl+0x73/0xb0 [ 27.717471] print_report+0xd1/0x640 [ 27.717494] ? __virt_addr_valid+0x1db/0x2d0 [ 27.717518] ? kasan_atomics_helper+0x4ba2/0x5450 [ 27.717540] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.717567] ? kasan_atomics_helper+0x4ba2/0x5450 [ 27.717591] kasan_report+0x141/0x180 [ 27.717616] ? kasan_atomics_helper+0x4ba2/0x5450 [ 27.717642] __asan_report_store4_noabort+0x1b/0x30 [ 27.717666] kasan_atomics_helper+0x4ba2/0x5450 [ 27.717690] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.717712] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.717736] ? kasan_atomics+0x152/0x310 [ 27.717762] kasan_atomics+0x1dc/0x310 [ 27.717785] ? __pfx_kasan_atomics+0x10/0x10 [ 27.717808] ? __pfx_read_tsc+0x10/0x10 [ 27.717831] ? ktime_get_ts64+0x86/0x230 [ 27.717856] kunit_try_run_case+0x1a5/0x480 [ 27.717880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.717904] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.717930] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.717965] ? __kthread_parkme+0x82/0x180 [ 27.717986] ? preempt_count_sub+0x50/0x80 [ 27.718010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.718034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.718057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.718081] kthread+0x337/0x6f0 [ 27.718101] ? trace_preempt_on+0x20/0xc0 [ 27.718126] ? __pfx_kthread+0x10/0x10 [ 27.718159] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.718183] ? calculate_sigpending+0x7b/0xa0 [ 27.718207] ? __pfx_kthread+0x10/0x10 [ 27.718229] ret_from_fork+0x116/0x1d0 [ 27.718249] ? __pfx_kthread+0x10/0x10 [ 27.718270] ret_from_fork_asm+0x1a/0x30 [ 27.718303] </TASK> [ 27.718314] [ 27.726431] Allocated by task 314: [ 27.726633] kasan_save_stack+0x45/0x70 [ 27.726793] kasan_save_track+0x18/0x40 [ 27.727050] kasan_save_alloc_info+0x3b/0x50 [ 27.727257] __kasan_kmalloc+0xb7/0xc0 [ 27.727601] __kmalloc_cache_noprof+0x189/0x420 [ 27.727848] kasan_atomics+0x95/0x310 [ 27.728097] kunit_try_run_case+0x1a5/0x480 [ 27.728297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.728574] kthread+0x337/0x6f0 [ 27.728751] ret_from_fork+0x116/0x1d0 [ 27.728909] ret_from_fork_asm+0x1a/0x30 [ 27.729044] [ 27.729110] The buggy address belongs to the object at ffff888106118e00 [ 27.729110] which belongs to the cache kmalloc-64 of size 64 [ 27.729472] The buggy address is located 0 bytes to the right of [ 27.729472] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.729835] [ 27.729902] The buggy address belongs to the physical page: [ 27.730203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.730553] flags: 0x200000000000000(node=0|zone=2) [ 27.730776] page_type: f5(slab) [ 27.730937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.731314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.731726] page dumped because: kasan: bad access detected [ 27.731901] [ 27.732041] Memory state around the buggy address: [ 27.732272] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.732663] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.732880] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.733480] ^ [ 27.733847] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.734155] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.734482] ================================================================== [ 27.734924] ================================================================== [ 27.735275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 27.735833] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.736139] [ 27.736253] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.736302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.736314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.736338] Call Trace: [ 27.736354] <TASK> [ 27.736371] dump_stack_lvl+0x73/0xb0 [ 27.736399] print_report+0xd1/0x640 [ 27.736421] ? __virt_addr_valid+0x1db/0x2d0 [ 27.736445] ? kasan_atomics_helper+0x4b88/0x5450 [ 27.736467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.736493] ? kasan_atomics_helper+0x4b88/0x5450 [ 27.736515] kasan_report+0x141/0x180 [ 27.736537] ? kasan_atomics_helper+0x4b88/0x5450 [ 27.736563] __asan_report_load4_noabort+0x18/0x20 [ 27.736588] kasan_atomics_helper+0x4b88/0x5450 [ 27.736610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.736632] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.736657] ? kasan_atomics+0x152/0x310 [ 27.736683] kasan_atomics+0x1dc/0x310 [ 27.736705] ? __pfx_kasan_atomics+0x10/0x10 [ 27.736729] ? __pfx_read_tsc+0x10/0x10 [ 27.736752] ? ktime_get_ts64+0x86/0x230 [ 27.736776] kunit_try_run_case+0x1a5/0x480 [ 27.736801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.736823] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.736849] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.736874] ? __kthread_parkme+0x82/0x180 [ 27.736895] ? preempt_count_sub+0x50/0x80 [ 27.736919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.736995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.737023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.737048] kthread+0x337/0x6f0 [ 27.737070] ? trace_preempt_on+0x20/0xc0 [ 27.737095] ? __pfx_kthread+0x10/0x10 [ 27.737118] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.737155] ? calculate_sigpending+0x7b/0xa0 [ 27.737181] ? __pfx_kthread+0x10/0x10 [ 27.737204] ret_from_fork+0x116/0x1d0 [ 27.737225] ? __pfx_kthread+0x10/0x10 [ 27.737248] ret_from_fork_asm+0x1a/0x30 [ 27.737281] </TASK> [ 27.737293] [ 27.745019] Allocated by task 314: [ 27.745219] kasan_save_stack+0x45/0x70 [ 27.745391] kasan_save_track+0x18/0x40 [ 27.745556] kasan_save_alloc_info+0x3b/0x50 [ 27.745701] __kasan_kmalloc+0xb7/0xc0 [ 27.745830] __kmalloc_cache_noprof+0x189/0x420 [ 27.745982] kasan_atomics+0x95/0x310 [ 27.746111] kunit_try_run_case+0x1a5/0x480 [ 27.746308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.746485] kthread+0x337/0x6f0 [ 27.746605] ret_from_fork+0x116/0x1d0 [ 27.746736] ret_from_fork_asm+0x1a/0x30 [ 27.746873] [ 27.746939] The buggy address belongs to the object at ffff888106118e00 [ 27.746939] which belongs to the cache kmalloc-64 of size 64 [ 27.747935] The buggy address is located 0 bytes to the right of [ 27.747935] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.748480] [ 27.748572] The buggy address belongs to the physical page: [ 27.748820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.749383] flags: 0x200000000000000(node=0|zone=2) [ 27.749623] page_type: f5(slab) [ 27.749787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.750109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.750346] page dumped because: kasan: bad access detected [ 27.750514] [ 27.750578] Memory state around the buggy address: [ 27.750730] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.750946] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.751188] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.751503] ^ [ 27.751730] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.752459] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.752808] ================================================================== [ 28.118396] ================================================================== [ 28.118885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 28.119259] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.119690] [ 28.119812] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.120016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.120032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.120055] Call Trace: [ 28.120077] <TASK> [ 28.120097] dump_stack_lvl+0x73/0xb0 [ 28.120130] print_report+0xd1/0x640 [ 28.120168] ? __virt_addr_valid+0x1db/0x2d0 [ 28.120194] ? kasan_atomics_helper+0xac7/0x5450 [ 28.120217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.120244] ? kasan_atomics_helper+0xac7/0x5450 [ 28.120266] kasan_report+0x141/0x180 [ 28.120290] ? kasan_atomics_helper+0xac7/0x5450 [ 28.120316] kasan_check_range+0x10c/0x1c0 [ 28.120341] __kasan_check_write+0x18/0x20 [ 28.120364] kasan_atomics_helper+0xac7/0x5450 [ 28.120493] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.120518] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.120597] ? kasan_atomics+0x152/0x310 [ 28.120625] kasan_atomics+0x1dc/0x310 [ 28.120649] ? __pfx_kasan_atomics+0x10/0x10 [ 28.120674] ? __pfx_read_tsc+0x10/0x10 [ 28.120749] ? ktime_get_ts64+0x86/0x230 [ 28.120775] kunit_try_run_case+0x1a5/0x480 [ 28.120802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.120827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.120854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.120881] ? __kthread_parkme+0x82/0x180 [ 28.120903] ? preempt_count_sub+0x50/0x80 [ 28.120927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.120968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.120993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.121018] kthread+0x337/0x6f0 [ 28.121040] ? trace_preempt_on+0x20/0xc0 [ 28.121065] ? __pfx_kthread+0x10/0x10 [ 28.121087] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.121112] ? calculate_sigpending+0x7b/0xa0 [ 28.121138] ? __pfx_kthread+0x10/0x10 [ 28.121171] ret_from_fork+0x116/0x1d0 [ 28.121192] ? __pfx_kthread+0x10/0x10 [ 28.121214] ret_from_fork_asm+0x1a/0x30 [ 28.121248] </TASK> [ 28.121260] [ 28.131818] Allocated by task 314: [ 28.131987] kasan_save_stack+0x45/0x70 [ 28.132186] kasan_save_track+0x18/0x40 [ 28.132324] kasan_save_alloc_info+0x3b/0x50 [ 28.132589] __kasan_kmalloc+0xb7/0xc0 [ 28.133197] __kmalloc_cache_noprof+0x189/0x420 [ 28.133635] kasan_atomics+0x95/0x310 [ 28.133872] kunit_try_run_case+0x1a5/0x480 [ 28.134053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.134518] kthread+0x337/0x6f0 [ 28.134736] ret_from_fork+0x116/0x1d0 [ 28.135030] ret_from_fork_asm+0x1a/0x30 [ 28.135200] [ 28.135297] The buggy address belongs to the object at ffff888106118e00 [ 28.135297] which belongs to the cache kmalloc-64 of size 64 [ 28.136069] The buggy address is located 0 bytes to the right of [ 28.136069] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.137036] [ 28.137128] The buggy address belongs to the physical page: [ 28.137363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.137913] flags: 0x200000000000000(node=0|zone=2) [ 28.138196] page_type: f5(slab) [ 28.138495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.138784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.139261] page dumped because: kasan: bad access detected [ 28.139546] [ 28.139727] Memory state around the buggy address: [ 28.139906] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.140226] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.140679] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.141227] ^ [ 28.141641] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.142038] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.142487] ================================================================== [ 28.242533] ================================================================== [ 28.242765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 28.243100] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.243337] [ 28.243423] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.243471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.243485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.243506] Call Trace: [ 28.243527] <TASK> [ 28.243545] dump_stack_lvl+0x73/0xb0 [ 28.243573] print_report+0xd1/0x640 [ 28.243596] ? __virt_addr_valid+0x1db/0x2d0 [ 28.243626] ? kasan_atomics_helper+0xe78/0x5450 [ 28.243649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.243676] ? kasan_atomics_helper+0xe78/0x5450 [ 28.243699] kasan_report+0x141/0x180 [ 28.243721] ? kasan_atomics_helper+0xe78/0x5450 [ 28.243747] kasan_check_range+0x10c/0x1c0 [ 28.243772] __kasan_check_write+0x18/0x20 [ 28.243796] kasan_atomics_helper+0xe78/0x5450 [ 28.243819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.243841] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.243866] ? kasan_atomics+0x152/0x310 [ 28.243893] kasan_atomics+0x1dc/0x310 [ 28.243915] ? __pfx_kasan_atomics+0x10/0x10 [ 28.243940] ? __pfx_read_tsc+0x10/0x10 [ 28.243962] ? ktime_get_ts64+0x86/0x230 [ 28.243988] kunit_try_run_case+0x1a5/0x480 [ 28.244012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.244035] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.244062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.244088] ? __kthread_parkme+0x82/0x180 [ 28.244109] ? preempt_count_sub+0x50/0x80 [ 28.244134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.244169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.244194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.244218] kthread+0x337/0x6f0 [ 28.244240] ? trace_preempt_on+0x20/0xc0 [ 28.244265] ? __pfx_kthread+0x10/0x10 [ 28.244286] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.244312] ? calculate_sigpending+0x7b/0xa0 [ 28.244336] ? __pfx_kthread+0x10/0x10 [ 28.244359] ret_from_fork+0x116/0x1d0 [ 28.244378] ? __pfx_kthread+0x10/0x10 [ 28.244401] ret_from_fork_asm+0x1a/0x30 [ 28.244473] </TASK> [ 28.244488] [ 28.254275] Allocated by task 314: [ 28.254486] kasan_save_stack+0x45/0x70 [ 28.254873] kasan_save_track+0x18/0x40 [ 28.255022] kasan_save_alloc_info+0x3b/0x50 [ 28.255435] __kasan_kmalloc+0xb7/0xc0 [ 28.255577] __kmalloc_cache_noprof+0x189/0x420 [ 28.255796] kasan_atomics+0x95/0x310 [ 28.256045] kunit_try_run_case+0x1a5/0x480 [ 28.256207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.256386] kthread+0x337/0x6f0 [ 28.256555] ret_from_fork+0x116/0x1d0 [ 28.256864] ret_from_fork_asm+0x1a/0x30 [ 28.257218] [ 28.257355] The buggy address belongs to the object at ffff888106118e00 [ 28.257355] which belongs to the cache kmalloc-64 of size 64 [ 28.258040] The buggy address is located 0 bytes to the right of [ 28.258040] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.258481] [ 28.258572] The buggy address belongs to the physical page: [ 28.258913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.259257] flags: 0x200000000000000(node=0|zone=2) [ 28.259504] page_type: f5(slab) [ 28.259713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.260037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.260306] page dumped because: kasan: bad access detected [ 28.260645] [ 28.260736] Memory state around the buggy address: [ 28.260948] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.261170] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.261601] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.261804] ^ [ 28.262251] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.262607] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.262906] ================================================================== [ 28.767126] ================================================================== [ 28.767702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 28.768089] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.768345] [ 28.768511] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.768564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.768579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.768603] Call Trace: [ 28.768624] <TASK> [ 28.768645] dump_stack_lvl+0x73/0xb0 [ 28.768676] print_report+0xd1/0x640 [ 28.768701] ? __virt_addr_valid+0x1db/0x2d0 [ 28.768728] ? kasan_atomics_helper+0x18b1/0x5450 [ 28.768750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.768777] ? kasan_atomics_helper+0x18b1/0x5450 [ 28.768800] kasan_report+0x141/0x180 [ 28.768823] ? kasan_atomics_helper+0x18b1/0x5450 [ 28.768851] kasan_check_range+0x10c/0x1c0 [ 28.768876] __kasan_check_write+0x18/0x20 [ 28.768901] kasan_atomics_helper+0x18b1/0x5450 [ 28.768946] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.768970] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.768997] ? kasan_atomics+0x152/0x310 [ 28.769025] kasan_atomics+0x1dc/0x310 [ 28.769048] ? __pfx_kasan_atomics+0x10/0x10 [ 28.769074] ? __pfx_read_tsc+0x10/0x10 [ 28.769097] ? ktime_get_ts64+0x86/0x230 [ 28.769124] kunit_try_run_case+0x1a5/0x480 [ 28.769159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.769193] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.769221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.769249] ? __kthread_parkme+0x82/0x180 [ 28.769281] ? preempt_count_sub+0x50/0x80 [ 28.769307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.769332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.769417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.769447] kthread+0x337/0x6f0 [ 28.769471] ? trace_preempt_on+0x20/0xc0 [ 28.769496] ? __pfx_kthread+0x10/0x10 [ 28.769519] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.769544] ? calculate_sigpending+0x7b/0xa0 [ 28.769569] ? __pfx_kthread+0x10/0x10 [ 28.769592] ret_from_fork+0x116/0x1d0 [ 28.769614] ? __pfx_kthread+0x10/0x10 [ 28.769635] ret_from_fork_asm+0x1a/0x30 [ 28.769669] </TASK> [ 28.769682] [ 28.778111] Allocated by task 314: [ 28.778334] kasan_save_stack+0x45/0x70 [ 28.778598] kasan_save_track+0x18/0x40 [ 28.778787] kasan_save_alloc_info+0x3b/0x50 [ 28.779032] __kasan_kmalloc+0xb7/0xc0 [ 28.779207] __kmalloc_cache_noprof+0x189/0x420 [ 28.779462] kasan_atomics+0x95/0x310 [ 28.779674] kunit_try_run_case+0x1a5/0x480 [ 28.779896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.780173] kthread+0x337/0x6f0 [ 28.780337] ret_from_fork+0x116/0x1d0 [ 28.780527] ret_from_fork_asm+0x1a/0x30 [ 28.780668] [ 28.780734] The buggy address belongs to the object at ffff888106118e00 [ 28.780734] which belongs to the cache kmalloc-64 of size 64 [ 28.781094] The buggy address is located 0 bytes to the right of [ 28.781094] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.781749] [ 28.781849] The buggy address belongs to the physical page: [ 28.782161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.782712] flags: 0x200000000000000(node=0|zone=2) [ 28.783004] page_type: f5(slab) [ 28.783170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.783464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.783700] page dumped because: kasan: bad access detected [ 28.783870] [ 28.783983] Memory state around the buggy address: [ 28.784238] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.784641] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.785030] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.785435] ^ [ 28.785692] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.786032] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.786424] ================================================================== [ 29.046902] ================================================================== [ 29.048625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 29.049387] Read of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.050105] [ 29.050336] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.050391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.050405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.050429] Call Trace: [ 29.050451] <TASK> [ 29.050472] dump_stack_lvl+0x73/0xb0 [ 29.050538] print_report+0xd1/0x640 [ 29.050564] ? __virt_addr_valid+0x1db/0x2d0 [ 29.050601] ? kasan_atomics_helper+0x4f98/0x5450 [ 29.050624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.050652] ? kasan_atomics_helper+0x4f98/0x5450 [ 29.050675] kasan_report+0x141/0x180 [ 29.050698] ? kasan_atomics_helper+0x4f98/0x5450 [ 29.050725] __asan_report_load8_noabort+0x18/0x20 [ 29.050751] kasan_atomics_helper+0x4f98/0x5450 [ 29.050775] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.050798] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.050825] ? kasan_atomics+0x152/0x310 [ 29.050852] kasan_atomics+0x1dc/0x310 [ 29.050876] ? __pfx_kasan_atomics+0x10/0x10 [ 29.050902] ? __pfx_read_tsc+0x10/0x10 [ 29.050925] ? ktime_get_ts64+0x86/0x230 [ 29.050963] kunit_try_run_case+0x1a5/0x480 [ 29.050990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.051013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.051040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.051068] ? __kthread_parkme+0x82/0x180 [ 29.051089] ? preempt_count_sub+0x50/0x80 [ 29.051114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.051140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.051174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.051200] kthread+0x337/0x6f0 [ 29.051221] ? trace_preempt_on+0x20/0xc0 [ 29.051247] ? __pfx_kthread+0x10/0x10 [ 29.051268] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.051293] ? calculate_sigpending+0x7b/0xa0 [ 29.051318] ? __pfx_kthread+0x10/0x10 [ 29.051340] ret_from_fork+0x116/0x1d0 [ 29.051362] ? __pfx_kthread+0x10/0x10 [ 29.051384] ret_from_fork_asm+0x1a/0x30 [ 29.051418] </TASK> [ 29.051431] [ 29.063721] Allocated by task 314: [ 29.063923] kasan_save_stack+0x45/0x70 [ 29.064315] kasan_save_track+0x18/0x40 [ 29.064606] kasan_save_alloc_info+0x3b/0x50 [ 29.064820] __kasan_kmalloc+0xb7/0xc0 [ 29.065150] __kmalloc_cache_noprof+0x189/0x420 [ 29.065467] kasan_atomics+0x95/0x310 [ 29.065653] kunit_try_run_case+0x1a5/0x480 [ 29.065845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.066273] kthread+0x337/0x6f0 [ 29.066439] ret_from_fork+0x116/0x1d0 [ 29.066764] ret_from_fork_asm+0x1a/0x30 [ 29.067060] [ 29.067164] The buggy address belongs to the object at ffff888106118e00 [ 29.067164] which belongs to the cache kmalloc-64 of size 64 [ 29.067749] The buggy address is located 0 bytes to the right of [ 29.067749] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.068547] [ 29.068718] The buggy address belongs to the physical page: [ 29.069024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.069473] flags: 0x200000000000000(node=0|zone=2) [ 29.069790] page_type: f5(slab) [ 29.069976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.070372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.070696] page dumped because: kasan: bad access detected [ 29.071139] [ 29.071271] Memory state around the buggy address: [ 29.071744] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.072225] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.072439] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.072646] ^ [ 29.072796] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.073015] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.073358] ================================================================== [ 28.991096] ================================================================== [ 28.991536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 28.991880] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.992198] [ 28.992297] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.992351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.992365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.992621] Call Trace: [ 28.992644] <TASK> [ 28.992666] dump_stack_lvl+0x73/0xb0 [ 28.992698] print_report+0xd1/0x640 [ 28.992723] ? __virt_addr_valid+0x1db/0x2d0 [ 28.992749] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.992773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.992801] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.992824] kasan_report+0x141/0x180 [ 28.992848] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.992875] kasan_check_range+0x10c/0x1c0 [ 28.992916] __kasan_check_write+0x18/0x20 [ 28.992947] kasan_atomics_helper+0x1f43/0x5450 [ 28.992972] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.992995] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.993022] ? kasan_atomics+0x152/0x310 [ 28.993049] kasan_atomics+0x1dc/0x310 [ 28.993073] ? __pfx_kasan_atomics+0x10/0x10 [ 28.993125] ? __pfx_read_tsc+0x10/0x10 [ 28.993160] ? ktime_get_ts64+0x86/0x230 [ 28.993187] kunit_try_run_case+0x1a5/0x480 [ 28.993214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.993240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.993267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.993293] ? __kthread_parkme+0x82/0x180 [ 28.993315] ? preempt_count_sub+0x50/0x80 [ 28.993340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.993365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.993391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.993424] kthread+0x337/0x6f0 [ 28.993446] ? trace_preempt_on+0x20/0xc0 [ 28.993472] ? __pfx_kthread+0x10/0x10 [ 28.993495] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.993521] ? calculate_sigpending+0x7b/0xa0 [ 28.993546] ? __pfx_kthread+0x10/0x10 [ 28.993569] ret_from_fork+0x116/0x1d0 [ 28.993590] ? __pfx_kthread+0x10/0x10 [ 28.993612] ret_from_fork_asm+0x1a/0x30 [ 28.993646] </TASK> [ 28.993659] [ 29.000449] Allocated by task 314: [ 29.000664] kasan_save_stack+0x45/0x70 [ 29.000867] kasan_save_track+0x18/0x40 [ 29.001050] kasan_save_alloc_info+0x3b/0x50 [ 29.001344] __kasan_kmalloc+0xb7/0xc0 [ 29.001527] __kmalloc_cache_noprof+0x189/0x420 [ 29.001721] kasan_atomics+0x95/0x310 [ 29.001853] kunit_try_run_case+0x1a5/0x480 [ 29.002175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.002427] kthread+0x337/0x6f0 [ 29.002562] ret_from_fork+0x116/0x1d0 [ 29.002737] ret_from_fork_asm+0x1a/0x30 [ 29.002914] [ 29.003081] The buggy address belongs to the object at ffff888106118e00 [ 29.003081] which belongs to the cache kmalloc-64 of size 64 [ 29.003508] The buggy address is located 0 bytes to the right of [ 29.003508] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.003966] [ 29.004065] The buggy address belongs to the physical page: [ 29.004334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.004658] flags: 0x200000000000000(node=0|zone=2) [ 29.004850] page_type: f5(slab) [ 29.005081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.005380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.005619] page dumped because: kasan: bad access detected [ 29.005857] [ 29.005931] Memory state around the buggy address: [ 29.006123] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.006404] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.006675] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.007025] ^ [ 29.007233] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.007518] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.007797] ================================================================== [ 28.642856] ================================================================== [ 28.643578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 28.643922] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.644233] [ 28.644325] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.644423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.644441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.644465] Call Trace: [ 28.644485] <TASK> [ 28.644504] dump_stack_lvl+0x73/0xb0 [ 28.644534] print_report+0xd1/0x640 [ 28.644558] ? __virt_addr_valid+0x1db/0x2d0 [ 28.644584] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.644606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.644633] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.644656] kasan_report+0x141/0x180 [ 28.644679] ? kasan_atomics_helper+0x15b6/0x5450 [ 28.644706] kasan_check_range+0x10c/0x1c0 [ 28.644731] __kasan_check_write+0x18/0x20 [ 28.644757] kasan_atomics_helper+0x15b6/0x5450 [ 28.644781] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.644804] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.644831] ? kasan_atomics+0x152/0x310 [ 28.644858] kasan_atomics+0x1dc/0x310 [ 28.644882] ? __pfx_kasan_atomics+0x10/0x10 [ 28.644908] ? __pfx_read_tsc+0x10/0x10 [ 28.644932] ? ktime_get_ts64+0x86/0x230 [ 28.644959] kunit_try_run_case+0x1a5/0x480 [ 28.644986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.645010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.645037] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.645064] ? __kthread_parkme+0x82/0x180 [ 28.645086] ? preempt_count_sub+0x50/0x80 [ 28.645112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.645138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.645176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.645201] kthread+0x337/0x6f0 [ 28.645223] ? trace_preempt_on+0x20/0xc0 [ 28.645249] ? __pfx_kthread+0x10/0x10 [ 28.645271] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.645297] ? calculate_sigpending+0x7b/0xa0 [ 28.645322] ? __pfx_kthread+0x10/0x10 [ 28.645345] ret_from_fork+0x116/0x1d0 [ 28.645367] ? __pfx_kthread+0x10/0x10 [ 28.645389] ret_from_fork_asm+0x1a/0x30 [ 28.645422] </TASK> [ 28.645435] [ 28.657505] Allocated by task 314: [ 28.657651] kasan_save_stack+0x45/0x70 [ 28.657801] kasan_save_track+0x18/0x40 [ 28.657933] kasan_save_alloc_info+0x3b/0x50 [ 28.658079] __kasan_kmalloc+0xb7/0xc0 [ 28.658517] __kmalloc_cache_noprof+0x189/0x420 [ 28.659012] kasan_atomics+0x95/0x310 [ 28.659537] kunit_try_run_case+0x1a5/0x480 [ 28.660022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.660645] kthread+0x337/0x6f0 [ 28.661011] ret_from_fork+0x116/0x1d0 [ 28.661420] ret_from_fork_asm+0x1a/0x30 [ 28.661797] [ 28.661981] The buggy address belongs to the object at ffff888106118e00 [ 28.661981] which belongs to the cache kmalloc-64 of size 64 [ 28.663131] The buggy address is located 0 bytes to the right of [ 28.663131] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.664203] [ 28.664373] The buggy address belongs to the physical page: [ 28.664796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.665445] flags: 0x200000000000000(node=0|zone=2) [ 28.665863] page_type: f5(slab) [ 28.666186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.666897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.667339] page dumped because: kasan: bad access detected [ 28.667840] [ 28.667918] Memory state around the buggy address: [ 28.668388] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.669078] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.669321] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.669540] ^ [ 28.669696] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.669910] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.670120] ================================================================== [ 28.746074] ================================================================== [ 28.746421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 28.746667] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.746893] [ 28.747011] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.747067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.747082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.747106] Call Trace: [ 28.747130] <TASK> [ 28.747163] dump_stack_lvl+0x73/0xb0 [ 28.747197] print_report+0xd1/0x640 [ 28.747233] ? __virt_addr_valid+0x1db/0x2d0 [ 28.747259] ? kasan_atomics_helper+0x1818/0x5450 [ 28.747283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.747321] ? kasan_atomics_helper+0x1818/0x5450 [ 28.747345] kasan_report+0x141/0x180 [ 28.747369] ? kasan_atomics_helper+0x1818/0x5450 [ 28.747397] kasan_check_range+0x10c/0x1c0 [ 28.747423] __kasan_check_write+0x18/0x20 [ 28.747448] kasan_atomics_helper+0x1818/0x5450 [ 28.747473] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.747497] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.747524] ? kasan_atomics+0x152/0x310 [ 28.747553] kasan_atomics+0x1dc/0x310 [ 28.747577] ? __pfx_kasan_atomics+0x10/0x10 [ 28.747603] ? __pfx_read_tsc+0x10/0x10 [ 28.747633] ? ktime_get_ts64+0x86/0x230 [ 28.747660] kunit_try_run_case+0x1a5/0x480 [ 28.747688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.747711] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.747739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.747767] ? __kthread_parkme+0x82/0x180 [ 28.747789] ? preempt_count_sub+0x50/0x80 [ 28.747813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.747840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.747866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.747891] kthread+0x337/0x6f0 [ 28.747914] ? trace_preempt_on+0x20/0xc0 [ 28.747960] ? __pfx_kthread+0x10/0x10 [ 28.747983] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.748008] ? calculate_sigpending+0x7b/0xa0 [ 28.748034] ? __pfx_kthread+0x10/0x10 [ 28.748057] ret_from_fork+0x116/0x1d0 [ 28.748079] ? __pfx_kthread+0x10/0x10 [ 28.748101] ret_from_fork_asm+0x1a/0x30 [ 28.748158] </TASK> [ 28.748171] [ 28.757213] Allocated by task 314: [ 28.757983] kasan_save_stack+0x45/0x70 [ 28.758271] kasan_save_track+0x18/0x40 [ 28.758644] kasan_save_alloc_info+0x3b/0x50 [ 28.759107] __kasan_kmalloc+0xb7/0xc0 [ 28.759339] __kmalloc_cache_noprof+0x189/0x420 [ 28.759713] kasan_atomics+0x95/0x310 [ 28.759907] kunit_try_run_case+0x1a5/0x480 [ 28.760157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.760343] kthread+0x337/0x6f0 [ 28.760603] ret_from_fork+0x116/0x1d0 [ 28.760794] ret_from_fork_asm+0x1a/0x30 [ 28.761007] [ 28.761103] The buggy address belongs to the object at ffff888106118e00 [ 28.761103] which belongs to the cache kmalloc-64 of size 64 [ 28.761615] The buggy address is located 0 bytes to the right of [ 28.761615] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.762178] [ 28.762265] The buggy address belongs to the physical page: [ 28.762574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.762948] flags: 0x200000000000000(node=0|zone=2) [ 28.763139] page_type: f5(slab) [ 28.763269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.763715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.763979] page dumped because: kasan: bad access detected [ 28.764161] [ 28.764281] Memory state around the buggy address: [ 28.764529] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.764841] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.765165] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.765480] ^ [ 28.765798] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.766179] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.766575] ================================================================== [ 29.129042] ================================================================== [ 29.129433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 29.129778] Read of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.130094] [ 29.130192] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.130243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.130256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.130279] Call Trace: [ 29.130300] <TASK> [ 29.130319] dump_stack_lvl+0x73/0xb0 [ 29.130348] print_report+0xd1/0x640 [ 29.130372] ? __virt_addr_valid+0x1db/0x2d0 [ 29.130398] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.130422] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.130451] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.130475] kasan_report+0x141/0x180 [ 29.130499] ? kasan_atomics_helper+0x4fa5/0x5450 [ 29.130526] __asan_report_load8_noabort+0x18/0x20 [ 29.130552] kasan_atomics_helper+0x4fa5/0x5450 [ 29.130577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.130600] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.130626] ? kasan_atomics+0x152/0x310 [ 29.130654] kasan_atomics+0x1dc/0x310 [ 29.130678] ? __pfx_kasan_atomics+0x10/0x10 [ 29.130703] ? __pfx_read_tsc+0x10/0x10 [ 29.130728] ? ktime_get_ts64+0x86/0x230 [ 29.130755] kunit_try_run_case+0x1a5/0x480 [ 29.130781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.130806] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.130834] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.130860] ? __kthread_parkme+0x82/0x180 [ 29.130883] ? preempt_count_sub+0x50/0x80 [ 29.130909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.130934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.131374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.131403] kthread+0x337/0x6f0 [ 29.131426] ? trace_preempt_on+0x20/0xc0 [ 29.131453] ? __pfx_kthread+0x10/0x10 [ 29.131475] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.131502] ? calculate_sigpending+0x7b/0xa0 [ 29.131528] ? __pfx_kthread+0x10/0x10 [ 29.131551] ret_from_fork+0x116/0x1d0 [ 29.131573] ? __pfx_kthread+0x10/0x10 [ 29.131596] ret_from_fork_asm+0x1a/0x30 [ 29.131635] </TASK> [ 29.131648] [ 29.139020] Allocated by task 314: [ 29.139279] kasan_save_stack+0x45/0x70 [ 29.139487] kasan_save_track+0x18/0x40 [ 29.139651] kasan_save_alloc_info+0x3b/0x50 [ 29.139796] __kasan_kmalloc+0xb7/0xc0 [ 29.139926] __kmalloc_cache_noprof+0x189/0x420 [ 29.140078] kasan_atomics+0x95/0x310 [ 29.140219] kunit_try_run_case+0x1a5/0x480 [ 29.140369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.140549] kthread+0x337/0x6f0 [ 29.140669] ret_from_fork+0x116/0x1d0 [ 29.140801] ret_from_fork_asm+0x1a/0x30 [ 29.140955] [ 29.141047] The buggy address belongs to the object at ffff888106118e00 [ 29.141047] which belongs to the cache kmalloc-64 of size 64 [ 29.141570] The buggy address is located 0 bytes to the right of [ 29.141570] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.142447] [ 29.142544] The buggy address belongs to the physical page: [ 29.142818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.143176] flags: 0x200000000000000(node=0|zone=2) [ 29.143357] page_type: f5(slab) [ 29.143478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.143718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.144320] page dumped because: kasan: bad access detected [ 29.144566] [ 29.144654] Memory state around the buggy address: [ 29.144852] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.145261] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.145518] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.145721] ^ [ 29.145866] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.146140] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.146448] ================================================================== [ 28.604775] ================================================================== [ 28.605056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 28.605445] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.605684] [ 28.605811] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.605862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.605876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.605899] Call Trace: [ 28.605921] <TASK> [ 28.605941] dump_stack_lvl+0x73/0xb0 [ 28.606197] print_report+0xd1/0x640 [ 28.606225] ? __virt_addr_valid+0x1db/0x2d0 [ 28.606252] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.606273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.606301] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.606324] kasan_report+0x141/0x180 [ 28.606347] ? kasan_atomics_helper+0x50d4/0x5450 [ 28.606420] __asan_report_store8_noabort+0x1b/0x30 [ 28.606453] kasan_atomics_helper+0x50d4/0x5450 [ 28.606478] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.606501] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.606527] ? kasan_atomics+0x152/0x310 [ 28.606555] kasan_atomics+0x1dc/0x310 [ 28.606579] ? __pfx_kasan_atomics+0x10/0x10 [ 28.606604] ? __pfx_read_tsc+0x10/0x10 [ 28.606628] ? ktime_get_ts64+0x86/0x230 [ 28.606654] kunit_try_run_case+0x1a5/0x480 [ 28.606681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.606704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.606731] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.606758] ? __kthread_parkme+0x82/0x180 [ 28.606780] ? preempt_count_sub+0x50/0x80 [ 28.606805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.606830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.606855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.606881] kthread+0x337/0x6f0 [ 28.606902] ? trace_preempt_on+0x20/0xc0 [ 28.606928] ? __pfx_kthread+0x10/0x10 [ 28.606962] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.606988] ? calculate_sigpending+0x7b/0xa0 [ 28.607013] ? __pfx_kthread+0x10/0x10 [ 28.607036] ret_from_fork+0x116/0x1d0 [ 28.607057] ? __pfx_kthread+0x10/0x10 [ 28.607079] ret_from_fork_asm+0x1a/0x30 [ 28.607112] </TASK> [ 28.607125] [ 28.614778] Allocated by task 314: [ 28.614927] kasan_save_stack+0x45/0x70 [ 28.615075] kasan_save_track+0x18/0x40 [ 28.615256] kasan_save_alloc_info+0x3b/0x50 [ 28.615645] __kasan_kmalloc+0xb7/0xc0 [ 28.615823] __kmalloc_cache_noprof+0x189/0x420 [ 28.615973] kasan_atomics+0x95/0x310 [ 28.616101] kunit_try_run_case+0x1a5/0x480 [ 28.616256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.616961] kthread+0x337/0x6f0 [ 28.617170] ret_from_fork+0x116/0x1d0 [ 28.617361] ret_from_fork_asm+0x1a/0x30 [ 28.617618] [ 28.617710] The buggy address belongs to the object at ffff888106118e00 [ 28.617710] which belongs to the cache kmalloc-64 of size 64 [ 28.618220] The buggy address is located 0 bytes to the right of [ 28.618220] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.618773] [ 28.618873] The buggy address belongs to the physical page: [ 28.619115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.619487] flags: 0x200000000000000(node=0|zone=2) [ 28.619697] page_type: f5(slab) [ 28.619865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.620175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.620545] page dumped because: kasan: bad access detected [ 28.620758] [ 28.620824] Memory state around the buggy address: [ 28.620976] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.621201] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.621417] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.621630] ^ [ 28.621785] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.622094] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.622453] ================================================================== [ 28.972711] ================================================================== [ 28.973238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 28.973719] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.974931] [ 28.975101] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.975178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.975204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.975228] Call Trace: [ 28.975252] <TASK> [ 28.975276] dump_stack_lvl+0x73/0xb0 [ 28.975311] print_report+0xd1/0x640 [ 28.975343] ? __virt_addr_valid+0x1db/0x2d0 [ 28.975370] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.975394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.975421] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.975445] kasan_report+0x141/0x180 [ 28.975469] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.975496] kasan_check_range+0x10c/0x1c0 [ 28.975521] __kasan_check_write+0x18/0x20 [ 28.975546] kasan_atomics_helper+0x1eaa/0x5450 [ 28.975571] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.975594] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.975626] ? kasan_atomics+0x152/0x310 [ 28.975654] kasan_atomics+0x1dc/0x310 [ 28.975677] ? __pfx_kasan_atomics+0x10/0x10 [ 28.975703] ? __pfx_read_tsc+0x10/0x10 [ 28.975728] ? ktime_get_ts64+0x86/0x230 [ 28.975754] kunit_try_run_case+0x1a5/0x480 [ 28.975781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.975805] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.975832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.975859] ? __kthread_parkme+0x82/0x180 [ 28.975882] ? preempt_count_sub+0x50/0x80 [ 28.975912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.975956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.975981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.976006] kthread+0x337/0x6f0 [ 28.976028] ? trace_preempt_on+0x20/0xc0 [ 28.976054] ? __pfx_kthread+0x10/0x10 [ 28.976076] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.976100] ? calculate_sigpending+0x7b/0xa0 [ 28.976126] ? __pfx_kthread+0x10/0x10 [ 28.976160] ret_from_fork+0x116/0x1d0 [ 28.976182] ? __pfx_kthread+0x10/0x10 [ 28.976205] ret_from_fork_asm+0x1a/0x30 [ 28.976238] </TASK> [ 28.976251] [ 28.983154] Allocated by task 314: [ 28.983341] kasan_save_stack+0x45/0x70 [ 28.983544] kasan_save_track+0x18/0x40 [ 28.983710] kasan_save_alloc_info+0x3b/0x50 [ 28.983891] __kasan_kmalloc+0xb7/0xc0 [ 28.984124] __kmalloc_cache_noprof+0x189/0x420 [ 28.984339] kasan_atomics+0x95/0x310 [ 28.984470] kunit_try_run_case+0x1a5/0x480 [ 28.984674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.984884] kthread+0x337/0x6f0 [ 28.985174] ret_from_fork+0x116/0x1d0 [ 28.985321] ret_from_fork_asm+0x1a/0x30 [ 28.985498] [ 28.985593] The buggy address belongs to the object at ffff888106118e00 [ 28.985593] which belongs to the cache kmalloc-64 of size 64 [ 28.986073] The buggy address is located 0 bytes to the right of [ 28.986073] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.986561] [ 28.986657] The buggy address belongs to the physical page: [ 28.986851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.987332] flags: 0x200000000000000(node=0|zone=2) [ 28.987521] page_type: f5(slab) [ 28.987695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.988012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.988324] page dumped because: kasan: bad access detected [ 28.988545] [ 28.988634] Memory state around the buggy address: [ 28.988831] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.989159] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.989400] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.989612] ^ [ 28.989767] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.990003] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.990370] ================================================================== [ 28.455790] ================================================================== [ 28.456349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 28.456730] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.457207] [ 28.457301] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.457352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.457366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.457435] Call Trace: [ 28.457459] <TASK> [ 28.457479] dump_stack_lvl+0x73/0xb0 [ 28.457510] print_report+0xd1/0x640 [ 28.457535] ? __virt_addr_valid+0x1db/0x2d0 [ 28.457561] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.457585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.457612] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.457634] kasan_report+0x141/0x180 [ 28.457658] ? kasan_atomics_helper+0x49e8/0x5450 [ 28.457685] __asan_report_load4_noabort+0x18/0x20 [ 28.457711] kasan_atomics_helper+0x49e8/0x5450 [ 28.457735] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.457759] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.457785] ? kasan_atomics+0x152/0x310 [ 28.457812] kasan_atomics+0x1dc/0x310 [ 28.457836] ? __pfx_kasan_atomics+0x10/0x10 [ 28.457861] ? __pfx_read_tsc+0x10/0x10 [ 28.457884] ? ktime_get_ts64+0x86/0x230 [ 28.457910] kunit_try_run_case+0x1a5/0x480 [ 28.457937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.457971] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.457998] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.458024] ? __kthread_parkme+0x82/0x180 [ 28.458045] ? preempt_count_sub+0x50/0x80 [ 28.458071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.458097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.458121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.458158] kthread+0x337/0x6f0 [ 28.458181] ? trace_preempt_on+0x20/0xc0 [ 28.458206] ? __pfx_kthread+0x10/0x10 [ 28.458228] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.458253] ? calculate_sigpending+0x7b/0xa0 [ 28.458280] ? __pfx_kthread+0x10/0x10 [ 28.458302] ret_from_fork+0x116/0x1d0 [ 28.458323] ? __pfx_kthread+0x10/0x10 [ 28.458345] ret_from_fork_asm+0x1a/0x30 [ 28.458379] </TASK> [ 28.458391] [ 28.466012] Allocated by task 314: [ 28.466563] kasan_save_stack+0x45/0x70 [ 28.466722] kasan_save_track+0x18/0x40 [ 28.466858] kasan_save_alloc_info+0x3b/0x50 [ 28.467215] __kasan_kmalloc+0xb7/0xc0 [ 28.467452] __kmalloc_cache_noprof+0x189/0x420 [ 28.467689] kasan_atomics+0x95/0x310 [ 28.467880] kunit_try_run_case+0x1a5/0x480 [ 28.468071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.468297] kthread+0x337/0x6f0 [ 28.468508] ret_from_fork+0x116/0x1d0 [ 28.468646] ret_from_fork_asm+0x1a/0x30 [ 28.468843] [ 28.468936] The buggy address belongs to the object at ffff888106118e00 [ 28.468936] which belongs to the cache kmalloc-64 of size 64 [ 28.469493] The buggy address is located 0 bytes to the right of [ 28.469493] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.469873] [ 28.469942] The buggy address belongs to the physical page: [ 28.470121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.470373] flags: 0x200000000000000(node=0|zone=2) [ 28.470533] page_type: f5(slab) [ 28.470654] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.470885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.471161] page dumped because: kasan: bad access detected [ 28.471451] [ 28.471542] Memory state around the buggy address: [ 28.471770] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.472568] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.473386] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.473709] ^ [ 28.473919] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.474174] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.474426] ================================================================== [ 28.726556] ================================================================== [ 28.726912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 28.727285] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.727662] [ 28.727809] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.727861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.727874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.727899] Call Trace: [ 28.727939] <TASK> [ 28.727961] dump_stack_lvl+0x73/0xb0 [ 28.727992] print_report+0xd1/0x640 [ 28.728017] ? __virt_addr_valid+0x1db/0x2d0 [ 28.728045] ? kasan_atomics_helper+0x177f/0x5450 [ 28.728068] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.728095] ? kasan_atomics_helper+0x177f/0x5450 [ 28.728118] kasan_report+0x141/0x180 [ 28.728156] ? kasan_atomics_helper+0x177f/0x5450 [ 28.728185] kasan_check_range+0x10c/0x1c0 [ 28.728211] __kasan_check_write+0x18/0x20 [ 28.728236] kasan_atomics_helper+0x177f/0x5450 [ 28.728260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.728283] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.728310] ? kasan_atomics+0x152/0x310 [ 28.728337] kasan_atomics+0x1dc/0x310 [ 28.728378] ? __pfx_kasan_atomics+0x10/0x10 [ 28.728405] ? __pfx_read_tsc+0x10/0x10 [ 28.728430] ? ktime_get_ts64+0x86/0x230 [ 28.728456] kunit_try_run_case+0x1a5/0x480 [ 28.728484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.728508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.728535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.728562] ? __kthread_parkme+0x82/0x180 [ 28.728583] ? preempt_count_sub+0x50/0x80 [ 28.728619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.728647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.728672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.728710] kthread+0x337/0x6f0 [ 28.728732] ? trace_preempt_on+0x20/0xc0 [ 28.728760] ? __pfx_kthread+0x10/0x10 [ 28.728782] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.728808] ? calculate_sigpending+0x7b/0xa0 [ 28.728836] ? __pfx_kthread+0x10/0x10 [ 28.728859] ret_from_fork+0x116/0x1d0 [ 28.728882] ? __pfx_kthread+0x10/0x10 [ 28.728904] ret_from_fork_asm+0x1a/0x30 [ 28.728952] </TASK> [ 28.728964] [ 28.737209] Allocated by task 314: [ 28.737427] kasan_save_stack+0x45/0x70 [ 28.737650] kasan_save_track+0x18/0x40 [ 28.737865] kasan_save_alloc_info+0x3b/0x50 [ 28.738073] __kasan_kmalloc+0xb7/0xc0 [ 28.738274] __kmalloc_cache_noprof+0x189/0x420 [ 28.738575] kasan_atomics+0x95/0x310 [ 28.738708] kunit_try_run_case+0x1a5/0x480 [ 28.738967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.739249] kthread+0x337/0x6f0 [ 28.739452] ret_from_fork+0x116/0x1d0 [ 28.739613] ret_from_fork_asm+0x1a/0x30 [ 28.739815] [ 28.739888] The buggy address belongs to the object at ffff888106118e00 [ 28.739888] which belongs to the cache kmalloc-64 of size 64 [ 28.740351] The buggy address is located 0 bytes to the right of [ 28.740351] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.740988] [ 28.741162] The buggy address belongs to the physical page: [ 28.741490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.741817] flags: 0x200000000000000(node=0|zone=2) [ 28.742066] page_type: f5(slab) [ 28.742218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.742625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.742865] page dumped because: kasan: bad access detected [ 28.743073] [ 28.743172] Memory state around the buggy address: [ 28.743430] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.743773] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.744096] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.744663] ^ [ 28.745002] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.745232] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.745536] ================================================================== [ 28.330089] ================================================================== [ 28.330427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 28.331021] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.331482] [ 28.331574] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.331631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.331646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.331669] Call Trace: [ 28.331691] <TASK> [ 28.331710] dump_stack_lvl+0x73/0xb0 [ 28.331740] print_report+0xd1/0x640 [ 28.331765] ? __virt_addr_valid+0x1db/0x2d0 [ 28.331792] ? kasan_atomics_helper+0x1079/0x5450 [ 28.331815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.331842] ? kasan_atomics_helper+0x1079/0x5450 [ 28.331866] kasan_report+0x141/0x180 [ 28.331890] ? kasan_atomics_helper+0x1079/0x5450 [ 28.331918] kasan_check_range+0x10c/0x1c0 [ 28.331957] __kasan_check_write+0x18/0x20 [ 28.331982] kasan_atomics_helper+0x1079/0x5450 [ 28.332007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.332029] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.332056] ? kasan_atomics+0x152/0x310 [ 28.332083] kasan_atomics+0x1dc/0x310 [ 28.332108] ? __pfx_kasan_atomics+0x10/0x10 [ 28.332132] ? __pfx_read_tsc+0x10/0x10 [ 28.332168] ? ktime_get_ts64+0x86/0x230 [ 28.332195] kunit_try_run_case+0x1a5/0x480 [ 28.332222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.332247] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.332274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.332301] ? __kthread_parkme+0x82/0x180 [ 28.332323] ? preempt_count_sub+0x50/0x80 [ 28.332348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.332413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.332441] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.332467] kthread+0x337/0x6f0 [ 28.332488] ? trace_preempt_on+0x20/0xc0 [ 28.332513] ? __pfx_kthread+0x10/0x10 [ 28.332536] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.332561] ? calculate_sigpending+0x7b/0xa0 [ 28.332587] ? __pfx_kthread+0x10/0x10 [ 28.332610] ret_from_fork+0x116/0x1d0 [ 28.332633] ? __pfx_kthread+0x10/0x10 [ 28.332655] ret_from_fork_asm+0x1a/0x30 [ 28.332689] </TASK> [ 28.332701] [ 28.340938] Allocated by task 314: [ 28.341138] kasan_save_stack+0x45/0x70 [ 28.341337] kasan_save_track+0x18/0x40 [ 28.341617] kasan_save_alloc_info+0x3b/0x50 [ 28.341831] __kasan_kmalloc+0xb7/0xc0 [ 28.342056] __kmalloc_cache_noprof+0x189/0x420 [ 28.342286] kasan_atomics+0x95/0x310 [ 28.342413] kunit_try_run_case+0x1a5/0x480 [ 28.342551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.342717] kthread+0x337/0x6f0 [ 28.342833] ret_from_fork+0x116/0x1d0 [ 28.342958] ret_from_fork_asm+0x1a/0x30 [ 28.343091] [ 28.343165] The buggy address belongs to the object at ffff888106118e00 [ 28.343165] which belongs to the cache kmalloc-64 of size 64 [ 28.343505] The buggy address is located 0 bytes to the right of [ 28.343505] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.343859] [ 28.343926] The buggy address belongs to the physical page: [ 28.344171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.344513] flags: 0x200000000000000(node=0|zone=2) [ 28.344737] page_type: f5(slab) [ 28.344897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.345303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.345641] page dumped because: kasan: bad access detected [ 28.345882] [ 28.345991] Memory state around the buggy address: [ 28.346221] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.346525] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.346729] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.346933] ^ [ 28.347606] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.347950] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.348283] ================================================================== [ 28.474947] ================================================================== [ 28.475295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 28.475678] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.475911] [ 28.476071] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.476122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.476135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.476170] Call Trace: [ 28.476193] <TASK> [ 28.476214] dump_stack_lvl+0x73/0xb0 [ 28.476245] print_report+0xd1/0x640 [ 28.476269] ? __virt_addr_valid+0x1db/0x2d0 [ 28.476296] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.476319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.476346] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.476382] kasan_report+0x141/0x180 [ 28.476406] ? kasan_atomics_helper+0x12e6/0x5450 [ 28.476433] kasan_check_range+0x10c/0x1c0 [ 28.476458] __kasan_check_write+0x18/0x20 [ 28.476482] kasan_atomics_helper+0x12e6/0x5450 [ 28.476508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.476531] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.476557] ? kasan_atomics+0x152/0x310 [ 28.476586] kasan_atomics+0x1dc/0x310 [ 28.476609] ? __pfx_kasan_atomics+0x10/0x10 [ 28.476634] ? __pfx_read_tsc+0x10/0x10 [ 28.476657] ? ktime_get_ts64+0x86/0x230 [ 28.476684] kunit_try_run_case+0x1a5/0x480 [ 28.476710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.476734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.476761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.476787] ? __kthread_parkme+0x82/0x180 [ 28.476809] ? preempt_count_sub+0x50/0x80 [ 28.476834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.476859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.476884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.476909] kthread+0x337/0x6f0 [ 28.476930] ? trace_preempt_on+0x20/0xc0 [ 28.476971] ? __pfx_kthread+0x10/0x10 [ 28.476992] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.477018] ? calculate_sigpending+0x7b/0xa0 [ 28.477043] ? __pfx_kthread+0x10/0x10 [ 28.477065] ret_from_fork+0x116/0x1d0 [ 28.477087] ? __pfx_kthread+0x10/0x10 [ 28.477109] ret_from_fork_asm+0x1a/0x30 [ 28.477150] </TASK> [ 28.477164] [ 28.485453] Allocated by task 314: [ 28.485662] kasan_save_stack+0x45/0x70 [ 28.485873] kasan_save_track+0x18/0x40 [ 28.486241] kasan_save_alloc_info+0x3b/0x50 [ 28.486572] __kasan_kmalloc+0xb7/0xc0 [ 28.486730] __kmalloc_cache_noprof+0x189/0x420 [ 28.486930] kasan_atomics+0x95/0x310 [ 28.487097] kunit_try_run_case+0x1a5/0x480 [ 28.487272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.487782] kthread+0x337/0x6f0 [ 28.487971] ret_from_fork+0x116/0x1d0 [ 28.488125] ret_from_fork_asm+0x1a/0x30 [ 28.488330] [ 28.489799] The buggy address belongs to the object at ffff888106118e00 [ 28.489799] which belongs to the cache kmalloc-64 of size 64 [ 28.490265] The buggy address is located 0 bytes to the right of [ 28.490265] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.491894] [ 28.492023] The buggy address belongs to the physical page: [ 28.492216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.492944] flags: 0x200000000000000(node=0|zone=2) [ 28.493291] page_type: f5(slab) [ 28.493464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.494229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.494732] page dumped because: kasan: bad access detected [ 28.495306] [ 28.495627] Memory state around the buggy address: [ 28.495853] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.496350] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.496668] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.497157] ^ [ 28.497690] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.498193] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.498667] ================================================================== [ 28.544107] ================================================================== [ 28.544821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 28.545951] Read of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.546425] [ 28.546525] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.546578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.546593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.546616] Call Trace: [ 28.546638] <TASK> [ 28.546659] dump_stack_lvl+0x73/0xb0 [ 28.546691] print_report+0xd1/0x640 [ 28.546716] ? __virt_addr_valid+0x1db/0x2d0 [ 28.546742] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.546764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.546791] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.546814] kasan_report+0x141/0x180 [ 28.546837] ? kasan_atomics_helper+0x4eae/0x5450 [ 28.546864] __asan_report_load8_noabort+0x18/0x20 [ 28.546889] kasan_atomics_helper+0x4eae/0x5450 [ 28.546913] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.546936] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.546963] ? kasan_atomics+0x152/0x310 [ 28.546989] kasan_atomics+0x1dc/0x310 [ 28.547013] ? __pfx_kasan_atomics+0x10/0x10 [ 28.547038] ? __pfx_read_tsc+0x10/0x10 [ 28.547061] ? ktime_get_ts64+0x86/0x230 [ 28.547086] kunit_try_run_case+0x1a5/0x480 [ 28.547113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.547136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.547175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.547202] ? __kthread_parkme+0x82/0x180 [ 28.547224] ? preempt_count_sub+0x50/0x80 [ 28.547248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.547273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.547298] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.547521] kthread+0x337/0x6f0 [ 28.547556] ? trace_preempt_on+0x20/0xc0 [ 28.547583] ? __pfx_kthread+0x10/0x10 [ 28.547605] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.547638] ? calculate_sigpending+0x7b/0xa0 [ 28.547664] ? __pfx_kthread+0x10/0x10 [ 28.547687] ret_from_fork+0x116/0x1d0 [ 28.547708] ? __pfx_kthread+0x10/0x10 [ 28.547731] ret_from_fork_asm+0x1a/0x30 [ 28.547766] </TASK> [ 28.547779] [ 28.564237] Allocated by task 314: [ 28.564706] kasan_save_stack+0x45/0x70 [ 28.565262] kasan_save_track+0x18/0x40 [ 28.565750] kasan_save_alloc_info+0x3b/0x50 [ 28.566141] __kasan_kmalloc+0xb7/0xc0 [ 28.566516] __kmalloc_cache_noprof+0x189/0x420 [ 28.566679] kasan_atomics+0x95/0x310 [ 28.566810] kunit_try_run_case+0x1a5/0x480 [ 28.566967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.567532] kthread+0x337/0x6f0 [ 28.567969] ret_from_fork+0x116/0x1d0 [ 28.568430] ret_from_fork_asm+0x1a/0x30 [ 28.568883] [ 28.569084] The buggy address belongs to the object at ffff888106118e00 [ 28.569084] which belongs to the cache kmalloc-64 of size 64 [ 28.570530] The buggy address is located 0 bytes to the right of [ 28.570530] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.570903] [ 28.570993] The buggy address belongs to the physical page: [ 28.571206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.571870] flags: 0x200000000000000(node=0|zone=2) [ 28.572168] page_type: f5(slab) [ 28.572315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.572629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.573108] page dumped because: kasan: bad access detected [ 28.573292] [ 28.573404] Memory state around the buggy address: [ 28.573695] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.574256] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.574674] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.575019] ^ [ 28.575249] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.575544] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.576138] ================================================================== [ 27.797479] ================================================================== [ 27.798883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 27.799585] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.800379] [ 27.800650] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.800717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.800733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.800759] Call Trace: [ 27.800781] <TASK> [ 27.800803] dump_stack_lvl+0x73/0xb0 [ 27.800837] print_report+0xd1/0x640 [ 27.800862] ? __virt_addr_valid+0x1db/0x2d0 [ 27.800888] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.800910] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.800938] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.801090] kasan_report+0x141/0x180 [ 27.801117] ? kasan_atomics_helper+0x4b54/0x5450 [ 27.801200] __asan_report_load4_noabort+0x18/0x20 [ 27.801227] kasan_atomics_helper+0x4b54/0x5450 [ 27.801251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.801274] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.801301] ? kasan_atomics+0x152/0x310 [ 27.801328] kasan_atomics+0x1dc/0x310 [ 27.801352] ? __pfx_kasan_atomics+0x10/0x10 [ 27.801387] ? __pfx_read_tsc+0x10/0x10 [ 27.801413] ? ktime_get_ts64+0x86/0x230 [ 27.801439] kunit_try_run_case+0x1a5/0x480 [ 27.801466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.801493] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.801522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.801547] ? __kthread_parkme+0x82/0x180 [ 27.801570] ? preempt_count_sub+0x50/0x80 [ 27.801594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.801618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.801643] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.801667] kthread+0x337/0x6f0 [ 27.801689] ? trace_preempt_on+0x20/0xc0 [ 27.801715] ? __pfx_kthread+0x10/0x10 [ 27.801737] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.801762] ? calculate_sigpending+0x7b/0xa0 [ 27.801788] ? __pfx_kthread+0x10/0x10 [ 27.801811] ret_from_fork+0x116/0x1d0 [ 27.801832] ? __pfx_kthread+0x10/0x10 [ 27.801854] ret_from_fork_asm+0x1a/0x30 [ 27.801887] </TASK> [ 27.801900] [ 27.818818] Allocated by task 314: [ 27.819137] kasan_save_stack+0x45/0x70 [ 27.819460] kasan_save_track+0x18/0x40 [ 27.819898] kasan_save_alloc_info+0x3b/0x50 [ 27.820362] __kasan_kmalloc+0xb7/0xc0 [ 27.820679] __kmalloc_cache_noprof+0x189/0x420 [ 27.821151] kasan_atomics+0x95/0x310 [ 27.821362] kunit_try_run_case+0x1a5/0x480 [ 27.821777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.821963] kthread+0x337/0x6f0 [ 27.822293] ret_from_fork+0x116/0x1d0 [ 27.822712] ret_from_fork_asm+0x1a/0x30 [ 27.823156] [ 27.823324] The buggy address belongs to the object at ffff888106118e00 [ 27.823324] which belongs to the cache kmalloc-64 of size 64 [ 27.824068] The buggy address is located 0 bytes to the right of [ 27.824068] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.824455] [ 27.824667] The buggy address belongs to the physical page: [ 27.825233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.826062] flags: 0x200000000000000(node=0|zone=2) [ 27.826565] page_type: f5(slab) [ 27.826935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.827709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.827937] page dumped because: kasan: bad access detected [ 27.828106] [ 27.828183] Memory state around the buggy address: [ 27.828337] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.828560] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.829176] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.829929] ^ [ 27.830406] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.831085] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.831786] ================================================================== [ 27.773381] ================================================================== [ 27.773611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 27.773835] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.774053] [ 27.774135] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.774195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.774210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.774233] Call Trace: [ 27.774252] <TASK> [ 27.774269] dump_stack_lvl+0x73/0xb0 [ 27.774560] print_report+0xd1/0x640 [ 27.774585] ? __virt_addr_valid+0x1db/0x2d0 [ 27.774611] ? kasan_atomics_helper+0x3df/0x5450 [ 27.774634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.774662] ? kasan_atomics_helper+0x3df/0x5450 [ 27.774685] kasan_report+0x141/0x180 [ 27.774711] ? kasan_atomics_helper+0x3df/0x5450 [ 27.774738] kasan_check_range+0x10c/0x1c0 [ 27.774764] __kasan_check_read+0x15/0x20 [ 27.774788] kasan_atomics_helper+0x3df/0x5450 [ 27.774813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.774835] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.774862] ? kasan_atomics+0x152/0x310 [ 27.774889] kasan_atomics+0x1dc/0x310 [ 27.774914] ? __pfx_kasan_atomics+0x10/0x10 [ 27.774939] ? __pfx_read_tsc+0x10/0x10 [ 27.774963] ? ktime_get_ts64+0x86/0x230 [ 27.774990] kunit_try_run_case+0x1a5/0x480 [ 27.775016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.775040] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.775067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.775095] ? __kthread_parkme+0x82/0x180 [ 27.775116] ? preempt_count_sub+0x50/0x80 [ 27.775141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.775180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.775206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.775232] kthread+0x337/0x6f0 [ 27.775254] ? trace_preempt_on+0x20/0xc0 [ 27.775280] ? __pfx_kthread+0x10/0x10 [ 27.775302] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.775328] ? calculate_sigpending+0x7b/0xa0 [ 27.775353] ? __pfx_kthread+0x10/0x10 [ 27.775376] ret_from_fork+0x116/0x1d0 [ 27.775397] ? __pfx_kthread+0x10/0x10 [ 27.775474] ret_from_fork_asm+0x1a/0x30 [ 27.775508] </TASK> [ 27.775521] [ 27.783761] Allocated by task 314: [ 27.783900] kasan_save_stack+0x45/0x70 [ 27.784223] kasan_save_track+0x18/0x40 [ 27.784415] kasan_save_alloc_info+0x3b/0x50 [ 27.784599] __kasan_kmalloc+0xb7/0xc0 [ 27.784739] __kmalloc_cache_noprof+0x189/0x420 [ 27.784894] kasan_atomics+0x95/0x310 [ 27.785026] kunit_try_run_case+0x1a5/0x480 [ 27.785254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.785747] kthread+0x337/0x6f0 [ 27.785951] ret_from_fork+0x116/0x1d0 [ 27.786156] ret_from_fork_asm+0x1a/0x30 [ 27.786354] [ 27.786510] The buggy address belongs to the object at ffff888106118e00 [ 27.786510] which belongs to the cache kmalloc-64 of size 64 [ 27.787043] The buggy address is located 0 bytes to the right of [ 27.787043] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.787554] [ 27.787633] The buggy address belongs to the physical page: [ 27.787810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.788122] flags: 0x200000000000000(node=0|zone=2) [ 27.788384] page_type: f5(slab) [ 27.788552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.788889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.789113] page dumped because: kasan: bad access detected [ 27.790279] [ 27.790476] Memory state around the buggy address: [ 27.790751] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.793026] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.794049] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.794761] ^ [ 27.794933] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.795434] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.796319] ================================================================== [ 27.897213] ================================================================== [ 27.898128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 27.899109] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.899602] [ 27.899933] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.900000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.900017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.900049] Call Trace: [ 27.900071] <TASK> [ 27.900093] dump_stack_lvl+0x73/0xb0 [ 27.900128] print_report+0xd1/0x640 [ 27.900166] ? __virt_addr_valid+0x1db/0x2d0 [ 27.900195] ? kasan_atomics_helper+0x565/0x5450 [ 27.900222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.900254] ? kasan_atomics_helper+0x565/0x5450 [ 27.900280] kasan_report+0x141/0x180 [ 27.900306] ? kasan_atomics_helper+0x565/0x5450 [ 27.900337] kasan_check_range+0x10c/0x1c0 [ 27.900365] __kasan_check_write+0x18/0x20 [ 27.900541] kasan_atomics_helper+0x565/0x5450 [ 27.900570] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.900598] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.900628] ? kasan_atomics+0x152/0x310 [ 27.900658] kasan_atomics+0x1dc/0x310 [ 27.900683] ? __pfx_kasan_atomics+0x10/0x10 [ 27.900711] ? __pfx_read_tsc+0x10/0x10 [ 27.900738] ? ktime_get_ts64+0x86/0x230 [ 27.900767] kunit_try_run_case+0x1a5/0x480 [ 27.900797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.900827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.900857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.900887] ? __kthread_parkme+0x82/0x180 [ 27.900911] ? preempt_count_sub+0x50/0x80 [ 27.900938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.900967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.900997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.901026] kthread+0x337/0x6f0 [ 27.901050] ? trace_preempt_on+0x20/0xc0 [ 27.901079] ? __pfx_kthread+0x10/0x10 [ 27.901103] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.901131] ? calculate_sigpending+0x7b/0xa0 [ 27.901171] ? __pfx_kthread+0x10/0x10 [ 27.901196] ret_from_fork+0x116/0x1d0 [ 27.901220] ? __pfx_kthread+0x10/0x10 [ 27.901245] ret_from_fork_asm+0x1a/0x30 [ 27.901280] </TASK> [ 27.901293] [ 27.913946] Allocated by task 314: [ 27.914336] kasan_save_stack+0x45/0x70 [ 27.914673] kasan_save_track+0x18/0x40 [ 27.914853] kasan_save_alloc_info+0x3b/0x50 [ 27.915242] __kasan_kmalloc+0xb7/0xc0 [ 27.915452] __kmalloc_cache_noprof+0x189/0x420 [ 27.915727] kasan_atomics+0x95/0x310 [ 27.915979] kunit_try_run_case+0x1a5/0x480 [ 27.916187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.916593] kthread+0x337/0x6f0 [ 27.916760] ret_from_fork+0x116/0x1d0 [ 27.917159] ret_from_fork_asm+0x1a/0x30 [ 27.917333] [ 27.917408] The buggy address belongs to the object at ffff888106118e00 [ 27.917408] which belongs to the cache kmalloc-64 of size 64 [ 27.918285] The buggy address is located 0 bytes to the right of [ 27.918285] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.919177] [ 27.919273] The buggy address belongs to the physical page: [ 27.919690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.920108] flags: 0x200000000000000(node=0|zone=2) [ 27.920421] page_type: f5(slab) [ 27.920625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.920984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.921389] page dumped because: kasan: bad access detected [ 27.921778] [ 27.921879] Memory state around the buggy address: [ 27.922136] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.922577] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.922996] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.923301] ^ [ 27.923601] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.924024] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.924345] ================================================================== [ 28.070662] ================================================================== [ 28.070928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 28.071258] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.071504] [ 28.071978] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.072034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.072048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.072073] Call Trace: [ 28.072094] <TASK> [ 28.072191] dump_stack_lvl+0x73/0xb0 [ 28.072281] print_report+0xd1/0x640 [ 28.072306] ? __virt_addr_valid+0x1db/0x2d0 [ 28.072332] ? kasan_atomics_helper+0x992/0x5450 [ 28.072411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.072440] ? kasan_atomics_helper+0x992/0x5450 [ 28.072463] kasan_report+0x141/0x180 [ 28.072488] ? kasan_atomics_helper+0x992/0x5450 [ 28.072515] kasan_check_range+0x10c/0x1c0 [ 28.072540] __kasan_check_write+0x18/0x20 [ 28.072565] kasan_atomics_helper+0x992/0x5450 [ 28.072588] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.072611] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.072636] ? kasan_atomics+0x152/0x310 [ 28.072662] kasan_atomics+0x1dc/0x310 [ 28.072686] ? __pfx_kasan_atomics+0x10/0x10 [ 28.072712] ? __pfx_read_tsc+0x10/0x10 [ 28.072735] ? ktime_get_ts64+0x86/0x230 [ 28.072762] kunit_try_run_case+0x1a5/0x480 [ 28.072787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.072811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.072839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.072865] ? __kthread_parkme+0x82/0x180 [ 28.072886] ? preempt_count_sub+0x50/0x80 [ 28.072911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.072937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.072962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.072988] kthread+0x337/0x6f0 [ 28.073011] ? trace_preempt_on+0x20/0xc0 [ 28.073036] ? __pfx_kthread+0x10/0x10 [ 28.073059] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.073084] ? calculate_sigpending+0x7b/0xa0 [ 28.073110] ? __pfx_kthread+0x10/0x10 [ 28.073133] ret_from_fork+0x116/0x1d0 [ 28.073165] ? __pfx_kthread+0x10/0x10 [ 28.073188] ret_from_fork_asm+0x1a/0x30 [ 28.073221] </TASK> [ 28.073234] [ 28.083132] Allocated by task 314: [ 28.083653] kasan_save_stack+0x45/0x70 [ 28.083964] kasan_save_track+0x18/0x40 [ 28.084234] kasan_save_alloc_info+0x3b/0x50 [ 28.084399] __kasan_kmalloc+0xb7/0xc0 [ 28.084550] __kmalloc_cache_noprof+0x189/0x420 [ 28.085125] kasan_atomics+0x95/0x310 [ 28.085313] kunit_try_run_case+0x1a5/0x480 [ 28.085515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.085999] kthread+0x337/0x6f0 [ 28.086134] ret_from_fork+0x116/0x1d0 [ 28.086346] ret_from_fork_asm+0x1a/0x30 [ 28.086571] [ 28.086768] The buggy address belongs to the object at ffff888106118e00 [ 28.086768] which belongs to the cache kmalloc-64 of size 64 [ 28.087425] The buggy address is located 0 bytes to the right of [ 28.087425] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.088190] [ 28.088354] The buggy address belongs to the physical page: [ 28.088619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.088920] flags: 0x200000000000000(node=0|zone=2) [ 28.089319] page_type: f5(slab) [ 28.089539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.090048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.090448] page dumped because: kasan: bad access detected [ 28.090815] [ 28.090956] Memory state around the buggy address: [ 28.091126] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.091658] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.091905] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.092300] ^ [ 28.092796] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.093081] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.093604] ================================================================== [ 29.092707] ================================================================== [ 29.093865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 29.094353] Read of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.094657] [ 29.094774] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.094829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.094843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.094868] Call Trace: [ 29.094889] <TASK> [ 29.094910] dump_stack_lvl+0x73/0xb0 [ 29.094955] print_report+0xd1/0x640 [ 29.095004] ? __virt_addr_valid+0x1db/0x2d0 [ 29.095030] ? kasan_atomics_helper+0x4fb2/0x5450 [ 29.095054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.095081] ? kasan_atomics_helper+0x4fb2/0x5450 [ 29.095122] kasan_report+0x141/0x180 [ 29.095157] ? kasan_atomics_helper+0x4fb2/0x5450 [ 29.095186] __asan_report_load8_noabort+0x18/0x20 [ 29.095212] kasan_atomics_helper+0x4fb2/0x5450 [ 29.095237] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.095261] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.095286] ? kasan_atomics+0x152/0x310 [ 29.095314] kasan_atomics+0x1dc/0x310 [ 29.095338] ? __pfx_kasan_atomics+0x10/0x10 [ 29.095364] ? __pfx_read_tsc+0x10/0x10 [ 29.095388] ? ktime_get_ts64+0x86/0x230 [ 29.095414] kunit_try_run_case+0x1a5/0x480 [ 29.095441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.095465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.095514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.095542] ? __kthread_parkme+0x82/0x180 [ 29.095564] ? preempt_count_sub+0x50/0x80 [ 29.095589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.095615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.095644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.095670] kthread+0x337/0x6f0 [ 29.095712] ? trace_preempt_on+0x20/0xc0 [ 29.095739] ? __pfx_kthread+0x10/0x10 [ 29.095761] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.095787] ? calculate_sigpending+0x7b/0xa0 [ 29.095813] ? __pfx_kthread+0x10/0x10 [ 29.095836] ret_from_fork+0x116/0x1d0 [ 29.095857] ? __pfx_kthread+0x10/0x10 [ 29.095879] ret_from_fork_asm+0x1a/0x30 [ 29.095912] </TASK> [ 29.095926] [ 29.103016] Allocated by task 314: [ 29.103208] kasan_save_stack+0x45/0x70 [ 29.103430] kasan_save_track+0x18/0x40 [ 29.103648] kasan_save_alloc_info+0x3b/0x50 [ 29.103859] __kasan_kmalloc+0xb7/0xc0 [ 29.104031] __kmalloc_cache_noprof+0x189/0x420 [ 29.104246] kasan_atomics+0x95/0x310 [ 29.104439] kunit_try_run_case+0x1a5/0x480 [ 29.104590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.104859] kthread+0x337/0x6f0 [ 29.105057] ret_from_fork+0x116/0x1d0 [ 29.105203] ret_from_fork_asm+0x1a/0x30 [ 29.105417] [ 29.105510] The buggy address belongs to the object at ffff888106118e00 [ 29.105510] which belongs to the cache kmalloc-64 of size 64 [ 29.105896] The buggy address is located 0 bytes to the right of [ 29.105896] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.106277] [ 29.106346] The buggy address belongs to the physical page: [ 29.106599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.106977] flags: 0x200000000000000(node=0|zone=2) [ 29.107230] page_type: f5(slab) [ 29.107395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.107729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.108207] page dumped because: kasan: bad access detected [ 29.108390] [ 29.108455] Memory state around the buggy address: [ 29.108608] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.108838] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.109417] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.109718] ^ [ 29.109933] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.110209] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.110523] ================================================================== [ 27.754532] ================================================================== [ 27.754887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 27.755559] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.755885] [ 27.755993] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.756042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.756055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.756078] Call Trace: [ 27.756097] <TASK> [ 27.756114] dump_stack_lvl+0x73/0xb0 [ 27.756157] print_report+0xd1/0x640 [ 27.756181] ? __virt_addr_valid+0x1db/0x2d0 [ 27.756207] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.756230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.756257] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.756280] kasan_report+0x141/0x180 [ 27.756303] ? kasan_atomics_helper+0x4b6e/0x5450 [ 27.756331] __asan_report_store4_noabort+0x1b/0x30 [ 27.756356] kasan_atomics_helper+0x4b6e/0x5450 [ 27.756426] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.756451] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.756478] ? kasan_atomics+0x152/0x310 [ 27.756505] kasan_atomics+0x1dc/0x310 [ 27.756529] ? __pfx_kasan_atomics+0x10/0x10 [ 27.756556] ? __pfx_read_tsc+0x10/0x10 [ 27.756579] ? ktime_get_ts64+0x86/0x230 [ 27.756605] kunit_try_run_case+0x1a5/0x480 [ 27.756631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.756655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.756682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.756709] ? __kthread_parkme+0x82/0x180 [ 27.756731] ? preempt_count_sub+0x50/0x80 [ 27.756755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.756781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.756806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.756832] kthread+0x337/0x6f0 [ 27.756854] ? trace_preempt_on+0x20/0xc0 [ 27.756879] ? __pfx_kthread+0x10/0x10 [ 27.756901] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.756926] ? calculate_sigpending+0x7b/0xa0 [ 27.756961] ? __pfx_kthread+0x10/0x10 [ 27.756984] ret_from_fork+0x116/0x1d0 [ 27.757005] ? __pfx_kthread+0x10/0x10 [ 27.757027] ret_from_fork_asm+0x1a/0x30 [ 27.757059] </TASK> [ 27.757072] [ 27.765299] Allocated by task 314: [ 27.765533] kasan_save_stack+0x45/0x70 [ 27.765681] kasan_save_track+0x18/0x40 [ 27.765814] kasan_save_alloc_info+0x3b/0x50 [ 27.765959] __kasan_kmalloc+0xb7/0xc0 [ 27.766088] __kmalloc_cache_noprof+0x189/0x420 [ 27.766322] kasan_atomics+0x95/0x310 [ 27.766593] kunit_try_run_case+0x1a5/0x480 [ 27.766802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.767045] kthread+0x337/0x6f0 [ 27.767223] ret_from_fork+0x116/0x1d0 [ 27.767408] ret_from_fork_asm+0x1a/0x30 [ 27.767593] [ 27.767666] The buggy address belongs to the object at ffff888106118e00 [ 27.767666] which belongs to the cache kmalloc-64 of size 64 [ 27.768017] The buggy address is located 0 bytes to the right of [ 27.768017] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.769081] [ 27.769190] The buggy address belongs to the physical page: [ 27.769423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.769715] flags: 0x200000000000000(node=0|zone=2) [ 27.769938] page_type: f5(slab) [ 27.770102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.770401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.770719] page dumped because: kasan: bad access detected [ 27.770925] [ 27.771028] Memory state around the buggy address: [ 27.771229] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.771523] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.771799] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.772088] ^ [ 27.772358] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.772648] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.772921] ================================================================== [ 28.786949] ================================================================== [ 28.787297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 28.787927] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.788250] [ 28.788424] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.788476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.788490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.788513] Call Trace: [ 28.788535] <TASK> [ 28.788555] dump_stack_lvl+0x73/0xb0 [ 28.788586] print_report+0xd1/0x640 [ 28.788611] ? __virt_addr_valid+0x1db/0x2d0 [ 28.788638] ? kasan_atomics_helper+0x194a/0x5450 [ 28.788661] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.788688] ? kasan_atomics_helper+0x194a/0x5450 [ 28.788712] kasan_report+0x141/0x180 [ 28.788735] ? kasan_atomics_helper+0x194a/0x5450 [ 28.788762] kasan_check_range+0x10c/0x1c0 [ 28.788788] __kasan_check_write+0x18/0x20 [ 28.788813] kasan_atomics_helper+0x194a/0x5450 [ 28.788837] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.788860] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.788887] ? kasan_atomics+0x152/0x310 [ 28.788915] kasan_atomics+0x1dc/0x310 [ 28.788948] ? __pfx_kasan_atomics+0x10/0x10 [ 28.788974] ? __pfx_read_tsc+0x10/0x10 [ 28.788997] ? ktime_get_ts64+0x86/0x230 [ 28.789023] kunit_try_run_case+0x1a5/0x480 [ 28.789050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.789074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.789102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.789128] ? __kthread_parkme+0x82/0x180 [ 28.789159] ? preempt_count_sub+0x50/0x80 [ 28.789184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.789210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.789235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.789260] kthread+0x337/0x6f0 [ 28.789281] ? trace_preempt_on+0x20/0xc0 [ 28.789307] ? __pfx_kthread+0x10/0x10 [ 28.789329] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.789355] ? calculate_sigpending+0x7b/0xa0 [ 28.789380] ? __pfx_kthread+0x10/0x10 [ 28.789403] ret_from_fork+0x116/0x1d0 [ 28.789423] ? __pfx_kthread+0x10/0x10 [ 28.789445] ret_from_fork_asm+0x1a/0x30 [ 28.789478] </TASK> [ 28.789491] [ 28.797744] Allocated by task 314: [ 28.797939] kasan_save_stack+0x45/0x70 [ 28.798175] kasan_save_track+0x18/0x40 [ 28.798605] kasan_save_alloc_info+0x3b/0x50 [ 28.798809] __kasan_kmalloc+0xb7/0xc0 [ 28.799009] __kmalloc_cache_noprof+0x189/0x420 [ 28.799248] kasan_atomics+0x95/0x310 [ 28.799507] kunit_try_run_case+0x1a5/0x480 [ 28.799738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.800012] kthread+0x337/0x6f0 [ 28.800186] ret_from_fork+0x116/0x1d0 [ 28.800436] ret_from_fork_asm+0x1a/0x30 [ 28.800630] [ 28.800700] The buggy address belongs to the object at ffff888106118e00 [ 28.800700] which belongs to the cache kmalloc-64 of size 64 [ 28.801248] The buggy address is located 0 bytes to the right of [ 28.801248] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.801867] [ 28.801981] The buggy address belongs to the physical page: [ 28.802231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.802535] flags: 0x200000000000000(node=0|zone=2) [ 28.802702] page_type: f5(slab) [ 28.802825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.803053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.803386] page dumped because: kasan: bad access detected [ 28.803656] [ 28.803747] Memory state around the buggy address: [ 28.804341] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.804789] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.805189] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.805570] ^ [ 28.805828] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.806179] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.806528] ================================================================== [ 27.925048] ================================================================== [ 27.925372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 27.925887] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.926167] [ 27.926283] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.926335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.926348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.926372] Call Trace: [ 27.926395] <TASK> [ 27.926561] dump_stack_lvl+0x73/0xb0 [ 27.926597] print_report+0xd1/0x640 [ 27.926623] ? __virt_addr_valid+0x1db/0x2d0 [ 27.926650] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.926672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.926700] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.926723] kasan_report+0x141/0x180 [ 27.926747] ? kasan_atomics_helper+0x5fe/0x5450 [ 27.926774] kasan_check_range+0x10c/0x1c0 [ 27.926800] __kasan_check_write+0x18/0x20 [ 27.926824] kasan_atomics_helper+0x5fe/0x5450 [ 27.926849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.926872] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.926898] ? kasan_atomics+0x152/0x310 [ 27.926925] kasan_atomics+0x1dc/0x310 [ 27.927084] ? __pfx_kasan_atomics+0x10/0x10 [ 27.927112] ? __pfx_read_tsc+0x10/0x10 [ 27.927137] ? ktime_get_ts64+0x86/0x230 [ 27.927176] kunit_try_run_case+0x1a5/0x480 [ 27.927204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.927318] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.927348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.927392] ? __kthread_parkme+0x82/0x180 [ 27.927422] ? preempt_count_sub+0x50/0x80 [ 27.927448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.927473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.927499] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.927524] kthread+0x337/0x6f0 [ 27.927547] ? trace_preempt_on+0x20/0xc0 [ 27.927573] ? __pfx_kthread+0x10/0x10 [ 27.927594] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.927633] ? calculate_sigpending+0x7b/0xa0 [ 27.927658] ? __pfx_kthread+0x10/0x10 [ 27.927681] ret_from_fork+0x116/0x1d0 [ 27.927703] ? __pfx_kthread+0x10/0x10 [ 27.927725] ret_from_fork_asm+0x1a/0x30 [ 27.927758] </TASK> [ 27.927771] [ 27.937795] Allocated by task 314: [ 27.937965] kasan_save_stack+0x45/0x70 [ 27.938392] kasan_save_track+0x18/0x40 [ 27.938589] kasan_save_alloc_info+0x3b/0x50 [ 27.938768] __kasan_kmalloc+0xb7/0xc0 [ 27.939082] __kmalloc_cache_noprof+0x189/0x420 [ 27.939291] kasan_atomics+0x95/0x310 [ 27.939584] kunit_try_run_case+0x1a5/0x480 [ 27.939811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.940182] kthread+0x337/0x6f0 [ 27.940358] ret_from_fork+0x116/0x1d0 [ 27.940661] ret_from_fork_asm+0x1a/0x30 [ 27.940983] [ 27.941071] The buggy address belongs to the object at ffff888106118e00 [ 27.941071] which belongs to the cache kmalloc-64 of size 64 [ 27.941690] The buggy address is located 0 bytes to the right of [ 27.941690] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.942162] [ 27.942258] The buggy address belongs to the physical page: [ 27.942786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.943289] flags: 0x200000000000000(node=0|zone=2) [ 27.943711] page_type: f5(slab) [ 27.943854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.944244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.944803] page dumped because: kasan: bad access detected [ 27.945004] [ 27.945098] Memory state around the buggy address: [ 27.945482] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.945861] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.946193] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.946694] ^ [ 27.946931] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.947252] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.947634] ================================================================== [ 28.263532] ================================================================== [ 28.263946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 28.264366] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.264807] [ 28.264992] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.265042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.265092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.265116] Call Trace: [ 28.265133] <TASK> [ 28.265163] dump_stack_lvl+0x73/0xb0 [ 28.265193] print_report+0xd1/0x640 [ 28.265217] ? __virt_addr_valid+0x1db/0x2d0 [ 28.265274] ? kasan_atomics_helper+0xf10/0x5450 [ 28.265297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.265324] ? kasan_atomics_helper+0xf10/0x5450 [ 28.265345] kasan_report+0x141/0x180 [ 28.265369] ? kasan_atomics_helper+0xf10/0x5450 [ 28.265396] kasan_check_range+0x10c/0x1c0 [ 28.265468] __kasan_check_write+0x18/0x20 [ 28.265493] kasan_atomics_helper+0xf10/0x5450 [ 28.265517] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.265540] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.265567] ? kasan_atomics+0x152/0x310 [ 28.265593] kasan_atomics+0x1dc/0x310 [ 28.265617] ? __pfx_kasan_atomics+0x10/0x10 [ 28.265642] ? __pfx_read_tsc+0x10/0x10 [ 28.265697] ? ktime_get_ts64+0x86/0x230 [ 28.265724] kunit_try_run_case+0x1a5/0x480 [ 28.265774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.265797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.265824] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.265851] ? __kthread_parkme+0x82/0x180 [ 28.265874] ? preempt_count_sub+0x50/0x80 [ 28.265899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.265952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.265978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.266003] kthread+0x337/0x6f0 [ 28.266025] ? trace_preempt_on+0x20/0xc0 [ 28.266050] ? __pfx_kthread+0x10/0x10 [ 28.266071] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.266097] ? calculate_sigpending+0x7b/0xa0 [ 28.266163] ? __pfx_kthread+0x10/0x10 [ 28.266186] ret_from_fork+0x116/0x1d0 [ 28.266207] ? __pfx_kthread+0x10/0x10 [ 28.266229] ret_from_fork_asm+0x1a/0x30 [ 28.266262] </TASK> [ 28.266305] [ 28.274785] Allocated by task 314: [ 28.274924] kasan_save_stack+0x45/0x70 [ 28.275129] kasan_save_track+0x18/0x40 [ 28.275465] kasan_save_alloc_info+0x3b/0x50 [ 28.275693] __kasan_kmalloc+0xb7/0xc0 [ 28.275876] __kmalloc_cache_noprof+0x189/0x420 [ 28.276118] kasan_atomics+0x95/0x310 [ 28.276256] kunit_try_run_case+0x1a5/0x480 [ 28.276759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.277520] kthread+0x337/0x6f0 [ 28.277810] ret_from_fork+0x116/0x1d0 [ 28.277996] ret_from_fork_asm+0x1a/0x30 [ 28.278744] [ 28.278834] The buggy address belongs to the object at ffff888106118e00 [ 28.278834] which belongs to the cache kmalloc-64 of size 64 [ 28.279585] The buggy address is located 0 bytes to the right of [ 28.279585] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.282109] [ 28.282562] The buggy address belongs to the physical page: [ 28.282826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.284592] flags: 0x200000000000000(node=0|zone=2) [ 28.284853] page_type: f5(slab) [ 28.285062] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.285470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.285714] page dumped because: kasan: bad access detected [ 28.285884] [ 28.285949] Memory state around the buggy address: [ 28.286103] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.287121] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.288021] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.288647] ^ [ 28.289181] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.289746] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.290206] ================================================================== [ 28.162104] ================================================================== [ 28.162492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 28.162825] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.163181] [ 28.163267] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.163316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.163329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.163353] Call Trace: [ 28.163372] <TASK> [ 28.163390] dump_stack_lvl+0x73/0xb0 [ 28.163418] print_report+0xd1/0x640 [ 28.163441] ? __virt_addr_valid+0x1db/0x2d0 [ 28.163468] ? kasan_atomics_helper+0xc70/0x5450 [ 28.163490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.163517] ? kasan_atomics_helper+0xc70/0x5450 [ 28.163540] kasan_report+0x141/0x180 [ 28.163564] ? kasan_atomics_helper+0xc70/0x5450 [ 28.163591] kasan_check_range+0x10c/0x1c0 [ 28.163649] __kasan_check_write+0x18/0x20 [ 28.163675] kasan_atomics_helper+0xc70/0x5450 [ 28.163699] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.163721] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.163747] ? kasan_atomics+0x152/0x310 [ 28.163775] kasan_atomics+0x1dc/0x310 [ 28.163798] ? __pfx_kasan_atomics+0x10/0x10 [ 28.163824] ? __pfx_read_tsc+0x10/0x10 [ 28.163866] ? ktime_get_ts64+0x86/0x230 [ 28.163892] kunit_try_run_case+0x1a5/0x480 [ 28.163918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.163961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.163989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.164017] ? __kthread_parkme+0x82/0x180 [ 28.164038] ? preempt_count_sub+0x50/0x80 [ 28.164062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.164087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.164112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.164137] kthread+0x337/0x6f0 [ 28.164167] ? trace_preempt_on+0x20/0xc0 [ 28.164193] ? __pfx_kthread+0x10/0x10 [ 28.164215] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.164239] ? calculate_sigpending+0x7b/0xa0 [ 28.164264] ? __pfx_kthread+0x10/0x10 [ 28.164287] ret_from_fork+0x116/0x1d0 [ 28.164307] ? __pfx_kthread+0x10/0x10 [ 28.164351] ret_from_fork_asm+0x1a/0x30 [ 28.164415] </TASK> [ 28.164428] [ 28.172900] Allocated by task 314: [ 28.173100] kasan_save_stack+0x45/0x70 [ 28.173308] kasan_save_track+0x18/0x40 [ 28.173522] kasan_save_alloc_info+0x3b/0x50 [ 28.173665] __kasan_kmalloc+0xb7/0xc0 [ 28.173791] __kmalloc_cache_noprof+0x189/0x420 [ 28.173963] kasan_atomics+0x95/0x310 [ 28.174326] kunit_try_run_case+0x1a5/0x480 [ 28.174686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.175005] kthread+0x337/0x6f0 [ 28.175170] ret_from_fork+0x116/0x1d0 [ 28.175299] ret_from_fork_asm+0x1a/0x30 [ 28.175433] [ 28.175498] The buggy address belongs to the object at ffff888106118e00 [ 28.175498] which belongs to the cache kmalloc-64 of size 64 [ 28.175975] The buggy address is located 0 bytes to the right of [ 28.175975] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.176551] [ 28.176642] The buggy address belongs to the physical page: [ 28.176881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.177329] flags: 0x200000000000000(node=0|zone=2) [ 28.177594] page_type: f5(slab) [ 28.177752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.178083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.178314] page dumped because: kasan: bad access detected [ 28.178478] [ 28.178543] Memory state around the buggy address: [ 28.178714] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.178939] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.179428] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.179743] ^ [ 28.179988] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.180305] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.180609] ================================================================== [ 28.094219] ================================================================== [ 28.094732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 28.095174] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.095556] [ 28.095685] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.095736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.095751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.095774] Call Trace: [ 28.095943] <TASK> [ 28.095965] dump_stack_lvl+0x73/0xb0 [ 28.095998] print_report+0xd1/0x640 [ 28.096021] ? __virt_addr_valid+0x1db/0x2d0 [ 28.096047] ? kasan_atomics_helper+0xa2b/0x5450 [ 28.096070] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.096097] ? kasan_atomics_helper+0xa2b/0x5450 [ 28.096120] kasan_report+0x141/0x180 [ 28.096157] ? kasan_atomics_helper+0xa2b/0x5450 [ 28.096184] kasan_check_range+0x10c/0x1c0 [ 28.096209] __kasan_check_write+0x18/0x20 [ 28.096233] kasan_atomics_helper+0xa2b/0x5450 [ 28.096257] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.096280] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.096305] ? kasan_atomics+0x152/0x310 [ 28.096333] kasan_atomics+0x1dc/0x310 [ 28.096356] ? __pfx_kasan_atomics+0x10/0x10 [ 28.096453] ? __pfx_read_tsc+0x10/0x10 [ 28.096480] ? ktime_get_ts64+0x86/0x230 [ 28.096506] kunit_try_run_case+0x1a5/0x480 [ 28.096533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.096556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.096584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.096611] ? __kthread_parkme+0x82/0x180 [ 28.096633] ? preempt_count_sub+0x50/0x80 [ 28.096658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.096683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.096707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.096732] kthread+0x337/0x6f0 [ 28.096754] ? trace_preempt_on+0x20/0xc0 [ 28.096779] ? __pfx_kthread+0x10/0x10 [ 28.096801] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.096826] ? calculate_sigpending+0x7b/0xa0 [ 28.096851] ? __pfx_kthread+0x10/0x10 [ 28.096874] ret_from_fork+0x116/0x1d0 [ 28.096895] ? __pfx_kthread+0x10/0x10 [ 28.096917] ret_from_fork_asm+0x1a/0x30 [ 28.096949] </TASK> [ 28.096962] [ 28.107161] Allocated by task 314: [ 28.107341] kasan_save_stack+0x45/0x70 [ 28.107660] kasan_save_track+0x18/0x40 [ 28.107850] kasan_save_alloc_info+0x3b/0x50 [ 28.108327] __kasan_kmalloc+0xb7/0xc0 [ 28.108573] __kmalloc_cache_noprof+0x189/0x420 [ 28.108861] kasan_atomics+0x95/0x310 [ 28.109128] kunit_try_run_case+0x1a5/0x480 [ 28.109332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.109562] kthread+0x337/0x6f0 [ 28.109966] ret_from_fork+0x116/0x1d0 [ 28.110159] ret_from_fork_asm+0x1a/0x30 [ 28.110561] [ 28.110638] The buggy address belongs to the object at ffff888106118e00 [ 28.110638] which belongs to the cache kmalloc-64 of size 64 [ 28.111102] The buggy address is located 0 bytes to the right of [ 28.111102] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.112093] [ 28.112266] The buggy address belongs to the physical page: [ 28.112670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.113186] flags: 0x200000000000000(node=0|zone=2) [ 28.113452] page_type: f5(slab) [ 28.113579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.114066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.114396] page dumped because: kasan: bad access detected [ 28.114807] [ 28.114894] Memory state around the buggy address: [ 28.115112] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.115667] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.116101] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.116605] ^ [ 28.116803] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.117190] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.117659] ================================================================== [ 28.807080] ================================================================== [ 28.807333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 28.807774] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.808130] [ 28.808288] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.808341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.808354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.808446] Call Trace: [ 28.808469] <TASK> [ 28.808490] dump_stack_lvl+0x73/0xb0 [ 28.808522] print_report+0xd1/0x640 [ 28.808545] ? __virt_addr_valid+0x1db/0x2d0 [ 28.808572] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.808595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.808622] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.808645] kasan_report+0x141/0x180 [ 28.808668] ? kasan_atomics_helper+0x19e3/0x5450 [ 28.808695] kasan_check_range+0x10c/0x1c0 [ 28.808719] __kasan_check_write+0x18/0x20 [ 28.808745] kasan_atomics_helper+0x19e3/0x5450 [ 28.808768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.808791] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.808817] ? kasan_atomics+0x152/0x310 [ 28.808856] kasan_atomics+0x1dc/0x310 [ 28.808882] ? __pfx_kasan_atomics+0x10/0x10 [ 28.808907] ? __pfx_read_tsc+0x10/0x10 [ 28.808942] ? ktime_get_ts64+0x86/0x230 [ 28.808984] kunit_try_run_case+0x1a5/0x480 [ 28.809011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.809035] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.809063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.809091] ? __kthread_parkme+0x82/0x180 [ 28.809113] ? preempt_count_sub+0x50/0x80 [ 28.809138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.809172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.809197] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.809222] kthread+0x337/0x6f0 [ 28.809245] ? trace_preempt_on+0x20/0xc0 [ 28.809272] ? __pfx_kthread+0x10/0x10 [ 28.809294] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.809319] ? calculate_sigpending+0x7b/0xa0 [ 28.809344] ? __pfx_kthread+0x10/0x10 [ 28.809423] ret_from_fork+0x116/0x1d0 [ 28.809448] ? __pfx_kthread+0x10/0x10 [ 28.809470] ret_from_fork_asm+0x1a/0x30 [ 28.809503] </TASK> [ 28.809515] [ 28.817534] Allocated by task 314: [ 28.817684] kasan_save_stack+0x45/0x70 [ 28.817836] kasan_save_track+0x18/0x40 [ 28.818074] kasan_save_alloc_info+0x3b/0x50 [ 28.818294] __kasan_kmalloc+0xb7/0xc0 [ 28.818761] __kmalloc_cache_noprof+0x189/0x420 [ 28.819030] kasan_atomics+0x95/0x310 [ 28.819242] kunit_try_run_case+0x1a5/0x480 [ 28.819546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.819835] kthread+0x337/0x6f0 [ 28.820011] ret_from_fork+0x116/0x1d0 [ 28.820199] ret_from_fork_asm+0x1a/0x30 [ 28.820437] [ 28.820559] The buggy address belongs to the object at ffff888106118e00 [ 28.820559] which belongs to the cache kmalloc-64 of size 64 [ 28.821082] The buggy address is located 0 bytes to the right of [ 28.821082] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.821668] [ 28.821783] The buggy address belongs to the physical page: [ 28.822043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.822486] flags: 0x200000000000000(node=0|zone=2) [ 28.822712] page_type: f5(slab) [ 28.822902] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.823231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.823846] page dumped because: kasan: bad access detected [ 28.824089] [ 28.824220] Memory state around the buggy address: [ 28.824433] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.824793] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.825038] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.825331] ^ [ 28.825660] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.826025] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.826347] ================================================================== [ 28.046259] ================================================================== [ 28.046723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 28.047009] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.047762] [ 28.047942] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.047995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.048009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.048033] Call Trace: [ 28.048055] <TASK> [ 28.048074] dump_stack_lvl+0x73/0xb0 [ 28.048105] print_report+0xd1/0x640 [ 28.048129] ? __virt_addr_valid+0x1db/0x2d0 [ 28.048167] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.048190] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.048219] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.048242] kasan_report+0x141/0x180 [ 28.048266] ? kasan_atomics_helper+0x8f9/0x5450 [ 28.048293] kasan_check_range+0x10c/0x1c0 [ 28.048318] __kasan_check_write+0x18/0x20 [ 28.048343] kasan_atomics_helper+0x8f9/0x5450 [ 28.048525] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.048610] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.048639] ? kasan_atomics+0x152/0x310 [ 28.048721] kasan_atomics+0x1dc/0x310 [ 28.048749] ? __pfx_kasan_atomics+0x10/0x10 [ 28.048775] ? __pfx_read_tsc+0x10/0x10 [ 28.048801] ? ktime_get_ts64+0x86/0x230 [ 28.048832] kunit_try_run_case+0x1a5/0x480 [ 28.048859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.048883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.048911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.048946] ? __kthread_parkme+0x82/0x180 [ 28.048968] ? preempt_count_sub+0x50/0x80 [ 28.048994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.049019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.049044] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.049070] kthread+0x337/0x6f0 [ 28.049092] ? trace_preempt_on+0x20/0xc0 [ 28.049118] ? __pfx_kthread+0x10/0x10 [ 28.049141] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.049179] ? calculate_sigpending+0x7b/0xa0 [ 28.049205] ? __pfx_kthread+0x10/0x10 [ 28.049229] ret_from_fork+0x116/0x1d0 [ 28.049251] ? __pfx_kthread+0x10/0x10 [ 28.049273] ret_from_fork_asm+0x1a/0x30 [ 28.049305] </TASK> [ 28.049318] [ 28.059715] Allocated by task 314: [ 28.060121] kasan_save_stack+0x45/0x70 [ 28.060453] kasan_save_track+0x18/0x40 [ 28.060722] kasan_save_alloc_info+0x3b/0x50 [ 28.060899] __kasan_kmalloc+0xb7/0xc0 [ 28.061108] __kmalloc_cache_noprof+0x189/0x420 [ 28.061693] kasan_atomics+0x95/0x310 [ 28.061851] kunit_try_run_case+0x1a5/0x480 [ 28.062086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.062496] kthread+0x337/0x6f0 [ 28.062675] ret_from_fork+0x116/0x1d0 [ 28.062927] ret_from_fork_asm+0x1a/0x30 [ 28.063138] [ 28.063262] The buggy address belongs to the object at ffff888106118e00 [ 28.063262] which belongs to the cache kmalloc-64 of size 64 [ 28.064081] The buggy address is located 0 bytes to the right of [ 28.064081] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.064585] [ 28.064692] The buggy address belongs to the physical page: [ 28.064920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.065639] flags: 0x200000000000000(node=0|zone=2) [ 28.065981] page_type: f5(slab) [ 28.066259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.066562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.067073] page dumped because: kasan: bad access detected [ 28.067301] [ 28.067488] Memory state around the buggy address: [ 28.067766] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.068187] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.068503] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.068836] ^ [ 28.069023] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.069465] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.069954] ================================================================== [ 27.948554] ================================================================== [ 27.949158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 27.949548] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.949936] [ 27.950063] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.950116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.950132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.950353] Call Trace: [ 27.950371] <TASK> [ 27.950460] dump_stack_lvl+0x73/0xb0 [ 27.950497] print_report+0xd1/0x640 [ 27.950522] ? __virt_addr_valid+0x1db/0x2d0 [ 27.950548] ? kasan_atomics_helper+0x697/0x5450 [ 27.950571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.950599] ? kasan_atomics_helper+0x697/0x5450 [ 27.950622] kasan_report+0x141/0x180 [ 27.950647] ? kasan_atomics_helper+0x697/0x5450 [ 27.950674] kasan_check_range+0x10c/0x1c0 [ 27.950699] __kasan_check_write+0x18/0x20 [ 27.950724] kasan_atomics_helper+0x697/0x5450 [ 27.950749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.950772] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.950798] ? kasan_atomics+0x152/0x310 [ 27.950825] kasan_atomics+0x1dc/0x310 [ 27.950848] ? __pfx_kasan_atomics+0x10/0x10 [ 27.950874] ? __pfx_read_tsc+0x10/0x10 [ 27.950899] ? ktime_get_ts64+0x86/0x230 [ 27.950925] kunit_try_run_case+0x1a5/0x480 [ 27.951042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.951066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.951093] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.951119] ? __kthread_parkme+0x82/0x180 [ 27.951140] ? preempt_count_sub+0x50/0x80 [ 27.951179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.951205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.951229] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.951254] kthread+0x337/0x6f0 [ 27.951277] ? trace_preempt_on+0x20/0xc0 [ 27.951302] ? __pfx_kthread+0x10/0x10 [ 27.951325] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.951349] ? calculate_sigpending+0x7b/0xa0 [ 27.951376] ? __pfx_kthread+0x10/0x10 [ 27.951407] ret_from_fork+0x116/0x1d0 [ 27.951430] ? __pfx_kthread+0x10/0x10 [ 27.951452] ret_from_fork_asm+0x1a/0x30 [ 27.951484] </TASK> [ 27.951497] [ 27.961827] Allocated by task 314: [ 27.962262] kasan_save_stack+0x45/0x70 [ 27.962576] kasan_save_track+0x18/0x40 [ 27.962818] kasan_save_alloc_info+0x3b/0x50 [ 27.963222] __kasan_kmalloc+0xb7/0xc0 [ 27.963464] __kmalloc_cache_noprof+0x189/0x420 [ 27.963745] kasan_atomics+0x95/0x310 [ 27.964021] kunit_try_run_case+0x1a5/0x480 [ 27.964229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.964457] kthread+0x337/0x6f0 [ 27.964815] ret_from_fork+0x116/0x1d0 [ 27.964991] ret_from_fork_asm+0x1a/0x30 [ 27.965283] [ 27.965471] The buggy address belongs to the object at ffff888106118e00 [ 27.965471] which belongs to the cache kmalloc-64 of size 64 [ 27.966123] The buggy address is located 0 bytes to the right of [ 27.966123] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.966705] [ 27.966800] The buggy address belongs to the physical page: [ 27.967194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.967708] flags: 0x200000000000000(node=0|zone=2) [ 27.967925] page_type: f5(slab) [ 27.968388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.968764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.969240] page dumped because: kasan: bad access detected [ 27.969433] [ 27.969525] Memory state around the buggy address: [ 27.969809] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.970234] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.970790] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.971062] ^ [ 27.971325] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.971895] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.972388] ================================================================== [ 28.499505] ================================================================== [ 28.499818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 28.500808] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.501157] [ 28.501283] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.501336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.501352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.501376] Call Trace: [ 28.501397] <TASK> [ 28.501418] dump_stack_lvl+0x73/0xb0 [ 28.501450] print_report+0xd1/0x640 [ 28.501474] ? __virt_addr_valid+0x1db/0x2d0 [ 28.501500] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.501523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.501551] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.501575] kasan_report+0x141/0x180 [ 28.501599] ? kasan_atomics_helper+0x49ce/0x5450 [ 28.501647] __asan_report_load4_noabort+0x18/0x20 [ 28.501674] kasan_atomics_helper+0x49ce/0x5450 [ 28.501697] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.501719] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.501746] ? kasan_atomics+0x152/0x310 [ 28.501772] kasan_atomics+0x1dc/0x310 [ 28.501796] ? __pfx_kasan_atomics+0x10/0x10 [ 28.501821] ? __pfx_read_tsc+0x10/0x10 [ 28.501844] ? ktime_get_ts64+0x86/0x230 [ 28.501870] kunit_try_run_case+0x1a5/0x480 [ 28.501896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.501920] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.501956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.501984] ? __kthread_parkme+0x82/0x180 [ 28.502005] ? preempt_count_sub+0x50/0x80 [ 28.502030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.502055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.502081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.502105] kthread+0x337/0x6f0 [ 28.502127] ? trace_preempt_on+0x20/0xc0 [ 28.502162] ? __pfx_kthread+0x10/0x10 [ 28.502185] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.502209] ? calculate_sigpending+0x7b/0xa0 [ 28.502235] ? __pfx_kthread+0x10/0x10 [ 28.502257] ret_from_fork+0x116/0x1d0 [ 28.502279] ? __pfx_kthread+0x10/0x10 [ 28.502300] ret_from_fork_asm+0x1a/0x30 [ 28.502333] </TASK> [ 28.502345] [ 28.510540] Allocated by task 314: [ 28.510706] kasan_save_stack+0x45/0x70 [ 28.510879] kasan_save_track+0x18/0x40 [ 28.511010] kasan_save_alloc_info+0x3b/0x50 [ 28.511180] __kasan_kmalloc+0xb7/0xc0 [ 28.511386] __kmalloc_cache_noprof+0x189/0x420 [ 28.511843] kasan_atomics+0x95/0x310 [ 28.512031] kunit_try_run_case+0x1a5/0x480 [ 28.512185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.512356] kthread+0x337/0x6f0 [ 28.512588] ret_from_fork+0x116/0x1d0 [ 28.513098] ret_from_fork_asm+0x1a/0x30 [ 28.513505] [ 28.513590] The buggy address belongs to the object at ffff888106118e00 [ 28.513590] which belongs to the cache kmalloc-64 of size 64 [ 28.514076] The buggy address is located 0 bytes to the right of [ 28.514076] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.514557] [ 28.514649] The buggy address belongs to the physical page: [ 28.514943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.515292] flags: 0x200000000000000(node=0|zone=2) [ 28.515640] page_type: f5(slab) [ 28.515804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.516042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.516381] page dumped because: kasan: bad access detected [ 28.516585] [ 28.516652] Memory state around the buggy address: [ 28.516957] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.517310] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.517525] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.517735] ^ [ 28.517888] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.518100] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.518317] ================================================================== [ 28.622989] ================================================================== [ 28.623969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 28.624335] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.624620] [ 28.624713] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.624764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.624779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.624802] Call Trace: [ 28.624824] <TASK> [ 28.624845] dump_stack_lvl+0x73/0xb0 [ 28.624875] print_report+0xd1/0x640 [ 28.624899] ? __virt_addr_valid+0x1db/0x2d0 [ 28.624926] ? kasan_atomics_helper+0x151d/0x5450 [ 28.624958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.624986] ? kasan_atomics_helper+0x151d/0x5450 [ 28.625010] kasan_report+0x141/0x180 [ 28.625034] ? kasan_atomics_helper+0x151d/0x5450 [ 28.625061] kasan_check_range+0x10c/0x1c0 [ 28.625087] __kasan_check_write+0x18/0x20 [ 28.625111] kasan_atomics_helper+0x151d/0x5450 [ 28.625136] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.625172] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.625198] ? kasan_atomics+0x152/0x310 [ 28.625226] kasan_atomics+0x1dc/0x310 [ 28.625250] ? __pfx_kasan_atomics+0x10/0x10 [ 28.625276] ? __pfx_read_tsc+0x10/0x10 [ 28.625300] ? ktime_get_ts64+0x86/0x230 [ 28.625326] kunit_try_run_case+0x1a5/0x480 [ 28.625353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.625377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.625455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.625482] ? __kthread_parkme+0x82/0x180 [ 28.625504] ? preempt_count_sub+0x50/0x80 [ 28.625527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.625553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.625579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.625604] kthread+0x337/0x6f0 [ 28.625626] ? trace_preempt_on+0x20/0xc0 [ 28.625652] ? __pfx_kthread+0x10/0x10 [ 28.625674] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.625700] ? calculate_sigpending+0x7b/0xa0 [ 28.625726] ? __pfx_kthread+0x10/0x10 [ 28.625748] ret_from_fork+0x116/0x1d0 [ 28.625771] ? __pfx_kthread+0x10/0x10 [ 28.625793] ret_from_fork_asm+0x1a/0x30 [ 28.625826] </TASK> [ 28.625839] [ 28.633838] Allocated by task 314: [ 28.634080] kasan_save_stack+0x45/0x70 [ 28.634303] kasan_save_track+0x18/0x40 [ 28.634582] kasan_save_alloc_info+0x3b/0x50 [ 28.634773] __kasan_kmalloc+0xb7/0xc0 [ 28.634955] __kmalloc_cache_noprof+0x189/0x420 [ 28.635366] kasan_atomics+0x95/0x310 [ 28.635628] kunit_try_run_case+0x1a5/0x480 [ 28.635831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.636125] kthread+0x337/0x6f0 [ 28.636289] ret_from_fork+0x116/0x1d0 [ 28.636572] ret_from_fork_asm+0x1a/0x30 [ 28.636764] [ 28.636857] The buggy address belongs to the object at ffff888106118e00 [ 28.636857] which belongs to the cache kmalloc-64 of size 64 [ 28.637344] The buggy address is located 0 bytes to the right of [ 28.637344] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.637908] [ 28.638040] The buggy address belongs to the physical page: [ 28.638288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.638679] flags: 0x200000000000000(node=0|zone=2) [ 28.638846] page_type: f5(slab) [ 28.638967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.639234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.639810] page dumped because: kasan: bad access detected [ 28.640059] [ 28.640152] Memory state around the buggy address: [ 28.640307] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.640522] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.641161] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.641457] ^ [ 28.641638] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.641850] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.642058] ================================================================== [ 29.171592] ================================================================== [ 29.172269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 29.172898] Read of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.173631] [ 29.173844] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.173898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.173912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.173935] Call Trace: [ 29.173969] <TASK> [ 29.173990] dump_stack_lvl+0x73/0xb0 [ 29.174021] print_report+0xd1/0x640 [ 29.174045] ? __virt_addr_valid+0x1db/0x2d0 [ 29.174071] ? kasan_atomics_helper+0x5115/0x5450 [ 29.174094] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.174120] ? kasan_atomics_helper+0x5115/0x5450 [ 29.174153] kasan_report+0x141/0x180 [ 29.174176] ? kasan_atomics_helper+0x5115/0x5450 [ 29.174204] __asan_report_load8_noabort+0x18/0x20 [ 29.174241] kasan_atomics_helper+0x5115/0x5450 [ 29.174265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.174301] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.174327] ? kasan_atomics+0x152/0x310 [ 29.174354] kasan_atomics+0x1dc/0x310 [ 29.174378] ? __pfx_kasan_atomics+0x10/0x10 [ 29.174403] ? __pfx_read_tsc+0x10/0x10 [ 29.174437] ? ktime_get_ts64+0x86/0x230 [ 29.174464] kunit_try_run_case+0x1a5/0x480 [ 29.174501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.174525] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.174554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.174580] ? __kthread_parkme+0x82/0x180 [ 29.174603] ? preempt_count_sub+0x50/0x80 [ 29.174627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.174653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.174678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.174703] kthread+0x337/0x6f0 [ 29.174725] ? trace_preempt_on+0x20/0xc0 [ 29.174752] ? __pfx_kthread+0x10/0x10 [ 29.174774] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.174798] ? calculate_sigpending+0x7b/0xa0 [ 29.174824] ? __pfx_kthread+0x10/0x10 [ 29.174847] ret_from_fork+0x116/0x1d0 [ 29.174868] ? __pfx_kthread+0x10/0x10 [ 29.174890] ret_from_fork_asm+0x1a/0x30 [ 29.174922] </TASK> [ 29.174944] [ 29.182466] Allocated by task 314: [ 29.182651] kasan_save_stack+0x45/0x70 [ 29.182842] kasan_save_track+0x18/0x40 [ 29.183043] kasan_save_alloc_info+0x3b/0x50 [ 29.183264] __kasan_kmalloc+0xb7/0xc0 [ 29.183426] __kmalloc_cache_noprof+0x189/0x420 [ 29.183636] kasan_atomics+0x95/0x310 [ 29.183841] kunit_try_run_case+0x1a5/0x480 [ 29.184026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.184269] kthread+0x337/0x6f0 [ 29.184422] ret_from_fork+0x116/0x1d0 [ 29.184609] ret_from_fork_asm+0x1a/0x30 [ 29.184793] [ 29.184889] The buggy address belongs to the object at ffff888106118e00 [ 29.184889] which belongs to the cache kmalloc-64 of size 64 [ 29.185424] The buggy address is located 0 bytes to the right of [ 29.185424] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.185775] [ 29.185842] The buggy address belongs to the physical page: [ 29.186187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.186555] flags: 0x200000000000000(node=0|zone=2) [ 29.186731] page_type: f5(slab) [ 29.186846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.187276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.187572] page dumped because: kasan: bad access detected [ 29.187840] [ 29.187929] Memory state around the buggy address: [ 29.188131] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.188368] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.188692] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.189090] ^ [ 29.189288] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.189618] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.189906] ================================================================== [ 28.931797] ================================================================== [ 28.932450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 28.932786] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.933284] [ 28.933384] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.933440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.933454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.933479] Call Trace: [ 28.933500] <TASK> [ 28.933522] dump_stack_lvl+0x73/0xb0 [ 28.933553] print_report+0xd1/0x640 [ 28.933661] ? __virt_addr_valid+0x1db/0x2d0 [ 28.933692] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.933715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.933744] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.933767] kasan_report+0x141/0x180 [ 28.933791] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.933819] kasan_check_range+0x10c/0x1c0 [ 28.933844] __kasan_check_write+0x18/0x20 [ 28.933869] kasan_atomics_helper+0x1d7a/0x5450 [ 28.933893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.933917] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.934053] ? kasan_atomics+0x152/0x310 [ 28.934082] kasan_atomics+0x1dc/0x310 [ 28.934212] ? __pfx_kasan_atomics+0x10/0x10 [ 28.934239] ? __pfx_read_tsc+0x10/0x10 [ 28.934263] ? ktime_get_ts64+0x86/0x230 [ 28.934289] kunit_try_run_case+0x1a5/0x480 [ 28.934316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.934339] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.934368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.934395] ? __kthread_parkme+0x82/0x180 [ 28.934418] ? preempt_count_sub+0x50/0x80 [ 28.934443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.934467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.934492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.934517] kthread+0x337/0x6f0 [ 28.934539] ? trace_preempt_on+0x20/0xc0 [ 28.934566] ? __pfx_kthread+0x10/0x10 [ 28.934588] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.934612] ? calculate_sigpending+0x7b/0xa0 [ 28.934638] ? __pfx_kthread+0x10/0x10 [ 28.934660] ret_from_fork+0x116/0x1d0 [ 28.934682] ? __pfx_kthread+0x10/0x10 [ 28.934705] ret_from_fork_asm+0x1a/0x30 [ 28.934738] </TASK> [ 28.934752] [ 28.946021] Allocated by task 314: [ 28.946185] kasan_save_stack+0x45/0x70 [ 28.946345] kasan_save_track+0x18/0x40 [ 28.946479] kasan_save_alloc_info+0x3b/0x50 [ 28.946625] __kasan_kmalloc+0xb7/0xc0 [ 28.946755] __kmalloc_cache_noprof+0x189/0x420 [ 28.946913] kasan_atomics+0x95/0x310 [ 28.947088] kunit_try_run_case+0x1a5/0x480 [ 28.947259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.947496] kthread+0x337/0x6f0 [ 28.947621] ret_from_fork+0x116/0x1d0 [ 28.947753] ret_from_fork_asm+0x1a/0x30 [ 28.947909] [ 28.948014] The buggy address belongs to the object at ffff888106118e00 [ 28.948014] which belongs to the cache kmalloc-64 of size 64 [ 28.948484] The buggy address is located 0 bytes to the right of [ 28.948484] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.948955] [ 28.949050] The buggy address belongs to the physical page: [ 28.949323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.949673] flags: 0x200000000000000(node=0|zone=2) [ 28.949886] page_type: f5(slab) [ 28.950114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.950421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.950716] page dumped because: kasan: bad access detected [ 28.950925] [ 28.951018] Memory state around the buggy address: [ 28.951235] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.951499] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.951782] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.952095] ^ [ 28.952276] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.952490] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.952761] ================================================================== [ 27.832703] ================================================================== [ 27.833428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 27.834123] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.834837] [ 27.835059] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.835120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.835134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.835166] Call Trace: [ 27.835188] <TASK> [ 27.835209] dump_stack_lvl+0x73/0xb0 [ 27.835240] print_report+0xd1/0x640 [ 27.835263] ? __virt_addr_valid+0x1db/0x2d0 [ 27.835290] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.835314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.835351] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.835404] kasan_report+0x141/0x180 [ 27.835429] ? kasan_atomics_helper+0x4a0/0x5450 [ 27.835456] kasan_check_range+0x10c/0x1c0 [ 27.835480] __kasan_check_write+0x18/0x20 [ 27.835505] kasan_atomics_helper+0x4a0/0x5450 [ 27.835529] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.835552] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.835579] ? kasan_atomics+0x152/0x310 [ 27.835606] kasan_atomics+0x1dc/0x310 [ 27.835634] ? __pfx_kasan_atomics+0x10/0x10 [ 27.835659] ? __pfx_read_tsc+0x10/0x10 [ 27.835682] ? ktime_get_ts64+0x86/0x230 [ 27.835709] kunit_try_run_case+0x1a5/0x480 [ 27.835735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.835759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.835786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.835813] ? __kthread_parkme+0x82/0x180 [ 27.835834] ? preempt_count_sub+0x50/0x80 [ 27.835858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.835883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.835908] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.835933] kthread+0x337/0x6f0 [ 27.835963] ? trace_preempt_on+0x20/0xc0 [ 27.835990] ? __pfx_kthread+0x10/0x10 [ 27.836011] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.836037] ? calculate_sigpending+0x7b/0xa0 [ 27.836063] ? __pfx_kthread+0x10/0x10 [ 27.836086] ret_from_fork+0x116/0x1d0 [ 27.836107] ? __pfx_kthread+0x10/0x10 [ 27.836128] ret_from_fork_asm+0x1a/0x30 [ 27.836171] </TASK> [ 27.836183] [ 27.851064] Allocated by task 314: [ 27.851431] kasan_save_stack+0x45/0x70 [ 27.851846] kasan_save_track+0x18/0x40 [ 27.852259] kasan_save_alloc_info+0x3b/0x50 [ 27.852620] __kasan_kmalloc+0xb7/0xc0 [ 27.852970] __kmalloc_cache_noprof+0x189/0x420 [ 27.853159] kasan_atomics+0x95/0x310 [ 27.853314] kunit_try_run_case+0x1a5/0x480 [ 27.853779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.854354] kthread+0x337/0x6f0 [ 27.854680] ret_from_fork+0x116/0x1d0 [ 27.855061] ret_from_fork_asm+0x1a/0x30 [ 27.855472] [ 27.855680] The buggy address belongs to the object at ffff888106118e00 [ 27.855680] which belongs to the cache kmalloc-64 of size 64 [ 27.856053] The buggy address is located 0 bytes to the right of [ 27.856053] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.857094] [ 27.857279] The buggy address belongs to the physical page: [ 27.857816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.858334] flags: 0x200000000000000(node=0|zone=2) [ 27.858841] page_type: f5(slab) [ 27.859197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.859598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.860122] page dumped because: kasan: bad access detected [ 27.860422] [ 27.860612] Memory state around the buggy address: [ 27.861076] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.861766] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.862463] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.862730] ^ [ 27.862885] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.863550] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.864281] ================================================================== [ 28.143202] ================================================================== [ 28.143454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 28.144361] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.144663] [ 28.144756] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.144809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.144823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.144846] Call Trace: [ 28.144866] <TASK> [ 28.144885] dump_stack_lvl+0x73/0xb0 [ 28.144915] print_report+0xd1/0x640 [ 28.144949] ? __virt_addr_valid+0x1db/0x2d0 [ 28.144975] ? kasan_atomics_helper+0xb6a/0x5450 [ 28.144998] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.145026] ? kasan_atomics_helper+0xb6a/0x5450 [ 28.145048] kasan_report+0x141/0x180 [ 28.145072] ? kasan_atomics_helper+0xb6a/0x5450 [ 28.145098] kasan_check_range+0x10c/0x1c0 [ 28.145123] __kasan_check_write+0x18/0x20 [ 28.145159] kasan_atomics_helper+0xb6a/0x5450 [ 28.145183] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.145206] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.145232] ? kasan_atomics+0x152/0x310 [ 28.145259] kasan_atomics+0x1dc/0x310 [ 28.145282] ? __pfx_kasan_atomics+0x10/0x10 [ 28.145308] ? __pfx_read_tsc+0x10/0x10 [ 28.145334] ? ktime_get_ts64+0x86/0x230 [ 28.145360] kunit_try_run_case+0x1a5/0x480 [ 28.145398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.145422] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.145449] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.145476] ? __kthread_parkme+0x82/0x180 [ 28.145496] ? preempt_count_sub+0x50/0x80 [ 28.145521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.145546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.145571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.145595] kthread+0x337/0x6f0 [ 28.145617] ? trace_preempt_on+0x20/0xc0 [ 28.145643] ? __pfx_kthread+0x10/0x10 [ 28.145665] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.145691] ? calculate_sigpending+0x7b/0xa0 [ 28.145715] ? __pfx_kthread+0x10/0x10 [ 28.145737] ret_from_fork+0x116/0x1d0 [ 28.145759] ? __pfx_kthread+0x10/0x10 [ 28.145781] ret_from_fork_asm+0x1a/0x30 [ 28.145813] </TASK> [ 28.145825] [ 28.153836] Allocated by task 314: [ 28.153992] kasan_save_stack+0x45/0x70 [ 28.154134] kasan_save_track+0x18/0x40 [ 28.154273] kasan_save_alloc_info+0x3b/0x50 [ 28.154413] __kasan_kmalloc+0xb7/0xc0 [ 28.154614] __kmalloc_cache_noprof+0x189/0x420 [ 28.154965] kasan_atomics+0x95/0x310 [ 28.155158] kunit_try_run_case+0x1a5/0x480 [ 28.155387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.155645] kthread+0x337/0x6f0 [ 28.155836] ret_from_fork+0x116/0x1d0 [ 28.156047] ret_from_fork_asm+0x1a/0x30 [ 28.156252] [ 28.156372] The buggy address belongs to the object at ffff888106118e00 [ 28.156372] which belongs to the cache kmalloc-64 of size 64 [ 28.156821] The buggy address is located 0 bytes to the right of [ 28.156821] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.157208] [ 28.157277] The buggy address belongs to the physical page: [ 28.157596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.158027] flags: 0x200000000000000(node=0|zone=2) [ 28.158267] page_type: f5(slab) [ 28.158496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.158759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.159000] page dumped because: kasan: bad access detected [ 28.159173] [ 28.159240] Memory state around the buggy address: [ 28.159386] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.160015] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.160386] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.160735] ^ [ 28.160983] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.161331] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.161573] ================================================================== [ 28.410919] ================================================================== [ 28.411471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 28.412060] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.412341] [ 28.412434] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.412531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.412544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.412568] Call Trace: [ 28.412590] <TASK> [ 28.412612] dump_stack_lvl+0x73/0xb0 [ 28.412642] print_report+0xd1/0x640 [ 28.412665] ? __virt_addr_valid+0x1db/0x2d0 [ 28.412691] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.412715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.412742] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.412764] kasan_report+0x141/0x180 [ 28.412787] ? kasan_atomics_helper+0x4a02/0x5450 [ 28.412814] __asan_report_load4_noabort+0x18/0x20 [ 28.412839] kasan_atomics_helper+0x4a02/0x5450 [ 28.412864] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.412887] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.412913] ? kasan_atomics+0x152/0x310 [ 28.412950] kasan_atomics+0x1dc/0x310 [ 28.412976] ? __pfx_kasan_atomics+0x10/0x10 [ 28.413003] ? __pfx_read_tsc+0x10/0x10 [ 28.413029] ? ktime_get_ts64+0x86/0x230 [ 28.413056] kunit_try_run_case+0x1a5/0x480 [ 28.413082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.413105] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.413133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.413173] ? __kthread_parkme+0x82/0x180 [ 28.413194] ? preempt_count_sub+0x50/0x80 [ 28.413218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.413245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.413272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.413298] kthread+0x337/0x6f0 [ 28.413321] ? trace_preempt_on+0x20/0xc0 [ 28.413347] ? __pfx_kthread+0x10/0x10 [ 28.413418] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.413447] ? calculate_sigpending+0x7b/0xa0 [ 28.413473] ? __pfx_kthread+0x10/0x10 [ 28.413496] ret_from_fork+0x116/0x1d0 [ 28.413518] ? __pfx_kthread+0x10/0x10 [ 28.413540] ret_from_fork_asm+0x1a/0x30 [ 28.413573] </TASK> [ 28.413585] [ 28.426818] Allocated by task 314: [ 28.427170] kasan_save_stack+0x45/0x70 [ 28.427587] kasan_save_track+0x18/0x40 [ 28.427981] kasan_save_alloc_info+0x3b/0x50 [ 28.428234] __kasan_kmalloc+0xb7/0xc0 [ 28.428365] __kmalloc_cache_noprof+0x189/0x420 [ 28.428972] kasan_atomics+0x95/0x310 [ 28.429389] kunit_try_run_case+0x1a5/0x480 [ 28.429798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.430093] kthread+0x337/0x6f0 [ 28.430266] ret_from_fork+0x116/0x1d0 [ 28.430612] ret_from_fork_asm+0x1a/0x30 [ 28.430996] [ 28.431166] The buggy address belongs to the object at ffff888106118e00 [ 28.431166] which belongs to the cache kmalloc-64 of size 64 [ 28.431705] The buggy address is located 0 bytes to the right of [ 28.431705] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.432095] [ 28.432176] The buggy address belongs to the physical page: [ 28.432519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.432830] flags: 0x200000000000000(node=0|zone=2) [ 28.433054] page_type: f5(slab) [ 28.433207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.433533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.433823] page dumped because: kasan: bad access detected [ 28.434137] [ 28.434219] Memory state around the buggy address: [ 28.434373] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.434732] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.435113] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.435461] ^ [ 28.435673] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.435984] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.436276] ================================================================== [ 29.026178] ================================================================== [ 29.026779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 29.027019] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.027258] [ 29.027346] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.027397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.027411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.027435] Call Trace: [ 29.027455] <TASK> [ 29.027475] dump_stack_lvl+0x73/0xb0 [ 29.027505] print_report+0xd1/0x640 [ 29.027529] ? __virt_addr_valid+0x1db/0x2d0 [ 29.027555] ? kasan_atomics_helper+0x2006/0x5450 [ 29.027577] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.027605] ? kasan_atomics_helper+0x2006/0x5450 [ 29.027633] kasan_report+0x141/0x180 [ 29.027657] ? kasan_atomics_helper+0x2006/0x5450 [ 29.027684] kasan_check_range+0x10c/0x1c0 [ 29.027709] __kasan_check_write+0x18/0x20 [ 29.027734] kasan_atomics_helper+0x2006/0x5450 [ 29.027758] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.027782] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.027810] ? kasan_atomics+0x152/0x310 [ 29.027838] kasan_atomics+0x1dc/0x310 [ 29.027862] ? __pfx_kasan_atomics+0x10/0x10 [ 29.027888] ? __pfx_read_tsc+0x10/0x10 [ 29.027912] ? ktime_get_ts64+0x86/0x230 [ 29.027939] kunit_try_run_case+0x1a5/0x480 [ 29.027965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.027990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.028017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.028044] ? __kthread_parkme+0x82/0x180 [ 29.028066] ? preempt_count_sub+0x50/0x80 [ 29.028091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.028117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.028152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.028177] kthread+0x337/0x6f0 [ 29.028199] ? trace_preempt_on+0x20/0xc0 [ 29.028225] ? __pfx_kthread+0x10/0x10 [ 29.028246] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.028272] ? calculate_sigpending+0x7b/0xa0 [ 29.028298] ? __pfx_kthread+0x10/0x10 [ 29.028321] ret_from_fork+0x116/0x1d0 [ 29.028341] ? __pfx_kthread+0x10/0x10 [ 29.028364] ret_from_fork_asm+0x1a/0x30 [ 29.028396] </TASK> [ 29.028409] [ 29.035945] Allocated by task 314: [ 29.036124] kasan_save_stack+0x45/0x70 [ 29.036334] kasan_save_track+0x18/0x40 [ 29.036521] kasan_save_alloc_info+0x3b/0x50 [ 29.036726] __kasan_kmalloc+0xb7/0xc0 [ 29.036889] __kmalloc_cache_noprof+0x189/0x420 [ 29.037174] kasan_atomics+0x95/0x310 [ 29.037306] kunit_try_run_case+0x1a5/0x480 [ 29.037450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.037622] kthread+0x337/0x6f0 [ 29.037738] ret_from_fork+0x116/0x1d0 [ 29.037869] ret_from_fork_asm+0x1a/0x30 [ 29.038005] [ 29.038072] The buggy address belongs to the object at ffff888106118e00 [ 29.038072] which belongs to the cache kmalloc-64 of size 64 [ 29.038592] The buggy address is located 0 bytes to the right of [ 29.038592] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.039217] [ 29.039319] The buggy address belongs to the physical page: [ 29.039580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.039953] flags: 0x200000000000000(node=0|zone=2) [ 29.040197] page_type: f5(slab) [ 29.040323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.040544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.040757] page dumped because: kasan: bad access detected [ 29.040931] [ 29.041012] Memory state around the buggy address: [ 29.042665] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.043041] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.043423] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.043747] ^ [ 29.044019] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.044424] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.045286] ================================================================== [ 28.291550] ================================================================== [ 28.291835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 28.292195] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.292461] [ 28.292768] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.292828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.292843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.292867] Call Trace: [ 28.292881] <TASK> [ 28.292900] dump_stack_lvl+0x73/0xb0 [ 28.292933] print_report+0xd1/0x640 [ 28.292973] ? __virt_addr_valid+0x1db/0x2d0 [ 28.292999] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.293021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.293049] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.293071] kasan_report+0x141/0x180 [ 28.293094] ? kasan_atomics_helper+0xfa9/0x5450 [ 28.293121] kasan_check_range+0x10c/0x1c0 [ 28.293159] __kasan_check_write+0x18/0x20 [ 28.293186] kasan_atomics_helper+0xfa9/0x5450 [ 28.293210] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.293233] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.293259] ? kasan_atomics+0x152/0x310 [ 28.293287] kasan_atomics+0x1dc/0x310 [ 28.293312] ? __pfx_kasan_atomics+0x10/0x10 [ 28.293337] ? __pfx_read_tsc+0x10/0x10 [ 28.293361] ? ktime_get_ts64+0x86/0x230 [ 28.293443] kunit_try_run_case+0x1a5/0x480 [ 28.293475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.293499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.293526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.293553] ? __kthread_parkme+0x82/0x180 [ 28.293575] ? preempt_count_sub+0x50/0x80 [ 28.293599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.293625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.293651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.293675] kthread+0x337/0x6f0 [ 28.293697] ? trace_preempt_on+0x20/0xc0 [ 28.293723] ? __pfx_kthread+0x10/0x10 [ 28.293746] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.293770] ? calculate_sigpending+0x7b/0xa0 [ 28.293796] ? __pfx_kthread+0x10/0x10 [ 28.293819] ret_from_fork+0x116/0x1d0 [ 28.293840] ? __pfx_kthread+0x10/0x10 [ 28.293863] ret_from_fork_asm+0x1a/0x30 [ 28.293895] </TASK> [ 28.293909] [ 28.301986] Allocated by task 314: [ 28.302129] kasan_save_stack+0x45/0x70 [ 28.302287] kasan_save_track+0x18/0x40 [ 28.302465] kasan_save_alloc_info+0x3b/0x50 [ 28.302682] __kasan_kmalloc+0xb7/0xc0 [ 28.302864] __kmalloc_cache_noprof+0x189/0x420 [ 28.303206] kasan_atomics+0x95/0x310 [ 28.303653] kunit_try_run_case+0x1a5/0x480 [ 28.303888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.304381] kthread+0x337/0x6f0 [ 28.304531] ret_from_fork+0x116/0x1d0 [ 28.304756] ret_from_fork_asm+0x1a/0x30 [ 28.304935] [ 28.305072] The buggy address belongs to the object at ffff888106118e00 [ 28.305072] which belongs to the cache kmalloc-64 of size 64 [ 28.305573] The buggy address is located 0 bytes to the right of [ 28.305573] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.306217] [ 28.306310] The buggy address belongs to the physical page: [ 28.306543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.306896] flags: 0x200000000000000(node=0|zone=2) [ 28.307079] page_type: f5(slab) [ 28.307254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.307556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.307870] page dumped because: kasan: bad access detected [ 28.308099] [ 28.308184] Memory state around the buggy address: [ 28.308432] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.308649] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.308861] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.309074] ^ [ 28.309281] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.309768] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.310498] ================================================================== [ 28.670979] ================================================================== [ 28.671754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 28.672417] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.673124] [ 28.673326] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.673377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.673400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.673423] Call Trace: [ 28.673444] <TASK> [ 28.673462] dump_stack_lvl+0x73/0xb0 [ 28.673495] print_report+0xd1/0x640 [ 28.673521] ? __virt_addr_valid+0x1db/0x2d0 [ 28.673562] ? kasan_atomics_helper+0x164f/0x5450 [ 28.673585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.673622] ? kasan_atomics_helper+0x164f/0x5450 [ 28.673644] kasan_report+0x141/0x180 [ 28.673667] ? kasan_atomics_helper+0x164f/0x5450 [ 28.673694] kasan_check_range+0x10c/0x1c0 [ 28.673719] __kasan_check_write+0x18/0x20 [ 28.673745] kasan_atomics_helper+0x164f/0x5450 [ 28.673768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.673791] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.673818] ? kasan_atomics+0x152/0x310 [ 28.673846] kasan_atomics+0x1dc/0x310 [ 28.673869] ? __pfx_kasan_atomics+0x10/0x10 [ 28.673894] ? __pfx_read_tsc+0x10/0x10 [ 28.673918] ? ktime_get_ts64+0x86/0x230 [ 28.673962] kunit_try_run_case+0x1a5/0x480 [ 28.673988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.674012] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.674039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.674067] ? __kthread_parkme+0x82/0x180 [ 28.674089] ? preempt_count_sub+0x50/0x80 [ 28.674114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.674139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.674173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.674199] kthread+0x337/0x6f0 [ 28.674223] ? trace_preempt_on+0x20/0xc0 [ 28.674249] ? __pfx_kthread+0x10/0x10 [ 28.674272] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.674297] ? calculate_sigpending+0x7b/0xa0 [ 28.674322] ? __pfx_kthread+0x10/0x10 [ 28.674345] ret_from_fork+0x116/0x1d0 [ 28.674386] ? __pfx_kthread+0x10/0x10 [ 28.674410] ret_from_fork_asm+0x1a/0x30 [ 28.674442] </TASK> [ 28.674457] [ 28.685792] Allocated by task 314: [ 28.686248] kasan_save_stack+0x45/0x70 [ 28.686655] kasan_save_track+0x18/0x40 [ 28.687043] kasan_save_alloc_info+0x3b/0x50 [ 28.687527] __kasan_kmalloc+0xb7/0xc0 [ 28.687891] __kmalloc_cache_noprof+0x189/0x420 [ 28.688327] kasan_atomics+0x95/0x310 [ 28.688742] kunit_try_run_case+0x1a5/0x480 [ 28.689153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.689710] kthread+0x337/0x6f0 [ 28.690040] ret_from_fork+0x116/0x1d0 [ 28.690444] ret_from_fork_asm+0x1a/0x30 [ 28.690794] [ 28.690975] The buggy address belongs to the object at ffff888106118e00 [ 28.690975] which belongs to the cache kmalloc-64 of size 64 [ 28.692283] The buggy address is located 0 bytes to the right of [ 28.692283] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.693631] [ 28.693790] The buggy address belongs to the physical page: [ 28.694318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.695133] flags: 0x200000000000000(node=0|zone=2) [ 28.695643] page_type: f5(slab) [ 28.695941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.696815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.697221] page dumped because: kasan: bad access detected [ 28.697506] [ 28.697691] Memory state around the buggy address: [ 28.698246] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.698934] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.699550] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.699771] ^ [ 28.699949] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.700722] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.701519] ================================================================== [ 28.519189] ================================================================== [ 28.519900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 28.520252] Read of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.521138] [ 28.521696] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.521761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.521778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.521802] Call Trace: [ 28.521819] <TASK> [ 28.522076] dump_stack_lvl+0x73/0xb0 [ 28.522121] print_report+0xd1/0x640 [ 28.522160] ? __virt_addr_valid+0x1db/0x2d0 [ 28.522188] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.522213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.522240] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.522263] kasan_report+0x141/0x180 [ 28.522287] ? kasan_atomics_helper+0x13b5/0x5450 [ 28.522314] kasan_check_range+0x10c/0x1c0 [ 28.522340] __kasan_check_read+0x15/0x20 [ 28.522365] kasan_atomics_helper+0x13b5/0x5450 [ 28.522389] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.522412] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.522438] ? kasan_atomics+0x152/0x310 [ 28.522466] kasan_atomics+0x1dc/0x310 [ 28.522489] ? __pfx_kasan_atomics+0x10/0x10 [ 28.522515] ? __pfx_read_tsc+0x10/0x10 [ 28.522538] ? ktime_get_ts64+0x86/0x230 [ 28.522564] kunit_try_run_case+0x1a5/0x480 [ 28.522590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.522614] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.522640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.522667] ? __kthread_parkme+0x82/0x180 [ 28.522689] ? preempt_count_sub+0x50/0x80 [ 28.522727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.522753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.522777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.522802] kthread+0x337/0x6f0 [ 28.522823] ? trace_preempt_on+0x20/0xc0 [ 28.522849] ? __pfx_kthread+0x10/0x10 [ 28.522872] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.522896] ? calculate_sigpending+0x7b/0xa0 [ 28.522921] ? __pfx_kthread+0x10/0x10 [ 28.522952] ret_from_fork+0x116/0x1d0 [ 28.522972] ? __pfx_kthread+0x10/0x10 [ 28.522995] ret_from_fork_asm+0x1a/0x30 [ 28.523026] </TASK> [ 28.523040] [ 28.531038] Allocated by task 314: [ 28.531228] kasan_save_stack+0x45/0x70 [ 28.531500] kasan_save_track+0x18/0x40 [ 28.531867] kasan_save_alloc_info+0x3b/0x50 [ 28.532081] __kasan_kmalloc+0xb7/0xc0 [ 28.532255] __kmalloc_cache_noprof+0x189/0x420 [ 28.532470] kasan_atomics+0x95/0x310 [ 28.532601] kunit_try_run_case+0x1a5/0x480 [ 28.532744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.533040] kthread+0x337/0x6f0 [ 28.533228] ret_from_fork+0x116/0x1d0 [ 28.533625] ret_from_fork_asm+0x1a/0x30 [ 28.533766] [ 28.533834] The buggy address belongs to the object at ffff888106118e00 [ 28.533834] which belongs to the cache kmalloc-64 of size 64 [ 28.534626] The buggy address is located 0 bytes to the right of [ 28.534626] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.535179] [ 28.535277] The buggy address belongs to the physical page: [ 28.535481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.535930] flags: 0x200000000000000(node=0|zone=2) [ 28.537673] page_type: f5(slab) [ 28.537826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.538306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.538657] page dumped because: kasan: bad access detected [ 28.538828] [ 28.538894] Memory state around the buggy address: [ 28.539321] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.540431] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.540729] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.541402] ^ [ 28.541950] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.542439] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.542869] ================================================================== [ 28.576892] ================================================================== [ 28.577261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 28.577574] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.577834] [ 28.578070] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.578123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.578137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.578171] Call Trace: [ 28.578193] <TASK> [ 28.578214] dump_stack_lvl+0x73/0xb0 [ 28.578259] print_report+0xd1/0x640 [ 28.578282] ? __virt_addr_valid+0x1db/0x2d0 [ 28.578308] ? kasan_atomics_helper+0x1467/0x5450 [ 28.578331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.578434] ? kasan_atomics_helper+0x1467/0x5450 [ 28.578462] kasan_report+0x141/0x180 [ 28.578517] ? kasan_atomics_helper+0x1467/0x5450 [ 28.578545] kasan_check_range+0x10c/0x1c0 [ 28.578581] __kasan_check_write+0x18/0x20 [ 28.578606] kasan_atomics_helper+0x1467/0x5450 [ 28.578633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.578657] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.578701] ? kasan_atomics+0x152/0x310 [ 28.578737] kasan_atomics+0x1dc/0x310 [ 28.578761] ? __pfx_kasan_atomics+0x10/0x10 [ 28.578796] ? __pfx_read_tsc+0x10/0x10 [ 28.578821] ? ktime_get_ts64+0x86/0x230 [ 28.578847] kunit_try_run_case+0x1a5/0x480 [ 28.578872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.578896] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.578923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.578958] ? __kthread_parkme+0x82/0x180 [ 28.579006] ? preempt_count_sub+0x50/0x80 [ 28.579031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.579057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.579094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.579119] kthread+0x337/0x6f0 [ 28.579176] ? trace_preempt_on+0x20/0xc0 [ 28.579203] ? __pfx_kthread+0x10/0x10 [ 28.579226] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.579262] ? calculate_sigpending+0x7b/0xa0 [ 28.579288] ? __pfx_kthread+0x10/0x10 [ 28.579310] ret_from_fork+0x116/0x1d0 [ 28.579332] ? __pfx_kthread+0x10/0x10 [ 28.579354] ret_from_fork_asm+0x1a/0x30 [ 28.579428] </TASK> [ 28.579443] [ 28.592860] Allocated by task 314: [ 28.593309] kasan_save_stack+0x45/0x70 [ 28.593762] kasan_save_track+0x18/0x40 [ 28.594364] kasan_save_alloc_info+0x3b/0x50 [ 28.594780] __kasan_kmalloc+0xb7/0xc0 [ 28.595076] __kmalloc_cache_noprof+0x189/0x420 [ 28.595245] kasan_atomics+0x95/0x310 [ 28.595416] kunit_try_run_case+0x1a5/0x480 [ 28.595795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.596308] kthread+0x337/0x6f0 [ 28.596641] ret_from_fork+0x116/0x1d0 [ 28.597042] ret_from_fork_asm+0x1a/0x30 [ 28.597489] [ 28.597681] The buggy address belongs to the object at ffff888106118e00 [ 28.597681] which belongs to the cache kmalloc-64 of size 64 [ 28.598190] The buggy address is located 0 bytes to the right of [ 28.598190] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.598767] [ 28.598929] The buggy address belongs to the physical page: [ 28.599489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.600436] flags: 0x200000000000000(node=0|zone=2) [ 28.600926] page_type: f5(slab) [ 28.601231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.601714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.601944] page dumped because: kasan: bad access detected [ 28.602115] [ 28.602200] Memory state around the buggy address: [ 28.602355] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.602747] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.603109] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.603358] ^ [ 28.603565] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.603838] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.604220] ================================================================== [ 29.147172] ================================================================== [ 29.148163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 29.148509] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.148806] [ 29.148934] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.148987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.149001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.149025] Call Trace: [ 29.149047] <TASK> [ 29.149088] dump_stack_lvl+0x73/0xb0 [ 29.149119] print_report+0xd1/0x640 [ 29.149154] ? __virt_addr_valid+0x1db/0x2d0 [ 29.149180] ? kasan_atomics_helper+0x224c/0x5450 [ 29.149203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.149231] ? kasan_atomics_helper+0x224c/0x5450 [ 29.149272] kasan_report+0x141/0x180 [ 29.149297] ? kasan_atomics_helper+0x224c/0x5450 [ 29.149328] kasan_check_range+0x10c/0x1c0 [ 29.149356] __kasan_check_write+0x18/0x20 [ 29.149382] kasan_atomics_helper+0x224c/0x5450 [ 29.149406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.149430] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.149457] ? kasan_atomics+0x152/0x310 [ 29.149484] kasan_atomics+0x1dc/0x310 [ 29.149508] ? __pfx_kasan_atomics+0x10/0x10 [ 29.149533] ? __pfx_read_tsc+0x10/0x10 [ 29.149557] ? ktime_get_ts64+0x86/0x230 [ 29.149583] kunit_try_run_case+0x1a5/0x480 [ 29.149609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.149633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.149661] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.149688] ? __kthread_parkme+0x82/0x180 [ 29.149710] ? preempt_count_sub+0x50/0x80 [ 29.149736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.149761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.149786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.149812] kthread+0x337/0x6f0 [ 29.149833] ? trace_preempt_on+0x20/0xc0 [ 29.149859] ? __pfx_kthread+0x10/0x10 [ 29.149882] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.149906] ? calculate_sigpending+0x7b/0xa0 [ 29.149932] ? __pfx_kthread+0x10/0x10 [ 29.149982] ret_from_fork+0x116/0x1d0 [ 29.150004] ? __pfx_kthread+0x10/0x10 [ 29.150026] ret_from_fork_asm+0x1a/0x30 [ 29.150059] </TASK> [ 29.150071] [ 29.157463] Allocated by task 314: [ 29.157650] kasan_save_stack+0x45/0x70 [ 29.157869] kasan_save_track+0x18/0x40 [ 29.158257] kasan_save_alloc_info+0x3b/0x50 [ 29.158472] __kasan_kmalloc+0xb7/0xc0 [ 29.158887] __kmalloc_cache_noprof+0x189/0x420 [ 29.159841] kasan_atomics+0x95/0x310 [ 29.160204] kunit_try_run_case+0x1a5/0x480 [ 29.160375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.161480] kthread+0x337/0x6f0 [ 29.161613] ret_from_fork+0x116/0x1d0 [ 29.161747] ret_from_fork_asm+0x1a/0x30 [ 29.161890] [ 29.161971] The buggy address belongs to the object at ffff888106118e00 [ 29.161971] which belongs to the cache kmalloc-64 of size 64 [ 29.162337] The buggy address is located 0 bytes to the right of [ 29.162337] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.162708] [ 29.162780] The buggy address belongs to the physical page: [ 29.162957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.163322] flags: 0x200000000000000(node=0|zone=2) [ 29.163909] page_type: f5(slab) [ 29.164236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.164992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.165663] page dumped because: kasan: bad access detected [ 29.166211] [ 29.166365] Memory state around the buggy address: [ 29.166802] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.167549] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.168246] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.168883] ^ [ 29.169344] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.169977] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.170595] ================================================================== [ 28.221857] ================================================================== [ 28.222549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 28.222812] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.223111] [ 28.223230] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.223280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.223294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.223318] Call Trace: [ 28.223338] <TASK> [ 28.223419] dump_stack_lvl+0x73/0xb0 [ 28.223454] print_report+0xd1/0x640 [ 28.223478] ? __virt_addr_valid+0x1db/0x2d0 [ 28.223513] ? kasan_atomics_helper+0xde0/0x5450 [ 28.223536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.223563] ? kasan_atomics_helper+0xde0/0x5450 [ 28.223587] kasan_report+0x141/0x180 [ 28.223651] ? kasan_atomics_helper+0xde0/0x5450 [ 28.223680] kasan_check_range+0x10c/0x1c0 [ 28.223705] __kasan_check_write+0x18/0x20 [ 28.223729] kasan_atomics_helper+0xde0/0x5450 [ 28.223752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.223775] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.223833] ? kasan_atomics+0x152/0x310 [ 28.223859] kasan_atomics+0x1dc/0x310 [ 28.223883] ? __pfx_kasan_atomics+0x10/0x10 [ 28.223909] ? __pfx_read_tsc+0x10/0x10 [ 28.223949] ? ktime_get_ts64+0x86/0x230 [ 28.224009] kunit_try_run_case+0x1a5/0x480 [ 28.224036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.224060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.224087] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.224114] ? __kthread_parkme+0x82/0x180 [ 28.224135] ? preempt_count_sub+0x50/0x80 [ 28.224203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.224228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.224253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.224278] kthread+0x337/0x6f0 [ 28.224300] ? trace_preempt_on+0x20/0xc0 [ 28.224356] ? __pfx_kthread+0x10/0x10 [ 28.224398] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.224423] ? calculate_sigpending+0x7b/0xa0 [ 28.224450] ? __pfx_kthread+0x10/0x10 [ 28.224473] ret_from_fork+0x116/0x1d0 [ 28.224495] ? __pfx_kthread+0x10/0x10 [ 28.224517] ret_from_fork_asm+0x1a/0x30 [ 28.224583] </TASK> [ 28.224595] [ 28.233844] Allocated by task 314: [ 28.234088] kasan_save_stack+0x45/0x70 [ 28.234318] kasan_save_track+0x18/0x40 [ 28.234571] kasan_save_alloc_info+0x3b/0x50 [ 28.234774] __kasan_kmalloc+0xb7/0xc0 [ 28.234953] __kmalloc_cache_noprof+0x189/0x420 [ 28.235186] kasan_atomics+0x95/0x310 [ 28.235430] kunit_try_run_case+0x1a5/0x480 [ 28.235656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.235889] kthread+0x337/0x6f0 [ 28.236192] ret_from_fork+0x116/0x1d0 [ 28.236410] ret_from_fork_asm+0x1a/0x30 [ 28.236618] [ 28.236743] The buggy address belongs to the object at ffff888106118e00 [ 28.236743] which belongs to the cache kmalloc-64 of size 64 [ 28.237292] The buggy address is located 0 bytes to the right of [ 28.237292] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.237789] [ 28.237993] The buggy address belongs to the physical page: [ 28.238260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.238583] flags: 0x200000000000000(node=0|zone=2) [ 28.238824] page_type: f5(slab) [ 28.238985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.239359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.239705] page dumped because: kasan: bad access detected [ 28.240090] [ 28.240180] Memory state around the buggy address: [ 28.240372] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.240686] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.241157] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.241523] ^ [ 28.241704] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.241919] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.242129] ================================================================== [ 28.022037] ================================================================== [ 28.022365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 28.023000] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.023523] [ 28.023627] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.023680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.023694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.023718] Call Trace: [ 28.023740] <TASK> [ 28.023760] dump_stack_lvl+0x73/0xb0 [ 28.023790] print_report+0xd1/0x640 [ 28.023814] ? __virt_addr_valid+0x1db/0x2d0 [ 28.023840] ? kasan_atomics_helper+0x860/0x5450 [ 28.023863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.023890] ? kasan_atomics_helper+0x860/0x5450 [ 28.024137] kasan_report+0x141/0x180 [ 28.024177] ? kasan_atomics_helper+0x860/0x5450 [ 28.024204] kasan_check_range+0x10c/0x1c0 [ 28.024230] __kasan_check_write+0x18/0x20 [ 28.024255] kasan_atomics_helper+0x860/0x5450 [ 28.024278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.024302] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.024328] ? kasan_atomics+0x152/0x310 [ 28.024356] kasan_atomics+0x1dc/0x310 [ 28.024389] ? __pfx_kasan_atomics+0x10/0x10 [ 28.024415] ? __pfx_read_tsc+0x10/0x10 [ 28.024438] ? ktime_get_ts64+0x86/0x230 [ 28.024464] kunit_try_run_case+0x1a5/0x480 [ 28.024490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.024514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.024541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.024568] ? __kthread_parkme+0x82/0x180 [ 28.024591] ? preempt_count_sub+0x50/0x80 [ 28.024615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.024641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.024666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.024691] kthread+0x337/0x6f0 [ 28.024713] ? trace_preempt_on+0x20/0xc0 [ 28.024739] ? __pfx_kthread+0x10/0x10 [ 28.024761] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.024786] ? calculate_sigpending+0x7b/0xa0 [ 28.024812] ? __pfx_kthread+0x10/0x10 [ 28.024834] ret_from_fork+0x116/0x1d0 [ 28.024854] ? __pfx_kthread+0x10/0x10 [ 28.024876] ret_from_fork_asm+0x1a/0x30 [ 28.024910] </TASK> [ 28.024922] [ 28.034803] Allocated by task 314: [ 28.034940] kasan_save_stack+0x45/0x70 [ 28.035169] kasan_save_track+0x18/0x40 [ 28.035717] kasan_save_alloc_info+0x3b/0x50 [ 28.036014] __kasan_kmalloc+0xb7/0xc0 [ 28.036209] __kmalloc_cache_noprof+0x189/0x420 [ 28.036532] kasan_atomics+0x95/0x310 [ 28.036705] kunit_try_run_case+0x1a5/0x480 [ 28.036890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.037444] kthread+0x337/0x6f0 [ 28.037640] ret_from_fork+0x116/0x1d0 [ 28.037812] ret_from_fork_asm+0x1a/0x30 [ 28.038122] [ 28.038336] The buggy address belongs to the object at ffff888106118e00 [ 28.038336] which belongs to the cache kmalloc-64 of size 64 [ 28.038995] The buggy address is located 0 bytes to the right of [ 28.038995] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.039671] [ 28.039839] The buggy address belongs to the physical page: [ 28.040159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.040586] flags: 0x200000000000000(node=0|zone=2) [ 28.041005] page_type: f5(slab) [ 28.041205] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.041800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.042172] page dumped because: kasan: bad access detected [ 28.042549] [ 28.042673] Memory state around the buggy address: [ 28.043168] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.043571] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.043896] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.044282] ^ [ 28.044557] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.045105] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.045625] ================================================================== [ 28.867108] ================================================================== [ 28.867581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 28.867834] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.868138] [ 28.868283] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.868344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.868431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.868458] Call Trace: [ 28.868482] <TASK> [ 28.868504] dump_stack_lvl+0x73/0xb0 [ 28.868537] print_report+0xd1/0x640 [ 28.868572] ? __virt_addr_valid+0x1db/0x2d0 [ 28.868599] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.868623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.868663] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.868687] kasan_report+0x141/0x180 [ 28.868712] ? kasan_atomics_helper+0x1c18/0x5450 [ 28.868740] kasan_check_range+0x10c/0x1c0 [ 28.868773] __kasan_check_write+0x18/0x20 [ 28.868797] kasan_atomics_helper+0x1c18/0x5450 [ 28.868822] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.868855] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.868883] ? kasan_atomics+0x152/0x310 [ 28.868910] kasan_atomics+0x1dc/0x310 [ 28.868941] ? __pfx_kasan_atomics+0x10/0x10 [ 28.868973] ? __pfx_read_tsc+0x10/0x10 [ 28.868997] ? ktime_get_ts64+0x86/0x230 [ 28.869024] kunit_try_run_case+0x1a5/0x480 [ 28.869051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.869075] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.869102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.869129] ? __kthread_parkme+0x82/0x180 [ 28.869159] ? preempt_count_sub+0x50/0x80 [ 28.869186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.869211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.869237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.869262] kthread+0x337/0x6f0 [ 28.869283] ? trace_preempt_on+0x20/0xc0 [ 28.869309] ? __pfx_kthread+0x10/0x10 [ 28.869331] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.869356] ? calculate_sigpending+0x7b/0xa0 [ 28.869383] ? __pfx_kthread+0x10/0x10 [ 28.869406] ret_from_fork+0x116/0x1d0 [ 28.869428] ? __pfx_kthread+0x10/0x10 [ 28.869450] ret_from_fork_asm+0x1a/0x30 [ 28.869483] </TASK> [ 28.869496] [ 28.878119] Allocated by task 314: [ 28.878453] kasan_save_stack+0x45/0x70 [ 28.878684] kasan_save_track+0x18/0x40 [ 28.878847] kasan_save_alloc_info+0x3b/0x50 [ 28.879101] __kasan_kmalloc+0xb7/0xc0 [ 28.879244] __kmalloc_cache_noprof+0x189/0x420 [ 28.879456] kasan_atomics+0x95/0x310 [ 28.879594] kunit_try_run_case+0x1a5/0x480 [ 28.879745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.880036] kthread+0x337/0x6f0 [ 28.880219] ret_from_fork+0x116/0x1d0 [ 28.880463] ret_from_fork_asm+0x1a/0x30 [ 28.880665] [ 28.880761] The buggy address belongs to the object at ffff888106118e00 [ 28.880761] which belongs to the cache kmalloc-64 of size 64 [ 28.881325] The buggy address is located 0 bytes to the right of [ 28.881325] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.881980] [ 28.882089] The buggy address belongs to the physical page: [ 28.882290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.882930] flags: 0x200000000000000(node=0|zone=2) [ 28.883220] page_type: f5(slab) [ 28.883492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.883869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.884232] page dumped because: kasan: bad access detected [ 28.884500] [ 28.884574] Memory state around the buggy address: [ 28.884733] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.884969] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.885287] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.885658] ^ [ 28.885887] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.886236] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.886574] ================================================================== [ 28.348714] ================================================================== [ 28.348935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 28.349288] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.349986] [ 28.350093] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.350154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.350168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.350191] Call Trace: [ 28.350211] <TASK> [ 28.350230] dump_stack_lvl+0x73/0xb0 [ 28.350260] print_report+0xd1/0x640 [ 28.350284] ? __virt_addr_valid+0x1db/0x2d0 [ 28.350309] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.350332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.350358] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.350381] kasan_report+0x141/0x180 [ 28.350405] ? kasan_atomics_helper+0x4a1c/0x5450 [ 28.350432] __asan_report_load4_noabort+0x18/0x20 [ 28.350458] kasan_atomics_helper+0x4a1c/0x5450 [ 28.350482] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.350504] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.350530] ? kasan_atomics+0x152/0x310 [ 28.350558] kasan_atomics+0x1dc/0x310 [ 28.350581] ? __pfx_kasan_atomics+0x10/0x10 [ 28.350606] ? __pfx_read_tsc+0x10/0x10 [ 28.350629] ? ktime_get_ts64+0x86/0x230 [ 28.350656] kunit_try_run_case+0x1a5/0x480 [ 28.350682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.350706] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.350732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.350758] ? __kthread_parkme+0x82/0x180 [ 28.350781] ? preempt_count_sub+0x50/0x80 [ 28.350806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.350831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.350857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.350887] kthread+0x337/0x6f0 [ 28.350910] ? trace_preempt_on+0x20/0xc0 [ 28.350936] ? __pfx_kthread+0x10/0x10 [ 28.351204] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.351233] ? calculate_sigpending+0x7b/0xa0 [ 28.351261] ? __pfx_kthread+0x10/0x10 [ 28.351285] ret_from_fork+0x116/0x1d0 [ 28.351309] ? __pfx_kthread+0x10/0x10 [ 28.351332] ret_from_fork_asm+0x1a/0x30 [ 28.351364] </TASK> [ 28.351430] [ 28.359773] Allocated by task 314: [ 28.359909] kasan_save_stack+0x45/0x70 [ 28.360111] kasan_save_track+0x18/0x40 [ 28.360325] kasan_save_alloc_info+0x3b/0x50 [ 28.360773] __kasan_kmalloc+0xb7/0xc0 [ 28.361040] __kmalloc_cache_noprof+0x189/0x420 [ 28.361255] kasan_atomics+0x95/0x310 [ 28.361385] kunit_try_run_case+0x1a5/0x480 [ 28.361538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.361814] kthread+0x337/0x6f0 [ 28.362032] ret_from_fork+0x116/0x1d0 [ 28.362325] ret_from_fork_asm+0x1a/0x30 [ 28.362781] [ 28.362884] The buggy address belongs to the object at ffff888106118e00 [ 28.362884] which belongs to the cache kmalloc-64 of size 64 [ 28.363368] The buggy address is located 0 bytes to the right of [ 28.363368] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.363729] [ 28.363797] The buggy address belongs to the physical page: [ 28.363968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.364264] flags: 0x200000000000000(node=0|zone=2) [ 28.364581] page_type: f5(slab) [ 28.364771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.365114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.365468] page dumped because: kasan: bad access detected [ 28.365714] [ 28.365804] Memory state around the buggy address: [ 28.366027] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.368577] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.369714] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.370622] ^ [ 28.371492] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.372215] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.373282] ================================================================== [ 27.696890] ================================================================== [ 27.697484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 27.698111] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.698504] [ 27.698620] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.698673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.698687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.698709] Call Trace: [ 27.698723] <TASK> [ 27.698740] dump_stack_lvl+0x73/0xb0 [ 27.698772] print_report+0xd1/0x640 [ 27.698795] ? __virt_addr_valid+0x1db/0x2d0 [ 27.698820] ? kasan_atomics_helper+0x4bbc/0x5450 [ 27.698841] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.698868] ? kasan_atomics_helper+0x4bbc/0x5450 [ 27.698889] kasan_report+0x141/0x180 [ 27.698912] ? kasan_atomics_helper+0x4bbc/0x5450 [ 27.698938] __asan_report_load4_noabort+0x18/0x20 [ 27.698975] kasan_atomics_helper+0x4bbc/0x5450 [ 27.698999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.699021] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.699046] ? kasan_atomics+0x152/0x310 [ 27.699072] kasan_atomics+0x1dc/0x310 [ 27.699095] ? __pfx_kasan_atomics+0x10/0x10 [ 27.699118] ? __pfx_read_tsc+0x10/0x10 [ 27.699140] ? ktime_get_ts64+0x86/0x230 [ 27.699178] kunit_try_run_case+0x1a5/0x480 [ 27.699204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.699227] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.699254] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.699280] ? __kthread_parkme+0x82/0x180 [ 27.699301] ? preempt_count_sub+0x50/0x80 [ 27.699324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.699349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.699372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.699448] kthread+0x337/0x6f0 [ 27.699470] ? trace_preempt_on+0x20/0xc0 [ 27.699495] ? __pfx_kthread+0x10/0x10 [ 27.699517] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.699542] ? calculate_sigpending+0x7b/0xa0 [ 27.699567] ? __pfx_kthread+0x10/0x10 [ 27.699589] ret_from_fork+0x116/0x1d0 [ 27.699608] ? __pfx_kthread+0x10/0x10 [ 27.699635] ret_from_fork_asm+0x1a/0x30 [ 27.699668] </TASK> [ 27.699679] [ 27.707100] Allocated by task 314: [ 27.707284] kasan_save_stack+0x45/0x70 [ 27.707646] kasan_save_track+0x18/0x40 [ 27.707810] kasan_save_alloc_info+0x3b/0x50 [ 27.707954] __kasan_kmalloc+0xb7/0xc0 [ 27.708082] __kmalloc_cache_noprof+0x189/0x420 [ 27.708243] kasan_atomics+0x95/0x310 [ 27.708469] kunit_try_run_case+0x1a5/0x480 [ 27.708681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.708928] kthread+0x337/0x6f0 [ 27.709103] ret_from_fork+0x116/0x1d0 [ 27.709298] ret_from_fork_asm+0x1a/0x30 [ 27.709668] [ 27.709768] The buggy address belongs to the object at ffff888106118e00 [ 27.709768] which belongs to the cache kmalloc-64 of size 64 [ 27.710649] The buggy address is located 0 bytes to the right of [ 27.710649] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.711027] [ 27.711097] The buggy address belongs to the physical page: [ 27.711288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.711640] flags: 0x200000000000000(node=0|zone=2) [ 27.711868] page_type: f5(slab) [ 27.712210] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.712472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.712691] page dumped because: kasan: bad access detected [ 27.712856] [ 27.712919] Memory state around the buggy address: [ 27.713154] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.713476] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.713798] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.714400] ^ [ 27.714636] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.714963] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.715284] ================================================================== [ 28.827012] ================================================================== [ 28.827332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 28.827807] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.828128] [ 28.828285] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.828339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.828353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.828451] Call Trace: [ 28.828473] <TASK> [ 28.828507] dump_stack_lvl+0x73/0xb0 [ 28.828541] print_report+0xd1/0x640 [ 28.828566] ? __virt_addr_valid+0x1db/0x2d0 [ 28.828594] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.828617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.828644] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.828668] kasan_report+0x141/0x180 [ 28.828691] ? kasan_atomics_helper+0x1a7f/0x5450 [ 28.828718] kasan_check_range+0x10c/0x1c0 [ 28.828742] __kasan_check_write+0x18/0x20 [ 28.828766] kasan_atomics_helper+0x1a7f/0x5450 [ 28.828791] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.828824] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.828850] ? kasan_atomics+0x152/0x310 [ 28.828888] kasan_atomics+0x1dc/0x310 [ 28.828912] ? __pfx_kasan_atomics+0x10/0x10 [ 28.828938] ? __pfx_read_tsc+0x10/0x10 [ 28.828961] ? ktime_get_ts64+0x86/0x230 [ 28.829004] kunit_try_run_case+0x1a5/0x480 [ 28.829031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.829056] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.829083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.829110] ? __kthread_parkme+0x82/0x180 [ 28.829133] ? preempt_count_sub+0x50/0x80 [ 28.829166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.829191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.829216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.829241] kthread+0x337/0x6f0 [ 28.829263] ? trace_preempt_on+0x20/0xc0 [ 28.829289] ? __pfx_kthread+0x10/0x10 [ 28.829312] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.829336] ? calculate_sigpending+0x7b/0xa0 [ 28.829395] ? __pfx_kthread+0x10/0x10 [ 28.829419] ret_from_fork+0x116/0x1d0 [ 28.829440] ? __pfx_kthread+0x10/0x10 [ 28.829473] ret_from_fork_asm+0x1a/0x30 [ 28.829506] </TASK> [ 28.829518] [ 28.837743] Allocated by task 314: [ 28.837977] kasan_save_stack+0x45/0x70 [ 28.838153] kasan_save_track+0x18/0x40 [ 28.838289] kasan_save_alloc_info+0x3b/0x50 [ 28.838788] __kasan_kmalloc+0xb7/0xc0 [ 28.839017] __kmalloc_cache_noprof+0x189/0x420 [ 28.839250] kasan_atomics+0x95/0x310 [ 28.839517] kunit_try_run_case+0x1a5/0x480 [ 28.839736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.839992] kthread+0x337/0x6f0 [ 28.840156] ret_from_fork+0x116/0x1d0 [ 28.840355] ret_from_fork_asm+0x1a/0x30 [ 28.840558] [ 28.840651] The buggy address belongs to the object at ffff888106118e00 [ 28.840651] which belongs to the cache kmalloc-64 of size 64 [ 28.841247] The buggy address is located 0 bytes to the right of [ 28.841247] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.841855] [ 28.841956] The buggy address belongs to the physical page: [ 28.842138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.842453] flags: 0x200000000000000(node=0|zone=2) [ 28.842677] page_type: f5(slab) [ 28.842858] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.843232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.843883] page dumped because: kasan: bad access detected [ 28.844200] [ 28.844292] Memory state around the buggy address: [ 28.844611] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.844864] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.845102] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.845334] ^ [ 28.845638] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.846011] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.846414] ================================================================== [ 28.847006] ================================================================== [ 28.847339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 28.847612] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.847944] [ 28.848057] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.848108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.848123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.848155] Call Trace: [ 28.848178] <TASK> [ 28.848199] dump_stack_lvl+0x73/0xb0 [ 28.848228] print_report+0xd1/0x640 [ 28.848252] ? __virt_addr_valid+0x1db/0x2d0 [ 28.848278] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.848301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.848328] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.848351] kasan_report+0x141/0x180 [ 28.848374] ? kasan_atomics_helper+0x1b22/0x5450 [ 28.848401] kasan_check_range+0x10c/0x1c0 [ 28.848426] __kasan_check_write+0x18/0x20 [ 28.848451] kasan_atomics_helper+0x1b22/0x5450 [ 28.848475] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.848499] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.848526] ? kasan_atomics+0x152/0x310 [ 28.848552] kasan_atomics+0x1dc/0x310 [ 28.848575] ? __pfx_kasan_atomics+0x10/0x10 [ 28.848601] ? __pfx_read_tsc+0x10/0x10 [ 28.848625] ? ktime_get_ts64+0x86/0x230 [ 28.848651] kunit_try_run_case+0x1a5/0x480 [ 28.848676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.848700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.848727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.848754] ? __kthread_parkme+0x82/0x180 [ 28.848776] ? preempt_count_sub+0x50/0x80 [ 28.848801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.848826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.848850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.848875] kthread+0x337/0x6f0 [ 28.848897] ? trace_preempt_on+0x20/0xc0 [ 28.848923] ? __pfx_kthread+0x10/0x10 [ 28.848945] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.848969] ? calculate_sigpending+0x7b/0xa0 [ 28.848994] ? __pfx_kthread+0x10/0x10 [ 28.849018] ret_from_fork+0x116/0x1d0 [ 28.849039] ? __pfx_kthread+0x10/0x10 [ 28.849061] ret_from_fork_asm+0x1a/0x30 [ 28.849094] </TASK> [ 28.849107] [ 28.857578] Allocated by task 314: [ 28.857797] kasan_save_stack+0x45/0x70 [ 28.858049] kasan_save_track+0x18/0x40 [ 28.858258] kasan_save_alloc_info+0x3b/0x50 [ 28.858550] __kasan_kmalloc+0xb7/0xc0 [ 28.858734] __kmalloc_cache_noprof+0x189/0x420 [ 28.858933] kasan_atomics+0x95/0x310 [ 28.859121] kunit_try_run_case+0x1a5/0x480 [ 28.859354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.859903] kthread+0x337/0x6f0 [ 28.860192] ret_from_fork+0x116/0x1d0 [ 28.860364] ret_from_fork_asm+0x1a/0x30 [ 28.860643] [ 28.860744] The buggy address belongs to the object at ffff888106118e00 [ 28.860744] which belongs to the cache kmalloc-64 of size 64 [ 28.861289] The buggy address is located 0 bytes to the right of [ 28.861289] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.861858] [ 28.861957] The buggy address belongs to the physical page: [ 28.862138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.862453] flags: 0x200000000000000(node=0|zone=2) [ 28.862623] page_type: f5(slab) [ 28.862819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.863190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.863591] page dumped because: kasan: bad access detected [ 28.863881] [ 28.863995] Memory state around the buggy address: [ 28.864228] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.864956] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.865202] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.865552] ^ [ 28.865778] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.866177] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.866578] ================================================================== [ 29.075178] ================================================================== [ 29.075456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 29.075816] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.076211] [ 29.076318] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.076371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.076385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.076409] Call Trace: [ 29.076430] <TASK> [ 29.076452] dump_stack_lvl+0x73/0xb0 [ 29.076484] print_report+0xd1/0x640 [ 29.076508] ? __virt_addr_valid+0x1db/0x2d0 [ 29.076534] ? kasan_atomics_helper+0x20c8/0x5450 [ 29.076557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.076604] ? kasan_atomics_helper+0x20c8/0x5450 [ 29.076627] kasan_report+0x141/0x180 [ 29.076650] ? kasan_atomics_helper+0x20c8/0x5450 [ 29.076677] kasan_check_range+0x10c/0x1c0 [ 29.076702] __kasan_check_write+0x18/0x20 [ 29.076727] kasan_atomics_helper+0x20c8/0x5450 [ 29.076750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.076773] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.076800] ? kasan_atomics+0x152/0x310 [ 29.076827] kasan_atomics+0x1dc/0x310 [ 29.076851] ? __pfx_kasan_atomics+0x10/0x10 [ 29.076876] ? __pfx_read_tsc+0x10/0x10 [ 29.076900] ? ktime_get_ts64+0x86/0x230 [ 29.076926] kunit_try_run_case+0x1a5/0x480 [ 29.076978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.077002] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.077030] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.077056] ? __kthread_parkme+0x82/0x180 [ 29.077078] ? preempt_count_sub+0x50/0x80 [ 29.077103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.077127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.077164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.077189] kthread+0x337/0x6f0 [ 29.077212] ? trace_preempt_on+0x20/0xc0 [ 29.077238] ? __pfx_kthread+0x10/0x10 [ 29.077260] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.077286] ? calculate_sigpending+0x7b/0xa0 [ 29.077311] ? __pfx_kthread+0x10/0x10 [ 29.077333] ret_from_fork+0x116/0x1d0 [ 29.077354] ? __pfx_kthread+0x10/0x10 [ 29.077376] ret_from_fork_asm+0x1a/0x30 [ 29.077408] </TASK> [ 29.077421] [ 29.084681] Allocated by task 314: [ 29.084859] kasan_save_stack+0x45/0x70 [ 29.085054] kasan_save_track+0x18/0x40 [ 29.085245] kasan_save_alloc_info+0x3b/0x50 [ 29.085446] __kasan_kmalloc+0xb7/0xc0 [ 29.085788] __kmalloc_cache_noprof+0x189/0x420 [ 29.086078] kasan_atomics+0x95/0x310 [ 29.086228] kunit_try_run_case+0x1a5/0x480 [ 29.086372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.086542] kthread+0x337/0x6f0 [ 29.086660] ret_from_fork+0x116/0x1d0 [ 29.086804] ret_from_fork_asm+0x1a/0x30 [ 29.086993] [ 29.087083] The buggy address belongs to the object at ffff888106118e00 [ 29.087083] which belongs to the cache kmalloc-64 of size 64 [ 29.087607] The buggy address is located 0 bytes to the right of [ 29.087607] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.088173] [ 29.088244] The buggy address belongs to the physical page: [ 29.088415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.088644] flags: 0x200000000000000(node=0|zone=2) [ 29.088873] page_type: f5(slab) [ 29.089134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.089503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.089835] page dumped because: kasan: bad access detected [ 29.090191] [ 29.090291] Memory state around the buggy address: [ 29.090468] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.090762] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.090987] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.091201] ^ [ 29.091350] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.091554] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.091885] ================================================================== [ 28.909271] ================================================================== [ 28.909616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 28.909924] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.910259] [ 28.910428] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.910505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.910520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.910545] Call Trace: [ 28.910570] <TASK> [ 28.910594] dump_stack_lvl+0x73/0xb0 [ 28.910627] print_report+0xd1/0x640 [ 28.910653] ? __virt_addr_valid+0x1db/0x2d0 [ 28.910680] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.910703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.910731] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.910758] kasan_report+0x141/0x180 [ 28.910783] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.910811] kasan_check_range+0x10c/0x1c0 [ 28.910837] __kasan_check_write+0x18/0x20 [ 28.910863] kasan_atomics_helper+0x1ce1/0x5450 [ 28.910888] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.910911] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.910937] ? kasan_atomics+0x152/0x310 [ 28.910983] kasan_atomics+0x1dc/0x310 [ 28.911007] ? __pfx_kasan_atomics+0x10/0x10 [ 28.911032] ? __pfx_read_tsc+0x10/0x10 [ 28.911057] ? ktime_get_ts64+0x86/0x230 [ 28.911083] kunit_try_run_case+0x1a5/0x480 [ 28.911110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.911134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.911174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.911201] ? __kthread_parkme+0x82/0x180 [ 28.911223] ? preempt_count_sub+0x50/0x80 [ 28.911248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.911274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.911299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.911325] kthread+0x337/0x6f0 [ 28.911347] ? trace_preempt_on+0x20/0xc0 [ 28.911374] ? __pfx_kthread+0x10/0x10 [ 28.911396] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.911422] ? calculate_sigpending+0x7b/0xa0 [ 28.911447] ? __pfx_kthread+0x10/0x10 [ 28.911471] ret_from_fork+0x116/0x1d0 [ 28.911493] ? __pfx_kthread+0x10/0x10 [ 28.911515] ret_from_fork_asm+0x1a/0x30 [ 28.911549] </TASK> [ 28.911562] [ 28.921097] Allocated by task 314: [ 28.921294] kasan_save_stack+0x45/0x70 [ 28.921494] kasan_save_track+0x18/0x40 [ 28.921653] kasan_save_alloc_info+0x3b/0x50 [ 28.921863] __kasan_kmalloc+0xb7/0xc0 [ 28.922049] __kmalloc_cache_noprof+0x189/0x420 [ 28.922714] kasan_atomics+0x95/0x310 [ 28.922872] kunit_try_run_case+0x1a5/0x480 [ 28.923252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.923567] kthread+0x337/0x6f0 [ 28.923713] ret_from_fork+0x116/0x1d0 [ 28.923905] ret_from_fork_asm+0x1a/0x30 [ 28.924252] [ 28.924435] The buggy address belongs to the object at ffff888106118e00 [ 28.924435] which belongs to the cache kmalloc-64 of size 64 [ 28.925069] The buggy address is located 0 bytes to the right of [ 28.925069] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.925681] [ 28.925794] The buggy address belongs to the physical page: [ 28.926289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.926712] flags: 0x200000000000000(node=0|zone=2) [ 28.926916] page_type: f5(slab) [ 28.927234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.927617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.927932] page dumped because: kasan: bad access detected [ 28.928373] [ 28.928463] Memory state around the buggy address: [ 28.928647] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.929170] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.929619] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.929863] ^ [ 28.930179] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.930559] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.930867] ================================================================== [ 27.865161] ================================================================== [ 27.865850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 27.866287] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.866807] [ 27.866993] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.867056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.867071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.867094] Call Trace: [ 27.867115] <TASK> [ 27.867134] dump_stack_lvl+0x73/0xb0 [ 27.867185] print_report+0xd1/0x640 [ 27.867210] ? __virt_addr_valid+0x1db/0x2d0 [ 27.867236] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.867270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.867306] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.867331] kasan_report+0x141/0x180 [ 27.867355] ? kasan_atomics_helper+0x4b3a/0x5450 [ 27.867393] __asan_report_store4_noabort+0x1b/0x30 [ 27.867419] kasan_atomics_helper+0x4b3a/0x5450 [ 27.867442] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.867466] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.867491] ? kasan_atomics+0x152/0x310 [ 27.867531] kasan_atomics+0x1dc/0x310 [ 27.867555] ? __pfx_kasan_atomics+0x10/0x10 [ 27.867581] ? __pfx_read_tsc+0x10/0x10 [ 27.867613] ? ktime_get_ts64+0x86/0x230 [ 27.867644] kunit_try_run_case+0x1a5/0x480 [ 27.867671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.867706] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.867733] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.867759] ? __kthread_parkme+0x82/0x180 [ 27.867781] ? preempt_count_sub+0x50/0x80 [ 27.867806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.867832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.867857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.867882] kthread+0x337/0x6f0 [ 27.867904] ? trace_preempt_on+0x20/0xc0 [ 27.867931] ? __pfx_kthread+0x10/0x10 [ 27.867962] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.867988] ? calculate_sigpending+0x7b/0xa0 [ 27.868014] ? __pfx_kthread+0x10/0x10 [ 27.868037] ret_from_fork+0x116/0x1d0 [ 27.868059] ? __pfx_kthread+0x10/0x10 [ 27.868080] ret_from_fork_asm+0x1a/0x30 [ 27.868113] </TASK> [ 27.868125] [ 27.881801] Allocated by task 314: [ 27.882195] kasan_save_stack+0x45/0x70 [ 27.882891] kasan_save_track+0x18/0x40 [ 27.883134] kasan_save_alloc_info+0x3b/0x50 [ 27.883388] __kasan_kmalloc+0xb7/0xc0 [ 27.883600] __kmalloc_cache_noprof+0x189/0x420 [ 27.884040] kasan_atomics+0x95/0x310 [ 27.884366] kunit_try_run_case+0x1a5/0x480 [ 27.884554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.885016] kthread+0x337/0x6f0 [ 27.885335] ret_from_fork+0x116/0x1d0 [ 27.885765] ret_from_fork_asm+0x1a/0x30 [ 27.886263] [ 27.886417] The buggy address belongs to the object at ffff888106118e00 [ 27.886417] which belongs to the cache kmalloc-64 of size 64 [ 27.887271] The buggy address is located 0 bytes to the right of [ 27.887271] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 27.888607] [ 27.888786] The buggy address belongs to the physical page: [ 27.889096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 27.889885] flags: 0x200000000000000(node=0|zone=2) [ 27.890425] page_type: f5(slab) [ 27.890756] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.891509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.891858] page dumped because: kasan: bad access detected [ 27.892138] [ 27.892478] Memory state around the buggy address: [ 27.893048] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.893814] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.894416] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.894638] ^ [ 27.894792] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.895168] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.896102] ================================================================== [ 28.374706] ================================================================== [ 28.375289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 28.376360] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.377290] [ 28.377845] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.377913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.377928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.377952] Call Trace: [ 28.377976] <TASK> [ 28.377999] dump_stack_lvl+0x73/0xb0 [ 28.378034] print_report+0xd1/0x640 [ 28.378060] ? __virt_addr_valid+0x1db/0x2d0 [ 28.378088] ? kasan_atomics_helper+0x1148/0x5450 [ 28.378111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.378138] ? kasan_atomics_helper+0x1148/0x5450 [ 28.378170] kasan_report+0x141/0x180 [ 28.378194] ? kasan_atomics_helper+0x1148/0x5450 [ 28.378221] kasan_check_range+0x10c/0x1c0 [ 28.378246] __kasan_check_write+0x18/0x20 [ 28.378271] kasan_atomics_helper+0x1148/0x5450 [ 28.378294] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.378318] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.378343] ? kasan_atomics+0x152/0x310 [ 28.378499] kasan_atomics+0x1dc/0x310 [ 28.378539] ? __pfx_kasan_atomics+0x10/0x10 [ 28.378579] ? __pfx_read_tsc+0x10/0x10 [ 28.378605] ? ktime_get_ts64+0x86/0x230 [ 28.378670] kunit_try_run_case+0x1a5/0x480 [ 28.378699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.378724] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.378751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.378778] ? __kthread_parkme+0x82/0x180 [ 28.378800] ? preempt_count_sub+0x50/0x80 [ 28.378823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.378848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.378873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.378898] kthread+0x337/0x6f0 [ 28.378920] ? trace_preempt_on+0x20/0xc0 [ 28.378947] ? __pfx_kthread+0x10/0x10 [ 28.378970] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.378995] ? calculate_sigpending+0x7b/0xa0 [ 28.379020] ? __pfx_kthread+0x10/0x10 [ 28.379043] ret_from_fork+0x116/0x1d0 [ 28.379064] ? __pfx_kthread+0x10/0x10 [ 28.379086] ret_from_fork_asm+0x1a/0x30 [ 28.379118] </TASK> [ 28.379131] [ 28.394867] Allocated by task 314: [ 28.395410] kasan_save_stack+0x45/0x70 [ 28.395896] kasan_save_track+0x18/0x40 [ 28.396350] kasan_save_alloc_info+0x3b/0x50 [ 28.396537] __kasan_kmalloc+0xb7/0xc0 [ 28.397056] __kmalloc_cache_noprof+0x189/0x420 [ 28.397639] kasan_atomics+0x95/0x310 [ 28.397783] kunit_try_run_case+0x1a5/0x480 [ 28.397930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.398629] kthread+0x337/0x6f0 [ 28.399026] ret_from_fork+0x116/0x1d0 [ 28.399526] ret_from_fork_asm+0x1a/0x30 [ 28.399920] [ 28.400168] The buggy address belongs to the object at ffff888106118e00 [ 28.400168] which belongs to the cache kmalloc-64 of size 64 [ 28.400879] The buggy address is located 0 bytes to the right of [ 28.400879] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.402254] [ 28.402448] The buggy address belongs to the physical page: [ 28.402995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.403605] flags: 0x200000000000000(node=0|zone=2) [ 28.403784] page_type: f5(slab) [ 28.403908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.404776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.405738] page dumped because: kasan: bad access detected [ 28.406587] [ 28.406764] Memory state around the buggy address: [ 28.407347] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.407588] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.407812] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.408029] ^ [ 28.408370] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.409118] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.409833] ================================================================== [ 28.702501] ================================================================== [ 28.703152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 28.703494] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.704278] [ 28.704573] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.704627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.704641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.704664] Call Trace: [ 28.704687] <TASK> [ 28.704708] dump_stack_lvl+0x73/0xb0 [ 28.704741] print_report+0xd1/0x640 [ 28.704776] ? __virt_addr_valid+0x1db/0x2d0 [ 28.704804] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.704839] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.704866] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.704890] kasan_report+0x141/0x180 [ 28.704914] ? kasan_atomics_helper+0x16e7/0x5450 [ 28.704957] kasan_check_range+0x10c/0x1c0 [ 28.704982] __kasan_check_write+0x18/0x20 [ 28.705007] kasan_atomics_helper+0x16e7/0x5450 [ 28.705040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.705064] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.705092] ? kasan_atomics+0x152/0x310 [ 28.705131] kasan_atomics+0x1dc/0x310 [ 28.705164] ? __pfx_kasan_atomics+0x10/0x10 [ 28.705191] ? __pfx_read_tsc+0x10/0x10 [ 28.705215] ? ktime_get_ts64+0x86/0x230 [ 28.705242] kunit_try_run_case+0x1a5/0x480 [ 28.705269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.705293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.705320] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.705347] ? __kthread_parkme+0x82/0x180 [ 28.705388] ? preempt_count_sub+0x50/0x80 [ 28.705414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.705440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.705465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.705491] kthread+0x337/0x6f0 [ 28.705513] ? trace_preempt_on+0x20/0xc0 [ 28.705540] ? __pfx_kthread+0x10/0x10 [ 28.705563] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.705590] ? calculate_sigpending+0x7b/0xa0 [ 28.705617] ? __pfx_kthread+0x10/0x10 [ 28.705640] ret_from_fork+0x116/0x1d0 [ 28.705662] ? __pfx_kthread+0x10/0x10 [ 28.705685] ret_from_fork_asm+0x1a/0x30 [ 28.705718] </TASK> [ 28.705731] [ 28.718350] Allocated by task 314: [ 28.718487] kasan_save_stack+0x45/0x70 [ 28.718639] kasan_save_track+0x18/0x40 [ 28.718774] kasan_save_alloc_info+0x3b/0x50 [ 28.718924] __kasan_kmalloc+0xb7/0xc0 [ 28.719054] __kmalloc_cache_noprof+0x189/0x420 [ 28.719243] kasan_atomics+0x95/0x310 [ 28.719381] kunit_try_run_case+0x1a5/0x480 [ 28.719527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.719707] kthread+0x337/0x6f0 [ 28.719828] ret_from_fork+0x116/0x1d0 [ 28.720162] ret_from_fork_asm+0x1a/0x30 [ 28.720469] [ 28.720564] The buggy address belongs to the object at ffff888106118e00 [ 28.720564] which belongs to the cache kmalloc-64 of size 64 [ 28.721049] The buggy address is located 0 bytes to the right of [ 28.721049] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.721650] [ 28.721745] The buggy address belongs to the physical page: [ 28.722024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.722428] flags: 0x200000000000000(node=0|zone=2) [ 28.722619] page_type: f5(slab) [ 28.722743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.723003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.723312] page dumped because: kasan: bad access detected [ 28.723687] [ 28.723788] Memory state around the buggy address: [ 28.724132] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.724471] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.724731] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.725106] ^ [ 28.725274] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.725512] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.725881] ================================================================== [ 28.200973] ================================================================== [ 28.201380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 28.201815] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.202230] [ 28.202338] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.202394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.202408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.202481] Call Trace: [ 28.202501] <TASK> [ 28.202517] dump_stack_lvl+0x73/0xb0 [ 28.202548] print_report+0xd1/0x640 [ 28.202572] ? __virt_addr_valid+0x1db/0x2d0 [ 28.202598] ? kasan_atomics_helper+0xd47/0x5450 [ 28.202620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.202682] ? kasan_atomics_helper+0xd47/0x5450 [ 28.202705] kasan_report+0x141/0x180 [ 28.202729] ? kasan_atomics_helper+0xd47/0x5450 [ 28.202756] kasan_check_range+0x10c/0x1c0 [ 28.202782] __kasan_check_write+0x18/0x20 [ 28.202837] kasan_atomics_helper+0xd47/0x5450 [ 28.202862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.202885] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.202912] ? kasan_atomics+0x152/0x310 [ 28.202984] kasan_atomics+0x1dc/0x310 [ 28.203011] ? __pfx_kasan_atomics+0x10/0x10 [ 28.203036] ? __pfx_read_tsc+0x10/0x10 [ 28.203060] ? ktime_get_ts64+0x86/0x230 [ 28.203086] kunit_try_run_case+0x1a5/0x480 [ 28.203153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.203177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.203204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.203231] ? __kthread_parkme+0x82/0x180 [ 28.203283] ? preempt_count_sub+0x50/0x80 [ 28.203308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.203333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.203380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.203407] kthread+0x337/0x6f0 [ 28.203428] ? trace_preempt_on+0x20/0xc0 [ 28.203486] ? __pfx_kthread+0x10/0x10 [ 28.203509] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.203534] ? calculate_sigpending+0x7b/0xa0 [ 28.203560] ? __pfx_kthread+0x10/0x10 [ 28.203582] ret_from_fork+0x116/0x1d0 [ 28.203604] ? __pfx_kthread+0x10/0x10 [ 28.203657] ret_from_fork_asm+0x1a/0x30 [ 28.203690] </TASK> [ 28.203702] [ 28.211490] Allocated by task 314: [ 28.211668] kasan_save_stack+0x45/0x70 [ 28.211850] kasan_save_track+0x18/0x40 [ 28.212015] kasan_save_alloc_info+0x3b/0x50 [ 28.214183] __kasan_kmalloc+0xb7/0xc0 [ 28.214392] __kmalloc_cache_noprof+0x189/0x420 [ 28.214551] kasan_atomics+0x95/0x310 [ 28.214682] kunit_try_run_case+0x1a5/0x480 [ 28.214826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.215005] kthread+0x337/0x6f0 [ 28.215126] ret_from_fork+0x116/0x1d0 [ 28.215267] ret_from_fork_asm+0x1a/0x30 [ 28.215404] [ 28.215472] The buggy address belongs to the object at ffff888106118e00 [ 28.215472] which belongs to the cache kmalloc-64 of size 64 [ 28.215828] The buggy address is located 0 bytes to the right of [ 28.215828] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.216391] [ 28.216496] The buggy address belongs to the physical page: [ 28.216760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.217358] flags: 0x200000000000000(node=0|zone=2) [ 28.217591] page_type: f5(slab) [ 28.217803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.218171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.218550] page dumped because: kasan: bad access detected [ 28.218814] [ 28.218910] Memory state around the buggy address: [ 28.219185] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.219539] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.219897] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.220253] ^ [ 28.220540] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.220875] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.221308] ================================================================== [ 28.953502] ================================================================== [ 28.953825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 28.954384] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.954611] [ 28.954699] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.954751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.954765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.954789] Call Trace: [ 28.954811] <TASK> [ 28.954832] dump_stack_lvl+0x73/0xb0 [ 28.954863] print_report+0xd1/0x640 [ 28.954888] ? __virt_addr_valid+0x1db/0x2d0 [ 28.954914] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.954947] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.954976] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.954999] kasan_report+0x141/0x180 [ 28.955023] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.955051] kasan_check_range+0x10c/0x1c0 [ 28.956759] __kasan_check_write+0x18/0x20 [ 28.956816] kasan_atomics_helper+0x1e12/0x5450 [ 28.956844] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.956869] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.956896] ? kasan_atomics+0x152/0x310 [ 28.956924] kasan_atomics+0x1dc/0x310 [ 28.956961] ? __pfx_kasan_atomics+0x10/0x10 [ 28.956989] ? __pfx_read_tsc+0x10/0x10 [ 28.957016] ? ktime_get_ts64+0x86/0x230 [ 28.957042] kunit_try_run_case+0x1a5/0x480 [ 28.957070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.957094] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.957122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.957165] ? __kthread_parkme+0x82/0x180 [ 28.957188] ? preempt_count_sub+0x50/0x80 [ 28.957213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.957238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.957264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.957289] kthread+0x337/0x6f0 [ 28.957312] ? trace_preempt_on+0x20/0xc0 [ 28.957338] ? __pfx_kthread+0x10/0x10 [ 28.957360] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.957385] ? calculate_sigpending+0x7b/0xa0 [ 28.957411] ? __pfx_kthread+0x10/0x10 [ 28.957434] ret_from_fork+0x116/0x1d0 [ 28.957455] ? __pfx_kthread+0x10/0x10 [ 28.957504] ret_from_fork_asm+0x1a/0x30 [ 28.957538] </TASK> [ 28.957552] [ 28.964858] Allocated by task 314: [ 28.965084] kasan_save_stack+0x45/0x70 [ 28.965295] kasan_save_track+0x18/0x40 [ 28.965459] kasan_save_alloc_info+0x3b/0x50 [ 28.965639] __kasan_kmalloc+0xb7/0xc0 [ 28.965802] __kmalloc_cache_noprof+0x189/0x420 [ 28.966020] kasan_atomics+0x95/0x310 [ 28.966194] kunit_try_run_case+0x1a5/0x480 [ 28.966390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.966620] kthread+0x337/0x6f0 [ 28.966771] ret_from_fork+0x116/0x1d0 [ 28.966927] ret_from_fork_asm+0x1a/0x30 [ 28.967089] [ 28.967168] The buggy address belongs to the object at ffff888106118e00 [ 28.967168] which belongs to the cache kmalloc-64 of size 64 [ 28.967575] The buggy address is located 0 bytes to the right of [ 28.967575] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.968199] [ 28.968340] The buggy address belongs to the physical page: [ 28.968519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.968820] flags: 0x200000000000000(node=0|zone=2) [ 28.969202] page_type: f5(slab) [ 28.969376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.969660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.969966] page dumped because: kasan: bad access detected [ 28.970199] [ 28.970290] Memory state around the buggy address: [ 28.970472] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.970688] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.970900] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.971111] ^ [ 28.971277] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.971494] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.971815] ================================================================== [ 28.181230] ================================================================== [ 28.181620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 28.181967] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.182201] [ 28.182284] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.182332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.182346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.182369] Call Trace: [ 28.182385] <TASK> [ 28.182424] dump_stack_lvl+0x73/0xb0 [ 28.182454] print_report+0xd1/0x640 [ 28.182478] ? __virt_addr_valid+0x1db/0x2d0 [ 28.182503] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.182526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.182598] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.182621] kasan_report+0x141/0x180 [ 28.182644] ? kasan_atomics_helper+0x4a84/0x5450 [ 28.182672] __asan_report_load4_noabort+0x18/0x20 [ 28.182697] kasan_atomics_helper+0x4a84/0x5450 [ 28.182753] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.182777] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.182804] ? kasan_atomics+0x152/0x310 [ 28.182830] kasan_atomics+0x1dc/0x310 [ 28.182853] ? __pfx_kasan_atomics+0x10/0x10 [ 28.182908] ? __pfx_read_tsc+0x10/0x10 [ 28.182949] ? ktime_get_ts64+0x86/0x230 [ 28.182976] kunit_try_run_case+0x1a5/0x480 [ 28.183002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.183026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.183085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.183115] ? __kthread_parkme+0x82/0x180 [ 28.183138] ? preempt_count_sub+0x50/0x80 [ 28.183172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.183229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.183253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.183278] kthread+0x337/0x6f0 [ 28.183302] ? trace_preempt_on+0x20/0xc0 [ 28.183327] ? __pfx_kthread+0x10/0x10 [ 28.183398] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.183426] ? calculate_sigpending+0x7b/0xa0 [ 28.183451] ? __pfx_kthread+0x10/0x10 [ 28.183483] ret_from_fork+0x116/0x1d0 [ 28.183505] ? __pfx_kthread+0x10/0x10 [ 28.183527] ret_from_fork_asm+0x1a/0x30 [ 28.183559] </TASK> [ 28.183571] [ 28.191417] Allocated by task 314: [ 28.191597] kasan_save_stack+0x45/0x70 [ 28.191794] kasan_save_track+0x18/0x40 [ 28.192039] kasan_save_alloc_info+0x3b/0x50 [ 28.192192] __kasan_kmalloc+0xb7/0xc0 [ 28.192319] __kmalloc_cache_noprof+0x189/0x420 [ 28.192688] kasan_atomics+0x95/0x310 [ 28.192891] kunit_try_run_case+0x1a5/0x480 [ 28.193154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.193403] kthread+0x337/0x6f0 [ 28.193589] ret_from_fork+0x116/0x1d0 [ 28.193772] ret_from_fork_asm+0x1a/0x30 [ 28.194059] [ 28.194200] The buggy address belongs to the object at ffff888106118e00 [ 28.194200] which belongs to the cache kmalloc-64 of size 64 [ 28.194676] The buggy address is located 0 bytes to the right of [ 28.194676] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.195316] [ 28.195419] The buggy address belongs to the physical page: [ 28.195676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.196112] flags: 0x200000000000000(node=0|zone=2) [ 28.196324] page_type: f5(slab) [ 28.196513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.197067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.197389] page dumped because: kasan: bad access detected [ 28.197718] [ 28.197809] Memory state around the buggy address: [ 28.198049] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.198430] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.198894] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.199235] ^ [ 28.199452] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.199977] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.200193] ================================================================== [ 28.311184] ================================================================== [ 28.311662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 28.311971] Read of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.312215] [ 28.312304] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.312357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.312371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.312411] Call Trace: [ 28.312426] <TASK> [ 28.312445] dump_stack_lvl+0x73/0xb0 [ 28.312476] print_report+0xd1/0x640 [ 28.312499] ? __virt_addr_valid+0x1db/0x2d0 [ 28.312527] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.312549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.312576] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.312600] kasan_report+0x141/0x180 [ 28.312622] ? kasan_atomics_helper+0x4a36/0x5450 [ 28.312649] __asan_report_load4_noabort+0x18/0x20 [ 28.312674] kasan_atomics_helper+0x4a36/0x5450 [ 28.312698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.312721] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.312748] ? kasan_atomics+0x152/0x310 [ 28.312775] kasan_atomics+0x1dc/0x310 [ 28.312800] ? __pfx_kasan_atomics+0x10/0x10 [ 28.312826] ? __pfx_read_tsc+0x10/0x10 [ 28.312850] ? ktime_get_ts64+0x86/0x230 [ 28.312876] kunit_try_run_case+0x1a5/0x480 [ 28.312903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.312927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.312964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.312991] ? __kthread_parkme+0x82/0x180 [ 28.313012] ? preempt_count_sub+0x50/0x80 [ 28.313037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.313062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.313088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.313114] kthread+0x337/0x6f0 [ 28.313134] ? trace_preempt_on+0x20/0xc0 [ 28.313172] ? __pfx_kthread+0x10/0x10 [ 28.313194] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.313219] ? calculate_sigpending+0x7b/0xa0 [ 28.313245] ? __pfx_kthread+0x10/0x10 [ 28.313267] ret_from_fork+0x116/0x1d0 [ 28.313288] ? __pfx_kthread+0x10/0x10 [ 28.313310] ret_from_fork_asm+0x1a/0x30 [ 28.313344] </TASK> [ 28.313356] [ 28.320919] Allocated by task 314: [ 28.321113] kasan_save_stack+0x45/0x70 [ 28.321321] kasan_save_track+0x18/0x40 [ 28.321620] kasan_save_alloc_info+0x3b/0x50 [ 28.321765] __kasan_kmalloc+0xb7/0xc0 [ 28.321891] __kmalloc_cache_noprof+0x189/0x420 [ 28.322268] kasan_atomics+0x95/0x310 [ 28.322455] kunit_try_run_case+0x1a5/0x480 [ 28.322660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.322909] kthread+0x337/0x6f0 [ 28.323492] ret_from_fork+0x116/0x1d0 [ 28.323654] ret_from_fork_asm+0x1a/0x30 [ 28.323854] [ 28.323960] The buggy address belongs to the object at ffff888106118e00 [ 28.323960] which belongs to the cache kmalloc-64 of size 64 [ 28.324560] The buggy address is located 0 bytes to the right of [ 28.324560] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.325077] [ 28.325182] The buggy address belongs to the physical page: [ 28.325444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.325803] flags: 0x200000000000000(node=0|zone=2) [ 28.326046] page_type: f5(slab) [ 28.326186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.326532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.326753] page dumped because: kasan: bad access detected [ 28.326921] [ 28.326986] Memory state around the buggy address: [ 28.327137] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.327483] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.327799] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.328299] ^ [ 28.329016] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.329333] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.329700] ================================================================== [ 27.997799] ================================================================== [ 27.998255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 27.998606] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 27.998990] [ 27.999465] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.999521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.999535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.999559] Call Trace: [ 27.999580] <TASK> [ 27.999675] dump_stack_lvl+0x73/0xb0 [ 27.999711] print_report+0xd1/0x640 [ 27.999790] ? __virt_addr_valid+0x1db/0x2d0 [ 27.999818] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.999842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.999869] ? kasan_atomics_helper+0x7c7/0x5450 [ 27.999949] kasan_report+0x141/0x180 [ 27.999975] ? kasan_atomics_helper+0x7c7/0x5450 [ 28.000002] kasan_check_range+0x10c/0x1c0 [ 28.000027] __kasan_check_write+0x18/0x20 [ 28.000051] kasan_atomics_helper+0x7c7/0x5450 [ 28.000076] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.000099] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.000127] ? kasan_atomics+0x152/0x310 [ 28.000167] kasan_atomics+0x1dc/0x310 [ 28.000192] ? __pfx_kasan_atomics+0x10/0x10 [ 28.000217] ? __pfx_read_tsc+0x10/0x10 [ 28.000241] ? ktime_get_ts64+0x86/0x230 [ 28.000268] kunit_try_run_case+0x1a5/0x480 [ 28.000293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.000317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.000345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.000383] ? __kthread_parkme+0x82/0x180 [ 28.000406] ? preempt_count_sub+0x50/0x80 [ 28.000431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.000457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.000483] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.000508] kthread+0x337/0x6f0 [ 28.000529] ? trace_preempt_on+0x20/0xc0 [ 28.000554] ? __pfx_kthread+0x10/0x10 [ 28.000576] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.000601] ? calculate_sigpending+0x7b/0xa0 [ 28.000627] ? __pfx_kthread+0x10/0x10 [ 28.000649] ret_from_fork+0x116/0x1d0 [ 28.000671] ? __pfx_kthread+0x10/0x10 [ 28.000693] ret_from_fork_asm+0x1a/0x30 [ 28.000726] </TASK> [ 28.000739] [ 28.010766] Allocated by task 314: [ 28.010937] kasan_save_stack+0x45/0x70 [ 28.011117] kasan_save_track+0x18/0x40 [ 28.011261] kasan_save_alloc_info+0x3b/0x50 [ 28.011924] __kasan_kmalloc+0xb7/0xc0 [ 28.012178] __kmalloc_cache_noprof+0x189/0x420 [ 28.012392] kasan_atomics+0x95/0x310 [ 28.012752] kunit_try_run_case+0x1a5/0x480 [ 28.013021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.013269] kthread+0x337/0x6f0 [ 28.013704] ret_from_fork+0x116/0x1d0 [ 28.013909] ret_from_fork_asm+0x1a/0x30 [ 28.014255] [ 28.014452] The buggy address belongs to the object at ffff888106118e00 [ 28.014452] which belongs to the cache kmalloc-64 of size 64 [ 28.014918] The buggy address is located 0 bytes to the right of [ 28.014918] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.015529] [ 28.015641] The buggy address belongs to the physical page: [ 28.015866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.016709] flags: 0x200000000000000(node=0|zone=2) [ 28.016975] page_type: f5(slab) [ 28.017250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.017533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.017977] page dumped because: kasan: bad access detected [ 28.018176] [ 28.018273] Memory state around the buggy address: [ 28.018524] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.019188] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.019542] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.019906] ^ [ 28.020310] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.020782] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.021152] ================================================================== [ 28.437160] ================================================================== [ 28.437473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 28.437903] Write of size 4 at addr ffff888106118e30 by task kunit_try_catch/314 [ 28.438261] [ 28.438364] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 28.438459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.438473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.438497] Call Trace: [ 28.438519] <TASK> [ 28.438541] dump_stack_lvl+0x73/0xb0 [ 28.438572] print_report+0xd1/0x640 [ 28.438597] ? __virt_addr_valid+0x1db/0x2d0 [ 28.438624] ? kasan_atomics_helper+0x1217/0x5450 [ 28.438647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.438675] ? kasan_atomics_helper+0x1217/0x5450 [ 28.438698] kasan_report+0x141/0x180 [ 28.438722] ? kasan_atomics_helper+0x1217/0x5450 [ 28.438750] kasan_check_range+0x10c/0x1c0 [ 28.438774] __kasan_check_write+0x18/0x20 [ 28.438799] kasan_atomics_helper+0x1217/0x5450 [ 28.438823] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.438845] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.438872] ? kasan_atomics+0x152/0x310 [ 28.438899] kasan_atomics+0x1dc/0x310 [ 28.438923] ? __pfx_kasan_atomics+0x10/0x10 [ 28.438948] ? __pfx_read_tsc+0x10/0x10 [ 28.438972] ? ktime_get_ts64+0x86/0x230 [ 28.438999] kunit_try_run_case+0x1a5/0x480 [ 28.439025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.439049] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.439076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.439111] ? __kthread_parkme+0x82/0x180 [ 28.439132] ? preempt_count_sub+0x50/0x80 [ 28.439170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.439198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.439223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.439247] kthread+0x337/0x6f0 [ 28.439269] ? trace_preempt_on+0x20/0xc0 [ 28.439295] ? __pfx_kthread+0x10/0x10 [ 28.439317] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.439341] ? calculate_sigpending+0x7b/0xa0 [ 28.439368] ? __pfx_kthread+0x10/0x10 [ 28.439389] ret_from_fork+0x116/0x1d0 [ 28.439422] ? __pfx_kthread+0x10/0x10 [ 28.439444] ret_from_fork_asm+0x1a/0x30 [ 28.439477] </TASK> [ 28.439489] [ 28.447643] Allocated by task 314: [ 28.447815] kasan_save_stack+0x45/0x70 [ 28.448031] kasan_save_track+0x18/0x40 [ 28.448230] kasan_save_alloc_info+0x3b/0x50 [ 28.448506] __kasan_kmalloc+0xb7/0xc0 [ 28.448678] __kmalloc_cache_noprof+0x189/0x420 [ 28.448879] kasan_atomics+0x95/0x310 [ 28.449059] kunit_try_run_case+0x1a5/0x480 [ 28.449226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.449414] kthread+0x337/0x6f0 [ 28.449579] ret_from_fork+0x116/0x1d0 [ 28.449804] ret_from_fork_asm+0x1a/0x30 [ 28.450023] [ 28.450109] The buggy address belongs to the object at ffff888106118e00 [ 28.450109] which belongs to the cache kmalloc-64 of size 64 [ 28.450560] The buggy address is located 0 bytes to the right of [ 28.450560] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 28.451094] [ 28.451277] The buggy address belongs to the physical page: [ 28.451540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 28.451893] flags: 0x200000000000000(node=0|zone=2) [ 28.452265] page_type: f5(slab) [ 28.452421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.452673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.452897] page dumped because: kasan: bad access detected [ 28.453136] [ 28.453503] Memory state around the buggy address: [ 28.453919] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.454201] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.454419] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.454630] ^ [ 28.454784] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.454997] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.455314] ================================================================== [ 29.111492] ================================================================== [ 29.112026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 29.112337] Write of size 8 at addr ffff888106118e30 by task kunit_try_catch/314 [ 29.112660] [ 29.112771] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 29.112823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.112837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.112861] Call Trace: [ 29.112881] <TASK> [ 29.112900] dump_stack_lvl+0x73/0xb0 [ 29.112955] print_report+0xd1/0x640 [ 29.112979] ? __virt_addr_valid+0x1db/0x2d0 [ 29.113005] ? kasan_atomics_helper+0x218a/0x5450 [ 29.113028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.113055] ? kasan_atomics_helper+0x218a/0x5450 [ 29.113078] kasan_report+0x141/0x180 [ 29.113102] ? kasan_atomics_helper+0x218a/0x5450 [ 29.113129] kasan_check_range+0x10c/0x1c0 [ 29.113165] __kasan_check_write+0x18/0x20 [ 29.113190] kasan_atomics_helper+0x218a/0x5450 [ 29.113214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.113238] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.113264] ? kasan_atomics+0x152/0x310 [ 29.113291] kasan_atomics+0x1dc/0x310 [ 29.113315] ? __pfx_kasan_atomics+0x10/0x10 [ 29.113340] ? __pfx_read_tsc+0x10/0x10 [ 29.113364] ? ktime_get_ts64+0x86/0x230 [ 29.113390] kunit_try_run_case+0x1a5/0x480 [ 29.113416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.113440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.113468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.113494] ? __kthread_parkme+0x82/0x180 [ 29.113516] ? preempt_count_sub+0x50/0x80 [ 29.113542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.113568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.113592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.113618] kthread+0x337/0x6f0 [ 29.113640] ? trace_preempt_on+0x20/0xc0 [ 29.113666] ? __pfx_kthread+0x10/0x10 [ 29.113688] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.113727] ? calculate_sigpending+0x7b/0xa0 [ 29.113753] ? __pfx_kthread+0x10/0x10 [ 29.113776] ret_from_fork+0x116/0x1d0 [ 29.113798] ? __pfx_kthread+0x10/0x10 [ 29.113820] ret_from_fork_asm+0x1a/0x30 [ 29.113853] </TASK> [ 29.113865] [ 29.121140] Allocated by task 314: [ 29.121344] kasan_save_stack+0x45/0x70 [ 29.121501] kasan_save_track+0x18/0x40 [ 29.121704] kasan_save_alloc_info+0x3b/0x50 [ 29.121849] __kasan_kmalloc+0xb7/0xc0 [ 29.121979] __kmalloc_cache_noprof+0x189/0x420 [ 29.122129] kasan_atomics+0x95/0x310 [ 29.122268] kunit_try_run_case+0x1a5/0x480 [ 29.122522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.122771] kthread+0x337/0x6f0 [ 29.122959] ret_from_fork+0x116/0x1d0 [ 29.123158] ret_from_fork_asm+0x1a/0x30 [ 29.123355] [ 29.123447] The buggy address belongs to the object at ffff888106118e00 [ 29.123447] which belongs to the cache kmalloc-64 of size 64 [ 29.124064] The buggy address is located 0 bytes to the right of [ 29.124064] allocated 48-byte region [ffff888106118e00, ffff888106118e30) [ 29.124488] [ 29.124560] The buggy address belongs to the physical page: [ 29.124741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106118 [ 29.124981] flags: 0x200000000000000(node=0|zone=2) [ 29.125175] page_type: f5(slab) [ 29.125360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.125696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.126020] page dumped because: kasan: bad access detected [ 29.126455] [ 29.126545] Memory state around the buggy address: [ 29.126764] ffff888106118d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.127214] ffff888106118d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.127491] >ffff888106118e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.127729] ^ [ 29.127880] ffff888106118e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.128095] ffff888106118f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.128319] ==================================================================